Security Framework for IoT Based Real-Time Health Applications
Abstract
:1. Introduction
1.1. Health Care in IoT
1.2. Security and Privacy
2. Background and Related Work
3. IoT Layered Architecture
4. Methodology
5. Evaluation and Implementation
Results of Contiki Cooja Simulation
- Border router, which allows access to the internet.
- Web-server, which gives internet access to the border router. Through the following steps, the Cooja simulation for a border router is done.
- For creating the server mote: Go to motes > Create mote > Select the mote type > Browse > Go to example folder > Select IPV6 > Rpl-border router > Border-router.c > Open > Compile > Create > Add motes > Add only 1 mote to make it server > View > Select the interfaces for the network.
6. Conclusions
Author Contributions
Funding
Acknowledgments
Conflicts of Interest
References
- Pasha, M.; Shah, S.M.W. Framework for e-health systems in IoT-based environments. Wirel. Commun. Mob. Comput. 2018, 2018. [Google Scholar] [CrossRef]
- Swaroop, K.N.; Chandu, K.; Gorrepotu, R.; Deb, S. A health monitoring system for vital signs using IoT. Internet Things 2019, 5, 116–129. [Google Scholar] [CrossRef]
- Hussain, A.; Draz, U.; Ali, T.; Tariq, S.; Irfan, M.; Glowacz, A.; Daviu, J.A.A.; Yasin, S.; Rahman, S. Waste Management and Prediction of Air Pollutants Using IoT and Machine Learning Approach. Energies 2020, 13, 3930. [Google Scholar] [CrossRef]
- Ali, T.; Noureen, J.; Draz, U.; Shaf, A.; Yasin, S.; Ayaz, M. Participants Ranking Algorithm for Crowdsensing in Mobile Communication. ICST Trans. Scalable Inf. Syst. 2018, 5. [Google Scholar] [CrossRef]
- Rahaman, A.; Islam, M.M.; Islam, M.R.; Sadi, M.S.; Nooruddin, S. Developing IoT Based Smart Health Monitoring Systems: A Review. Rev. D’intelligence Artif. 2019, 33, 435–440. [Google Scholar] [CrossRef] [Green Version]
- Chattopadhyay, A.K.; Nag, A.; Ghosh, D.; Chanda, K. A Secure Framework for IoT-Based Healthcare System. In Proceedings of International Ethical Hacking Conference 2018; Springer: Singapore, 2018. [Google Scholar]
- Al-Janabi, S.; Al-Shourbaji, I.; Shojafar, M.; Shamshirband, S. Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications. Egypt. Inform. J. 2017, 18, 113–122. [Google Scholar] [CrossRef] [Green Version]
- Hussain, A.; Wenbi, R.; da Silva, A.L.; Nadher, M.; Mudhish, M. Health and emergency-care platform for the elderly and disabled people in the Smart City. J. Syst. Softw. 2015, 110, 253–263. [Google Scholar] [CrossRef]
- Hussain, A.; Rao, W.; Zheng, X.; Wang, H.; Aristides, L.D.S. Personal Home Healthcare System for the Cardiac Patient of Smart City Using Fuzzy Logic. J. Adv. Inf. Technol. 2016, 7, 58–64. [Google Scholar] [CrossRef]
- Yew, H.T.; Ng, M.F.; Ping, S.Z.; Chung, S.K.; Chekima, A.; Dargham, J.A. IoT Based Real-Time Remote Patient Monitoring System. In Proceedings of the 2020 16th IEEE International Colloquium on Signal Processing & Its Applications (CSPA), Langkawi, MA, USA, 28–29 February 2020; pp. 176–179. [Google Scholar]
- Kim, D.-W.; Choi, J.-Y.; Han, K.-H. Medical Device Safety Management Using Cybersecurity Risk Analysis. IEEE Access 2020, 8, 115370–115382. [Google Scholar] [CrossRef]
- Abouelmehdi, K.; Beni-Hssane, A.; Khaloufi, H.; Saadi, M. Big data security and privacy in healthcare: A Review. Procedia Comput. Sci. 2017, 113, 73–80. [Google Scholar] [CrossRef]
- Islam, S.; Lloret, J.; Zikria, Y.B. Internet of Things (IoT)-Based Wireless Health: Enabling Technologies and Applications. Electronics 2021, 10, 148. [Google Scholar] [CrossRef]
- Draz, U.; Ali, T.; Yasin, S.; Waqas, U.; Zahra, S.B.; Shoukat, M.A.; Gul, S. A Pattern Detection Technique of L-MYC for Lungs Cancer Oncogene in Bioinformatics Big Data. In Proceedings of the 2020 17th International Bhurban Conference on Applied Sciences and Technology (IBCAST), Islamabad, Pakistan, 14–18 January 2020; pp. 218–223. [Google Scholar]
- Ali, G.; Ali, T.; Irfan, M.; Draz, U.; Sohail, M.; Glowacz, A.; Sulowicz, M.; Mielnik, R.; Bin Faheem, Z.; Martis, C. IoT Based Smart Parking System Using Deep Long Short Memory Network. Electronics 2020, 9, 1696. [Google Scholar] [CrossRef]
- Wu, F.; Wu, T.; Yuce, M.R. An Internet-of-Things (IoT) Network System for Connected Safety and Health Monitoring Applications. Sensors 2018, 19, 21. [Google Scholar] [CrossRef] [Green Version]
- Kavitha, S.; Alphonse, P.J.A.; Reddy, Y.V. An Improved Authentication and Security on Efficient Generalized Group Key Agreement Using Hyper Elliptic Curve Based Public Key Cryptography for IoT Health Care System. J. Med. Syst. 2019, 43, 260. [Google Scholar] [CrossRef]
- Carta, S.; Podda, A.S.; Recupero, D.R.; Saia, R. A Local Feature Engineering Strategy to Improve Network Anomaly Detection. Futur. Internet 2020, 12, 177. [Google Scholar] [CrossRef]
- Almahdi, E.M.; Zaidan, A.A.; Zaidan, B.B.; AlSalem, M.A.; Albahri, O.S.; Albahri, A.S. Mobile Patient Monitoring Systems from a Benchmarking Aspect: Challenges, Open Issues and Recommended Solutions. J. Med. Syst. 2019, 43, 207. [Google Scholar] [CrossRef]
- Shah, S.T.U.; Badshah, F.; Dad, F.; Amin, N.; Jan, M.A. Cloud-assisted IoT-based smart respiratory monitoring system for asthma patients. In Applications of Intelligent Technologies in Healthcare; Springer: Cham, Switzerland, 2019; pp. 77–86. [Google Scholar]
- Rahmani, A.-M.; Thanigaivelan, N.K.; Gia, T.N.; Granados, J.; Negash, B.; Liljeberg, P.; Tenhunen, H. Smart e-Health Gateway: Bringing intelligence to Internet-of-Things based ubiquitous healthcare systems. In Proceedings of the 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC), Las Vegas, NV, USA, 9–12 January 2015; Institute of Electrical and Electronics Engineers (IEEE): Piscataway, NJ, USA, 2015; pp. 826–834. [Google Scholar]
- Nanayakkara, M.; Halgamuge, M.; Syed, A. Security and Privacy of Internet of Medical Things (IoMT) Based Healthcare Applications: A Review. In Proceedings of the International Conference on Advances in Business Management and Information Technology, Istanbul, Turkey, 6–7 November 2019. [Google Scholar]
- Mohammed, K.I.; Zaidan, A.A.; Zaidan, B.B.; Albahri, O.S.; AlSalem, M.A.; Hadi, A.; Hashim, M.; Albahri, A.S. Real-Time Remote-Health Monitoring Systems: A Review on Patients Prioritisation for Multiple-Chronic Diseases, Taxonomy Analysis, Concerns and Solution Procedure. J. Med. Syst. 2019, 43, 223. [Google Scholar] [CrossRef] [PubMed]
- Sun, Y. Securing Body Sensor Networks and Pervasive Healthcare Systems. Ph.D. Thesis, Imperial College London, London, UK, 2019. [Google Scholar]
- Selvaraj, P.; Doraikannan, S. Privacy and Security Issues on Wireless Body Area and IoT for Remote Healthcare Monitoring. Intell. Pervasive Comput. Syst. Smarter Healthc. 2019, 227–253. [Google Scholar] [CrossRef]
- Masood, I.; Wang, Y.; Daud, A.; Aljohani, N.R.; Dawood, H. Towards smart healthcare: Patient data privacy and security in sensor-cloud infrastructure. Wirel. Commun. Mob. Comput. 2018, 2018. [Google Scholar] [CrossRef]
- Ali, T.; Yasin, S.; Draz, U.; Ayaz, M.; Tariq, T.; Javaid, S. Motif Detection in Cellular Tumor p53 Antigen Protein Sequences by using Bioinformatics Big Data Analytical Techniques. Int. J. Adv. Comput. Sci. Appl. 2018, 9, 330–338. [Google Scholar] [CrossRef] [Green Version]
- Choi, J.; In, Y.; Park, C.; Seok, S.; Seo, H.; Kim, H. Secure IoT framework and 2D architecture for End-To-End security. J. Supercomput. 2018, 74, 3521–3535. [Google Scholar] [CrossRef]
- Yan, Z.; Zhang, P.; Vasilakos, A.V. A survey on trust management for Internet of Things. J. Netw. Comput. Appl. 2014, 42, 120–134. [Google Scholar] [CrossRef]
- Fortino, G.; Messina, F.; Rosaci, D.; Sarné, G.L. Using trust and local reputation for group formation in the Cloud of Things. Futur. Gener. Comput. Syst. 2018, 89, 804–815. [Google Scholar] [CrossRef]
- Li, X.; Xuan, Z.; Wen, L. Research on the Architecture of Trusted Security System Based on the Internet of Things. In Proceedings of the 2011 Fourth International Conference on Intelligent Computation Technology and Automation, Shenzhen, China, 28–29 March 2011; Volume 2, pp. 1172–1175. [Google Scholar]
- Qi, J.; Yang, P.; Min, G.; Amft, O.; Dong, F.; Xu, L. Advanced internet of things for personalised healthcare systems: A survey. Pervasive Mob. Comput. 2017, 41, 132–149. [Google Scholar] [CrossRef]
- Yasin, S.; Ali, T.; Draz, U.; Jung, L.T.; Arshad, M.A. Formal Analysis of Coherent Non-Redundant Partition-based Motif Detection Algorithm for Data Visual Analytics. J. Appl. Environ. Biol. Sci. 2018, 8, 23–30. [Google Scholar]
- Mohapatra, S.; Rekha, K.S. Sensor-Cloud: A Hybrid Framework for Remote Patient Monitoring. Int. J. Comput. Appl. 2012, 55, 7–11. [Google Scholar] [CrossRef]
- Hamrioui, S.; Díez, I.D.L.T.; Garcia-Zapirain, B.; Saleem, K.; Rodrigues, J.J.P.C. A Systematic Review of Security Mechanisms for Big Data in Health and New Alternatives for Hospitals. Wirel. Commun. Mob. Comput. 2017, 2017, 1–6. [Google Scholar] [CrossRef]
- Logambal, M.; Thiagarasu, V. Healthcare Monitoring Systems: A WBAN Approach for Patient Monitoring. Int. J. Future Revolut. Comput. Sci. Commun. Eng. 2017, 3, 26–31. [Google Scholar]
- Buccafurri, F.; Fotia, L.; Lax, G. Privacy-preserving resource evaluation in social networks. In Proceedings of the 2012 Tenth Annual International Conference on Privacy, Security and Trust, Paris, France, 16–18 July 2012; pp. 51–58. [Google Scholar]
- Huang, H.; Gong, T.; Ye, N.; Wang, R.; Dou, Y. Private and Secured Medical Data Transmission and Analysis for Wireless Sensing Healthcare System. IEEE Trans. Ind. Inform. 2017, 13, 1227–1237. [Google Scholar] [CrossRef]
- Farooq, S.M.; Hussain, S.M.S.; Kiran, S.; Ustun, T.S. Certificate Based Authentication Mechanism for PMU Communication Networks Based on IEC 61850-90-5. Electronics 2018, 7, 370. [Google Scholar] [CrossRef] [Green Version]
- Hathaliya, J.J.; Tanwar, S. An exhaustive survey on security and privacy issues in Healthcare 4. Comput. Commun. 2020, 153, 311–335. [Google Scholar] [CrossRef]
- Hatzivasilis, G.; Soultatos, O.; Ioannidis, S.; Verikoukis, C.; Demetriou, G.; Tsatsoulis, C. Review of Security and Privacy for the Internet of Medical Things (IoMT). In Proceedings of the 2019 15th International Conference on Distributed Computing in Sensor Systems (DCOSS), Santorini, Greece, 29–31 May 2019; pp. 457–464. [Google Scholar]
- Ali, T.; Masood, K.; Irfan, M.; Draz, U.; Nagra, A.; Asif, M.; Alshehri, B.; Glowacz, A.; Tadeusiewicz, R.; Mahnashi, M.; et al. Multistage Segmentation of Prostate Cancer Tissues Using Sample Entropy Texture Analysis. Entropy 2020, 22, 1370. [Google Scholar] [CrossRef] [PubMed]
- Tewari, A.; Verma, P. Security and Privacy in E-Healthcare Monitoring with WBAN: A Critical Review. Int. J. Comput. Appl. 2016, 136, 37–42. [Google Scholar] [CrossRef]
- Draz, U.; Ali, T.; Yasin, S. Towards Pattern Detection of Proprotein Convertase Subtilisin/kexin type 9 (PCSK9) Gene in Bioinformatics Big Data. NFC IEFR J. Eng. Sci. Res. 2018, 6, 160–165. [Google Scholar]
- Al-Qaseemi, S.A.; Almulhim, H.A.; Almulhim, M.F.; Chaudhry, S.R. IoT architecture challenges and issues: Lack of standardization. In Proceedings of the 2016 Future Technologies Conference (FTC), San Francisco, CA, USA, 6–7 December 2016; pp. 731–738. [Google Scholar]
- Caviness, J.A. Wireless Sensing for Healthcare Solutions. In Proceedings of the 2018 IEEE International Conference on Electro/Information Technology (EIT), Rochester, MI, USA, 3–5 May 2018; pp. 923–927. [Google Scholar]
- Pandey, I.; Dutta, H.S.; Banerjee, J.S. WBAN: A Smart Approach to Next Generation e-healthcare System. In Proceedings of the 2019 3rd International Conference on Computing Methodologies and Communication (ICCMC), Erode, India, 27–29 March 2019; pp. 344–349. [Google Scholar]
- Sun, W.; Cai, Z.; Li, Y.; Liu, F.; Fang, S.; Wang, G. Security and Privacy in the Medical Internet of Things: A Review. Secur. Commun. Netw. 2018, 2018, 5978636. [Google Scholar] [CrossRef]
- Shuwandy, M.L.; Zaidan, B.B.; Zaidan, A.A.; Albahri, A.S. Sensor-Based mHealth Authentication for Real-Time Remote Healthcare Monitoring System: A Multilayer Systematic Review. J. Med. Syst. 2019, 43, 33. [Google Scholar] [CrossRef]
- Nowakowski, G. REST API safety assurance by means of HMAC mechanism. Inf. Syst. Manag. 2016, 5, 358–369. [Google Scholar]
- Niksaz, P.; Branch, M. Wireless body area networks: Attacks and countermeasures. Int. J. Sci. Eng. Res. 2015, 6, 556–568. [Google Scholar]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Hussain, A.; Ali, T.; Althobiani, F.; Draz, U.; Irfan, M.; Yasin, S.; Shafiq, S.; Safdar, Z.; Glowacz, A.; Nowakowski, G.; et al. Security Framework for IoT Based Real-Time Health Applications. Electronics 2021, 10, 719. https://doi.org/10.3390/electronics10060719
Hussain A, Ali T, Althobiani F, Draz U, Irfan M, Yasin S, Shafiq S, Safdar Z, Glowacz A, Nowakowski G, et al. Security Framework for IoT Based Real-Time Health Applications. Electronics. 2021; 10(6):719. https://doi.org/10.3390/electronics10060719
Chicago/Turabian StyleHussain, Aamir, Tariq Ali, Faisal Althobiani, Umar Draz, Muhammad Irfan, Sana Yasin, Saher Shafiq, Zanab Safdar, Adam Glowacz, Grzegorz Nowakowski, and et al. 2021. "Security Framework for IoT Based Real-Time Health Applications" Electronics 10, no. 6: 719. https://doi.org/10.3390/electronics10060719
APA StyleHussain, A., Ali, T., Althobiani, F., Draz, U., Irfan, M., Yasin, S., Shafiq, S., Safdar, Z., Glowacz, A., Nowakowski, G., Khan, M. S., & Alqhtani, S. (2021). Security Framework for IoT Based Real-Time Health Applications. Electronics, 10(6), 719. https://doi.org/10.3390/electronics10060719