Security Framework for IoT Based Real-Time Health Applications

被引:19
|
作者
Hussain, Aamir [1 ]
Ali, Tariq [2 ]
Althobiani, Faisal [3 ]
Draz, Umar [4 ]
Irfan, Muhammad [5 ]
Yasin, Sana [6 ]
Shafiq, Saher [1 ]
Safdar, Zanab [4 ]
Glowacz, Adam [7 ]
Nowakowski, Grzegorz [8 ]
Khan, Muhammad Salman [9 ]
Alqhtani, Samar [10 ]
机构
[1] MNS Univ Agr Multan, Dept Comp Sci, Multan 60000, Pakistan
[2] COMSATS Univ Islamabad, Dept Comp Sci, Sahiwal Campus, Sahiwal 57000, Pakistan
[3] King Abdulaziz Univ, Fac Maritime Studies, POB 80401, Jeddah, Saudi Arabia
[4] Univ Sahiwal, Dept Comp Sci, Sahiwal 57000, Pakistan
[5] Najran Univ, Dept Elect Engn, Coll Engn, Najran 61441, Saudi Arabia
[6] Univ Okara, Dept Comp Sci, Okara 56130, Pakistan
[7] AGH Univ Sci & Technol, Dept Automat Control & Robot, Fac Elect Engn Automat Comp Sci & Biomed Engn, Al A Mickiewicza 30, PL-30059 Krakow, Poland
[8] Cracow Univ Technol, Fac Elect & Comp Engn, Warszawska 24 Str, PL-31155 Krakow, Poland
[9] COMSATS Univ Islamabad, Dept Comp Sci, Lahore Campus, Lahore 54000, Pakistan
[10] Najran Univ Saudi Arabia, Coll Comp Sci & Informat Syst, Najran 61441, Saudi Arabia
关键词
e-health; IoT and data privacy; IoT layered architecture; CoAP; MONITORING-SYSTEM; CARE; AUTHENTICATION; MANAGEMENT; INTERNET; PRIVACY; CHALLENGES; NETWORKS; THINGS; SAFETY;
D O I
10.3390/electronics10060719
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The amazing fusion of the internet of things (IoT) into traditional health monitoring systems has produced remarkable advances in the field of e-health. Different wireless body area network devices and sensors are providing real-time health monitoring services. As the number of IoT devices is rapidly booming, technological and security challenges are also rising day by day. The data generated from sensor-based devices need confidentiality, integrity, authenticity, and end-to-end security for safe communication over the public network. IoT-based health monitoring systems work in a layered manner, comprising a perception layer, a network layer, and an application layer. Each layer has some security, and privacy concerns that need to be addressed accordingly. A lot of research has been conducted to resolve these security issues in different domains of IoT. Several frameworks for the security of IoT-based e-health systems have also been developed. This paper introduces a security framework for real-time health monitoring systems to ensure data confidentiality, integrity, and authenticity by using two common IoT protocols, namely constrained application protocol (CoAP) and message query telemetry transports (MQTT). This security framework aims to defend sensor data against the security loopholes while it is continuously transmitting over the layers and uses hypertext transfer protocols (HTTPs) for this purpose. As a result, it shields from the breach with a very low ratio of risk. The methodology of this paper focuses on how the security framework of IoT-based real-time health systems is protected under the tiers of CoAP and HTTPs. CoAP works alongside HTTPs and is responsible for providing end-to-end security solutions.
引用
收藏
页码:1 / 15
页数:15
相关论文
共 50 条
  • [21] SolicitudeSavvy: An IoT-based Edge Intelligent Framework for Monitoring Anxiety in Real-time
    Sundaravadivel, Prabha
    Wilmoth, Parker
    Fitzgerald, Ashton
    PROCEEDINGS OF THE 2021 TWENTY SECOND INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN (ISQED 2021), 2021, : 576 - 580
  • [22] An IoT Real-Time Message Exchange Framework Based on Publication-Subscription Mechanism
    Wu, Yuexin
    Fan, Chunxiao
    Fu, Rong
    Li, Hai
    LISS 2013, 2015, : 821 - 828
  • [23] A systematic review of innovations for real-time image security in IoT applications using machine learning and blockchain
    Rai, Manish
    Kumar, Sunil
    Rathore, Pramod Singh
    JOURNAL OF INTELLIGENT MANUFACTURING, 2024,
  • [24] Fault-Tolerant mHealth Framework in the Context of IoT-Based Real-Time Wearable Health Data Sensors
    Albahri, O. S.
    Albahri, A. S.
    Zaidan, A. A.
    Zaidan, B. B.
    Alsalem, M. A.
    Mohsin, A. H.
    Mohammed, K., I
    Alamoodi, A. H.
    Nidhal, Shahad
    Enaizan, Odai
    Chyad, M. A.
    Abdulkareem, Karrar Hameed
    Almahdi, E. M.
    Al Shafeey, Ghailan A.
    Baqer, M. J.
    Jasim, Ali Najm
    Jalood, N. S.
    Shareef, Ali H.
    IEEE ACCESS, 2019, 7 : 50052 - 50080
  • [25] IoT-RRHM: Provably secure IoT-based real-time remote healthcare monitoring framework
    Parai, Krittibas
    Islam, S. K. Hafizul
    JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 138
  • [26] Real-time intelligent image processing for security applications
    Singh, Akansha
    Li, Ping
    Singh, Krishna Kant
    Saravana, Vijayalakshmi
    JOURNAL OF REAL-TIME IMAGE PROCESSING, 2021, 18 (05) : 1787 - 1788
  • [27] A security middleware model for real-time applications on grids
    Xie, T
    Qin, X
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2006, E89D (02): : 631 - 638
  • [28] Real-time intelligent image processing for security applications
    Akansha Singh
    Ping Li
    Krishna Kant Singh
    Vijayalakshmi Saravana
    Journal of Real-Time Image Processing, 2021, 18 : 1787 - 1788
  • [29] Kinect Based Suspicious Posture Recognition for Real-Time Home Security Applications
    Vikram, Mandikal
    Anantharaman, Aditya
    Suhas, B. S.
    Ashwin, T. S.
    Guddeti, Ram Mohana Reddy
    IEEE INDICON: 15TH IEEE INDIA COUNCIL INTERNATIONAL CONFERENCE, 2018,
  • [30] Convergence of big data, cloud and iot for real-time applications
    Krishnamurthi, Rajalakshmi
    Jain, Rachna
    Nayyar, Anand
    Recent Patents on Engineering, 2020, 14 (04)