Security Framework for IoT Based Real-Time Health Applications

被引:19
|
作者
Hussain, Aamir [1 ]
Ali, Tariq [2 ]
Althobiani, Faisal [3 ]
Draz, Umar [4 ]
Irfan, Muhammad [5 ]
Yasin, Sana [6 ]
Shafiq, Saher [1 ]
Safdar, Zanab [4 ]
Glowacz, Adam [7 ]
Nowakowski, Grzegorz [8 ]
Khan, Muhammad Salman [9 ]
Alqhtani, Samar [10 ]
机构
[1] MNS Univ Agr Multan, Dept Comp Sci, Multan 60000, Pakistan
[2] COMSATS Univ Islamabad, Dept Comp Sci, Sahiwal Campus, Sahiwal 57000, Pakistan
[3] King Abdulaziz Univ, Fac Maritime Studies, POB 80401, Jeddah, Saudi Arabia
[4] Univ Sahiwal, Dept Comp Sci, Sahiwal 57000, Pakistan
[5] Najran Univ, Dept Elect Engn, Coll Engn, Najran 61441, Saudi Arabia
[6] Univ Okara, Dept Comp Sci, Okara 56130, Pakistan
[7] AGH Univ Sci & Technol, Dept Automat Control & Robot, Fac Elect Engn Automat Comp Sci & Biomed Engn, Al A Mickiewicza 30, PL-30059 Krakow, Poland
[8] Cracow Univ Technol, Fac Elect & Comp Engn, Warszawska 24 Str, PL-31155 Krakow, Poland
[9] COMSATS Univ Islamabad, Dept Comp Sci, Lahore Campus, Lahore 54000, Pakistan
[10] Najran Univ Saudi Arabia, Coll Comp Sci & Informat Syst, Najran 61441, Saudi Arabia
关键词
e-health; IoT and data privacy; IoT layered architecture; CoAP; MONITORING-SYSTEM; CARE; AUTHENTICATION; MANAGEMENT; INTERNET; PRIVACY; CHALLENGES; NETWORKS; THINGS; SAFETY;
D O I
10.3390/electronics10060719
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The amazing fusion of the internet of things (IoT) into traditional health monitoring systems has produced remarkable advances in the field of e-health. Different wireless body area network devices and sensors are providing real-time health monitoring services. As the number of IoT devices is rapidly booming, technological and security challenges are also rising day by day. The data generated from sensor-based devices need confidentiality, integrity, authenticity, and end-to-end security for safe communication over the public network. IoT-based health monitoring systems work in a layered manner, comprising a perception layer, a network layer, and an application layer. Each layer has some security, and privacy concerns that need to be addressed accordingly. A lot of research has been conducted to resolve these security issues in different domains of IoT. Several frameworks for the security of IoT-based e-health systems have also been developed. This paper introduces a security framework for real-time health monitoring systems to ensure data confidentiality, integrity, and authenticity by using two common IoT protocols, namely constrained application protocol (CoAP) and message query telemetry transports (MQTT). This security framework aims to defend sensor data against the security loopholes while it is continuously transmitting over the layers and uses hypertext transfer protocols (HTTPs) for this purpose. As a result, it shields from the breach with a very low ratio of risk. The methodology of this paper focuses on how the security framework of IoT-based real-time health systems is protected under the tiers of CoAP and HTTPs. CoAP works alongside HTTPs and is responsible for providing end-to-end security solutions.
引用
收藏
页码:1 / 15
页数:15
相关论文
共 50 条
  • [31] Cloud-hosted intelligence for real-time IoT applications
    Birman K.
    Hariharan B.
    De Sa C.
    Operating Systems Review (ACM), 2019, 53 (01): : 7 - 13
  • [32] Energy efficient resource management for real-time IoT applications
    Fereira, Rolden John
    Ranaweera, Chathurika
    Lee, Kevin
    Schneider, Jean-Guy
    INTERNET OF THINGS, 2025, 30
  • [33] A fast stream transaction system for real-time IoT applications
    Yukonhiatou, Chaxiong
    Yoshihisa, Tomoki
    Kawakami, Tomoya
    Teranishi, Yuuichi
    Shimojo, Shinji
    INTERNET OF THINGS, 2020, 11
  • [34] Real-Time Lighter Sound Recognition System for IoT Applications
    Yang, Yu-Sheng
    Chen, Che-Wei
    Sheu, Ming-Hwa
    Wang, Szu-Hong
    Chen, Tzu-Hsiung
    2020 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS - TAIWAN (ICCE-TAIWAN), 2020,
  • [35] Towards a Software Architecture for Near Real-time Applications of IoT
    Grzelak, Dominik
    Mai, Carl
    Assmann, Uwe
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, BIG DATA AND SECURITY (IOTBDS 2019), 2019, : 197 - 206
  • [36] Proactive Context Caching Based on Situation Prediction for Real-Time Mobile IoT Applications
    Weerasinghe, Shakthi
    Zaslavsky, Arkady
    Loke, Seng W.
    Guang Li-Huang
    PROCEEDINGS OF THE 2024 25TH IEEE INTERNATIONAL CONFERENCE ON MOBILE DATA MANAGEMENT, MDM 2024, 2024, : 313 - 318
  • [37] A Dynamic Intervals Determination Method Based on Transaction Rates for Real-time IoT Applications
    Yukonhiatou, Chaxiong
    Yoshihisa, Tomoki
    Kawakami, Tomoya
    Teranishi, Yuuichi
    Shimojo, Shinji
    2019 IEEE 43RD ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), VOL 2, 2019, : 7 - 12
  • [38] A Framework for Security Monitoring of Real IoT Testbeds
    La, Vinh
    de Oca, Edgardo Montes
    Mallouli, Wissam
    Cavalli, Ana
    PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON SOFTWARE TECHNOLOGIES (ICSOFT), 2021, : 645 - 652
  • [39] Reflections on Security Options for the Real-time Transport Protocol Framework
    Perkins, Colin
    2014 IEEE 22ND INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP), 2014, : 642 - 647
  • [40] Wearable IoT enabled real-time health monitoring system
    Wan, Jie
    Al-awlaqi, Munassar A. A. H.
    Li, MingSong
    O'Grady, Michael
    Gu, Xiang
    Wang, Jin
    Cao, Ning
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2018,