ABSTRACT:
Internet of Things provides the mixing of various physical objects which communicate together automatically with intelligence. Nowadays, these IoT objects are connected through internet to supply services in various field like smart home, smart cities, smart transportation, smart healthcare etc. Health care and IoT are complimenting one another and it faces major challenging issues as compare to traditional scenario. IoT architecture-based Health care system uses smart equipment, smart sensors that track physical body in each fraction of seconds which is useful for human to watch and analyze health. Security issues and avoidance has become very significant research topic within the area of Internet of Things enables healthcare services. This paper study various IoT enabled health care services and also provides existing security issues within the IoT architecture.
Cite this article:
Manisha Chandrakar, V. K. Patle. Security Issue in IoT Based Architecture for Health Care System. Research J. Engineering and Tech. 2020;11(2):89-97. doi: 10.5958/2321-581X.2020.00016.1
Cite(Electronic):
Manisha Chandrakar, V. K. Patle. Security Issue in IoT Based Architecture for Health Care System. Research J. Engineering and Tech. 2020;11(2):89-97. doi: 10.5958/2321-581X.2020.00016.1 Available on: https://ijersonline.org/AbstractView.aspx?PID=2020-11-2-12
REFERENCES:
1. N. L. S. J. Meng Xi, "Research on urban anti-terrorism intelligence perception system from the perspective of Internet of things application," International Journal of Electrical Engineering & Education , p. 10, 2019.
2. V. K. S. K. M. K. Valentina Emilia Balas, Handbook of data science approaches for biomedical engineering.
3. M. I. Temitope O. Takpor and Aderemi A. Atayero, "Integrating Internet of Things and EHealth," World Congress onEngineering, pp. 1- 4, 2015.
4. https://www.medicaldevice- [Access online].
5. R. H. Weber, "Internet of Things – new security and privacy challenges,” Computer Law & Security Review," vol. 26, 2010.
6. P. a. P. S. Fremantle, "A survey of secure middleware for the Internet of Things," PeerJ Computer Science, vol. 3, 2017.
7. https://www.medicaldevice- [Access Online].
8. F. B. M. P. E. M. Dave Steinberg, "eclips," in (EMF)Eclipse Modeling Framework, Addison-Wesley Professional, Dec 16, 2008.
9. https://azure.microsoft.com/ [Access Online].
10. B. B. Julia Rauscher, "Safety and Security Architecture Analyses Framework for the Internet of Things of Medical Devices," in *IEEE 20th International Conference on e-Health Networking, Applications and Services (Healthcom)*, 2018.
11. https://www.proofpoint.com/us/ [Access Online].
12. MaryemNeyja, Shahid Mumtaz, Kazi Mohammed Saidul Huq, SherifAdeshinaBusari, Jonathan Rodriguez and Zhenyu Zhou: An IoT-Based E-Health Monitoring System Using ECG Signal. Instituto de Telecomunicações, 3810-193 Aveiro, Portugal, North China Elec- tric Power University.
13. AIOtaibi, Majed, A. Tawalbeh Lo'ai, and Yaser Jararweh. "Integrated sensors system based on loT and mobile cloud computing." In2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA), pp. 1-5. IEEE, 2016.
14. Adhikari, Richard. (2013). "Webcam maker takes FTC's heat for InternetofThings securityfailure."
15. Peterson,A.(2013)."RIPBarnabyJack: The hacker who wanted to save your life."The Washington Post.
16. "About MedSec." (2019). https:llmedsec.comlabout.html
17. "Speaker BillyRios." (2019)Black HatUSA2018.Retrieved from https:llwww.blackhat.comlus-18/speakers/Billy-Rios.html[Access online] .
18. Moh'd, Abidalrahman, Nauman Aslam, Hosein Marzi, and L. A. Tawalbeh. "Hardwareimplementations of securehashing functions on FPGAs for WSNs." InProceedings of the 3rd international conference on the applications of digital information and web technologies(ICADIWT).2010.
19. Vaas, L. (2013). "Doctors disabled wireless in Dick Cheney's pacemaker to thwart hacking." Retrieved from https:llnakedsecurity.sophos.coml20I3/10/221doctors-disabled-wireless-in-dick-cheneys-pacemaker-to-thwart-hackingl[Access online].
20. "Cybersecurity: How can it be improved in health care?" (n.d.) Retrieved fromhttps:/lhealthinformatics.uic.edulbloglcybersecurity-how-can-it-beimproved-in-health-carel[Access online].
21. Kimani, K., Oduol, V., and Langat, K. (2019). "Cyber Security Challenges for loT based smart grid networks." International Journal of Critical Infrastructure Protection 25:36--49. https:llwwwsciencedirectcom.tamusa.idm.oclc.orgiscience/article/piilS1874548217301622. [Access online].
22. "Healthcare and cybersecurity: Highlights from RSAC 2018." (2018). Retrieved from https:llwww.rsaconference.comlvideoslhealthcare-andcybersecurity-highlights-from-rsac-2018. [Access online].
23. Lo'ai,A. Tawalbeh,andWaseemBakhader."Amobilecloudsystem for different useful applications." In2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW), pp. 295-298. IEEE, 2016.
24. Hughes,Robert,FadiMuheidat,MasonLee,andA. TawalbehLo'ai. "Floor Based Sensors Walk Identification System Using Dynamic Time Warping with Cloudlet Support." In2019 IEEE 13th International Conference on SemanticComputing (ICSC), pp.440444.IEEE, 2019.
25. A. I. G. M. Luigi Atzori, The Internet of Things: A survey, 2010.
26. "Google self-driving car.," [Online]. Available: http://www.google.com/selfdrivingcar/ how/..
27. K. Z. a. L. Ge., "A survey on the internet of things security.," in International Conference on Computational Intelligence and Security (CIS), December 2013.
28. R. C. T. C. J. a. K. S. M. V. Bharathi, " Node capture attack in wireless sensor network," in IEEE International Conference on Computational Intelligence Computing Research (ICCIC), , December 2012..
29. W. Y. X. Y. G. X. a. W. Z. J. Lin, " On false data injection attacks against distributed energy routing in smart grid.," in IEEE/ACM Third International Conference on Cyber-Physical Systems (ICCPS), , April 2012.
30. W. Y. a. X. Y. J. Lin, " Towards multistep electricity prices in smart grid electricity markets.," in IEEE Transactions on Parallel and Distributed Systems, , January 2016.
31. A. P. L. v. D. a. P. K. S. A. Seshadri, " softwarebased attestation for embedded devices.," in IEEE Symposium on Security and Privacy,, May 2004.
32. X. H. W. Y. J. L. R. L. Q. Y. a. H. S. X. Yang, " Towards a low-cost remote memory attestation for the smart grid. Sensors,," August 2015.
33. K. G. L. Zhao, "A survey on the Internet of Things security," in 9th International Conference on Computational Intelligence and Security, 2013.
34. A. Mazlan, Internet of Things (IoT) - we are at the tip of An Iceberg., 2014.
35. H. M. Oen, Interoperability at the Application Layer in the Internet of Things, 2015.
36. L. B. N. B. P. C. L. V. a. M. Z. N. Bressan, " The deployment of a smart monitoring system using wireless sensor and actuator networks.," in IEEE International Conference on Smart Grid Communications (SmartGridComm), 2010.
37. N. S. U. E. A. M. A. a. K. R. D. S. U. Maheswari, "A novel robust routing protocol raeed to avoid dos attacks in wsn," in International Conference on Information Communication and Embedded Systems (ICICES), , February 2016.
38. M. C. C. a. J. F. L. T. networks., " Trust-extended authentication mechanism for vehicular ad hoc," IEEE Systems Journal, September 2014.
39. J. Belissent., "Getting clever about smart cities: New opportunities require new business models.," Novemer 2010.
40. U. K. C. a. V. S. Maodv, "Maodv:Modified wormhole detection aodv protocol.," in Sixth International Conference on Contemporary Computing (IC3), , August 2013.
41. S. Y. e. a. K. Ren, "Multi-user broadcast authentication in wireless sensor networks," IEEE, 2009.
42. M. C. C. a. J. F. Lee., "Trust-extended authentication mechanism for vehicular ad hoc networks.," IEEE Systems Journal, September 2014.
43. A. R. Chandan and V. D. Khairnar, “Bluetooth Low Energy (BLE) crackdown using IoT,” 2018 Int. Conf. Inven. Res. Comput. Appl., no. Icirca, pp. 1436–1441, 2018.
44. Naone, E. Taking Control of Cars from Afar. 14 March 2011. Available online: https://www.technologyreview.com/s/423292/taking-control-of-cars-from-afar/ (accessed on Jan 2020).
45. Markoff, J. Researchers Show How a Car’s Electronics Can Be Taken over Remotely. Available online:https://www.nytimes.com/2011/03/10/business/10hack.html (accessed on Feb 2020).
46. J. L. Beavers, “Hacking NHS Pacemakers: A Feasibility Study,” 2019 IEEE 12th Int. Conf. Glob. Secur. Saf. Sustain., pp. 206–212.
47. Kijewski, M. The Medical Devices Most Vulnerable to Hackers. Available online: https://www.medtechintelligence.com/feature_article/medical-devices-vulnerable-hackers/ (accessed on Jan 2020).
48. Estes, A.C. This Nest Security Flaw is Remarkably Dumb. Available online: https://gizmodo.com/this-nestsecurity-flaw-is-remarkably-dumb-1793524264 (accessed on Feb 2020).
49. Wagenseil, P. 75 Percent of Bluetooth Smart Locks Can Be Hacked. Available online: https://www.tomsguide.com/us/bluetooth-lock-hacks-defcon2016, news-23129.html (accessed on Feb 2020).