Professional Documents
Culture Documents
08 - Chapter 1
08 - Chapter 1
08 - Chapter 1
CHAPTER 1
INTRODUCTION
This chapter introduces and describes IoT and challenges faced to provide
security and privacy in medical health care system. Section 1.1 Explains basics
concept of Internet of Things (IoT), Section 1.2 Introduce security issue in IoT and
challenges of IoT, Section 1.3 Describes health care monitoring system, Section 1.4
explains Health care monitoring using IoT, Section 1.5 Narrate recent trends in health
care monitoring system. Section 1.6 Gives security issues in health care monitoring
systems. Section 1.7 Delineates motives of the research, Section 1.8 Explains research
objective in detail. Section 1.9 Describes Contribution of Thesis. 1.10 Presents the
Organization of Thesis.
The Internet of Things (IoT) can define as inter connection of objects and
providing services to peoples, data will be shared in order to fulfill various type of
application. The elementary intent of IoT is to meet our daily life schedule by
performing various tasks, the various types of application from day-to-day life to
industry. IoT network [1] are highly distributed and provide wide application. IoT is a
fundamental domain in which data stream are generated with the rapid development
of health care system. Studies have shown wearable devices, fitness App form a major
role in common citizen in the globe. They also predict that in the succeeding years the
technology aided health care will be most trending, more and more updated smart
watches, heart rate monitors and other fitness trackers will come into market in
coming times.
Even though the concept of combining the sensors computer and networks
the key technologies [2] are now accompany the application of Internet of Things.
The three main characteristics of IoT are: first, the utilization of sensors. Second,
2
The technology used in IoT are [4] RFID tags, sensors, mobile phones and
actuators, these devices communicate with each other’s collect medical data. Key
trend in IoT is commercial wearable products and mobile application enables for
collecting medical health data, apart from wearable technology sensor technology is
also widely implemented.
• Sensor layer
o Accelerometer sensor
o Temperature sensor
o Rain sensor
o GPS sensor
o Light sensor
o Humidity sensor
o Proximity sensor
• Network layer
The network layer of IoT provides the function of routing data and
transmission to different IoT devices, at this layer [10] routing, switching and gateway
are operated using traditional technologies like WiFi, Bluetooth, Zigbee etc., a detail
study is explained in Table 1.1. The gateway serves as mediator to collect data from
the sensors.
4
• Application
The application layer is the place where the user interacts with and this
layer is responsible for delivering application specific to user. At this layer the
purpose of layer is to create a smart environment. The service may vary with different
application because the service depends on data collected.
The three-layer architecture [12] is the most basic architecture, due to the
continuous evolution of technology and in order to fulfill the requirement a four layer
and followed by adding support layer to become a five layered architecture [15],
along with security mechanism to make more secure environment.
• Support Layer
• Processing Layer
It is also called as middleware layer; this layer collect data coming from
transport layer. The processing of collected data in done in this layer, removing of
unwanted information and extract useful information is executed in this layer.
However, it also deals with Big- data [17] in IoT concepts.
• Business Layer
The indent behavior of application layer brings top most layer called
Business layer and it is similar to manage a complete system. The major duties are to
control and manage application, this layer is also concern with security factors. This
layer has an ability to store and manage the information.
The number of IoT devices are increasing each and every day, likely
health care monitoring application also getting popularize in the recent era due to
providing better comfort and medical treatment to patient. It has been reported that the
e-health care system in 2020 has more than tripled since 2010; Figure 1.3 [20] will
show the increase of e-health system from 2010 to 2020.
6
People use IoT due to the popularity and benefits provided by the
technology. IoT allows people to automate, control and achieve ask that are essential
for life.
Along with the growth of IoT, new security issues arise while traditional
security issues become more severe. The main reasons are the heterogeneity and the
large scale of the objects. The factors of security can be further divided into two
categories: the diversity of the “Things” diversity means different thing to different
people and the communication of the “Things” shows how the devices are connected.
To provide quality healthcare system to the patient, the IoT network must secure
enough. Each IoT layer faces different attacks and threats, attack can be classified into
two: i) active attack ii) passive attack. The active attack stops the services and the
passive attack monitors IoT network without effecting the services. There are many
[21] challenges in IoT like energy efficiency, poor management, security and privacy
etc.
The main IoT security are from the heterogeneity and the large scale of
objects.
ensure the integrity of records used in the naming architecture. Although the Domain
Name System (DNS) provides name translation services to Internet users, it is an
insecure naming system. It remains vulnerable to various attacks, such as DNS cache
poisoning attack, and man-in-the-middle attack.
• Malicious node: here attacker act as a node in the network and provide
fake data
• Timing attack: this type of attack occurred when a system with week
computing capability
8
• Man in The Middle (MiTM): MiTM attack where attackers interrupt and
alter communication between device and they believe that they are
communicating with each other. Her the communication is controlled by
attacker so that he can alter the message according their needs.
• Storage attack: The valid information of the users is kept safe in cloud or
storage device, here this attack occurred in either cloud or storage devices.
The application layer faces may threat from inside and outside from the
environment, the major security threats faced in [23] application layers are
• Malicious code attack: the code contains any part of the software that
causes damage to the system. This type may control the use of anti-virus
by activating itself.
• Cross cite scripting: the attacker can change the content by insert a client-
side script in trusted site of the user, it’s also called as injection attack.
The various attack that occurs in support layer are DoS attack, Malicious
node unauthorized access etc., likely the attack that effect processing layer that effect
performance is
9
• Exhaustion: the exhaustion occurs after effect of attack like DoS attack,
this may cause exhaust the system resources.
The major problems occur in the business layer are in the security issues,
they are
• Business logic attack: this attack uses the advantage of flaw in the
programming, this type controls the information between user and
database
IoT starts with connectivity, the most common technology [24] used for
communication IoT are:
3) WiFi (Wireless Fidelity): radio waves are used for communication; it does
10
not provide any encryption mechanism so easy for attacker to get into.
Eavesdropping is another major threat in this technology. 4) ZigBee
Technology: this provides personal area network (PAN), provides low
power conception with maximum number of users. MAC layer in the
ZigBee provide security, access control, encryption and integrity are the
different service provided for security. 5) Wireless Sensor Network
(WSN): sensor is spatially distributed in the network, sensors battery,
microcontroller and memory are the components [25] in the WSN. The
main functionality is to collect information from sensor and store in
memory, the major security attack in WSN are DoS, Service attack, DoS
etc.
Frequency Encryption
RFID Health care No authorization
waves (AES, DES)
Home, Encryption,
ZigBee Wireless Fixed key
Industries, PA Integrity
With regards to privacy in IoT, every solution or framework must address the
following challenges (1) Profiling and Tracking. Association of an identity with a
11
certain individual is a threat as this may lead to profiling and tracking. Hence, one of
the major challenges is to disallow such activity in IoT and take some preventive
measures. (2) Localization and Tracking. Localization is another threat as systems try
to determine and record person’s location through time and space. One of the major
challenges of security solutions for IoT is to design protocols for interactions with IoT
that discourages such activity. Profiling information related to a certain individual to
infer interests by correlation between other profiles and data is very common in e-
commerce applications. Huge challenge lies in balancing interests of businesses for
profiling and data analysis with user’s privacy requirements. (3) Secure Data
Transmission. Yet another security is to ensure that data are transmitted in a secure
manner through the public medium without concealing information to anyone and
thereby prevent unauthorized collection of information about things and people.
Access Control
Privacy Authentication
Secure
Mobile Security
Middleware
Confidentiality
Health care monitoring devices are developed for empowering idea and
technique for remote monitoring, diagnostics and other health related activity. Health
monitoring should be a continuous tracking of patient’s health status and provide data
to the medical team for diagnosis. This will help elderly and patients in case of
13
emergency without going hospital. Most of the developed and under developed
countries have shortage of human resource in the health care sectors; therefore, new
model of health care system is required for the public. The senior citizen doesn’t
frequently visit the hospital as they cannot move easily, advance technique can be
used for their well wishes.
• Wearable sensor and Central node: These sensors are used to measure
physiological condition, like pulse, blood pressure, vital condition etc.
Some special purpose sensors like motion detection, angle sensor are also
used in the health monitoring system; the central node receives data from
the sensor node and forward to external devices. A dedicated central node
is implemented to improve the functionality in the health monitoring
system.
14
IoT health monitoring system has many vulnerable threats, the different types are
• Privacy: IoT device collect data from a remote access mechanism this
have major concern in security and privacy. Data collected through the
sensor are collected and stored in cloud through internet; IoT device and
internet are threatened heath data. Health data is shared by different nodes
and each node should provide privacy and security.
There are few disadvantages in remote health care monitoring, but the
issue is largely solved and these systems are designed for many emergencies purpose.
Machine learning can also use for obtain from large dataset to identify the
disease based on previous patient diagnosis results and developing exact treatment
plan. Cloud platform enables machine learning for providing huge database and high
computational power, sensor nodes and mobile devices would not have much storage
capacity or resources to analyze data through machine learning thus it need of cloud
technology is essential to achieve this. The data obtained from machine learning
include trends in disease, development of treatment plan and connectivity of disease.
It is also possible to implement classification algorithm in cloud to get better results,
but there is no best machine learning algorithm rather than some are suitable for one
context but not suitable for other.
term health monitoring for elder people or patient with clinical disease is another
aspects, thus proper monitoring and follow-up can provide by doctor through the e-
health system.
Cloud based e-health system has emerged recently, the location of patient
data changed. E-health applications provide services along with cloud technology,
data security compression of data are some additional challenges faced. Thus, hybrid
cloud addressed to overcome the drawback for existing scenario. Intelligence in health
monitoring [37] is another segment; an intelligent system is capable of carrying out
processing by perform analysis of previous experience or hypothesis. The prediction
and assessment of future health state and control the individual to become patient in
future. A number of method and technique in Artificial Intelligence (AI) used to
develop intelligence in health care systems. Artificial neural network, fuzzy logic is
also can consider developing intelligent health care systems.
Ageing of human being leads to new challenge for society and health care
environment, technology provide assistance to disable people and support daily
activity. An efficient health monitoring system should exhibit basic security services
like confidentiality, privacy, authentication etc. The following are major challenges
and security concern in health care monitoring system.
• Sensor data quality: quality of sensor data collected from the sensor
should ensure, like noisy or false data leads to wrong diagnosis of disease.
Sensor may collect sensor data due to unexpected hardware failure or
interception of third parties due to unreadable communication.
• Privacy and security for health data: To guarantee security and privacy for
patient health data is one of the major issues in e health care systems.
Another major security issue is distributed data storage and access to
sensitive private patient health information, for example i) MAC spoofing
attack, ii) Blue over attack iii) Brute Force attack iv) DoS attack etc.
The factor that motivated to devise the proposed system are; (i) IoT network faces lot
of challenges in providing security and privacy like data security and user privacy. (ii)
Unsecured storage and transmission of heath related data, (iii) public access of update
mechanism leads to more unsecure environment. (iv) user interface application is
needed to address the privacy. To overcome these issues, the proposed system is
devised.
Objective 2: Ensures the anonymity and traceability of both medical node and user.
21
Chapter 3: Describes the proposed security architecture and the components of the
architecture
Chapter 6: Concludes the research work with the scope for future work in health
monitoring system.