Abstract
Internet of Things (IoT) networks are fast-evolving and expanding into most aspects of human society. The rapid proliferation of smart devices, such as smart phones and wearables that have been adopted for personal use in everyday life, has produced a demand for utilities that can assist people with achieving goals for a successful lifestyle, i.e., to live healthier and more productive lives. With continued research and development into technology, the costs of building IoT networks, including the devices and the accessibility of information from these networks is reducing at a rapid rate, allowing for the feasibility of large volumes of data to be produced. This is of great importance to the health informatics field, as health data made available from personal devices such as wearables and sensors may be of significant value to stakeholders within the health service industry, such as insurance companies and hospitals or doctors. Data collected by these sensors are transmitted by the devices to a centralized server, which can be accessed and retrieved by those service providers for further processing, analysis, and use. Devices used for this purpose through the IoT network can be referred to as the Internet of Health Things (IoHT). This paper broadly reviews the current security protocols that are available, taking the approach of a horizontal and vertical perspective. Possible options to protect this sensitive data and to protect network security are proposed, with considerations of simplicity and ease of implementation, as well as cost factors involved to meet the constraints of personal health devices (PHD), which are often limited in terms of battery power and processing power.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
- 2.
- 3.
- 4.
- 5.
- 6.
References
Adibi S (2012) Link technologies and BlackBerry mobile health (mHealth) solutions: a review. IEEE Inf Technol B 16(4):586–597. https://doi.org/10.1109/TITB.2012.2191295
Adibi S (2015) A multilayer nonrepudiation system: a SuiteB approach. Secur Commun Netw 8(9):1698–1706. https://doi.org/10.1002/sec.1117
Boneh D, Crescenzo GD, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In: Cachin C, Camenisch JL (eds) Advances in cryptology—EUROCRYPT 2004. Springer, Heidelberg, pp 506–522. https://doi.org/10.1007/978-3-540-24676-3_30
Campagna M (2012) A cryptographic suite for embedded systems (SuiteE). https://tools.ietf.org/html/draft-campagna-suitee-04
Chisholm D (2014) The good hacker: the wonderful life and strange death of Barnaby Jack. https://www.metromag.co.nz/society/society-people/the-good-hacker-the-wonderful-life-and-strange-death-of-barnaby-jack
Faisal M, Al-Muhtadi J, Al-Dhelaan A (2013) Integrated protocols to ensure security services in wireless sensor networks. Int J Distrib Sens Netw. https://doi.org/10.1155/2013/740392
Fischer A (1989) Public key/signature cryptosystem with enhanced digital signature certification. https://patents.google.com/patent/CA2000400A1/
Ha DA, Nguyen KT, Zao JK (2016) Efficient authentication of resource-constrained IoT devices based on ECQV implicit certificates and datagram transport layer security protocol. In: Proceedings of the Seventh Symposium on Information and Communication Technology. ACM, New York, pp 173–179. https://doi.org/10.1145/3011077.3011108
IEEE 11073 Standards Committee (2019) IEEE 11073-20601-2019—IEEE approved draft—health informatics—personal health device communication—Part 20601: application profile – optimized exchange protocol. https://standards.ieee.org/standard/11073-20601-2019.html
Irum S, Ali A, Khan FA, Abbas H (2013) A hybrid security mechanism for intra-WBAN and inter-WBAN communications. Int J Distrib Sens Netw. https://doi.org/10.1155/2013/842608
Kang J, Adibi S (2015) A review of security protocols in mHealth wireless body area networks (WBAN). In: Doss R, Piramuthu S, Zhou W (eds) Future network systems and security. Springer, Cham, pp 61–83. https://doi.org/10.1007/978-3-319-19210-9_5
Kao C, Liebovitz DM (2017) Consumer mobile health apps: current state, barriers, and future directions. Clin Informat Physiatry 9(5S):106–115. https://doi.org/10.1016/j.pmrj.2017.02.018
Nasser N, Chen Y (2007) SEEM: secure and energy-efficient multipath routing protocol for wireless sensor networks. Comput Commun 30(11–12):2401–2412. https://doi.org/10.1016/j.comcom.2007.04.014
Nilsson R, Saltzstein B (2012) Bluetooth low energy vs. classic Bluetooth: choose the best wireless technology for your application. http://venkatachalam.co.in/wp-content/uploads/2015/02/Bluetooth-Low-Energy-vs-Bluetooth-Classic.pdf
Portilla J, Otero A, de la Torre E, Riesgo T, Stecklina O, Peter S, Langendörfer P (2010) Adaptable security in wireless sensor networks by using reconfigurable ECC hardware coprocessors. Int J Distrib Sens Netw. https://doi.org/10.1155/2010/740823
Pritzker P, May WE (2019) Annex C: approved random number generators for FIPS PUB 140-2, security requirements for cryptographic modules. https://csrc.nist.gov/csrc/media/publications/fips/140/2/final/documents/fips1402annexc.pdf
Rushanan M, Rubin AD, Kune DF, Swanson CM (2014) SoK: security and privacy in implantable medical devices and body area networks. In: 2014 IEEE Symposium on Security and Privacy. IEEE, pp 524–539. https://doi.org/10.1109/SP.2014.40
Toorani M, Beheshti A (2008) LPKI—a lightweight public key infrastructure for the mobile environments. In: 11th IEEE Singapore International Conference on Communication Systems. IEEE, pp 162–166. https://doi.org/10.1109/ICCS.2008.4737164
Viega J, Thompson H (2012) The state of embedded-device security (spoiler alert: it’s bad). IEEE Secur Priv 10(5):68–70. https://doi.org/10.1109/MSP.2012.134
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Kang, J.J. (2020). Systematic Analysis of Security Implementation for Internet of Health Things in Mobile Health Networks. In: Sikos, L., Choo, KK. (eds) Data Science in Cybersecurity and Cyberthreat Intelligence. Intelligent Systems Reference Library, vol 177. Springer, Cham. https://doi.org/10.1007/978-3-030-38788-4_5
Download citation
DOI: https://doi.org/10.1007/978-3-030-38788-4_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-38787-7
Online ISBN: 978-3-030-38788-4
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)
