Open Access
Subscription Access
Secure Modern Healthcare System Based on Internet of Things and Secret Sharing of IoT Healthcare Data
The Internet of Things (IoT), is a concept that describes how objects that we are used in daily life will interact and negotiate with other objects over the internet. The amount of devices with Wi-Fi capabilities and built-in sensors keeps on increasing. IoT combines smart devices to provide smart services and applications like smart cities, smart healthcare, smart home, and digital farm etc. But it is very crucial to secure connected IoT devices and networks because of the nature of IoT system. In this paper, the existing works are analyzed and an IoT based healthcare system architecture is proposed. An authentication scheme to enhance the security of the proposed healthcare system is also present.
Keywords
Internet of Things, Smart Healthcare System, Secure Authentication, IOT Architecture.
User
Font Size
Information
- National Intelligence Council, Disruptive Civil Technologies – Six Technologies with Potential Impacts on US Interests Out to 2025- Conference Report CR 2008-07, April 2008, Online: www.dni.gov/nic/NIC_home.html.
- Maarten Botterman, “Internet of Things: an early reality of the Future Internet”, European Commission, Information Society and Media Directorate, 2009.
- Gartner-IT-Glossary, available at: http://www.gartner.com/itglossary/ internet-of-things/ 2015.
- Aaditya Jain, Bhuwnesh Sharma, Pawan Gupta, “Internet of Things: Architecture, Security Goals and Challenges-A Survey”, 3rd International Conference on Recent Trends in Engineering Science and Management (ICRTESM), ISBN:978-81-932074-4-4, April 2016.
- Eleonora Borgia, "The Internet of Things vision: Key features, applications and open issues", Computer Communications Vol. 54, pp.1-31, 2014.
- Andrew Whitmore, Anurag Agarwal, and Li Da Xu. "The Internet of Things-A survey of topics and trends", Information Systems Frontiers Vol. 17, Issue. 2, pp. 261-274, 2015.
- Somayya Madakam, R. Ramaswamy, Siddharth Tripathi, "Internet of Things (IoT): A Literature Review", Journal of Computer and Communications, Vol. 3, Issue. 05, pp. 164-173, 2015.
- John Pescatore, and G. Shpantzer, "Securing the Internet of Things Survey", SANS Institute, pp. 1-22, 2016.
- Jorge Granjal, Edmundo Monteiro, and Jorge Sa Silva, "Security for the internet of things: a survey of existing protocols and open research issues", Communications Surveys & Tutorials, IEEE, Vol. 17, Issue 3, pp. 1294-1312, 2015.
- J. Sathish Kumar and Dhiren R. Patel, "A survey on Internet of Things: security and privacy issues", International Journal of Computer Applications, Vol. 90, Issue. 11, pp. 20-26, 2016.
- Md Mahmud Hossain, Maziar Fotouhi, and Ragib Hasan, "Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things", Services, IEEE World Congress on. IEEE, pp. 1-8, 2015.
- Jing, Qi, Athanasios V. Vasilakos, Jiafu Wan, Jingwei Lu, and Dechao Qiu, "Security of the internet of things: Perspectives and challenges.",Wireless Networks, Vol. 20, Issue. 8, pp. 2481-2501, 2014.
- Jan Henrik Ziegeldorf, Oscar García Morchon, and Klaus Wehrle, "Privacy in the Internet of Things: threats and challenges", Security and Communication Networks, Vol. 7, Issue. 12, pp. 2728-2742, 2014.
- Sye Loong Keoh, Sahoo Subhendu Kumar, and Hannes Tschofenig, "Securing the internet of things: A standardization perspective", Internet of Things Journal, IEEE, Vol. 1, N0. 3, pp. 265-275, 2014.
- M. U. Farooq, Muhammad Waseem, Anjum Khairi and Sadia Mazhar "A critical analysis on the security concerns of internet of things (IoT)", International Journal of Computer Applications, Vol. 111, No. 7, pp. 1-6, 2015.
- Sanaz Rahimi Moosavi, Ethiopia Nigussie, Seppo Virtanen and Jouni Isoaho, “An Elliptic Curve-based Mutual Authentication Scheme for RFID Implant Systems”, Procedia Computer Science (Elsevier), Vol. 32, pp. 198 – 206, 2014.
- Manoj Kumar S, “An Analysis of Authentication Schemes for Internet of Things”, International Journal of Engineering Sciences & Research Technology, Vol. 4, Issue 6, pp. 978 – 984, 2015.
- G. Usha Devi, E. Vishnu Balan, M. K. Priyan and C. Gokulnath, “Mutual Authentication Scheme for IoT Application”, Indian Journal of Science and Technology, Vol 8. No. 26, pp. 2-5, 2016.
- Dave Evans, “The Internet of Things: How the Next Evolution of the Internet Is Changing Everything”, CISCO White paper, pp. 1-11, 2011.
Abstract Views: 241
PDF Views: 3