Background/Literature Review
Discuss about the Secure IOT-Based Modern Healthcare System.
Internet of things or the IoT can be considered as one of the most common research topic. The growt of this technology has been greatly favored by the various type of advancements that has occurred in the field of electronics, IPv6 and the wireless networks [1]. The use of IoT has greatly increased and it is being used in various environments, which includes the homes, healthcare, and many more. Besides this various type of approached have been proposed which can be used for eth purpose of controlling the IoT devices. The major concern regarding the use of the IoT includes the various type of security issues. The security concerns are to be kept in the highest priority and should be first topic for the research [2].
The interest of body wearable is increasing day by day which is acting as a powerful tool for different application of healthcare and also the different devices. Different IoT devices are available which are currently being used for various purposes which mainly includes the personal healthcare, awareness regarding various activities and fitness.
Various researchers have been associated with proposing new techniques of clinical application of the IoT technology. This technology has greatly helped in remote healthcare monitoring along with functionalities for long-term recording of the health statues [3]. It has been seen that most of the remote health care frameworks, which has been proposed, consists of three tiers and this includes the body sensor network tier, communication and networking tier and lastly the processing and the analyzing nodes. The first tier or the body sensor network tier mainly includes the various wearable sensors, which works like as the unit for data acquisition. The second tier or the communication and the networking and the services are associated with the collection of the data from the sensors and then forward the data to the next tier [4][5]. The last tier, which is associated with the processing and analyzing of the nodes [6][7].
Most of the researchers have been facing a certain challenges. The main challenges which the researcher are facing while proposing new authentication mechanism but also while proposing new authentication mechanism that would be responsible for supporting the different kinds of IoT devices [8]. The authentication standards that the smart phones are having would be applicable for the smart devices as well. By smart devices, we mainly mean the smart watches, smart thermostat and many more [9].
Challenges with authentication mechanisms
The researchers have been capable of proposing two main device identity security solutions, this mainly includes the Physical protection solution, and the cryptography based authentication solution [10]. The main purpose of designing the physical protection approach is for protecting the device from being damaged or attacked at the level of the physical layer and this is mainly done application of the various physical concepts [11]. Along with this, the cryptography based authentication approach is mainly designed by making use of the IoT Based RFID in the field of security. Besides this it also consists of various features and different algorithms has been proposed which are based upon the IoT RFID [12].
There exists limited number of resources in the IoT devices and all this are connected to the resources. This ultimately makes the devices vulnerable to various kind of risks and the devices become vulnerable to this attack [13]. In order to guarantee the security and also to identify the identities authentication is needed and this would be helping in preventing the attackers and other type of malicious attacks [14]. High resources are required for the processing in the traditional authentication methods. Besides this, the IoT is also considered as a constraint resource environment, which is having a limited number of resources. Along with this, a lightweight authentication approach assisted by the robust security features which is generally required for preserving the energy and to fit the processing capabilities [15][16].
Some of the latest authentication approach have been used for the purpose of providing a secure communication. The approaches have been associated with the use of the HTTP protocol in order to authenticate the communication suffer [17]. In addition, this is done from the high overhead, which is resulted from the usage of the HTTP protocol. This HTTP protocols are not at all optimized for the IoT environment, which are having limited resources. Whereas the other approaches are associated with the usage of the AES in order to encrypt the communication [18]. The AES is associated with the usage of the long encryption keys along with the complex calculations which are ultimately resulting in the high consumption of the power and are also not fitted for the requirements of the IoT energy resources which are restricted [19].
Various types of authentication has been proposed for the purpose of providing the authentication that is required by the IoT devices [20]. An enhances mutual authentication model was proposed by [18] for the IoT environment. Besides this, they were also associated with providing a some suggestions regarding the improvement of the algorithm associated with authenticating the RFID authentication protocol, which is based upon the challenge response present in the distributed database environment. This ultimately resulted in making the proposed architecture much more suitable for the IoT control system environment [21]. Three main steps are included in this approach and this includes the add backup device for each terminal devices used for controlling, add monitor devices to follow and monitor terminal devices and finally add a push in alarm mechanism for alarming for any failed authentication process.
Proposed solutions for authentication mechanisms
Whereas a Two-Phase Authentication Protocol was proposed by [22] for the Wireless Sensor Network present in the Distributed IoT application. This protocol can be stated as the certificate based authentication approach. The two phase authentication is associated allowing both the IoT devices as wella s the control station in order to authenticate and recognize each other. Besides this a secure connection was also established and the transfer of the data was done in a secure way. They were also associated with using the protocol supports resources limitation of the sensor nodes and had also considered the network scalability and heterogeneity. Besides this the CA or the Certificate authority was used for the purpose of issuing the certificates. Once a certificate is received then the existing nodes would be capable of moving and changing their location. The CA would also be helping in the validation of the identity of the sensors and communicating with the other entities present at the network. Before initializing a connection the team members need to connect to the CA first in order to confirm the identity of the destination. The approach has also been considered as an end-to-end application layer authentication approach and is also dependent on the other security features present at the lower layer.
A light weight mutual authentication schema was proposed by [23] in order to validate the identities in the IoT devices which are associated with participating in the environment before participating in the network. Along with this they also proposed a decreased communication overhead. They were also associated with choosing a Constrained Application Protocol (CoAP) as a under layer protocol in order to provide communication that exists between the various IoT devices. The process of authentication has been completed by making use of the 128-bit AES or the Advanced Encryption Standard. After this an identification of the client and the server is done at the first step. Followed by this is the providing of different resources to the clients which are based upon certain conditions that are determined according to the request. The transmission of the condition specific data is associated with minimizing the number of transmitted packets. The ultimate result is the reduction of the energy consumption and the computation.
A secure authentication schema for the IoT was proposed by the [24] which was mainly dependent on the ECC or the Elliptical Curve Cryptography based algorithm which is associated with supporting the security solutions which are better. This happens when it is compared with the other type of PKC or the Public Key cryptography algorithm due to the small size of the keys [25]. Besides this the authentication protocol is used by the EEC for the embedded devices which in turn makes use of the HTTP protocol. By making use of the cookies of the HTTP authentication of the smart devices are done and this a novel approach. All these devices needs to be configured by making use of the TCP/IP. The Proposed Authentication Protocol was designed for the purpose of using the HTTP cookies which are to be implemented in order to fit the embedded devices which are having the constrain environment and are controlled by the cloud servers. Three phases are included in the proposed protocol and the phase includes the phase of registration, phase of the pre-computation and the phase of login. The phase of registration mainly includes the embedded devices which registers themselves with the cloud servers and this in turn is associated with sending back of the cookies that are generally stored in the embedded devices. Whereas in the pre-computational and the login phase the devices have been associated with connecting with the server and they need to send a request for login [26]. Lastly, in the authentication phase the embedded devices as well the cloud servers have to mutually authenticate themselves by making use of the EEC algorithm. Instead of having small encryption key this has been associated with increasing the size of the encrypted message in a significant way. Besides this the ECC algorithm is very much complex along with being difficult for implementation when compared with the other cryptographic algorithms and they also require much more processing resources.
A Threshold Cryptography-based Group Authentication or the TCGA was proposed for the IoT in [27]. This model has been associated with providing an authenticity for the IoT devices which is mainly based upon the communication model of the group. Besides this the TCGA is also designed for the purpose of implementing it in the Wi-Fi environment. Besides this it is also associated with creating a secret channel or session keys for authenticating each group and this in turn can be used for the purpose of group applications. There exists a group head in each group and they are responsible for the generation of the keys and followed by the distribution of the new keys every time whenever a new member gets added for the purpose of preserving the leakage of the group keys. This group head is generally referred to as the group authority. There exists five main modules and this mainly includes the distribution of the keys, updating of the keys, generation of the group credits, authenticating the listener and decryption of the messages.
According to [28] SEA or the Secure and Efficient Authentication and Authorization Architecture for the IoT based healthcare was proposed by making use of the Smart Gateways. This architecture was mainly based upon the certificate-based DTLS handshake protocol. The following parts have been included in the Architecture and this mainly includes the medical sensors network which are associated with the gathering of the information from the body of the patients or from a room of the patient which would be followed by helping in the process of treatment and medical diagnosis. The second component mainly includes the Smart e-Health Gateway which is associated with enabling the various systems responsible for communication which would be acting as an immediate for the MSN and also for the internet. Lastly the third part includes the Back-end system which are associated with receiving, processing and storing of the information which are collected.
New CoAP option was proposed by [29]. This CoAP is associated with working at the application layer which is associated with providing the ability of retrieving the data from devices. This data might include the metadata and the measurement of the sensors. This information are used by different real-time applications. However, sometimes it is a security requirement to not retrieve the raw communication data. However only the abstractions, which also includes the high level state of the observed entities. Additionally along with the nature of the resource constrained devices might be accesses by anyone by making use of the internet, reduction of the consumption of energy also plays a vital role. The proposed option would be helping in reducing the messages numbers while observing the sensor resources and this would be resulting in the reduced consumption of the energy along with increasing the lifetime of the devices.
The highest concern in the developing mainly includes the prevention of the exhaustion of the resources. This resources are responsible for the restriction of the nature of the IoT environment devices and mainly requires authentication mechanisms which would be fitting the limited memory, processing and the energy of the IoT devices [30]. The research proposal is associated with providing an authentication mechanism which is mainly dependent on the CoAP and the Elliptic Curve Cryptography or the ECC [30].
References:
- Gope, P., & Hwang, T. (2016). BSN-Care: A secure IoT-based modern healthcare system using body sensor network. IEEE Sensors Journal, 16(5), 1368-1376.
- Manogaran, C. T. G., & Priyan, M. (2017). Centralized fog computing security platform for IoT and cloud in healthcare system. Exploring the convergence of big data and the internet of things, 141.
- Fernandez, F., & Pallis, G. C. (2014, November). Opportunities and challenges of the Internet of Things for healthcare: Systems engineering perspective. In Wireless Mobile Communication and Healthcare (Mobihealth), 2014 EAI 4th International Conference on(pp. 263-266). IEEE.
- Farooq, M. U., Waseem, M., Mazhar, S., Khairi, A., & Kamal, T. (2015). A review on internet of things (IoT). International Journal of Computer Applications, 113(1).
- Atzori, L., Iera, A., & Morabito, G. (2010). The internet of things: A survey. Computer networks, 54(15), 2787-2805.
- Hassanalieragh, M., Page, A., Soyata, T., Sharma, G., Aktas, M., Mateos, G., … & Andreescu, S. (2015, June). Health monitoring and management using Internet-of-Things (IoT) sensing with cloud-based processing: Opportunities and challenges. In Services Computing (SCC), 2015 IEEE International Conference on (pp. 285-292). IEEE.
- Abie, H., & Balasingham, I. (2012, February). Risk-based adaptive security for smart IoT in eHealth. In Proceedings of the 7th International Conference on Body Area Networks(pp. 269-275). ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering).
- Bui, N., & Zorzi, M. (2011, October). Health care applications: a solution based on the internet of things. In Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies(p. 131). ACM.
- Zhao, K., & Ge, L. (2013, December). A survey on the internet of things security. In Computational Intelligence and Security (CIS), 2013 9th International Conference on(pp. 663-667). IEEE.
- Azzawi, M. A., Hassan, R., & Bakar, K. A. A. (2016). A Review on Internet of Things (IoT) in Healthcare. International Journal of Applied Engineering Research, 11(20), 10216-10221.
- Govinda, K., & Saravanaguru, R. (2016). Review on IOT Technologies. International Journal of Applied Engineering Research, 11(4), 2848-2853.
- Mahalle, P., Babar, S., Prasad, N. R., & Prasad, R. (2010, July). Identity management framework towards internet of things (IoT): Roadmap and key challenges. In International Conference on Network Security and Applications(pp. 430-439). Springer, Berlin, Heidelberg.
- Toma, I., Simperl, E., & Hench, G. (2009, June). A joint roadmap for semantic technologies and the internet of things. In Proceedings of the Third STI Roadmapping Workshop, Crete, Greece(Vol. 1).
- Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A vision, architectural elements, and future directions. Future generation computer systems, 29(7), 1645-1660.
- Madakam, S., Ramaswamy, R., & Tripathi, S. (2015). Internet of Things (IoT): A literature review. Journal of Computer and Communications, 3(05), 164.
- Suresh, P., Daniel, J. V., Parthasarathy, V., & Aswathy, R. H. (2014, November). A state of the art review on the Internet of Things (IoT) history, technology and fields of deployment. In Science Engineering and Management Research (ICSEMR), 2014 International Conference on(pp. 1-8). IEEE.
- Zhang, Z. K., Cho, M. C. Y., Wang, C. W., Hsu, C. W., Chen, C. K., & Shieh, S. (2014, November). IoT security: ongoing challenges and research opportunities. In Service-Oriented Computing and Applications (SOCA), 2014 IEEE 7th International Conference on(pp. 230-234). IEEE.
- Khoo, B. (2011, October). RFID as an Enabler of the Internet of Things: Issues of Security and Privacy. In Internet of Things (iThings/CPSCom), 2011 International Conference on and 4th International Conference on Cyber, Physical and Social Computing (pp. 709-712). IEEE.
- Suo, H., Wan, J., Zou, C., & Liu, J. (2012, March). Security in the internet of things: a review. In Computer Science and Electronics Engineering (ICCSEE), 2012 international conference on(Vol. 3, pp. 648-651). IEEE.
- Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., & Qiu, D. (2014). Security of the Internet of Things: perspectives and challenges. Wireless Networks, 20(8), 2481-2501.
- YANG, J. C., Hao, P. A. N. G., & ZHANG, X. (2013). Enhanced mutual authentication model of IoT. The Journal of China Universities of Posts and Telecommunications, 20, 69-74.
- Rhee, K., Kwak, J., Kim, S., & Won, D. (2005, April). Challenge-response based RFID authentication protocol for distributed database environment. In International Conference on Security in Pervasive Computing(pp. 70-84). Springer, Berlin, Heidelberg.
- Porambage, P., Schmitt, C., Kumar, P., Gurtov, A., & Ylianttila, M. (2014, April). Two-phase authentication protocol for wireless sensor networks in distributed IoT applications. In Wireless Communications and Networking Conference (WCNC), 2014 IEEE(pp. 2728-2733). IEEE.
- Jan, M. A., Nanda, P., He, X., Tan, Z., & Liu, R. P. (2014, September). A robust authentication scheme for observing resources in the internet of things environment. In Trust, Security and Privacy in Computing and Communications (TrustCom), 2014 IEEE 13th International Conference on(pp. 205-211). IEEE.
- Kalra, S., & Sood, S. K. (2015). Secure authentication scheme for IoT and cloud servers. Pervasive and Mobile Computing, 24, 210-223.
- Batina, L., Guajardo, J., Kerins, T., Mentens, N., Tuyls, P., & Verbauwhede, I. (2007, March). Public-key cryptography for RFID-tags. In Pervasive Computing and Communications Workshops, 2007. PerCom Workshops’ 07. Fifth Annual IEEE International Conference on(pp. 217-222). IEEE.
- Liu, J., Xiao, Y., & Chen, C. P. (2012, June). Authentication and access control in the internet of things. In Distributed Computing Systems Workshops (ICDCSW), 2012 32nd International Conference on(pp. 588-592). IEEE.
- Mahalle, P. N., Prasad, N. R., & Prasad, R. (2014, May). Threshold cryptography-based group authentication (TCGA) scheme for the internet of things (IoT). In Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE), 2014 4th International Conference on(pp. 1-5). IEEE.
- Moosavi, S. R., Gia, T. N., Rahmani, A. M., Nigussie, E., Virtanen, S., Isoaho, J., & Tenhunen, H. (2015). SEA: a secure and efficient authentication and authorization architecture for IoT-based healthcare using smart gateways. Procedia Computer Science, 52, 452-459.
- Mietz, R., Abraham, P., & Romer, K. (2014, April). High-level states with CoAP: Giving meaning to raw sensor values to support IoT applications. In Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), 2014 IEEE Ninth International Conference on(pp. 1-6). IEEE.
- Shelby, Z., Hartke, K., & Bormann, C. (2014). The constrained application protocol (CoAP). [32] Kapoor, V., Abraham, V. S., & Singh, R. (2008). Elliptic curve cryptography. Ubiquity, 2008(May), 7.