Back to Search Start Over

Security Framework for IoT Based Real-Time Health Applications

Authors :
Muhammad Salman Khan
Sana Yasin
Aamir Hussain
Tariq Ali
Saher Shafiq
Adam Glowacz
Umar Draz
Grzegorz Nowakowski
Muhammad Irfan
Samar Alqhtani
Faisal Althobiani
Zanab Safdar
Source :
Electronics, Vol 10, Iss 719, p 719 (2021), Electronics, Volume 10, Issue 6
Publication Year :
2021
Publisher :
MDPI AG, 2021.

Abstract

The amazing fusion of the internet of things (IoT) into traditional health monitoring systems has produced remarkable advances in the field of e-health. Different wireless body area network devices and sensors are providing real-time health monitoring services. As the number of IoT devices is rapidly booming, technological and security challenges are also rising day by day. The data generated from sensor-based devices need confidentiality, integrity, authenticity, and end-to-end security for safe communication over the public network. IoT-based health monitoring systems work in a layered manner, comprising a perception layer, a network layer, and an application layer. Each layer has some security, and privacy concerns that need to be addressed accordingly. A lot of research has been conducted to resolve these security issues in different domains of IoT. Several frameworks for the security of IoT-based e-health systems have also been developed. This paper introduces a security framework for real-time health monitoring systems to ensure data confidentiality, integrity, and authenticity by using two common IoT protocols, namely constrained application protocol (CoAP) and message query telemetry transports (MQTT). This security framework aims to defend sensor data against the security loopholes while it is continuously transmitting over the layers and uses hypertext transfer protocols (HTTPs) for this purpose. As a result, it shields from the breach with a very low ratio of risk. The methodology of this paper focuses on how the security framework of IoT-based real-time health systems is protected under the tiers of CoAP and HTTPs. CoAP works alongside HTTPs and is responsible for providing end-to-end security solutions.

Details

ISSN :
20799292
Volume :
10
Database :
OpenAIRE
Journal :
Electronics
Accession number :
edsair.doi.dedup.....1d0f5b59c65d3d68c7792bfb6c013ad6
Full Text :
https://doi.org/10.3390/electronics10060719