Title :
The Internet of Things for healthcare monitoring: Security review and proposed solution
Author :
Rghioui, Anass ; L´aarje, Aziza ; Elouaai, Fatiha ; Bouhorma, Mohammed
Author_Institution :
Dept. of Comput. Sci., Abdelmalek Essaadi Univ., Tangiers, Morocco
Abstract :
The development of the Internet of Things will greatly facilitate the process of patient´s diagnosis and monitoring, with small IP-based wireless sensors implemented on the patient´s body, his physiological parameters, such as blood pressure and heart rate, can be monitored remotely and continuously. This scenario must absolutely respect the confidentiality and privacy of patient´s medical information, only caregivers and authorized persons should possess the right to access these information. The security must be ensured throughout the healthcare application scenario. This paper presents a study of the potential security problems in this application, and proposes a security model as a solution. Our model is based on symmetric cryptography with a proposed key management system and network nodes authentication mechanism.
Keywords :
IP networks; Internet of Things; authorisation; computer network security; cryptography; data privacy; health care; information retrieval; message authentication; patient diagnosis; patient monitoring; telemedicine; wireless sensor networks; IP-based wireless sensors; Internet of Things; authorized persons; blood pressure; caregivers; healthcare application scenario; healthcare monitoring; heart rate; information access; key management system; network nodes authentication mechanism; patient body; patient diagnosis; patient medical information confidentiality; patient medical information privacy; patient monitoring; physiological parameters; remote monitoring; security model; security problems; security review; symmetric cryptography; Decision support systems; Internet of Things; Medical services; Monitoring; Security; Wireless communication; Wireless sensor networks; Healthcare monitoring; Internet of Things; IoT; Network Security; WBAN; WPAN; WSN;
Conference_Titel :
Information Science and Technology (CIST), 2014 Third IEEE International Colloquium in
Conference_Location :
Tetouan
Print_ISBN :
978-1-4799-5978-5
DOI :
10.1109/CIST.2014.7016651