Cyber Security Challenges of Deploying IoT in Smart Cities for Healthcare Applications

As technology improves at an astounding rate, cities have to improve their services in terms of safety, healthcare, transportation, and the overall welfare of their residents. Internet of Things (IoT) play a major role in the infrastructure of a smart city by gathering and processing data from distributed sensors to implement smart services, such as traffic control, environment monitoring, and waste management. However, the most challenging part is securing data from various attacks while maintaining low-complexity techniques and algorithms. Considering security concerns to the deployment of IoT as the main source of data collection and transmission, attacks are classified to identify a suitable scheme of defending against them. This paper provides a two-fold contribution to analyze security and privacy in the context of smart cities for healthcare applications. Thus, on one hand an overview of different IoT applications and their cyber vulnerabilities are presented. On the other hand, a comprehensive evaluation of possible approaches to mitigate the problem of cyber attacks is described.

[1]  Emanuele Garone,et al.  False data injection attacks against state estimation in wireless sensor networks , 2010, 49th IEEE Conference on Decision and Control (CDC).

[2]  JeongGil Ko,et al.  Wireless Sensor Networks for Healthcare , 2010, Proceedings of the IEEE.

[3]  John A. Stankovic,et al.  Context-aware wireless sensor networks for assisted living and residential monitoring , 2008, IEEE Network.

[4]  Michele Nogueira Lima,et al.  Detection of sinkhole attacks for supporting secure routing on 6LoWPAN for Internet of Things , 2015, 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM).

[5]  Yan Rong Shi,et al.  Internet of Things Key Technologies and Architectures Research in Information Processing , 2013 .

[6]  Xin Zhou,et al.  Study on security architecture in the Internet of Things , 2011, Proceedings of 2012 International Conference on Measurement, Information and Control.

[7]  Shi Yan-rong,et al.  Internet of Things Key Technologies and Architectures Research in Information Processing , 2013 .

[8]  Raj Kulkarni,et al.  Internet of Things: Architecture and Security , 2014 .

[9]  Majid Sarrafzadeh,et al.  The SmartCane system: an assistive device for geriatrics , 2008, BODYNETS.

[10]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[11]  Roberto Manduchi,et al.  Color Targets: Fiducials to Help Visually Impaired People Find Their Way by Camera Phone , 2007, EURASIP J. Image Video Process..

[12]  David E. Culler,et al.  Telos: enabling ultra-low power wireless research , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[13]  Xiaohui Liang,et al.  Sybil Attacks and Their Defenses in the Internet of Things , 2014, IEEE Internet of Things Journal.

[14]  Nasser S. Abouzakhar,et al.  Critical Infrastructure Cybersecurity : A Review of Recent Threats and Violations , 2013 .

[15]  Sarmad Ullah Khan,et al.  Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges , 2012, 2012 10th International Conference on Frontiers of Information Technology.

[16]  Mianxiong Dong,et al.  A Hierarchical Security Framework for Defending Against Sophisticated Attacks on Wireless Sensor Networks in Smart Cities , 2016, IEEE Access.

[17]  Mike Burmester,et al.  RFID Security : Attacks , Countermeasures and Challenges , 2007 .

[18]  Kyung Sup Kwak,et al.  Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications , 2010, Journal of Medical Systems.

[19]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[20]  Leslie Lenert,et al.  MASCAL: RFID Tracking of Patients, Staff and Equipment to Enhance HospitalResponse to Mass Casualty Events , 2005, AMIA.

[21]  Tzonelih Hwang,et al.  BSN-Care: A Secure IoT-Based Modern Healthcare System Using Body Sensor Network , 2016, IEEE Sensors Journal.

[22]  Choong Seon Hong,et al.  Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.

[23]  Mohamed F. Younis,et al.  On handling QoS traffic in wireless sensor networks , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.

[24]  Kamin Whitehouse,et al.  Protecting your daily in-home activity information from a wireless snooping attack , 2008, UbiComp.

[25]  Hannu Tenhunen,et al.  International Conference on Ambient Systems , Networks and Technologies ( ANT 2015 ) SEA : A Secure and E ffi cient Authentication and Authorization Architecture for IoT-Based Healthcare Using Smart Gateways , 2015 .

[26]  Terran Lane,et al.  An Application of Machine Learning to Anomaly Detection , 1999 .

[27]  Tian He,et al.  SIGF: a family of configurable, secure routing protocols for wireless sensor networks , 2006, SASN '06.

[28]  Ashok Hanjagi,et al.  A Public Health Care Information System Using GIS and GPS: A Case Study of Shiggaon , 2007 .

[29]  Benjamin K. S. Khoo,et al.  RFID as an Enabler of the Internet of Things: Issues of Security and Privacy , 2011, 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing.

[30]  I. A. Khatib,et al.  Throughput Analysis of WEP Security in Ad Hoc Sensor Networks , 2005 .

[31]  Maurizio A. Spirito,et al.  Denial-of-Service detection in 6LoWPAN based Internet of Things , 2013, 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[32]  John A. Stankovic,et al.  Security in wireless sensor networks , 2004, SASN '04.