A Review-Based Taxonomy for Secure Health Care Monitoring: Wireless Smart Cameras

Health records data security is one of the main challenges in e-health systems. Authentication is one of the essential security services to support the stored data confidentiality, integrity, and availability. This research focuses on the secure storage of patient and medical records in the healthcare sector where data security and unauthorized access is an ongoing issue. A potential solution comes from biometrics, although their use may be time-consuming and can slow down data retrieval. This research aims to overcome these challenges and enhance data access control in the healthcare sector through the addition of biometrics in the form of fingerprints. The proposed model for application in the healthcare sector consists of Collection, Network communication, and Authentication (CNA) using biometrics, which replaces an existing password-based access control method. A sensor then collects data and by using a network (wireless or Zig-bee), a connection is established, after connectivity analytics and data management work which processes and aggregate the data. Subsequently, access is granted to authenticated users of the application. This IoT-based biometric authentication system facilitates effective recognition and ensures confidentiality, integrity, and reliability of patients’ records and other sensitive data. The proposed solution provides reliable access to healthcare data and enables secure access through the process of user and device authentication. The proposed model has been developed for access control to data through the authentication of users in healthcare to reduce data manipulation or theft.

[1]  Kim-Kwang Raymond Choo,et al.  A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network , 2018, IEEE Transactions on Dependable and Secure Computing.

[2]  Athanasios V. Vasilakos,et al.  An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks , 2017, Comput. Electr. Eng..

[3]  Wang Zhi-she,et al.  Multi-sensor image enhanced fusion algorithm based on NSST and top-hat transformation , 2015 .

[4]  Mohammed Abdullahi,et al.  An Efficient Next Hop Selection Algorithm for Multi-Hop Body Area Networks , 2016, PloS one.

[5]  Yonghong Chen,et al.  Energy-efficient relay tracking with multiple mobile camera sensors , 2018, Comput. Networks.

[6]  Oluwarotimi Williams Samuel,et al.  Fuzzy vault-based biometric security method for tele-health monitoring systems , 2018, Comput. Electr. Eng..

[7]  Lu Zhou,et al.  Lightweight IoT-based authentication scheme in cloud computing circumstance , 2019, Future Gener. Comput. Syst..

[8]  Hodjat Hamidi,et al.  An approach to develop the smart health using Internet of Things and authentication based on biometric technology , 2019, Future Gener. Comput. Syst..

[9]  D. Bhattacharjee,et al.  Development Of Smart Detachable Wireless Sensing System For Environmental Monitoring , 2014 .

[10]  André Rossi,et al.  Heuristics for lifetime maximization in camera sensor networks , 2017, Inf. Sci..

[11]  Muhammad Khurram Khan,et al.  An Improved User Authentication Protocol for Healthcare Services via Wireless Medical Sensor Networks , 2014, Int. J. Distributed Sens. Networks.

[12]  Xuelong Li,et al.  A Review of Co-Saliency Detection Algorithms , 2018 .

[13]  Ping Wang,et al.  Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment , 2015, IEEE Transactions on Dependable and Secure Computing.

[14]  Ximeng Liu,et al.  SUAA: A Secure User Authentication Scheme with Anonymity for the Single & Multi-server Environments , 2019, Inf. Sci..

[15]  Mohammed Feham,et al.  Trust Key Management Scheme for Wireless Body Area Networks , 2011, Int. J. Netw. Secur..

[16]  Hassan Ghasemzadeh,et al.  Context-Aware Data Processing to Enhance Quality of Measurements in Wireless Health Systems: An Application to MET Calculation of Exergaming Actions , 2015, IEEE Internet of Things Journal.

[17]  Katia Obraczka,et al.  Wireless Smart Camera Networks for the Surveillance of Public Spaces , 2014, Computer.

[18]  D. Shalini Punithavathani,et al.  Optimized ensemble decision-based multi-focus imagefusion using binary genetic Grey-Wolf optimizer in camera sensor networks , 2016, Multimedia Tools and Applications.

[19]  Ashok Kumar Das,et al.  A secure and effective biometric‐based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor , 2017, Int. J. Commun. Syst..

[20]  Peyman Dodangeh,et al.  A biometric security scheme for wireless body area networks , 2018, J. Inf. Secur. Appl..

[21]  Li Li,et al.  Design and Implementation of a RFID Reader/Router in RFID-WSN Hybrid System , 2018, Future Internet.

[22]  Hannu Tenhunen,et al.  International Conference on Ambient Systems , Networks and Technologies ( ANT 2015 ) SEA : A Secure and E ffi cient Authentication and Authorization Architecture for IoT-Based Healthcare Using Smart Gateways , 2015 .

[23]  Carmen C. Y. Poon,et al.  A fast key generation method based on dynamic biometrics to secure wireless body sensor networks for p-health , 2010, 2010 Annual International Conference of the IEEE Engineering in Medicine and Biology.

[24]  Chih-Yung Chang,et al.  QoS guaranteed surveillance algorithms for directional wireless sensor networks , 2018, Ad Hoc Networks.

[25]  Samaher Al-Janabi,et al.  Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications , 2017 .

[26]  Yixian Yang,et al.  On development of security monitoring system via wireless sensing network , 2018, EURASIP J. Wirel. Commun. Netw..

[27]  Jean-Michel Redoute,et al.  An Autonomous Wireless Body Area Network Implementation Towards IoT Connected Healthcare Applications , 2017, IEEE Access.

[28]  Yang Wang,et al.  Coverage problem with uncertain properties in wireless sensor networks: A survey , 2017, Comput. Networks.

[29]  Xingming Sun,et al.  Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement , 2016, IEEE Transactions on Information Forensics and Security.

[30]  Farrukh Aslam Khan,et al.  A Cloud-based Healthcare Framework for Security and Patients' Data Privacy Using Wireless Body Area Networks , 2014, FNC/MobiSPC.

[31]  Mansaf Alam,et al.  BAMHealthCloud: A Biometric Authentication and Data Management System for Healthcare Data in Cloud , 2020, J. King Saud Univ. Comput. Inf. Sci..

[32]  Rituparna Chaki,et al.  Bio-authentication for layered remote health monitor framework , 2014 .

[33]  Xiang-guang Chen,et al.  Development of a Wireless Security Monitoring System for CCEL , 2017 .

[34]  Chao Yang,et al.  Efficient end-to-end authentication protocol for wearable health monitoring systems , 2017, Comput. Electr. Eng..

[35]  Za'er Salim Abo-Hammour,et al.  Numerical solution of systems of second-order boundary value problems using continuous genetic algorithm , 2014, Inf. Sci..

[36]  Yaser Jararweh,et al.  Internet of surveillance: a cloud supported large-scale wireless surveillance system , 2016, The Journal of Supercomputing.

[37]  Victor Hugo C. De Albuquerque,et al.  Health of Things Algorithms for Malignancy Level Classification of Lung Nodules , 2018, IEEE Access.

[38]  Kyung Sup Kwak,et al.  An Internet of Things-based health prescription assistant and its security system design , 2017, Future Gener. Comput. Syst..

[39]  Sherali Zeadally,et al.  Taxonomy and analysis of security protocols for Internet of Things , 2018, Future Gener. Comput. Syst..

[40]  Harry K. S. Chung,et al.  How does reading direction modulate perceptual asymmetry effects? , 2017, Quarterly journal of experimental psychology.

[41]  Willy Susilo,et al.  Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment , 2020, IEEE Transactions on Dependable and Secure Computing.

[42]  Yi Wang,et al.  Barrier coverage in camera sensor networks , 2011, MobiHoc '11.

[43]  Athanasios V. Vasilakos,et al.  Authenticated key management protocol for cloud-assisted body area sensor networks , 2018, J. Netw. Comput. Appl..

[44]  Ling Shao,et al.  Face recognition with a small occluded training set using spatial and statistical pooling , 2018, Inf. Sci..

[45]  Alok Singh,et al.  A hybrid evolutionary approach to the registration area planning problem , 2014, Applied Intelligence.

[46]  D. Sridharan,et al.  Priority based AODV routing protocol for critical data in Wireless Body Area Network , 2015, 2015 3rd International Conference on Signal Processing, Communication and Networking (ICSCN).

[47]  Wei Liang,et al.  A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity , 2016, Secur. Commun. Networks.

[48]  Xiong Li,et al.  An enhanced smart card based remote user password authentication scheme , 2013, J. Netw. Comput. Appl..

[49]  Jianfeng Ma,et al.  Improvement of robust smart‐card‐based password authentication scheme , 2015, Int. J. Commun. Syst..

[50]  Muhammad Khurram Khan,et al.  A robust and anonymous patient monitoring system using wireless medical sensor networks , 2018, Future Gener. Comput. Syst..

[51]  Xiong Li,et al.  An improved and anonymous two-factor authentication protocol for health-care applications with wireless medical sensor networks , 2017, Multimedia Systems.

[52]  Gabriel Neagu,et al.  A Cloud-IoT based sensing service for health monitoring , 2017, 2017 E-Health and Bioengineering Conference (EHB).

[53]  Guihai Chen,et al.  A survey on barrier coverage with sensors , 2016, Frontiers of Computer Science.

[54]  I. Székely ENERGY-EFFICIENT INTEGRATION OF WSNS WITH ACTIVE RFID SYSTEMS , 2011 .

[55]  Anand Sharma,et al.  Secure Key Agreement with Rekeying Using FLSO Routing Protocol in Wireless Sensor Network , 2018, Wirel. Pers. Commun..

[56]  Katia Obraczka,et al.  Solar-powered, wireless smart camera network: An IoT solution for outdoor video monitoring , 2018, Comput. Commun..

[57]  Wenjing Lou,et al.  Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance , 2009, IEEE INFOCOM 2009.

[58]  Sukumaran Aasha Nandhini,et al.  Efficient compressed sensing-based security approach for video surveillance application in wireless multimedia sensor networks , 2017, Comput. Electr. Eng..

[59]  Victor Hugo C. De Albuquerque,et al.  An Automated Remote Cloud-Based Heart Rate Variability Monitoring System , 2018, IEEE Access.

[60]  Rakesh Kumar,et al.  Technological aspects of WBANs for health monitoring: a comprehensive review , 2019, Wirel. Networks.

[61]  Xiong Li,et al.  A novel and provably secure biometrics-based three-factor remote authentication scheme for mobile client-server networks , 2015, Comput. Electr. Eng..

[62]  R. Saravanan,et al.  A Secure Authentication Scheme with User Anonymity for Roaming Service in Global Mobility Networks , 2015, Wirel. Pers. Commun..

[63]  Jehn-Ruey Jiang,et al.  Barrier coverage with optimized quality for wireless sensor networks , 2012, The 15th International Symposium on Wireless Personal Multimedia Communications.

[64]  Jocelyne Elias,et al.  Optimal design of energy-efficient and cost-effective wireless body area networks , 2014, Ad Hoc Networks.

[65]  Guojun Wang,et al.  Dependable Cascading Target Tracking in Heterogeneous Mobile Camera Sensor Networks , 2015, ICA3PP.

[66]  Xiaoping Li,et al.  A Trust Management System for Securing Data Plane of Ad-Hoc Networks , 2016, IEEE Transactions on Vehicular Technology.

[67]  G. P. Biswas,et al.  Design of Two-Party Authenticated Key Agreement Protocol Based on ECC and Self-Certified Public Keys , 2015, Wireless Personal Communications.

[68]  S. Zeadally,et al.  Smart cities , 2016, Commun. ACM.

[69]  Dan Tao,et al.  A Survey on Barrier Coverage Problem in Directional Sensor Networks , 2015, IEEE Sensors Journal.

[70]  Mohammad Hammoudeh,et al.  Adaptive routing in wireless sensor networks: QoS optimisation for enhanced application performance , 2015, Inf. Fusion.

[71]  Jian Shen,et al.  A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks , 2017, Future Gener. Comput. Syst..

[72]  Dan J. Kim,et al.  Comparing fingerprint-based biometrics authentication versus traditional authentication methods for e-payment , 2018, Decis. Support Syst..

[73]  Miquel Oliver,et al.  CUIDATS: An RFID-WSN hybrid monitoring system for smart health care environments , 2018, Future Gener. Comput. Syst..

[74]  Jie Shen,et al.  Fault Tolerant Line-Based Barrier Coverage Formation in Mobile Wireless Sensor Networks , 2015, Int. J. Distributed Sens. Networks.

[75]  Yong Jiang,et al.  Fast mutual modulation fusion for multi-sensor images , 2015 .

[76]  Tayeb Lemlouma,et al.  A survey on health monitoring systems for health smart homes , 2018, International Journal of Industrial Ergonomics.

[77]  M. Shamim Hossain,et al.  Toward end-to-end biomet rics-based security for IoT infrastructure , 2016, IEEE Wireless Communications.

[78]  Zhengwei Jiang Camera network analysis for visual surveillance in electric industrial context , 2018, J. Vis. Commun. Image Represent..

[79]  Yongdong Zhang,et al.  Compressive sensing based video scrambling for privacy protection , 2011, 2011 Visual Communications and Image Processing (VCIP).

[80]  Yanfei Sun,et al.  A Hybrid Security and Compressive Sensing-Based Sensor Data Gathering Scheme , 2015, IEEE Access.

[81]  Xiaoying Gan,et al.  Critical sensing range for mobile heterogeneous camera sensor networks , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.