Secure IoT e-Health Applications using VICINITY Framework and GDPR Guidelines

In this work we analyze the security requirements and challenges of e-Health Internet of Things (IoT) applications and propose a complete architecture to address them. This architecture combines VICINITY IoT Framework security features together with General Data Protection Regulation (GDPR) compliant mechanisms in order to provide secure e-Health services to elders and middle-aged people. We also demonstrate how an Ambient Assisted Living (AAL) and an mHealth application were designed and implemented, addressing the current security and privacy requirements.

[1]  Peter Saint-Andre,et al.  Extensible Messaging and Presence Protocol (XMPP): Core , 2004, RFC.

[2]  Xinyu Yang,et al.  A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.

[3]  Sheetal Kalra,et al.  Secure authentication scheme for IoT and cloud servers , 2015, Pervasive Mob. Comput..

[4]  Aafaf Ouaddah,et al.  Chapter Eight - A blockchain based access control framework for the security and privacy of IoT with strong anonymity unlinkability and intractability guarantees , 2019, Adv. Comput..

[5]  S. Smys,et al.  Intelligent security framework for iot devices cryptography based end-to-end security architecture , 2017, 2017 International Conference on Inventive Systems and Control (ICISC).

[6]  Elisa Bertino,et al.  Internet of Things (IoT) , 2016, ACM Trans. Internet Techn..

[7]  Bashar Nuseibeh,et al.  Privacy-by-Design Framework for Assessing Internet of Things Applications and Platforms , 2016, IOT.

[8]  Ali Dehghantanha,et al.  Internet of Things security and forensics: Challenges and opportunities , 2018, Future Gener. Comput. Syst..

[9]  Yvonne O'Connor,et al.  Privacy by Design: Informed Consent and Internet of Things for Smart Health , 2017, EUSPN/ICTH.

[10]  Nazmus Sakib,et al.  Performance analysis of security algorithms for IoT devices , 2017, 2017 IEEE Region 10 Humanitarian Technology Conference (R10-HTC).

[11]  Hwajeong Seo,et al.  Secure IoT framework and 2D architecture for End-To-End security , 2018, The Journal of Supercomputing.

[12]  Howon Kim,et al.  The intelligent IoT common service platform architecture and service implementation , 2018, The Journal of Supercomputing.

[13]  Dimitrios Tzovaras,et al.  e-Health Services in the Context of IoT: The Case of the VICINITY Project , 2018, AIAI.

[14]  Victor I. Chang,et al.  Towards fog-driven IoT eHealth: Promises and challenges of IoT in medicine and healthcare , 2018, Future Gener. Comput. Syst..

[15]  Hannu Tenhunen,et al.  International Conference on Ambient Systems , Networks and Technologies ( ANT 2015 ) SEA : A Secure and E ffi cient Authentication and Authorization Architecture for IoT-Based Healthcare Using Smart Gateways , 2015 .

[16]  Juan C. Vasquez,et al.  An open virtual neighbourhood network to connect IoT infrastructures and smart objects — Vicinity: IoT enables interoperability as a service , 2017, 2017 Global Internet of Things Summit (GIoTS).

[17]  Mahmoud Ammar,et al.  Journal of Information Security and Applications , 2022 .

[18]  Khaled Salah,et al.  IoT security: Review, blockchain solutions, and open challenges , 2017, Future Gener. Comput. Syst..

[19]  Sanjay Jha,et al.  Automated Analysis of Secure Internet of Things Protocols , 2017, ACSAC.

[20]  Davide Bacciu,et al.  An experimental characterization of reservoir computing in ambient assisted living applications , 2013, Neural Computing and Applications.

[21]  Andrei V. Gurtov,et al.  Two-phase authentication protocol for wireless sensor networks in distributed IoT applications , 2014, 2014 IEEE Wireless Communications and Networking Conference (WCNC).

[22]  Wan Haslina Hassan,et al.  Current research on Internet of Things (IoT) security: A survey , 2019, Comput. Networks.