Secure mHealth IoT Data Transfer from the Patient to the Hospital: A Three-Tier Approach

eHealth and mHealth applications are gaining increasing importance with advances in the IoT and the ubiquity of sensor deployments. Measured IoT mHealth data needs to be captured, transmitted, and stored securely, without having the security measures hinder or delay the response of medical personnel in case of emergency. In this article, we present a holistic framework for data transfer from the patient to the hospital. Three tiers are identified in the proposed framework. In each tier, suitable security measures are presented for securing the data and protecting the privacy of the patients. The proposed methods range from physical layer security techniques designed for low portable sensors deployed at the patient's home or body, to combining traditional encryption methods with additional security procedures at the cloud data center where the medical records are stored.

[1]  S. K. Chakarvarti,et al.  A Review on Wireless Body Area Network (WBAN) for Health Monitoring System: Implementation Protocols , 2016 .

[2]  Kyung-Sup Kwak,et al.  The Internet of Things for Health Care: A Comprehensive Survey , 2015, IEEE Access.

[3]  Khalil El-Khatib,et al.  Privacy and security concerns for health data collected using off-the-shelf health monitoring devices , 2015, 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[4]  Elias Yaacoub,et al.  Multihop Routing for Energy Efficiency in Wireless Sensor Networks , 2012 .

[5]  IMT Vision – Framework and overall objectives of the future development of IMT for 2020 and beyond M Series Mobile , radiodetermination , amateur and related satellite services , 2015 .

[6]  Amr Mohamed,et al.  Survey on wireless body area sensor networks for healthcare applications: Signal processing, data analysis and feedback , 2011 .

[7]  Jinho Choi,et al.  Channel Aware Encryption and Decision Fusion for Wireless Sensor Networks , 2013, IEEE Transactions on Information Forensics and Security.

[8]  Pardeep Kumar,et al.  Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey , 2011, Sensors.

[9]  Liang Chen,et al.  Internet of Things for Ambient Assisted Living: Challenges and Future Opportunities , 2017, 2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC).

[10]  Mohsen Guizani,et al.  A secure client-side framework for protecting the privacy of health data stored on the cloud , 2018, 2018 IEEE Middle East and North Africa Communications Conference (MENACOMM).

[11]  Jeffrey G. Andrews,et al.  Why to decouple the uplink and downlink in cellular networks and how to do it , 2015, IEEE Communications Magazine.

[12]  Elias Yaacoub,et al.  A Simple Approach for Securing IoT Data Transmitted over Multi-RATs , 2018, 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC).

[13]  Ayman I. Kayssi,et al.  Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.

[14]  Ali Chehab,et al.  An Efficient OFDM-Based Encryption Scheme Using a Dynamic Key Approach , 2019, IEEE Internet of Things Journal.

[15]  Tingting Chen,et al.  Multilevel Threshold Secret Sharing in Distributed Cloud , 2015, SSCC.