Security Analysis of a Patient Monitoring System for the Internet of Things in eHealth

A patient monitoring system for the Internet of Things in eHealth can be established through the integration of wireless body area network, communication infrastructure, and the hospital network. The dynamic and heterogeneous environment of the Internet of Things may facilitate the pa- tient with mobility options. However, security-related prob- lems may obstruct the development of such a comprehensive patient monitoring system. While assessing the security of a patient monitoring system, it is necessary to realise that it may not be enough to only look into the security related aspects of the body area network. Instead, the overall patient monitoring system should be treated as a connected and integrated eHealth system. This paper analyses the important security issues that can put the eHealth system at risk. The specific se- curity goals and requirements, vulnerabilities, threats, and attacks are analysed and some possible security recommenda- tions with direction for future work are discussed.

[1]  Jie Wu,et al.  Security analysis of emerging remote obstetrics monitoring systems , 2012, 2012 IEEE 14th International Conference on e-Health Networking, Applications and Services (Healthcom).

[2]  Pardeep Kumar,et al.  Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey , 2011, Sensors.

[3]  Biswajit Nandy,et al.  Security advances and challenges in 4G wireless networks , 2010, 2010 Eighth International Conference on Privacy, Security and Trust.

[4]  Zuraini Ismail,et al.  A Tree Model for Identification of Threats as the First Stage of Risk Assessment in HIS , 2012, J. Information Security.

[5]  Wan Haslina Hassan,et al.  WIRELESS NETWORKS: DEVELOPMENTS, THREATS AND COUNTERMEASURES , 2013 .

[6]  Dugki Min,et al.  A situation aware framework for activity based risk analysis of patient monitoring system , 2011, 2011 3rd International Conference on Awareness Science and Technology (iCAST).

[7]  Wolfgang Leister,et al.  A Novel Authentication Framework Based on Biometric and Radio Fingerprinting for the IoT in eHealth , 2014 .

[8]  Leo Marcus,et al.  Introduction to Logical Foundations of an Adaptive Security Infrastructure , 2004 .

[9]  David Kotz,et al.  A threat taxonomy for mHealth privacy , 2011, 2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011).

[10]  Minho Shin Secure Remote Health Monitoring with Unreliable Mobile Devices , 2012, Journal of biomedicine & biotechnology.

[11]  Habtamu Abie,et al.  Towards metrics-driven adaptive security management in e-health IoT applications , 2012, BODYNETS.

[12]  Ilangko Balasingham,et al.  Risk-based adaptive security for smart IoT in eHealth , 2012, BODYNETS.

[13]  Kyung Sup Kwak,et al.  A Study of IEEE 802.15.4 Security Framework for Wireless Body Area Networks , 2011, Sensors.

[14]  Tae Hwan Oh,et al.  Security Issues on Wireless Body Area Network for Remote Healthcare Monitoring , 2010, 2010 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing.

[15]  I. Maglogiannis,et al.  Modeling Risk in Distributed Healthcare Information Systems , 2006, 2006 International Conference of the IEEE Engineering in Medicine and Biology Society.

[16]  Wolfgang Leister,et al.  An Evaluation Scenario for Adaptive Security in eHealth , 2013 .

[17]  Habtamu Abie Adaptive security and trust management for autonomic message-oriented middleware , 2009, 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems.

[18]  I. Balasingham,et al.  Threat Assessment of Wireless Patient Monitoring Systems , 2008, 2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications.

[19]  Ming Li,et al.  Data security and privacy in wireless body area networks , 2010, IEEE Wireless Communications.

[20]  F. Kargl,et al.  Security, Privacy and Legal Issues in Pervasive eHealth Monitoring Systems , 2008, 2008 7th International Conference on Mobile Business.

[21]  Nicolae Tapus,et al.  Adaptive Security Framework for Wireless Sensor Networks , 2012, 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems.

[22]  ChengCheng Li,et al.  A survey of the security and threats of the IMT-Advanced requirements for 4G standards , 2013, IEEE Conference Anthology.