A lightweight replay attack detection framework for battery depended IoT devices designed for healthcare

Internet of things can be summarized as all physical objects connected to the Internet and being able to identify themselves to other digital devices, with the intent of facilitating communication that can transform the way we operate. Data integrity in healthcare is of utmost importance. A compromised transmitted or received signal can pose serious health hazards to patients. With the growing number of devices connected to the Internet, serious security concerns have been raised in relation to lack of appropriate security mechanisms used in Internet of Things devices. While security considerations are not recent in the arena of Information Technology, many existing frameworks developed for Internet of Things (IoT)healthcare present new and unique security challenges. In order to address these challenges and ensure a maximum level of security in IoT products and services, a lightweight and reliable framework has been developed which uses a combination of universally unique identifier, timestamp and a self-learning battery depletion monitor to detect and mitigate replay attacks on battery dependent IoT devices. A prototype application has been developed to successfully test the framework.

[1]  Habtamu Abie,et al.  Towards metrics-driven adaptive security management in e-health IoT applications , 2012, BODYNETS.

[2]  Xu Xiaohui,et al.  Study on Security Problems and Key Technologies of the Internet of Things , 2013, 2013 International Conference on Computational and Information Sciences.

[3]  Ki-Hyung Kim,et al.  Scenario and countermeasure for replay attack using join request messages in LoRaWAN , 2017, 2017 International Conference on Information Networking (ICOIN).

[4]  Do-Yeon Kim Cyber security issues imposed on nuclear power plants , 2014 .

[5]  Lisandro Zambenedetti Granville,et al.  Internet of Things in healthcare: Interoperatibility and security issues , 2012, 2012 IEEE International Conference on Communications (ICC).

[6]  Ramesh Karri,et al.  Hardware and embedded security in the context of internet of things , 2013, CyCAR '13.

[7]  Kai Zhao,et al.  A Survey on the Internet of Things Security , 2013, 2013 Ninth International Conference on Computational Intelligence and Security.

[8]  Sathish Alampalayam Kumar,et al.  Security in Internet of Things: Challenges, Solutions and Future Directions , 2016, 2016 49th Hawaii International Conference on System Sciences (HICSS).

[9]  George J. Pappas,et al.  Stochastic game approach for replay attack detection , 2013, 52nd IEEE Conference on Decision and Control.