IoT Security (IoTSec) Mechanisms for e-Health and Ambient Assisted Living Applications

The Internet Of Things (IoT) is poised to make substantial inroads in all aspects of modern life before the end of this decade, including applications in smart grids, smart cities, transportation, crowdsensing, e-health, ambient assisted living, and home automation, to list just a few. Although it is recognized that IoTSec mechanisms and principles are needed across the entire IoT ecosystem, many of the intrinsic features of IoT systems make the IoT vulnerable to cybersecurity breaches. Firms wonder if the mechanisms required to protect the users and the data are ready for "prime time", especially in the e-health arena. The field of big data as related to security event processing, is relatively new, especially in the context of IoT, challenges include but are not limited to capture, transmission, analysis and curation of the data. This article provides a novel IoT protocol architecture and examines security tools and techniques that can be leveraged as part of the deployment of IoT, these mechanisms are particularly important in e-health and assisted living applications.

[1]  Yu Gong,et al.  Physical Layer Network Security in the Full-Duplex Relay System , 2015, IEEE Transactions on Information Forensics and Security.

[2]  Alvaro A. Cárdenas,et al.  Big Data Analytics for Security , 2013, IEEE Security & Privacy.

[3]  P. Cochat,et al.  Et al , 2008, Archives de pediatrie : organe officiel de la Societe francaise de pediatrie.

[4]  Daniel Minoli,et al.  Wireless Sensor Networks: Technology, Protocols, and Applications , 2007 .

[5]  Vinod Menon Interaction of neuronal populations with delay: effect of frequency mismatch and feedback gain , 1995, Int. J. Neural Syst..

[6]  Antonella Molinaro,et al.  Information-centric networking for connected vehicles: a survey and future perspectives , 2016, IEEE Communications Magazine.

[7]  Daniel E. O'Leary,et al.  Artificial Intelligence and Big Data , 2013, IEEE Intelligent Systems.

[8]  Fabiano Hessel,et al.  The importance of a standard securit y archit ecture for SOA-based iot middleware , 2015, IEEE Communications Magazine.

[9]  Michael Weyrich,et al.  Reference Architectures for the Internet of Things , 2016, IEEE Software.

[10]  J. Alberto Espinosa,et al.  Big Data: Issues and Challenges Moving Forward , 2013, 2013 46th Hawaii International Conference on System Sciences.

[11]  Sailaja Arsi,et al.  SECURITY ISSUES ASSOCIATED WITH BIG DATA IN CLOUD COMPUTING , 2014 .

[12]  Xuemin Shen,et al.  Toward secure large-scale machine-to-machine comm unications in 3GPP networks: chall enges and solutions , 2015, IEEE Communications Magazine.

[13]  Ramón F. Brena,et al.  A crowdsourcing approach for personalization in human activities recognition , 2017, Intell. Data Anal..

[14]  Miriam Vollenbroek-Hutten,et al.  A Community-Based, Technology-Supported Health Service for Detecting and Preventing Frailty among Older Adults: A Participatory Design Development Process , 2015, Journal of aging research.

[15]  Julie A. McCann,et al.  Efficient In-Network Processing for a Hardware-Heterogeneous IoT , 2016, IOT.

[16]  Ian F. Akyildiz,et al.  Wireless sensor networks , 2007 .

[17]  Carsten Magerkurth,et al.  IoT Reference Architecture , 2013 .

[18]  Srinivas Sethi,et al.  Scalable Big Data Analysis in Cloud Environment: A Review , 2017 .

[19]  Niall Twomey,et al.  Bridging e-Health and the Internet of Things: The SPHERE Project , 2015, IEEE Intelligent Systems.

[20]  Yonggang Wen,et al.  Toward Scalable Systems for Big Data Analytics: A Technology Tutorial , 2014, IEEE Access.

[21]  Gunasekaran Manogaran,et al.  Big Data Security Framework for Distributed Cloud Data Centers , 2017 .

[22]  Mihail Popescu,et al.  Early illness recognition using in-home monitoring sensors and multiple instance learning. , 2012, Methods of information in medicine.