Internet of Things (IoT)

Slides:



Advertisements
Similar presentations
Research Directions for the Internet of Things Supervised by: Dr. Nouh Sabry Presented by: Ahmed Mohamed Sayed.
Advertisements

Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.
From Sensors To Intelligence
IntroOH-1 CSE 5810 Wireless Body Sensor Networks (WBSN) in Healthcare Aljoharah A. Algwaiz Computer Science & Engineering Department The University of.
Remote Healthcare Applications With Smartphones In Developing Countries Jeffrey Tse Mentors: Gloria Mark, Dani Massaguer University of California, Irvine.
1 The Internet of Things. 2 Agenda IntroductionWhat is the Internet of Things?What are these “things”?What is.
IoT, Big Data and Emerging Technologies
Master Course /11/ Some additional words about pervasive/ubiquitous computing Lionel Brunie National Institute of Applied Science (INSA)
Internet of Things (Ref: Slideshare)
Azam Supervisor : Prof. Raj Jain
IoT Primer Stephen Bates | Energy Huntsville: Tues 15 Dec
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Internet of Things in Industries
Announce-1 CSE 5810Announcements  Informatics is:  Management and Processing of Data  From Multiple Sources/Contexts  Involves Classification (Ontologies),
Internet of Things – Getting Started
By KESHAB DAS and PRITAM SARKAR INSITUTE OF RADIOPHYSICS & ELECTRONICS UNIVERSITY OF CALCUTTA.
The Fallacy Behind “There’s Nothing to Hide” Why End-to-End Encryption Is a Must in Today’s World.
Digital Identity and My Data as Business Enablers 1 My Pekka Turpeinen, Business Architect.
IntroOH-1 CSE 5810 Remote Health Care Monitoring by Wearable Sensors and Mobile Devices Kanchan Jha Computer Science & Engineering Department The University.
Teaching Security of Internet of Things in Using RaspberryPi Oliver Nichols, Li Yang University of Tennessee at Chattanooga Xiaohong Yuan North Carolina.
IoT Solutions for Health and Wellness by: Dr. Nissim Zur www. telnt
Authors: Christos Stergiou Andreas P. Plageras Kostas E. Psannis
Personal Home Healthcare System for the Cardiac Patient of Smart City Using Fuzzy Logic Shijia Liu.
Grado en Ingeniería de Tecnologías y Servicios de Telecomunicación
The Internet of Things for Health Care
Privacy and Public Policy Implications of IoT
Sensors Journal, IEEE, Issue Date: May 2013,
Lightweight Cryptography for IoT
Remarks by Dr Mawaki Chango Kara University DigiLexis Consulting
chownIoT Secure Handling of Smart Home IoT Devices Ownership Change
#ConnectedHomeHuman&Habitat
Internet Of Things (IoT)
Internet of Things (IoT)
Smart Retail Digital Store.
EMBEDDED SYSTEMS.
Leveraging IoT to improve Healthcare Outcomes
Welcome to the Workshop on IoT & Cloud Computing The Coexistence
Bluetooth Low Energy Overview.
Cloud Architecture Internet of Everything Meetup
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF.
Challenges facing Enterprise Mobility
Information Technology Deanship
Researcher and Lecturer Assistant at FCI Assiut University
Prepared by: Celeste Ng Updated: May, 2017.
World-Leading Research with Real-World Impact!
Virtual Private Networks (VPN)
Algorithms for Big Data Delivery over the Internet of Things
Internet of Things.
Internet of Things
Presenter: Patrick N. zwane Advisor: Dr. Kai-Wei Kevin Ke 21/09/2018
The Internet of Things (IoT) and Analytics
The security and vulnerabilities of IoT devices
Mobile edge computing Report by Weiqing huang.
Mobile Commerce and the Internet of Things
Broad Emerging Themes in CPS/IoT
ASHIKA S ROLL NO: 20.
Internet of Things Vulnerabilities
Smart University utilising the concept of the Internet of Things (IoT) Simon Downes BSc MBCS Carlene Campbell March 2018.
Adhoc and Wireless Sensor Networks
Securing the Internet of Things: Key Insights and Best Practices Across the Industry Theresa Bui Revon IoT Cloud Strategy.
Mobile Commerce and Ubiquitous Computing
Tareq Khan, Ph.D. Assistant Professor,
Internet of Things (IoT) for Industrial Development and Automation
Introduction to IoT Sadoon Azizi s. ac
Security in SDR & cognitive radio
Internet of Things (IoT)
IoTs (Internet of Things)
Welcome to The World of Internet of Things
Mobile Commerce and Ubiquitous Computing
INTERNET OF THINGS BY S DEVA PRIYA. WHAT IS IOT?  The internet of things, or IoT, is a system of interrelated computing devices, mechanical and digital.
Presentation transcript:

Internet of Things (IoT) Based Healthcare Systems: Privacy and Security Dr. Saman Mirza Abdullah Software Engineering, Koya University Ishik University, Computer Engineering saman.mirza@koyauniversity.org saman.mirza@ishik.edu.iq

Outline A background on IoT Security in IoT; Standards and Technologies. Requirements of IoT Security Challenges facing IoT security 11/12/2018 IoT based Healthcare systems: Security and Privacy

Internet of Things (IoT) Definition The Internet of Things (IoT) is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction. 11/12/2018 IoT based Healthcare systems: Security and Privacy

Internet of Things (IoT) Background Devices communication through Internet or other types of networks. Machine to machine communication, which means that machines (objects) that can work autonomously, without any connectivity. Internet of Objects (IoO) here refers to inert and passive objects that do not generate any data by themselves. 11/12/2018 Internet of Things (IoT): Requirements and Challenges

Key Characteristics of IoT Typically IoTs are embedded computing devices that exhibit the following qualities: Unique identity. Ability to wirelessly communicate. Ability to sense. Ability to be controlled remotely. Data collection and analysis. Leverage mobility, cloud, and big data 11/12/2018 IoT based Healthcare systems: Security and Privacy

Internet of Things (IoT) Statistical Figures on IoT Projects-2018 11/12/2018 IoT based Healthcare systems: Security and Privacy

Internet of Things (IoT) Statistical Figures on IoT Projects-2018 11/12/2018 IoT based Healthcare systems: Security and Privacy

Internet of Things (IoT) Type of Projects Smart City. Connected Industry. Connected Buildings. Connected Cars. Smart Energy. Healthcare systems. Smart Supply chain. Smart Agriculture. Smart Retail. Others. Projects related to the ambient 11/12/2018 IoT based Healthcare systems: Security and Privacy

11/12/2018 IoT based Healthcare systems: Security and Privacy

11/12/2018 IoT based Healthcare systems: Security and Privacy

11/12/2018 IoT based Healthcare systems: Security and Privacy

Internet of Health Things (IoHT) Sensors Basically, an IoT-based healthcare can collected the following information through biomedical sensors and wearable devices. Electrocardiography (ECG). Heart rate. Electroencephalogram (EEG) Diabetes. Oxygen rate in blood Airflow (breathing). Body temperature Glucometer, Blood pressure Patient position Electromyography (EMG) 11/12/2018 IoT based Healthcare systems: Security and Privacy

Internet of Health Things (IoHT) Framework The data input from patients can be collected through sensors and processed by applications developed for a user terminal Such as computers, smart phones, smart watches or, even, a specific embedded device. The user terminal is connected to a gateway through short coverage communication protocols, Bluetooth low energy (BLE), Bluetooth, or 6LoWPAN (IPv6 over Low Power Wireless Personal Area Networks). This gateway connects to a (clinical) server or cloud services for data processing and storage. In the other hand, patients’ data can be stored in a health information system using electronic health records and, when the patient visits a medical doctor, he/she can easily access the clinic history of the patient. 11/12/2018 IoT based Healthcare systems: Security and Privacy

Legislation 11/12/2018 IoT based Healthcare systems: Security and Privacy

IoHT Challenges Security and Privacy The core requirement for securing IoT based health care are: Authentication ; is user identification Authorization; Access controlling. Securing the communication channels. (Conventional cryptographic techniques) 11/12/2018 IoT based Healthcare systems: Security and Privacy

IoHT Challenges Security and Privacy The first challenge is managing credentials and controlling access to applications and patient’s confidential information. Hospitals need to open their devices to receive responses from patients. When a communication done within unsecure Wi-Fi, the man in the middle attack my happen. Strong authentication (digitally information / bio-information) 11/12/2018 IoT based Healthcare systems: Security and Privacy

IoHT Challenges Security and Privacy Many IoT Applications are vulnerable to code injection attacks which permit the attacker to take full control of the program and memory vulnerabilities. To take place: Targeted program must has memory corruption. (changing memory place) There must be a writable and executable region of memory. Way to redirect the processor to execute the injected code. Example is Buffer over flow. This issue is related to the Software Security. 11/12/2018 IoT based Healthcare systems: Security and Privacy

IoHT Challenges Security and Privacy Implementing and deploying cryptographic protocols in IoT health cloud correctly IoT in Healthcare systems should be very fast and transfer should be done at real-time for urgent cases. IoT Systems should be able to achieve a concurrent user authentication. Cryptography computation need more power. 11/12/2018 IoT based Healthcare systems: Security and Privacy

IoHT Challenges Security and Privacy Data privacy is very crucial in the context of IoT-based health cloud. Healthcare cloud applications are designed and developed based on acquiring data from IoT devices. Confidential information is collected from devices, aggregated through smartphones and tablets and uploaded to the cloud, or transmitted to tablets or smartphones from the cloud. These patient information could also be transferred to third parties. 11/12/2018 IoT based Healthcare systems: Security and Privacy

11/12/2018 IoT based Healthcare systems: Security and Privacy

Thanks Dr. Saman Mirza Abdullah Software Engineering, Koya University saman.mirza@koyauniversity.org