Securing Things in the Healthcare Internet of Things

被引:14
|
作者
MacDermott, Aine [1 ]
Kendrick, Phillip [1 ]
Idowu, Ibrahim [1 ]
Ashall, Mal [2 ]
Shi, Qi [1 ]
机构
[1] Liverpool John Moores Univ, Dept Comp Sci, Liverpool, Merseyside, England
[2] Liverpool John Moores Univ, Dept Built Environm, Liverpool, Merseyside, England
关键词
Healthcare; Cyber Security; Internet of Things; IoT; H-IoT; Network Security; Cloud Computing; Fog Computing;
D O I
10.1109/giots.2019.8766383
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The Internet of Things (IoT) has had a positive impact on e-health, assisted living, human-centric sensing and wellness. Recently this interconnection has been referred to as Healthcare IoT (H-IoT). Real-time monitoring based on the information gathered from the connected 'things' provides large scale connectivity and a greater insight into patient care, individual habits and routines. While the benefits of introducing this paradigm into healthcare are conspicuous, the underlying security vulnerabilities and threats of the infrastructure and devices cannot go unaddressed. H-IoT is set to impact society significantly, and with attackers already exploiting the IoT in a myriad of ways, it is inevitable that the IoT will become the most vulnerable area of cyber security. Securing these 'things' in H-IoT requires a multifaceted approach. A multi-agent approach to advanced persistent threat detection is conveyed with the use of machine learning for predictive analytics: identifying security vulnerabilities, identifying patterns in order to make predictions and identify outliers.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Securing the Internet of Things
    Roman, Rodrigo
    Najera, Pablo
    Lopez, Javier
    [J]. COMPUTER, 2011, 44 (09) : 51 - 58
  • [2] Challenges to Securing the Internet of Things
    Stout, William M. S.
    Urias, Vincent E.
    [J]. 2016 IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2016, : 1 - 8
  • [3] Securing the Internet of Things (IoT)
    El bekkali, Abla
    Boulmalf, Mohammed
    Essaaidi, Mohammad
    Mezzour, Ghita
    [J]. 2018 6TH INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS (WINCOM), 2018, : 211 - 216
  • [4] Securing Internet-of-Things
    Gong, Guang
    [J]. FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2018, 2019, 11358 : 3 - 16
  • [5] An Internet of Things for Healthcare
    Blake, M. Brian
    [J]. IEEE INTERNET COMPUTING, 2015, 19 (04) : 4 - 6
  • [6] Securing the Internet of Things in a Quantum World
    Cheng, Chi
    Lu, Rongxing
    Petzoldt, Albrecht
    Takagi, Tsuyoshi
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2017, 55 (02) : 116 - 120
  • [7] Securing the Internet of things using Blockchain
    Showkat, Sadia
    Qureshi, Shaima
    [J]. PROCEEDINGS OF THE CONFLUENCE 2020: 10TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE & ENGINEERING, 2020, : 540 - 545
  • [8] The embedded framework for securing the Internet of Things
    Khan, Feroz A. B.
    Anandharaj, G.
    [J]. JOURNAL OF ENGINEERING RESEARCH, 2021, 9 (02): : 139 - 148
  • [9] Securing the Internet of Things: An Ongoing Challenge
    Smith, Sean W.
    [J]. COMPUTER, 2020, 53 (06) : 62 - 66
  • [10] Securing the Internet of Things: A Standardization Perspective
    Keoh, Sye Loong
    Kumar, Sandeep S.
    Tschofenig, Hannes
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2014, 1 (03): : 265 - 275