You are on page 1of 4

2019 IEEE 8th Global Conference on Consumer Electronics (GCCE)

An Authentication-Centric Multi-Layered Security


Model for Data Security in IoT-Enabled Biomedical
Applications
Vidyadhar Jinnappa Aski, Shashank Gupta*, Bharat Sarkar
Department of Computer Science and Information Systems
Birla Institute of Technology and Science Pilani, Plani, Rajasthan, India
shashank.gupta@pilani.bits-pilani.ac.in

Abstract— IoT-enabled technologies have been creating In this regard, this article proposes a two-way authentication
phenomenal impacts in the field of biomedical applications ever centric, token-based multilayered security model for
since the advancements in ubiquitous computing has begun. providing protected access to healthcare resources and
Securing these biomedical applications has always been a key applications by preventing unauthorized usage. The
concern due to the highly openness nature of Wireless performance analysis was carried out on an implemented
Computing Technologies (WCT) to the vulnerabilities. Access prototype of healthcare device designed with raspberry pi
control is an important factor in designing a security system for powered by RetroPie operating system. The observed results
such applications which involves seamless healthcare devices. were compared with single layered security model (only 2-
However, several existing approaches provide token-based
way authentication-based systems) in terms of algorithm
access control mechanisms that are still facing the challenges in
integrating the multilayered security architecture. In this
execution time and observed extensively optimized results.
regard, the proposed model contributes towards in designing II. RELATED WORK
two-way authentication centric and generic security framework
for healthcare applications under the protected resource Wu et al. [1] proposed a model of intelligent wireless body
accessing environment. The model features its heterogeneous set area network that enables connected scenario in healthcare
of users to interact with the token-based resource accessing applications. They have also discussed a methodological
environment in healthcare scenario, preventing unauthorized approach to avoid space and power consumption related
users accessing the personalized medical devices. The proposed issues by considering miniaturized and power harvesting
model produced the extensive better results in comparison with techniques. Oueida [2] evaluated an edge-based theoretical
conventional single layered security approaches in terms of framework for a smart healthcare network offering non-
Human to Machine (H2M) interactions under the presumption consumable resource protection. This model also features the
of distributed and context-aware approaches. optimized healthcare resource utilization ratio and patient wait
time. Hamidi [3] discussed an approach to design an efficient
Keywords— Wireless Computing Technologies (WCT);
healthcare IoT device powered by biometric feature-based
Healthcare devices; Security framework; Access control
authentication technology. Lee et al. [4] presented a cluster-
mechanism; Resource Access Token (RAT); Authentication
oriented approach that predominantly offers the namelessness,
I. INTRODUCTION uniqueness and delay limitations on data transfer, therefore it
increases the stringency on security breaches. This was
The Internet of Things (IoT) is a novel paradigm that is achieved by following a practice of constant naming of data
rapidly attaining ground in the scenario of building modern transfer via versatile cluster. Chaudhary et al. [5] proposed a
healthcare facilities. Technologies to support the IoT-enabled novel approach in designing lattice-based secure
healthcare designs are becoming more important as, the need cryptosystem for smart healthcare (LSCSH) envisioned for
for better analysis of the chronicle diseases and make them advanced smart city applications. In order to avoid data
predicted well ahead of time increases. As a result, it is duplication and eavesdropping at third party cloud storage
predicted that intelligent devices and networks, such as services, this model employs lattice enabled common
WSNs, WBANs, and Low Power Wireless Body Area verification scheme that authenticates the end user requests
Network (LPWBAN) will not be isolated, but connected and (doctor-patients) for accessing cloud services. However it was
integrated, composing healthcare networks [1-8]. One of the not secured against the wearable devices/ mobile devices
primary features offered by the IoT-enabled healthcare (WD/MD) stolen attacks, privileged insider attacks and
devices is to provide real-time monitoring and world-wide impersonation attacks.
access services to its intended set of end users. This feature
enables the doctors and patients to gain better understandings In an effort to mitigate the security vulnerabilities in high
in the behavioral patterns of prolonged chronicle health issues performance cloud services in smart transportation
and helps in improving their quality of life. applications, a persistent approach for an intrusion detection
has been presented by Aloqaily et al. [6]. This approach is
However, healthcare applications and devices are resistive towards various attacks such as Denial of Service,
expected to exhibit the carriage of extremely private Probe, Remote to user etc. The intrusion classification was
information such as individual critical health data and carried out by ID3-based decision tree algorithm and deep
prescription [9]. In addition, such real-time accessing and belief function for reduction of data dimensions was presented
monitoring nature of IoT systems from World Wide Web as well. The system accuracy was acclaimed to be as high as
increases the vulnerability chances and such systems may 99.92%. However, system has a flaw of false negative rate as
become a cyber-target. Therefore, such applications and 1.53% which denotes approximately 3-4 intruder attempts
devices requires to employ a secured access mechanism to could break the privacy wall for every 200 user sessions.
avoid digital forgery and misuse of highly personal devices.

XXX-X-XXXX-XXXX-X/XX/$XX.00 ©20XX IEEE


Authorized licensed use limited to: University of the West of England. Downloaded on December 14,2023 at 21:07:22 UTC from IEEE Xplore. Restrictions apply.
957 978-1-7281-3575-5/19/$31.00 ©2019 IEEE
III. PROPOSED MODEL his current health status and choose resources as per his
This section explains the operational principle of proposed doctor’s recommendation. In addition, rules are defined by
authentication centric multilayered security model. Fig. 1. the policy descriptor in such a way that user is designated to
shows the framework of multilayered security centric issue commands (e.g., POST, GET, etc.) to IoT device and/or
biomedical application-based IoT architecture. This security resources in whichever the way he/she is entitled to do.
model is implemented at cloud level that offers the secured
access to both device and cloud-based healthcare application Protected Resource Access Key Generation-PRAcKeyGen
[11]. It executes in two phases: phase 1 and phase 2. In the fun1 Outlayer_Authentication (UserPhone, DoB);
if (authorized!) in Outlayer_Authentication then
former phase, user generates a login request from a common return Error "Not Registered User"
interface with allowed attributes (phone no, DoB) and else
successful authentication of user will return to the consequent return SesKey
session with the Session Key (SesKey). In the later phase, user begin fun2 PRAcKeyGen(uID, DoB, SesKey)
generates a resource access token with the issued SesKey. It Input:User Registration ID (uID), Birth Date(DoB)
Output: Authenticated Resource Access Token (RAT)
is evaluated to identify whether the user has already entered if uID in reovkedEntity then
into the revoked entity or not. Finally, user ID is generated and return Error "Access Denied!"
context is embedded with the validated user ID (uID). Upon else
successful validation of user, policy is generated with an RAT⟵new RATInstance();
attribute (polID) and hence, permission is dispensed out along RAT.add(uID,DoB);
with the user roles and responsibility (resID). Therefore, user Responsibility⟵getResponsibility(uID,DoB);
is issued a Resource Access Token (RAT). Fig. 2 illustrates uPolicies⟵getuPolicy(responsibility)
the detailed view of the entire process of RAT generation. for upolicy in upolicies do
for grant in upolicy do
//add grant to the user responsibility
// add grant to the biomedical sensor node
end
end
for res in RAT.resources do
BC⟵getBackgroundInfo(res);
RAT.add(BL);
end
return Auth(RAT,Key);
end
end

Fig. 2. Algorithmic representation of proposed model

The expansion of Internet in the current information age


has been termed as the largest engineered creature ever. In
this regard, the International Telecommunication Union
described that there are rapidly growing concerns related to
user data security and privacy [3], it also specifies that
Fig. 1. Overall detailed design of multilayered security model tracking of user’s activity in any cloud enabled services is
This model offers the users with heterogeneous equally essential. Therefore, it is highly critical to track user
backgrounds that interact with the common environment and activity. The proposed system provides cloud monitoring of
determine their capabilities represented by policies. Policy user activities. In general, user gets access rights to IoT
descriptor does not contain user profile-related information. services according to the steps specified in Fig. 3 through
Indeed roles and responsibilities of individual users are authentication and verification [10]. User activities are
defined by policies. Hence, the policies of individual users recorded in the cloud server for further analysis of the system
are stored in a separate database (policy descriptor) in and provide better user experience. The cloud server also has
verification unit of authorization division. JSON is being a repository encompassing the user subscription information.
used in encoding the capability tickets. An access request is
made by user to medical device with an access token attached
with capability ticket. The biomedical entity checks verify the
requests and token then apply the background constraints
either to grant or to deny the access request.

The proposed authorization model invokes the capability


dependent context-aware access control mechanism, offering
multilayered protection for accessing healthcare resources
and IoT services. Policy descriptor assigns the capabilities to
each user according to their respective roles. For example, if
the user is a doctor then he/she is capable to view/monitor
their patient records, provide the list of suitable healthcare
assistive devices as per the patient’s diagnosis and needs etc. Fig. 3. General framework of Authentication and RAT Generation
In other words, if the user is a patient then he is able to view

Authorized licensed use limited to: University of the West of England. Downloaded on December 14,2023 at 21:07:22 UTC from IEEE Xplore. Restrictions apply.
958
Registration: The service user need to first create the security execution based on numerous parameters as specified by user
credentials using the interactive user application as shown in of the application [14]. Depending on the overall
fig. 4. User registration and password allocation will be taken computational requirements of individual sensor application
care by registration management system (RMS). The RMS [15], it is possible for resource provisioning unit for
works on dual mode, user mode and admin mode. In user originating and dismissing specified number of computation,
mode, service user must provide his/her personal information storage and network resources while maintaining queued
such as name, social security information, credit card details events to be scheduled. Resource failures are handled
etc. Initial password is generated for the first use. This effectively by reallocating the resources based on notifying
password has the further significance in RAT generation. In
priority of the applications. Each of the events are recorded
admin mode RMS allows its administrators to access the
by Bluemix event monitoring unit.
application using the OTP using which they could control/
moniter the resource allocation and user access logs.

Fig. 4. Generic security components of a multilayered architecture

Authentication: The authentication management unit


(AMU) offers the login services to its heterogeneous set of
Fig. 5. Cloud centric IoT architecture for healthcare services
users. The user’s authenticity is determined by the context
store as shown in the fig. 1. The AMU is responsible for RAT verification: The verification of resource access ticket
verifying the user’s identity and issue the authenticated users (RAT) involved distribution based tactic in the proposed
with an access grant for generation of RAT. model. The methodology utilizes a gateway device positioned
along with the personalized local network for performing
Authorization and IoT services: The authorization unit RAT authorization. The smart gateway exhibits highly
(AU) is responsible for ensuring the protected access to the richness of carrying resources as compared to other healthcare
IoT-enabled healthcare devices and subscribed medical devices in terms of network related activities. The gateway
services. The authorization unit issues the RAT to an authorizes incoming service request in two steps. The RAT
authenticated user. Every IoT service has dual facets: cloud integrated access request is validated by gateway in the first
integrated IoT devices and embedded medical device. Cloud step. The access requests are then forwarded to requested
integrated medical services facilitates the real-time data flow medical devices subsequently based on the validation status.
from the device level to the cloud and therefore to the doctor
IV. EXPERIMENTAL SETUP AND RESULTS
site. Whereas embedded medical device users can choose to
upload the data in periodical manner. The proposed model was implemented and tested on
JAVA ME EMBEDDED application supported by Netbeans
Storage and computing services: Cloud infrastructure is IDE. Biomedical IoT device was designed by a Raspberry-Pi
one of the key components in any IoT enabled services [13]. model 3B+ with 1GB LPDDR2 SDRAM powered by
Cloud computing offers storage services as a core activity. It RetroPie operating system. A BMP108 (Bosch) temperature
sensor was interfaced with Raspberry Pi [12] to create a
is responsible for many computing and controlling tasks for
simple biomedical application for monitoring the body
invoked application. The data aggregated from device level temperature. The cloud platform IBM Bluemix was chosen for
will be conveyed to the health cloud for storage. The data cloud services (CAAS). An android application was also
from the cloud shall be further employed in analytics and designed on a typical android device [16] of LG smartphone
decision making events. The control server acts as a primary with 1.7GHZ Dual core CPU, 4GB RAM and 32GB storage
hub for the IoT healthcare application. It monitors and notify disc enabled by wireless computing modules such as WiFi and
the users about their current health status and suggests BLE interface.
prescription accordingly. The proposed multilayered security
architecture is deployed in a healthcare application powered In order to imply the simplicity in application design, we
by IBM Bluemix cloud services. A model that describes the incorporated pre-distributed key based authentication process
[17]. However, multiple public key-based methodologies are
ability and harness the power of cloud computing is
free to use for authentication purpose. RAT generation time
illustrated in Fig. 5.
and algorithm execution time of conventional authentication
based security models were compared as shown in Fig. 6. in
The task scheduling unit is responsible for assigning order to analyze the better runtime of both the systems and
essential resources to at task in an invoked application for

Authorized licensed use limited to: University of the West of England. Downloaded on December 14,2023 at 21:07:22 UTC from IEEE Xplore. Restrictions apply.
959
hence, observed the optimized results in multilayered [7] Yeh, Kuo-Hui. "A secure IoT-based healthcare system with body
approach. Therefore, it has been observed that time sensor networks." IEEE Access 4 (2016): 10288-10299.
complexity will be nearly similar even when the multilayered [8] Keoh, Sye Loong, Sandeep S. Kumar, and Hannes Tschofenig.
"Securing the internet of things: A standardization perspective." IEEE
security architecture is considered as the no. of resources Internet of things Journal 1, no. 3 (2014): 265-275.
usually increases. Thus proposed model suffices the need of [9] Zhang, Liping, Yixin Zhang, Shanyu Tang, and He Luo. "Privacy
reduced complexity and improved security. protection for e-health systems by means of dynamic authentication
and three-factor key agreement." IEEE Transactions on Industrial
Electronics 65, no. 3 (2017): 2795-2805.
[10] Kim, Joongheon. "Energy-efficient dynamic packet downloading for
medical IoT platforms." IEEE Transactions on Industrial Informatics
11, no. 6 (2015): 1653-1659.
[11] Abawajy, Jemal H., and Mohammad Mehedi Hassan. "Federated
internet of things and cloud computing pervasive patient health
monitoring system." IEEE Communications Magazine 55, no. 1
(2017): 48-53.
[12] Kumar, Pardeep, and Hoon-Jae Lee. "Security issues in healthcare
applications using wireless medical sensor networks: A survey."
sensors 12, no. 1 (2012): 55-91.
[13] Sajid, Anam, Haider Abbas, and Kashif Saleem. "Cloud-assisted IoT-
based SCADA systems security: A review of the state of the art and
Fig. 6. Observed results of multi-layered security model future challenges." IEEE Access 4 (2016): 1375-1384.
[14] Barcelo, Marc, Alejandro Correa, Jaime Llorca, Antonia M. Tulino,
V. CONCLUSION Jose Lopez Vicario, and Antoni Morell. "IoT-cloud service
optimization in next generation smart environments." IEEE Journal on
This article presented a multi-layered security approach Selected Areas in Communications 34, no. 12 (2016): 4077-4090.
for implementation of a protected resource accessing
[15] Lee, Huang-Chen, and Kai-Hsiang Ke. "Monitoring of large-area IoT
mechanism for IoT-enabled healthcare devices and sensors using a LoRa wireless mesh network system: Design and
applications. Deeper insights allow readers to understand how evaluation." IEEE Transactions on Instrumentation and Measurement
security breaches can be filled out with a proper authentication 67, no. 9 (2018): 2177-2187.
and verification model. This article also depicts how 2-way [16] Zhang, Zhi-Kai, Michael Cheng Yi Cho, Chia-Wei Wang, Chia-Wei
authentication centric multilayered security architecture can Hsu, Chong-Kuan Chen, and Shiuhpyng Shieh. "IoT security: ongoing
be performed using authentication and key generation phase. challenges and research opportunities." In 2014 IEEE 7th international
conference on service-oriented computing and applications, pp. 230-
The RAT generation and verification process is validated with 234. IEEE, 2014.
the help of implemented prototype. Paper also demonstrates [17] Yahalom, Raphael, Birgit Klein, and Thomas Beth. "Trust
context-aware capability based controlled access mechanism relationships in secure systems-a distributed authentication
can be employed in securing medical devices in an energy perspective." In Proceedings 1993 IEEE Computer Society
efficient way. Hence, proposed architecture of multilayered Symposium on Research in Security and Privacy, pp. 150-164. IEEE,
security model is anticipated to be beneficial to the research 1993.
and development fellows working in IoT healthcare domain.
VI. ACKNOWLEDGEMENT
The work presented in this article was supported by Research
Initiation Grant (RIG) and financially supported by Birla
Institute of Technology and Science, Pilani, India. The authors
would also like to thank all the reviewers and related co-
authors who were actively involved in providing the valuable
feedback and comments related to this article.
REFERENCES
[1] Wu, Taiyang, Fan Wu, Jean-Michel Redouté, and Mehmet Rasit Yuce.
"An autonomous wireless body area network implementation towards
IoT connected healthcare applications." Ieee Access 5 (2017): 11413-
11422.
[2] Oueida, Soraia, Yehia Kotb, Moayad Aloqaily, Yaser Jararweh, and
Thar Baker. "An edge computing based smart healthcare framework
for resource management." Sensors 18, no. 12 (2018): 4307.
[3] Hamidi, Hodjat. "An approach to develop the smart health using
Internet of Things and authentication based on biometric technology."
Future generation computer systems 91 (2019): 434-449.
[4] Lee, In, and Kyoochun Lee. "The Internet of Things (IoT):
Applications, investments, and challenges for enterprises." Business
Horizons 58, no. 4 (2015): 431-440.
[5] Chaudhary, Rajat, Anish Jindal, Gagangeet Singh Aujla, Neeraj
Kumar, Ashok Kumar Das, and Neetesh Saxena. "Lscsh: Lattice-based
secure cryptosystem for smart healthcare in smart cities environment."
IEEE Communications Magazine 56, no. 4 (2018): 24-32.
[6] Aloqaily, Moayad, Safa Otoum, Ismaeel Al Ridhawi, and Yaser
Jararweh. "An intrusion detection system for connected vehicles in
smart cities." Ad Hoc Networks 90 (2019): 101842.

Authorized licensed use limited to: University of the West of England. Downloaded on December 14,2023 at 21:07:22 UTC from IEEE Xplore. Restrictions apply.
960

You might also like