Professional Documents
Culture Documents
Abstract— IoT-enabled technologies have been creating In this regard, this article proposes a two-way authentication
phenomenal impacts in the field of biomedical applications ever centric, token-based multilayered security model for
since the advancements in ubiquitous computing has begun. providing protected access to healthcare resources and
Securing these biomedical applications has always been a key applications by preventing unauthorized usage. The
concern due to the highly openness nature of Wireless performance analysis was carried out on an implemented
Computing Technologies (WCT) to the vulnerabilities. Access prototype of healthcare device designed with raspberry pi
control is an important factor in designing a security system for powered by RetroPie operating system. The observed results
such applications which involves seamless healthcare devices. were compared with single layered security model (only 2-
However, several existing approaches provide token-based
way authentication-based systems) in terms of algorithm
access control mechanisms that are still facing the challenges in
integrating the multilayered security architecture. In this
execution time and observed extensively optimized results.
regard, the proposed model contributes towards in designing II. RELATED WORK
two-way authentication centric and generic security framework
for healthcare applications under the protected resource Wu et al. [1] proposed a model of intelligent wireless body
accessing environment. The model features its heterogeneous set area network that enables connected scenario in healthcare
of users to interact with the token-based resource accessing applications. They have also discussed a methodological
environment in healthcare scenario, preventing unauthorized approach to avoid space and power consumption related
users accessing the personalized medical devices. The proposed issues by considering miniaturized and power harvesting
model produced the extensive better results in comparison with techniques. Oueida [2] evaluated an edge-based theoretical
conventional single layered security approaches in terms of framework for a smart healthcare network offering non-
Human to Machine (H2M) interactions under the presumption consumable resource protection. This model also features the
of distributed and context-aware approaches. optimized healthcare resource utilization ratio and patient wait
time. Hamidi [3] discussed an approach to design an efficient
Keywords— Wireless Computing Technologies (WCT);
healthcare IoT device powered by biometric feature-based
Healthcare devices; Security framework; Access control
authentication technology. Lee et al. [4] presented a cluster-
mechanism; Resource Access Token (RAT); Authentication
oriented approach that predominantly offers the namelessness,
I. INTRODUCTION uniqueness and delay limitations on data transfer, therefore it
increases the stringency on security breaches. This was
The Internet of Things (IoT) is a novel paradigm that is achieved by following a practice of constant naming of data
rapidly attaining ground in the scenario of building modern transfer via versatile cluster. Chaudhary et al. [5] proposed a
healthcare facilities. Technologies to support the IoT-enabled novel approach in designing lattice-based secure
healthcare designs are becoming more important as, the need cryptosystem for smart healthcare (LSCSH) envisioned for
for better analysis of the chronicle diseases and make them advanced smart city applications. In order to avoid data
predicted well ahead of time increases. As a result, it is duplication and eavesdropping at third party cloud storage
predicted that intelligent devices and networks, such as services, this model employs lattice enabled common
WSNs, WBANs, and Low Power Wireless Body Area verification scheme that authenticates the end user requests
Network (LPWBAN) will not be isolated, but connected and (doctor-patients) for accessing cloud services. However it was
integrated, composing healthcare networks [1-8]. One of the not secured against the wearable devices/ mobile devices
primary features offered by the IoT-enabled healthcare (WD/MD) stolen attacks, privileged insider attacks and
devices is to provide real-time monitoring and world-wide impersonation attacks.
access services to its intended set of end users. This feature
enables the doctors and patients to gain better understandings In an effort to mitigate the security vulnerabilities in high
in the behavioral patterns of prolonged chronicle health issues performance cloud services in smart transportation
and helps in improving their quality of life. applications, a persistent approach for an intrusion detection
has been presented by Aloqaily et al. [6]. This approach is
However, healthcare applications and devices are resistive towards various attacks such as Denial of Service,
expected to exhibit the carriage of extremely private Probe, Remote to user etc. The intrusion classification was
information such as individual critical health data and carried out by ID3-based decision tree algorithm and deep
prescription [9]. In addition, such real-time accessing and belief function for reduction of data dimensions was presented
monitoring nature of IoT systems from World Wide Web as well. The system accuracy was acclaimed to be as high as
increases the vulnerability chances and such systems may 99.92%. However, system has a flaw of false negative rate as
become a cyber-target. Therefore, such applications and 1.53% which denotes approximately 3-4 intruder attempts
devices requires to employ a secured access mechanism to could break the privacy wall for every 200 user sessions.
avoid digital forgery and misuse of highly personal devices.
Authorized licensed use limited to: University of the West of England. Downloaded on December 14,2023 at 21:07:22 UTC from IEEE Xplore. Restrictions apply.
958
Registration: The service user need to first create the security execution based on numerous parameters as specified by user
credentials using the interactive user application as shown in of the application [14]. Depending on the overall
fig. 4. User registration and password allocation will be taken computational requirements of individual sensor application
care by registration management system (RMS). The RMS [15], it is possible for resource provisioning unit for
works on dual mode, user mode and admin mode. In user originating and dismissing specified number of computation,
mode, service user must provide his/her personal information storage and network resources while maintaining queued
such as name, social security information, credit card details events to be scheduled. Resource failures are handled
etc. Initial password is generated for the first use. This effectively by reallocating the resources based on notifying
password has the further significance in RAT generation. In
priority of the applications. Each of the events are recorded
admin mode RMS allows its administrators to access the
by Bluemix event monitoring unit.
application using the OTP using which they could control/
moniter the resource allocation and user access logs.
Authorized licensed use limited to: University of the West of England. Downloaded on December 14,2023 at 21:07:22 UTC from IEEE Xplore. Restrictions apply.
959
hence, observed the optimized results in multilayered [7] Yeh, Kuo-Hui. "A secure IoT-based healthcare system with body
approach. Therefore, it has been observed that time sensor networks." IEEE Access 4 (2016): 10288-10299.
complexity will be nearly similar even when the multilayered [8] Keoh, Sye Loong, Sandeep S. Kumar, and Hannes Tschofenig.
"Securing the internet of things: A standardization perspective." IEEE
security architecture is considered as the no. of resources Internet of things Journal 1, no. 3 (2014): 265-275.
usually increases. Thus proposed model suffices the need of [9] Zhang, Liping, Yixin Zhang, Shanyu Tang, and He Luo. "Privacy
reduced complexity and improved security. protection for e-health systems by means of dynamic authentication
and three-factor key agreement." IEEE Transactions on Industrial
Electronics 65, no. 3 (2017): 2795-2805.
[10] Kim, Joongheon. "Energy-efficient dynamic packet downloading for
medical IoT platforms." IEEE Transactions on Industrial Informatics
11, no. 6 (2015): 1653-1659.
[11] Abawajy, Jemal H., and Mohammad Mehedi Hassan. "Federated
internet of things and cloud computing pervasive patient health
monitoring system." IEEE Communications Magazine 55, no. 1
(2017): 48-53.
[12] Kumar, Pardeep, and Hoon-Jae Lee. "Security issues in healthcare
applications using wireless medical sensor networks: A survey."
sensors 12, no. 1 (2012): 55-91.
[13] Sajid, Anam, Haider Abbas, and Kashif Saleem. "Cloud-assisted IoT-
based SCADA systems security: A review of the state of the art and
Fig. 6. Observed results of multi-layered security model future challenges." IEEE Access 4 (2016): 1375-1384.
[14] Barcelo, Marc, Alejandro Correa, Jaime Llorca, Antonia M. Tulino,
V. CONCLUSION Jose Lopez Vicario, and Antoni Morell. "IoT-cloud service
optimization in next generation smart environments." IEEE Journal on
This article presented a multi-layered security approach Selected Areas in Communications 34, no. 12 (2016): 4077-4090.
for implementation of a protected resource accessing
[15] Lee, Huang-Chen, and Kai-Hsiang Ke. "Monitoring of large-area IoT
mechanism for IoT-enabled healthcare devices and sensors using a LoRa wireless mesh network system: Design and
applications. Deeper insights allow readers to understand how evaluation." IEEE Transactions on Instrumentation and Measurement
security breaches can be filled out with a proper authentication 67, no. 9 (2018): 2177-2187.
and verification model. This article also depicts how 2-way [16] Zhang, Zhi-Kai, Michael Cheng Yi Cho, Chia-Wei Wang, Chia-Wei
authentication centric multilayered security architecture can Hsu, Chong-Kuan Chen, and Shiuhpyng Shieh. "IoT security: ongoing
be performed using authentication and key generation phase. challenges and research opportunities." In 2014 IEEE 7th international
conference on service-oriented computing and applications, pp. 230-
The RAT generation and verification process is validated with 234. IEEE, 2014.
the help of implemented prototype. Paper also demonstrates [17] Yahalom, Raphael, Birgit Klein, and Thomas Beth. "Trust
context-aware capability based controlled access mechanism relationships in secure systems-a distributed authentication
can be employed in securing medical devices in an energy perspective." In Proceedings 1993 IEEE Computer Society
efficient way. Hence, proposed architecture of multilayered Symposium on Research in Security and Privacy, pp. 150-164. IEEE,
security model is anticipated to be beneficial to the research 1993.
and development fellows working in IoT healthcare domain.
VI. ACKNOWLEDGEMENT
The work presented in this article was supported by Research
Initiation Grant (RIG) and financially supported by Birla
Institute of Technology and Science, Pilani, India. The authors
would also like to thank all the reviewers and related co-
authors who were actively involved in providing the valuable
feedback and comments related to this article.
REFERENCES
[1] Wu, Taiyang, Fan Wu, Jean-Michel Redouté, and Mehmet Rasit Yuce.
"An autonomous wireless body area network implementation towards
IoT connected healthcare applications." Ieee Access 5 (2017): 11413-
11422.
[2] Oueida, Soraia, Yehia Kotb, Moayad Aloqaily, Yaser Jararweh, and
Thar Baker. "An edge computing based smart healthcare framework
for resource management." Sensors 18, no. 12 (2018): 4307.
[3] Hamidi, Hodjat. "An approach to develop the smart health using
Internet of Things and authentication based on biometric technology."
Future generation computer systems 91 (2019): 434-449.
[4] Lee, In, and Kyoochun Lee. "The Internet of Things (IoT):
Applications, investments, and challenges for enterprises." Business
Horizons 58, no. 4 (2015): 431-440.
[5] Chaudhary, Rajat, Anish Jindal, Gagangeet Singh Aujla, Neeraj
Kumar, Ashok Kumar Das, and Neetesh Saxena. "Lscsh: Lattice-based
secure cryptosystem for smart healthcare in smart cities environment."
IEEE Communications Magazine 56, no. 4 (2018): 24-32.
[6] Aloqaily, Moayad, Safa Otoum, Ismaeel Al Ridhawi, and Yaser
Jararweh. "An intrusion detection system for connected vehicles in
smart cities." Ad Hoc Networks 90 (2019): 101842.
Authorized licensed use limited to: University of the West of England. Downloaded on December 14,2023 at 21:07:22 UTC from IEEE Xplore. Restrictions apply.
960