Systematic analysis of security implementation for Internet of Health Things in mobile health networks

Document Type

Book Chapter

Publication Title

Data Science in Cybersecurity and Cyberthreat Intelligence

Publisher

Springer

School

School of Science

RAS ID

30598

Comments

Kang, J. J. (2020). Systematic analysis of security implementation for Internet of Health Things in mobile health networks. In L. F. Sikos & K.-K. R. Choo (Eds.), Data science in cybersecurity and cyberthreat intelligence (pp. 87-113). Springer. https://doi.org/10.1007/978-3-030-38788-4_5

Abstract

Internet of Things (IoT) networks are fast-evolving and expanding into most aspects of human society. The rapid proliferation of smart devices, such as smart phones and wearables that have been adopted for personal use in everyday life, has produced a demand for utilities that can assist people with achieving goals for a successful lifestyle, i.e., to live healthier and more productive lives. With continued research and development into technology, the costs of building IoT networks, including the devices and the accessibility of information from these networks is reducing at a rapid rate, allowing for the feasibility of large volumes of data to be produced. This is of great importance to the health informatics field, as health data made available from personal devices such as wearables and sensors may be of significant value to stakeholders within the health service industry, such as insurance companies and hospitals or doctors. Data collected by these sensors are transmitted by the devices to a centralized server, which can be accessed and retrieved by those service providers for further processing, analysis, and use. Devices used for this purpose through the IoT network can be referred to as the Internet of Health Things (IoHT). This paper broadly reviews the current security protocols that are available, taking the approach of a horizontal and vertical perspective. Possible options to protect this sensitive data and to protect network security are proposed, with considerations of simplicity and ease of implementation, as well as cost factors involved to meet the constraints of personal health devices (PHD), which are often limited in terms of battery power and processing power.

DOI

10.1007/978-3-030-38788-4_5

Access Rights

subscription content

Share

 
COinS