Skip to main content

Mimicking Biometrics on Smart Devices and Its Application in IoT Security for Health Systems

  • Chapter
  • First Online:
IoT and ICT for Healthcare Applications

Abstract

The Internet of Things (IoT) encompasses cyber and physical objects in multidisciplinary applications such as home automation, industrial process, environmental monitoring, and human health, to mention a few. Especially the latter systems have seen rapid growth in hospitals and health centers over the last decade. The wireless healthcare monitoring devices of various technologies are presenting global interest, since they offer valuable health metrics to users and physicians and also they are easy to use on a day-to-day basis. This chapter refers to security issues associated to IoT devices in general and how a technique of bio-mimicking on smart devices may reveal potential attacks or malfunctions. The case of systems for healthcare and health monitoring is considered, in order to highlight the techniques’ benefits in this topic. The approach is bio-inspired by human biometrics and adopted to fit the cyber world, referring to a device’s state; specifically the paradigm of side channel attack is exploited. This introduces the notion that to secure devices for healthcare, the designer has to consider the “health status” of the device itself. Taking into consideration that these devices are limited by their functionality and functional characteristics, it is expected that any deviation from the expected normal operation would result in a similar deviation in any operational parameter.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 109.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 139.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 139.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. A.H. Alqahtani, M. Iftikhar, TCP/IP attacks, defenses and security tools. Int. J. Sci. Modern Eng. (IJISME) 1(10) (2013)

    Google Scholar 

  2. Apple, Apple. https://www.apple.com/itunes/charts/ (2019). Online; Accessed 10 June 2019

  3. H. Beitollahi, G. Deconinck, Tackling application-layer DDoS attacks. Proc. Comput. Sci. 10, 432–441 (2012)

    Article  Google Scholar 

  4. M.I. Bhat, S. Ahmad, A. Amin, S. Ashraf, e-health with internet of things. Int. J. Comput. Sci. Mob. Comput. 6(6), 357–362 (2017)

    Google Scholar 

  5. I. Dacosta, S. Chakradeo, M. Ahamad, P. Traynor, One-time cookies: preventing session hijacking attacks with stateless authentication tokens. ACM Trans. Internet Technol. (TOIT) 12(1), 1 (2012)

    Google Scholar 

  6. P. De Ryck, L. Desmet, W. Joosen, F. Piessens, Automatic and precise client-side protection against CSRF attacks, in European Symposium on Research in Computer Security (Springer, 2011), pp. 100–116

    Google Scholar 

  7. M.M. Dhanvijay, S.C. Patil, Internet of things: a survey of enabling technologies in healthcare and its applications. Comput. Netw. (2019)

    Google Scholar 

  8. A. Dohr, R. Modre-Opsrian, M. Drobics, D. Hayn, G. Schreier, The internet of things for ambient assisted living, in 2010 Seventh International Conference on Information Technology: New Generations (IEEE, 2010), pp. 804–809

    Google Scholar 

  9. B.J. Drew, R.M. Califf, M. Funk, E.S. Kaufman, M.W. Krucoff, M.M. Laks, P.W. Macfarlane, C. Sommargren, S. Swiryn, G.F. Van Hare, Practice standards for electrocardiographic monitoring in hospital settings: an American heart association scientific statement from the councils on cardiovascular nursing, clinical cardiology, and cardiovascular disease in the young: endorsed by the international society of computerized electrocardiology and the American association of critical-care nurses. Circulation 110(17), 2721–2746 (2004)

    Google Scholar 

  10. H.A. El Zouka, M.M. Hosni, Secure IoT communications for smart healthcare monitoring system. Internet Things (2019)

    Google Scholar 

  11. M. Elhoseny, G. Ramírez-González, O.M. Abu-Elnasr, S.A. Shawkat, N. Arunkumar, A. Farouk, Secure medical data transmission model for iot-based healthcare systems. IEEE Access 6, 20596–20608 (2018)

    Article  Google Scholar 

  12. Enisa, Enisa. https://www.enisa.europa.eu/publications/baseline-security-recommendations-for-iot/ (2019). Online; Accessed 10 June 2019

  13. Y.J. Fan, Y.H. Yin, L. Da Xu, Y. Zeng, F. Wu, IoT-based smart rehabilitation system. IEEE Trans. Ind. Inf. 10(2), 1568–1577 (2014)

    Article  Google Scholar 

  14. J. Fonseca, M. Vieira, H. Madeira, Testing and comparing web vulnerability scanning tools for SQL injection and XSS attacks, in 13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007) (IEEE, 2007), pp. 365–372

    Google Scholar 

  15. E. Gayat, A. Bodin, C. Sportiello, M. Boisson, J.F. Dreyfus, E. Mathieu, M. Fischler, Performance evaluation of a noninvasive hemoglobin monitoring device. Ann. Emerg. Med. 57(4), 330–333 (2011)

    Article  Google Scholar 

  16. T.N. Gia, M. Ali, I.B. Dhaou, A.M. Rahmani, T. Westerlund, P. Liljeberg, H. Tenhunen, IoT-based continuous glucose monitoring system: a feasibility study. Proc. Comput. Sci. 109, 327–334 (2017)

    Article  Google Scholar 

  17. Z. Guangnan, L. Penghui, IoT (internet of things) control system facing rehabilitation training of hemiplegic patients. Chin. Patent 202(587), 045 (2012)

    Google Scholar 

  18. M. Hassanalieragh, A. Page, T. Soyata, G. Sharma, M. Aktas, G. Mateos, B. Kantarci, S. Andreescu, Health monitoring and management using internet-of-things (IoT) sensing with cloud-based processing: opportunities and challenges, in 2015 IEEE International Conference on Services Computing (IEEE, 2015), pp. 285–292

    Google Scholar 

  19. M.S. Hossain, G. Muhammad, Cloud-assisted industrial internet of things (IIoT)–enabled framework for health monitoring. Comput. Netw. 101, 192–202 (2016)

    Article  Google Scholar 

  20. Imedicalapps, Imedicalapps. http://www.imedicalapps.com/2014/01/diagnose-app-evidence-based-clinical-decision/ (2019). Online; Accessed 10 June 2019

  21. Intel, Intel. http://www.intel.co.kr/content/www/kr/ko/internet-of-things/videos/dr-hawkings-connected-wheelchair-video.html/ (2019). Online; Accessed 10 June 2019

  22. S.R. Islam, D. Kwak, M.H. Kabir, M. Hossain, K.S. Kwak, The internet of things for health care: a comprehensive survey. IEEE Access 3, 678–708 (2015)

    Article  Google Scholar 

  23. R.S. Istepanian, S. Hu, N.Y. Philip, A. Sungoor, The potential of internet of m-health things (m-IoT) for non-invasive glucose level sensing, in 2011 Annual International Conference of the IEEE Engineering in Medicine and Biology Society (IEEE, 2011), pp. 5264–5266

    Google Scholar 

  24. H.A. Khattak, M. Ruta, E. Di Sciascio, Coap-based healthcare sensor networks: a survey, in Proceedings of 11th International Bhurban Conference on Applied Sciences and Technology (IBCAST), 2014, pp. 499–503

    Google Scholar 

  25. E.C. Larson, M. Goel, M. Redfield, G. Boriello, M. Rosenfeld, S.N. Patel, Tracking lung function on any phone, in Proceedings of the 3rd ACM Symposium on Computing for Development (ACM, 2013), p. 29

    Google Scholar 

  26. S. Liang, Y. Zilong, S. Hai, M. Trinidad, Childhood autism language training system and internet-of-things-based centralized training center. Chin. Patent 102(184), 661 (2011)

    Google Scholar 

  27. S. Mansfield-Devine, Ransomware: the most popular form of attack. Comput. Fraud Secur. 2017(10), 15–20 (2017)

    Article  Google Scholar 

  28. M. Marudhapandi, D. Ramkumar, R. Ramkumar, S. Jeevanandham, N. Suguna, Wearable ecg monitoring system and data analysis. Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol. 5, 667–673 (2019)

    Google Scholar 

  29. Medicaljoyworks, Medicaljoyworks. http://www.medicaljoyworks.com/ (2019). Online; Accessed 10 June 2019

  30. A.S.M. Mosa, I. Yoo, L. Sheets, A systematic review of healthcare applications for smartphones. BMC Med. Inform. Decis. Mak. 12(1), 67 (2012)

    Google Scholar 

  31. S. Pal, M. Hitchens, V. Varadharajan, T. Rabehaja, Policy-based access control for constrained healthcare resources, in 2018 IEEE 19th International Symposium on “A World of Wireless, Mobile and Multimedia Networks” (WoWMoM) (IEEE, 2018), pp. 588–599

    Google Scholar 

  32. Z. Pang, J. Tian, Q. Chen, Intelligent packaging and intelligent medicine box for medication management towards the internet-of-things, in 16th International Conference on Advanced Communication Technology (IEEE, 2014), pp. 352–360

    Google Scholar 

  33. M. Pesta, J. Fichtl, V. Kulda, O. Topolcan, V. Treska, Monitoring of circulating tumor cells in patients undergoing surgery for hepatic metastases from colorectal cancer. Anticancer Res. 33(5), 2239–2243 (2013)

    Google Scholar 

  34. Prognosisapp, Apple. http://www.prognosisapp.com/ (2019). Online; Accessed 10 June 2019

  35. A. Rahman, T. Rahman, N.H. Ghani, S. Hossain, J. Uddin, IoT based patient monitoring system using ecg sensor, in 2019 International Conference on Robotics, Electrical and Signal Processing Techniques (ICREST) (IEEE, 2019), pp. 378–382

    Google Scholar 

  36. V.M. Rohokale, N.R. Prasad, R. Prasad, A cooperative internet of things (IoT) for rural healthcare monitoring and control, in 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE) (IEEE, 2011), pp. 1–6

    Google Scholar 

  37. Y. Sheffer, R. Holz, P. Saint-Andre, Summarizing known attacks on transport layer security (TLS) and datagram TLS (DTLS). Technical report, Technische Universitaet Muenchen, 2015

    Book  Google Scholar 

  38. S. Sicari, A. Rizzardi, L. Grieco, G. Piro, A. Coen-Porisini, A policy enforcement framework for internet of things applications in the smart health. Smart Health 3, 39–74 (2017)

    Article  Google Scholar 

  39. L.M.R. Tarouco, L.M. Bertholdo, L.Z. Granville, L.M.R. Arbiza, F. Carbone, M. Marotta, J.J.C. De Santanna, Internet of things in healthcare: interoperatibility and security issues, in 2012 IEEE International Conference on Communications (ICC) (IEEE, 2012), pp. 6121–6125

    Google Scholar 

  40. W. Xu, K. Ma, W. Trappe, Y. Zhang, Jamming sensor networks: attack and defense strategies. IEEE Netw. 20(3), 41–47 (2006)

    Article  Google Scholar 

  41. G. Yang, M. Gerla, M. Sanadidi, Defense against low-rate TCP-targeted denial-of-service attacks, in Proceedings. ISCC 2004. Ninth International Symposium on Computers and Communications (IEEE Cat. No. 04TH8769), vol. 1 (IEEE, 2004), pp. 345–350

    Google Scholar 

  42. Z. Yang, Q. Zhou, L. Lei, K. Zheng, W. Xiang, An IoT-cloud based wearable ecg monitoring system for smart healthcare. J. Med. Syst. 40(12), 286 (2016)

    Google Scholar 

  43. T. Ylonen, C. Lonvick, The secure shell (SSH) protocol architecture. Technical report, The Internet Society, 2006

    Google Scholar 

  44. Y. Yue-Hong, F. Wu, F.Y. Jie, L. Jian, X. Chao, Z. Yi, Remote medical rehabilitation system in smart city. Chin. Patent 103(488), 880 (2014)

    Google Scholar 

Download references

Acknowledgements

This work was supported by NOKIA Bell Labs through global donation program for “Research on IoT Security based on Bio-informatics.”

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Myridakis Dimitrios .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Dimitrios, M., Georgios, S., Athanasios, K., Schoinianakis, D., Lueken, J. (2020). Mimicking Biometrics on Smart Devices and Its Application in IoT Security for Health Systems. In: Gupta, N., Paiva, S. (eds) IoT and ICT for Healthcare Applications. EAI/Springer Innovations in Communication and Computing. Springer, Cham. https://doi.org/10.1007/978-3-030-42934-8_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-42934-8_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-42933-1

  • Online ISBN: 978-3-030-42934-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics