Security Analysis of an IoT Architecture for Healthcare

Security issues of IoT devices are increasing with their massive use in healthcare. Recollection of data from devices is not clear to the users so far, and different problems arise including confidentiality, integrity and availability of the information. We analyze security issues mainly related to...

Full description

Saved in:
Bibliographic Details
Published inInternet of Things. IoT Infrastructures Vol. 169; pp. 454 - 460
Main Authors Teresa Villalba, M., de Buenaga, Manuel, Gachet, Diego, Aparicio, Fernando
Format Book Chapter
LanguageEnglish
Published Switzerland Springer International Publishing AG 2016
Springer International Publishing
SeriesLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Subjects
Online AccessGet full text
ISBN9783319470627
3319470620
ISSN1867-8211
1867-822X
DOI10.1007/978-3-319-47063-4_48

Cover

Abstract Security issues of IoT devices are increasing with their massive use in healthcare. Recollection of data from devices is not clear to the users so far, and different problems arise including confidentiality, integrity and availability of the information. We analyze security issues mainly related to IoT data storage and transmission in our proposal of healthcare system architecture including cloud services and big data processing of information. We identify protocols needed and security problems including authentication, transmission of data to the cloud, as well as their insufficient anonymization process and the opaque procedure for users in order to control the storage of their data.
AbstractList Security issues of IoT devices are increasing with their massive use in healthcare. Recollection of data from devices is not clear to the users so far, and different problems arise including confidentiality, integrity and availability of the information. We analyze security issues mainly related to IoT data storage and transmission in our proposal of healthcare system architecture including cloud services and big data processing of information. We identify protocols needed and security problems including authentication, transmission of data to the cloud, as well as their insufficient anonymization process and the opaque procedure for users in order to control the storage of their data.
Author Teresa Villalba, M.
de Buenaga, Manuel
Gachet, Diego
Aparicio, Fernando
Author_xml – sequence: 1
  givenname: M.
  surname: Teresa Villalba
  fullname: Teresa Villalba, M.
– sequence: 2
  givenname: Manuel
  surname: de Buenaga
  fullname: de Buenaga, Manuel
– sequence: 3
  givenname: Diego
  surname: Gachet
  fullname: Gachet, Diego
  email: diego.gachet@uem.es
– sequence: 4
  givenname: Fernando
  surname: Aparicio
  fullname: Aparicio, Fernando
BookMark eNpVkM1OAjEUhauiEZA3cDEvUG2nnf4sCREhIXEhJu6aUm5ldDIztmXB21vAmLg6yTn33OR8IzRouxYQuqfkgRIiH7VUmGFGNeaSCIa54eoCTbLNsnny-CUaUiUkVmX5fvUvK-XgL6P0Bo0oEYJKzYi6RZMYPwkhVArKlBwi-QpuH-p0KKatbQ6xjkXnC9sWy25dTIPb1Qlc2gcofBeKBdgm7ZwNcIeuvW0iTH51jN7mT-vZAq9enpez6Qr3JWcJC71l0oK0GrQtK-d16UBWTFilvN1QqLz3WuisomKWew75VCqVZ7At82yMyvPf2Ie6_YBgNl33FQ0l5ojK5N2GmbzcnLCYI6pc4udSH7rvPcRk4Nhy0KZgG7ezfYIQTVUpnbkYrnNPC_YDC-VouA
ContentType Book Chapter
Copyright ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2016
Copyright_xml – notice: ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2016
DBID FFUUA
DEWEY 4.6779999999999999
DOI 10.1007/978-3-319-47063-4_48
DatabaseName ProQuest Ebook Central - Book Chapters - Demo use only
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISBN 9783319470634
3319470639
EISSN 1867-822X
Editor Badra, Mohamad
Mitre Campista, Miguel Elias
Chaouchi, Hakima
Somov, Andrey
Cagáňová, Dagmar
Mandler, Benny
Giordano, Stefano
Fazio, Maria
Zeadally, Sherali
Marquez-Barja, Johann
Editor_xml – sequence: 1
  fullname: Badra, Mohamad
– sequence: 2
  fullname: Mitre Campista, Miguel Elias
– sequence: 3
  fullname: Chaouchi, Hakima
– sequence: 4
  fullname: Somov, Andrey
– sequence: 5
  fullname: Cagáňová, Dagmar
– sequence: 6
  fullname: Mandler, Benny
– sequence: 7
  fullname: Giordano, Stefano
– sequence: 8
  fullname: Fazio, Maria
– sequence: 9
  fullname: Zeadally, Sherali
– sequence: 10
  fullname: Marquez-Barja, Johann
EndPage 460
ExternalDocumentID EBC5589179_493_496
GroupedDBID 0D6
0DA
38.
9-Z
AABBV
AAMCO
AAQZU
ABBVZ
ABMNI
ABOWU
ACLMJ
ADCXD
ADPGQ
AEIBC
AEJGN
AEJLV
AEKFX
AEZAY
AJQNT
ALMA_UNASSIGNED_HOLDINGS
AORVH
BBABE
CZZ
FFUUA
I4C
IEZ
SBO
SWNTM
TPJZQ
Z5O
Z7R
Z7S
Z7U
Z7V
Z7W
Z7X
Z7Y
Z7Z
Z81
Z83
Z84
Z85
Z87
Z88
ID FETCH-LOGICAL-p243t-69d37ae7a9e9a25cf92ce7536a88fab1e5fff969e5f653a4f4ea9e7880623d3f3
ISBN 9783319470627
3319470620
ISSN 1867-8211
IngestDate Wed Sep 17 04:52:01 EDT 2025
Thu May 29 16:01:56 EDT 2025
IsPeerReviewed false
IsScholarly true
LCCallNum TK5105.5-5105.9
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-p243t-69d37ae7a9e9a25cf92ce7536a88fab1e5fff969e5f653a4f4ea9e7880623d3f3
OCLC 1066179308
PQID EBC5589179_493_496
PageCount 7
ParticipantIDs springer_books_10_1007_978_3_319_47063_4_48
proquest_ebookcentralchapters_5589179_493_496
PublicationCentury 2000
PublicationDate 2016
PublicationDateYYYYMMDD 2016-01-01
PublicationDate_xml – year: 2016
  text: 2016
PublicationDecade 2010
PublicationPlace Switzerland
PublicationPlace_xml – name: Switzerland
– name: Cham
PublicationSeriesTitle Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
PublicationSeriesTitleAlternate Lect.Notes Social.Inform.
PublicationSubtitle Second International Summit, IoT 360° 2015, Rome, Italy, October 27-29, 2015. Revised Selected Papers, Part I
PublicationTitle Internet of Things. IoT Infrastructures
PublicationYear 2016
Publisher Springer International Publishing AG
Springer International Publishing
Publisher_xml – name: Springer International Publishing AG
– name: Springer International Publishing
RelatedPersons Dressler, Falko
Xiaohua, Jia
Shen, Xuemin Sherman
Ferrari, Domenico
Kobayashi, Hisashi
Cao, Jiannong
Palazzo, Sergio
Coulson, Geoffrey
Stan, Mircea
Gerla, Mario
Akan, Ozgur
Bellavista, Paolo
Zomaya, Albert Y.
Sahni, Sartaj
RelatedPersons_xml – sequence: 1
  givenname: Ozgur
  surname: Akan
  fullname: Akan, Ozgur
– sequence: 2
  givenname: Paolo
  surname: Bellavista
  fullname: Bellavista, Paolo
– sequence: 3
  givenname: Jiannong
  surname: Cao
  fullname: Cao, Jiannong
– sequence: 4
  givenname: Geoffrey
  surname: Coulson
  fullname: Coulson, Geoffrey
– sequence: 5
  givenname: Falko
  surname: Dressler
  fullname: Dressler, Falko
– sequence: 6
  givenname: Domenico
  surname: Ferrari
  fullname: Ferrari, Domenico
– sequence: 7
  givenname: Mario
  surname: Gerla
  fullname: Gerla, Mario
– sequence: 8
  givenname: Hisashi
  surname: Kobayashi
  fullname: Kobayashi, Hisashi
– sequence: 9
  givenname: Sergio
  surname: Palazzo
  fullname: Palazzo, Sergio
– sequence: 10
  givenname: Sartaj
  surname: Sahni
  fullname: Sahni, Sartaj
– sequence: 11
  givenname: Xuemin Sherman
  surname: Shen
  fullname: Shen, Xuemin Sherman
– sequence: 12
  givenname: Mircea
  surname: Stan
  fullname: Stan, Mircea
– sequence: 13
  givenname: Jia
  surname: Xiaohua
  fullname: Xiaohua, Jia
– sequence: 14
  givenname: Albert Y.
  surname: Zomaya
  fullname: Zomaya, Albert Y.
SSID ssj0001761387
ssib023167542
ssj0000608566
Score 1.8421004
Snippet Security issues of IoT devices are increasing with their massive use in healthcare. Recollection of data from devices is not clear to the users so far, and...
SourceID springer
proquest
SourceType Publisher
StartPage 454
SubjectTerms Expert systems / knowledge-based systems
Healthcare
Internet of Things
Network hardware
Privacy
Security
User interface design & usability
Wearable
Title Security Analysis of an IoT Architecture for Healthcare
URI http://ebookcentral.proquest.com/lib/SITE_ID/reader.action?docID=5589179&ppg=496
http://link.springer.com/10.1007/978-3-319-47063-4_48
Volume 169
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Nc9MwENWk4QIcgAJDaWF04JZxJrFkyzr0UEohdJpecDu9aWRb6nSGsZkmufBz-SWsvmwl9FIOcRJHcezdzeppvbsPoU91ncpZlTZJVjU8obVUCeeKJFQ2sAjShDW2XGx5mS-u6PlNdjMa_Ymyljbralr_frCu5H-0CvtAr6ZK9hGa7Q8KO-A16Be2oGHY7oDf7TDrkC7YKnsn37FvTiffuxL-8fpeurawm_shQ7BU8EZOrg3L0M_KQsblNHzYqMnnjWqli7IuZbtRfebFN9Py2brqL3fqtustxNAX1nc20uqD0V1sfz88Md5W2xNwJuYUT-K7FybPcdFnoTkvZ7ovr44v_IjLbu1a47pMz5DdYL4YSCmCj7JW6UuOfaVV34e6NJQ_cT3MKu7GGIc_5rvhjxD-3AmgDjG8rfUyAYdDmenMHLn8AqaKIvUuX8X7LNF7cO3UNbv2KIE6FoR_JqA458TUh5lfA8sXtNhDe6ygY_Tk5Oz84jr4vNR0IggkxA49AAj2ENvGCRkALsvz2J-oKVEKF-Lblg0XFpWHPnQWWwupnXv_FlKVL9FzU2aDTf0LiPQVGql2H70I-sRen_voWaSj14gFs8LBrHCnsWwxmBWOzQqD7vFgVm_Q1dez8nSReO6P5FdKyTrJeUOYVExyxWWa1ZqntYKldS6LQstqrjKtNc85POcZkVRTBUMZzEaA5xuiyVs0brtWvUMYoMCsYsTSdNEi45zOixngDVVwOHBGD1ASRCJshoJPi66dAFYiM8ybjAvKCTzyAzQJchNm-EqE1t8gcEEECFxYgQsj8PePGn2Ing5GfoTG4CzUB0C96-qjN5y_SK-mBg
linkProvider Library Specific Holdings
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Internet+of+Things.+IoT+Infrastructures&rft.au=Teresa+Villalba%2C+M.&rft.au=de+Buenaga%2C+Manuel&rft.au=Gachet%2C+Diego&rft.au=Aparicio%2C+Fernando&rft.atitle=Security+Analysis+of+an+IoT+Architecture+for+Healthcare&rft.series=Lecture+Notes+of+the+Institute+for+Computer+Sciences%2C+Social+Informatics+and+Telecommunications+Engineering&rft.date=2016-01-01&rft.pub=Springer+International+Publishing&rft.isbn=9783319470627&rft.issn=1867-8211&rft.eissn=1867-822X&rft.spage=454&rft.epage=460&rft_id=info:doi/10.1007%2F978-3-319-47063-4_48
thumbnail_s http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Febookcentral.proquest.com%2Fcovers%2F5589179-l.jpg