Pub Date : 2020-12-14DOI: 10.1109/IOTSMS52051.2020.9340216
Christine Hennebert
While numerous studies deepen the security issues of the distributed consensus mechanisms, the lack of a normalized reference for their security evaluation makes it difficult to exploit their conclusions. In this paper, the author applies the rigorous standardized methodology of the Common Criteria to consensus mechanisms and defines the security problem to introduce a Protection Profile focused on a peer node as physical device, in its blockchain environment. The aim is to focus on the security assessment of a physical peer device in a distributed network. The further goal is to succeed in defining shared relevant evaluation metrics.
{"title":"A first Step towards a Protection Profile for the Security Evaluation of Consensus Mechanisms","authors":"Christine Hennebert","doi":"10.1109/IOTSMS52051.2020.9340216","DOIUrl":"https://doi.org/10.1109/IOTSMS52051.2020.9340216","url":null,"abstract":"While numerous studies deepen the security issues of the distributed consensus mechanisms, the lack of a normalized reference for their security evaluation makes it difficult to exploit their conclusions. In this paper, the author applies the rigorous standardized methodology of the Common Criteria to consensus mechanisms and defines the security problem to introduce a Protection Profile focused on a peer node as physical device, in its blockchain environment. The aim is to focus on the security assessment of a physical peer device in a distributed network. The further goal is to succeed in defining shared relevant evaluation metrics.","PeriodicalId":147136,"journal":{"name":"2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120937806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-14DOI: 10.1109/IOTSMS52051.2020.9340213
V. Bellandi, P. Ceravolo, S. Maghool, S. Siccardi
Due to the current emergency situation, caused by COVID-19, the scientific literature on the topic has rapidly grown. At the same time, purposeful and targeted research plans with strong background knowledge is urgently needed. However, the huge number of documents produced by multiple communities generates a fragmented terminology that may cause confusion in information retrieval. To this aim, in a comparative study, we test different techniques to efficiently cluster these publications for improving their level of findability.
{"title":"A Comparative Study of Clustering Techniques Applied on Covid-19 Scientific Literature","authors":"V. Bellandi, P. Ceravolo, S. Maghool, S. Siccardi","doi":"10.1109/IOTSMS52051.2020.9340213","DOIUrl":"https://doi.org/10.1109/IOTSMS52051.2020.9340213","url":null,"abstract":"Due to the current emergency situation, caused by COVID-19, the scientific literature on the topic has rapidly grown. At the same time, purposeful and targeted research plans with strong background knowledge is urgently needed. However, the huge number of documents produced by multiple communities generates a fragmented terminology that may cause confusion in information retrieval. To this aim, in a comparative study, we test different techniques to efficiently cluster these publications for improving their level of findability.","PeriodicalId":147136,"journal":{"name":"2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116594545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-14DOI: 10.1109/IOTSMS52051.2020.9340217
Drisya Alex Thumba, S. Lazarova-Molnar, P. Niloofar
Livestock sector is known for its contribution to environmental pollution. A large portion of anthropogenic emissions is from livestock-related activities, such as animal feeding and manure management. According to the Food and Agriculture Organization of the United Nations, by 2050, 73% increase in livestock product consumption is anticipated. This poses an alarming threat to the environmental sustainability as a proportionate increase in greenhouse gases (GHG) emission is also expected. On the bright side, with the support of appropriate technologies and mitigation strategies, the livestock production sector is capable of achieving a substantial reduction in the level of emissions. A consistent quantitative analysis of emissions and related activities can help in identifying the sensitive areas to intervene. There are several data-driven decision support tools and practices available in literature that aim to help farmers contribute to sustainability. In this work, we provide an overview of the popular data-driven modelling techniques and decision support tools used to estimate GHG emissions from the various livestock farming-related sources. We also discuss the role of decision support tools in various management activities, such as analysing and designing farm systems trials and integrating environmental, technological and economic aspects. Finally, we discuss the challenges and opportunities in using data for decision support in reducing GHG emissions in livestock farming.
{"title":"Data-driven Decision Support Tools for Reducing GHG Emissions from Livestock Production Systems: Overview and Challenges","authors":"Drisya Alex Thumba, S. Lazarova-Molnar, P. Niloofar","doi":"10.1109/IOTSMS52051.2020.9340217","DOIUrl":"https://doi.org/10.1109/IOTSMS52051.2020.9340217","url":null,"abstract":"Livestock sector is known for its contribution to environmental pollution. A large portion of anthropogenic emissions is from livestock-related activities, such as animal feeding and manure management. According to the Food and Agriculture Organization of the United Nations, by 2050, 73% increase in livestock product consumption is anticipated. This poses an alarming threat to the environmental sustainability as a proportionate increase in greenhouse gases (GHG) emission is also expected. On the bright side, with the support of appropriate technologies and mitigation strategies, the livestock production sector is capable of achieving a substantial reduction in the level of emissions. A consistent quantitative analysis of emissions and related activities can help in identifying the sensitive areas to intervene. There are several data-driven decision support tools and practices available in literature that aim to help farmers contribute to sustainability. In this work, we provide an overview of the popular data-driven modelling techniques and decision support tools used to estimate GHG emissions from the various livestock farming-related sources. We also discuss the role of decision support tools in various management activities, such as analysing and designing farm systems trials and integrating environmental, technological and economic aspects. Finally, we discuss the challenges and opportunities in using data for decision support in reducing GHG emissions in livestock farming.","PeriodicalId":147136,"journal":{"name":"2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123196040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-14DOI: 10.1109/iotsms52051.2020.9340210
{"title":"IOTSMS 2020 Committee","authors":"","doi":"10.1109/iotsms52051.2020.9340210","DOIUrl":"https://doi.org/10.1109/iotsms52051.2020.9340210","url":null,"abstract":"","PeriodicalId":147136,"journal":{"name":"2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128355050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-14DOI: 10.1109/IOTSMS52051.2020.9340230
Santhosh Shetty Chowdary, M. A. E. Ghany, K. Hofmann
Electricity has become the primary need of human life. The emerging of IoT concept recently in our lives, has offered the chance to establish energy efficient smart devices, systems and cities. Due to the urging need for conserving energy, this paper proposes an IoT based wireless energy efficient smart metering systems for smart cities. A network of smart meters is achieved to deliver the energy consumption data to the Energy/Utility provider. The star and mesh topologies are used in creating the network of smart meters in order to increase the distance of coverage. The proposed system offers an easily operated application for users as well as a Website and database for electricity Supplier Company. The proposed system design has an accuracy level of 95% and it is about 35% lower cost than its peer in the global market. The proposed design reduced the power consumption by 25%.
{"title":"IoT based Wireless Energy Efficient Smart Metering System Using ZigBee in Smart Cities","authors":"Santhosh Shetty Chowdary, M. A. E. Ghany, K. Hofmann","doi":"10.1109/IOTSMS52051.2020.9340230","DOIUrl":"https://doi.org/10.1109/IOTSMS52051.2020.9340230","url":null,"abstract":"Electricity has become the primary need of human life. The emerging of IoT concept recently in our lives, has offered the chance to establish energy efficient smart devices, systems and cities. Due to the urging need for conserving energy, this paper proposes an IoT based wireless energy efficient smart metering systems for smart cities. A network of smart meters is achieved to deliver the energy consumption data to the Energy/Utility provider. The star and mesh topologies are used in creating the network of smart meters in order to increase the distance of coverage. The proposed system offers an easily operated application for users as well as a Website and database for electricity Supplier Company. The proposed system design has an accuracy level of 95% and it is about 35% lower cost than its peer in the global market. The proposed design reduced the power consumption by 25%.","PeriodicalId":147136,"journal":{"name":"2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133039554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-14DOI: 10.1109/IOTSMS52051.2020.9340218
Sharhabeel H. Alnabelsi, H. Salameh
Routing in Cognitive Radio Networks (CRNs) has recently become more efficient, due to employing the Full-Duplex (FD) transmission technology. When the unlicensed users, also known as Secondary Users (SUs), have FD capabilities, they can transmit and receive simultaneously either over the same channel, namely in-band FD (IB-FD), or over different channels, namely Out-of-Band FD (OB-FD). In this work, we adopt the OB-FD transmission, because it is less complex than IBFD, i.e.; it does not require Self-Interference-Cancellation (SIC) technique, also the hardware cost of devices that support IB-FD capability is more expensive. Apparently, channels assignment for the discovered route is crucial, whether it satisfies the FD transmission condition or not. For the OB-FD transmission, for every segment of three-consecutive hops along the route, their selected three channels must be different in order to avoid interference between SUs. Therefore, in this work, we are motivated to propose a sequential mechanism with low-complexity that is aware about FD when assigning channels, namely Sequential FD-(SFD)-aware. According to the proposed protocol, for each candidate route, channels are assigned to route hops sequentially such that the aforementioned condition is satisfied. However, if this condition is not satisfied, the route will not be adopted. It is worth mentioning that there are some methods studied recently in literature for channels assignments, however, these methods require optimization techniques that have NP-hard complexity in terms of number of hops and channels. We compared our proposed protocol with an existing protocol which assigns for each hop the available channel with maximum rate, and then selects the route that has the maximum bottleneck rate. The simulation results show that our proposed mechanism outperforms the baseline protocol in terms of achieved end-to-end throughput.
{"title":"Sequential Routing Decision with Low-Complexity for Throughput Improvement in Full-duplex Cognitive Radio Networks","authors":"Sharhabeel H. Alnabelsi, H. Salameh","doi":"10.1109/IOTSMS52051.2020.9340218","DOIUrl":"https://doi.org/10.1109/IOTSMS52051.2020.9340218","url":null,"abstract":"Routing in Cognitive Radio Networks (CRNs) has recently become more efficient, due to employing the Full-Duplex (FD) transmission technology. When the unlicensed users, also known as Secondary Users (SUs), have FD capabilities, they can transmit and receive simultaneously either over the same channel, namely in-band FD (IB-FD), or over different channels, namely Out-of-Band FD (OB-FD). In this work, we adopt the OB-FD transmission, because it is less complex than IBFD, i.e.; it does not require Self-Interference-Cancellation (SIC) technique, also the hardware cost of devices that support IB-FD capability is more expensive. Apparently, channels assignment for the discovered route is crucial, whether it satisfies the FD transmission condition or not. For the OB-FD transmission, for every segment of three-consecutive hops along the route, their selected three channels must be different in order to avoid interference between SUs. Therefore, in this work, we are motivated to propose a sequential mechanism with low-complexity that is aware about FD when assigning channels, namely Sequential FD-(SFD)-aware. According to the proposed protocol, for each candidate route, channels are assigned to route hops sequentially such that the aforementioned condition is satisfied. However, if this condition is not satisfied, the route will not be adopted. It is worth mentioning that there are some methods studied recently in literature for channels assignments, however, these methods require optimization techniques that have NP-hard complexity in terms of number of hops and channels. We compared our proposed protocol with an existing protocol which assigns for each hop the available channel with maximum rate, and then selects the route that has the maximum bottleneck rate. The simulation results show that our proposed mechanism outperforms the baseline protocol in terms of achieved end-to-end throughput.","PeriodicalId":147136,"journal":{"name":"2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","volume":"80 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129679058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-14DOI: 10.1109/IOTSMS52051.2020.9340221
Bart Moons, Flor Sanders, Thijs Paelman, J. Hoebeke
Data generated by sensors in Internet of Things ecosystems contains lots of valuable information, which is often not used to its full potential. This is mainly due to the fact that data is stored in proprietary storages and formats. Manufacturers of sensor devices often offer closed platforms to view and manage the data, which limits their reusability. Moreover, questions start to raise about true data ownership over data generated from monitoring our everyday lives. In order to overcome these issues several initiatives have emerged in the past to hand over data to the rightful owner. One of these initiatives is Solid, currently focusing on socially linked data. However, never before did one apply the Solid principles to Internet of Things data. Therefore, in this paper, a novel approach is presented where sensor data is handled from sensor to storage using open data formats and standards to ensure interoperability and reusability. It is shown that combining existing concepts can be helpful in designing decentralized Internet of Things data storages, on top of which data can be incorporated into the Linked Open Data cloud. This has been done by comparing the overhead of a regular approach, using Linked Open Data concepts on top of a sensor device, to an approach that was optimized for device management in constrained Internet of Things networks.
{"title":"Decentralized Linked Open Data in Constrained Wireless Sensor Networks","authors":"Bart Moons, Flor Sanders, Thijs Paelman, J. Hoebeke","doi":"10.1109/IOTSMS52051.2020.9340221","DOIUrl":"https://doi.org/10.1109/IOTSMS52051.2020.9340221","url":null,"abstract":"Data generated by sensors in Internet of Things ecosystems contains lots of valuable information, which is often not used to its full potential. This is mainly due to the fact that data is stored in proprietary storages and formats. Manufacturers of sensor devices often offer closed platforms to view and manage the data, which limits their reusability. Moreover, questions start to raise about true data ownership over data generated from monitoring our everyday lives. In order to overcome these issues several initiatives have emerged in the past to hand over data to the rightful owner. One of these initiatives is Solid, currently focusing on socially linked data. However, never before did one apply the Solid principles to Internet of Things data. Therefore, in this paper, a novel approach is presented where sensor data is handled from sensor to storage using open data formats and standards to ensure interoperability and reusability. It is shown that combining existing concepts can be helpful in designing decentralized Internet of Things data storages, on top of which data can be incorporated into the Linked Open Data cloud. This has been done by comparing the overhead of a regular approach, using Linked Open Data concepts on top of a sensor device, to an approach that was optimized for device management in constrained Internet of Things networks.","PeriodicalId":147136,"journal":{"name":"2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130024923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-14DOI: 10.1109/IOTSMS52051.2020.9340206
Thibaud Ecarot, Samuel Dussault, Ameni Souid, L. Lavoie, J. Éthier
The AppArmor Linux Security Module (LSM) is widely used on Linux operating systems as it, among other things, provides mandatory access control (MAC) and isolates processes. This isolation helps meet the privacy requirements for critical applications. These application security policies are defined with profiles loaded into the Linux system kernel. However, these access control mechanisms are far from covering all the rising demands for confidentiality enforcement regarding critical applications. This paper conducts a risks and benefits analysis to assess whether a healthcare infrastructure can safely rely on the AppArmor LSM to protect its sensitive data. Thus, the general architecture of AppAmor comes to be detailed. Then, a static code analysis is performed to study the data structures found in the LSM. Finally, the outbreak of would-be side-channel attacks from userspace is discussed while offering mitigation methods. The result of this analysis shows that the AppArmor LSM is susceptible to side-channel attacks and should be used as part of a more comprehensive defense-in-depth strategy.
AppArmor Linux Security Module (LSM)广泛用于Linux操作系统,因为它提供了强制访问控制(MAC)和隔离进程等功能。这种隔离有助于满足关键应用程序的隐私要求。这些应用程序安全策略是通过加载到Linux系统内核中的配置文件定义的。然而,这些访问控制机制远远不能满足关键应用程序的所有日益增长的保密要求。本文进行了风险和收益分析,以评估医疗保健基础设施是否可以安全地依赖AppArmor LSM来保护其敏感数据。因此,详细介绍了AppAmor的总体架构。然后,执行静态代码分析来研究LSM中发现的数据结构。最后,讨论了来自用户空间的潜在侧通道攻击的爆发,同时提供了缓解方法。分析结果表明,AppArmor LSM容易受到侧信道攻击,应该作为更全面的纵深防御策略的一部分使用。
{"title":"AppArmor For Health Data Access Control: Assessing Risks and Benefits","authors":"Thibaud Ecarot, Samuel Dussault, Ameni Souid, L. Lavoie, J. Éthier","doi":"10.1109/IOTSMS52051.2020.9340206","DOIUrl":"https://doi.org/10.1109/IOTSMS52051.2020.9340206","url":null,"abstract":"The AppArmor Linux Security Module (LSM) is widely used on Linux operating systems as it, among other things, provides mandatory access control (MAC) and isolates processes. This isolation helps meet the privacy requirements for critical applications. These application security policies are defined with profiles loaded into the Linux system kernel. However, these access control mechanisms are far from covering all the rising demands for confidentiality enforcement regarding critical applications. This paper conducts a risks and benefits analysis to assess whether a healthcare infrastructure can safely rely on the AppArmor LSM to protect its sensitive data. Thus, the general architecture of AppAmor comes to be detailed. Then, a static code analysis is performed to study the data structures found in the LSM. Finally, the outbreak of would-be side-channel attacks from userspace is discussed while offering mitigation methods. The result of this analysis shows that the AppArmor LSM is susceptible to side-channel attacks and should be used as part of a more comprehensive defense-in-depth strategy.","PeriodicalId":147136,"journal":{"name":"2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126616547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-14DOI: 10.1109/IOTSMS52051.2020.9340232
K. Wilber, Sarah Vayansky, N. Costello, David Berdik, Y. Jararweh
Blockchain, cryptographically linked blocks of data, is the key technology behind the infamous cryptocurrency Bitcoin, however, blockchain can serve more use cases than just cryptocurrency. The technology has use cases in any industry that generates and transfers data. In a use case such as cryptocurrency the blockchain is used to manage transactions from peer-to-peer in a way that does not allow for that transaction’s data to be manipulated by one of the involved parties or a third party. This is a valuable process that other industries could leverage. One such industry that could benefit from applying blockchain technology for a multitude of cases is the healthcare industry. Primary care doctors could be connected to a blockchain system that allowed them to access patient data and securely monitor the respective patient, pharmaceutical companies could increase their products validity in the marketplace with individual product tracking, and the insurance industry could trust all the information about a client. All of these are possible use cases for blockchain in the healthcare industry. Currently, the healthcare industry is not leveraging the blockchain at scale. Within this paper we are going to explore the possibilities for blockchain technology and the use cases in the healthcare industry specifically, and how the different industries within the healthcare industry can implement a blockchain system.
{"title":"A Survey on Blockchain for Healthcare Informatics and Applications","authors":"K. Wilber, Sarah Vayansky, N. Costello, David Berdik, Y. Jararweh","doi":"10.1109/IOTSMS52051.2020.9340232","DOIUrl":"https://doi.org/10.1109/IOTSMS52051.2020.9340232","url":null,"abstract":"Blockchain, cryptographically linked blocks of data, is the key technology behind the infamous cryptocurrency Bitcoin, however, blockchain can serve more use cases than just cryptocurrency. The technology has use cases in any industry that generates and transfers data. In a use case such as cryptocurrency the blockchain is used to manage transactions from peer-to-peer in a way that does not allow for that transaction’s data to be manipulated by one of the involved parties or a third party. This is a valuable process that other industries could leverage. One such industry that could benefit from applying blockchain technology for a multitude of cases is the healthcare industry. Primary care doctors could be connected to a blockchain system that allowed them to access patient data and securely monitor the respective patient, pharmaceutical companies could increase their products validity in the marketplace with individual product tracking, and the insurance industry could trust all the information about a client. All of these are possible use cases for blockchain in the healthcare industry. Currently, the healthcare industry is not leveraging the blockchain at scale. Within this paper we are going to explore the possibilities for blockchain technology and the use cases in the healthcare industry specifically, and how the different industries within the healthcare industry can implement a blockchain system.","PeriodicalId":147136,"journal":{"name":"2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125535602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-14DOI: 10.1109/IOTSMS52051.2020.9340231
Paige Harvey, Otily Toutsop, K. Kornegay, Excel Alale, Don Reaves
The Internet of Things, IoT, provides various applications in the health and care sector, enhancing assisted living, and the ability to remotely monitor patients in hospitals, at homes, and in care facilities [1]. Additionally, many patients who require constant health monitoring prefer the comfort of home monitoring to hospital environments [2]. Therefore, with the increased interest in smart home configurations and the need for Medical IoT, MIoT, device development, we may witness a rise in in-home smart healthcare set-ups. In this paper, we present a Ph.D. research proposing an improve architecture for ensuring security and privacy of smart medical devices in smart home environments.
{"title":"Security and Privacy of Medical Internet of Things Devices for Smart Homes","authors":"Paige Harvey, Otily Toutsop, K. Kornegay, Excel Alale, Don Reaves","doi":"10.1109/IOTSMS52051.2020.9340231","DOIUrl":"https://doi.org/10.1109/IOTSMS52051.2020.9340231","url":null,"abstract":"The Internet of Things, IoT, provides various applications in the health and care sector, enhancing assisted living, and the ability to remotely monitor patients in hospitals, at homes, and in care facilities [1]. Additionally, many patients who require constant health monitoring prefer the comfort of home monitoring to hospital environments [2]. Therefore, with the increased interest in smart home configurations and the need for Medical IoT, MIoT, device development, we may witness a rise in in-home smart healthcare set-ups. In this paper, we present a Ph.D. research proposing an improve architecture for ensuring security and privacy of smart medical devices in smart home environments.","PeriodicalId":147136,"journal":{"name":"2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128049221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}