International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Since Year 2012 | Open Access | Double Blind Reviewed

ISSN: 2319-7064

Downloads: 160

Research Paper | Computer Science & Engineering | India | Volume 5 Issue 5, May 2016

Cyber Security for Remote Patient Monitoring System

B. Manjulatha

Abstract: The Internet of Things is an emerging topic of technical, social, and economic significance. Consumer products, durable goods, cars and trucks, industrial and utility components, sensors, and other everyday objects are being combined with Internet connectivity and powerful data analytic capabilities that promise to transform the way we work, live, and play. Projections for the impact of IoT on the Internet and economy are impressive, with some anticipating as many as 100 billion connected IoT devices and a global economic impact of more than $11 trillion by 2025. Internet of Things (IoT) devices is rapidly becoming ubiquitous while IoT services are becoming pervasive. Their success has not gone unnoticed and the number of threats and attacks against IoT devices and services are on the increase as well. Cyber-attacks are not new to IoT, but as IoT will be deeply interwoven in our lives and societies, it is becoming necessary to step up and take cyber defense seriously. Currently, most proposed IoT attacks are proof-of-concepts and have yet to generate any profit for attackers. This does not mean that attackers wont target IoT devices in future, even if it is just to misuse the technology or have a persistent anchor in a home network. The use of weak passwords is a security issue that has repeatedly been seen in IoT devices. These devices often do not have a keyboard, so configuration has to be done remotely. Unfortunately, not all vendors force the user to change the devices default passwords and many have unnecessary restrictions which make the implementation of long, complex passwords impossible. The Open Web Application Security Projects (OWASP) Lists Top Ten Internet of Things Vulnerabilities. This thesis has three main contributions. (i) It enables secure communication in the IoT using lightweight compressed yet standard compliant IPsec, DTLS, and IEEE 802.15.4 link layer security, and it discusses the pros and cons of each of these solutions. The proposed security solutions are implemented and evaluated in an IoT setup on real hardware. (ii) This thesis also presents the design, implementation, and evaluation of novel IDS for the IoT. (iii) Last but not least, it also provides mechanisms to protect data inside constrained nodes. This paper mainly focuses on Remote Patient Monitoring Systems. However, deploying new technologies in healthcare applications without considering security makes patient privacy vulnerable. Moreover, the physiological data of an individual are highly sensitive. Therefore, security is a paramount requirement of healthcare applications, especially in the case of patient privacy, if the patient has an embarrassing disease. Security is provided for data which is being fetched from the patients through wearable devices and transferred to the concerned doctors by using a public key encryption technique namely ECC (Elliptic Curve Cryptography) is used.

Keywords: Wireless Medical Sensor Networks WMSN, ECC, DTLS, IEEE 802154 or ZigBee, OWASP

Edition: Volume 5 Issue 5, May 2016,

Pages: 190 - 197

How to Cite this Article?

B. Manjulatha, "Cyber Security for Remote Patient Monitoring System", International Journal of Science and Research (IJSR), Volume 5 Issue 5, May 2016, pp. 190-197,

How to Share this Article?

Enter Your Email Address

Similar Articles with Keyword 'ECC'

Downloads: 100

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1709 - 1712

A Business Framework for Securing Data Storage over Cloud Environment using ECC Crypto System

Nara Venkata Surendra Reddy | DLS Reddy [2]

Share this Article

Downloads: 102

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2832 - 2836

Minimization of DDoS Attack using Firecol an Intrusion Prevention System

Bhagyashri Kotame | Shrinivas Sonkar

Share this Article