A survey on internet of things: privacy with security of sensors and wearable network ip/protocols

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    The paper gives the introduction of the IoT, which lay forward the capabilties to detect and link with the world wide web with the con-nectivity to connect this with the physical objects into a cognate systems. On the other hand some severe concers as the part of the IoT, are been highlighted over the passage gateways of critical personal informations relevants to device and personalized privacy.This survey will summerize and tries to highlight the core issues related to the security threats,and the privacy interest of the IoT.

     

     


  • Keywords


    Security; Networks Protocols; Sensors; Wearable’s, Algorithms.

  • References


      [1] J.Sathish Kumar and Dhiren R Patel “Survey on Internets of Things: Security and Privacy Issues” International Journal of Computer Applications (0975 – 8887) Volume 90 – No 11, March 2014

      [2] S. M. RIAZUL ISLAM1, (Member, IEEE), DAEHAN KWAK2, MD. HUMAUN KABIR1, MAHMUD HOSSAIN3, AND KYUNG-SUP KWAK1, (Member, IEEE) “The Internets of Things for HealthCare: Comprehensive Study” IEEE Access Date of publication June 1, 2015, date of current version June 4, 2015.

      [3] Shu-yuan Ge, Seung-Man Chun, Hyun-Su Kim and Jong-Tae Park “Design and Implementation of Interoperable IoT Healthcare System Based on International Standards” 13th IEEE Annual Consumer Communications &Networking Conference (CCNC) ,2016.

      [4] Arijit Ukil and Soma Bandyoapdhyayand Chetanya Puri and Arpan Pal “IoT Healthcare Analytics: The Importance of Anomaly Detection” 30th International Conference on Advanced Information Networking and Applications IEEE 2016.

      [5] KUO-HUI YEH, (Senior Member, IEEE) “A Secure IoT-Based Healthcare System With BodySensor Networks” IEEE Access, Date of publication December 9, 2016, date of current version January 27, 2017.

      [6] Wan Aida Nadia binti Wan Abdullah, N. Yaakob, R Badlishah, A Amir, Siti Asilah binti Yah,ENAC,” On the effectiveness of Congestion ControlMechanisms for Remote Healthcare Monitoring System in IoT Environment – A Review” 3rd International Conference on Electronic Design (ICED), August 11-12, 2016, Phuket, Thailand 2016.

      [7] Ons Bibani, Carla Mouradian, Sami Yangui†, Roch H. Glitho, Walid Gaaloul, Nejib Ben Hadj-Alouane, Monique J. Morrow Paul A. Polakos “A Demo of IoT Healthcare Application Provisioning in Hybrid Cloud/Fog Environment” IEEE 8th International Conference on Cloud Computing Technology and Science 2016.

      [8] Shu-yuan Ge, Seung-Man Chun, Hyun-Su Kim and Jong-Tae Park” Design and Implementation of Interoperable IoT Healthcare System Based on International Standards ”13th IEEE Annual Consumer Communications & Networking Conference (CCNC) 2016.

      [9] Dejana Ugrenovic ,Gordana Gardasevic “ CoAP Protocols for Web –based monitoring In IoT healthacare applications” 23 rd Telecommunications forum TELFOR 2015.

      [10] “https://en.wikipedia.org/wiki/Constrained_Application_Protocol].”

      [11] Uttam U. Deshpande, Milan A. Kulkarni” IoT based Real Time ECG Monitoring System using Cypress WICED” (An ISO 3297: 2007 Certified Organization) Website: www.ijareeie.com Vol. 6, Issue 2, February 2017.

      [12] Deshpande Niranjan R 1 , Vadane Pandurang M 2 , Sangle Sagar D 3 , Prof. Dighe M. S.4’’ A IOT-based Modern Healthcare System Using Body Sensor Network (BSN) ” International Journal of Innovative Research in Computer and Communication Engineering (An ISO 3297: 2007 Certified Organization) Vol. 4, Issue 11, November 2016.

      [13] Ons Bibani‡§, Carla Mouradian†, Sami Yangui†, Roch H. Glitho†, Walid Gaaloul‡, Nejib Ben Hadj-Alouane§, Monique J. Morrow , Paul A. Polakos’” A Demo of IoT Healthcare ApplicationProvisioning in Hybrid Cloud/Fog Environment ” IEEE 8th International Conference on Cloud Computing Technology and Science 2016

      [14] M. Hadjem, O. Salem, F. Nait-Abdesselam, "An ECG monitoringsystem for prediction of cardiac anomalies using WBAN," IEEE 16thInternational Conference on e-Health Networking, Applications and Services (Healthcom), pp. 441-446, 2014.

      [15] T. Musha, H. Matsuzaki, Y. Kobayashi, Y. Okamoto, M. Tanaka, T.Asada, T., "EEG Markers for Characterizing Anomalous Activities ofCerebral Neurons in NAT (Neuronal Activity Topography) Method,"IEEE Transactions on Biomedical Engineering, vol.60, no.8, pp. 2332-2338, Aug. 2013.

      [16] C. C. Aggarwal, "Outlier Analysis," Springer Publication, 2013.

      [17] P. Horn, L. Feng, Y. Li, and A. J. Pesce, "Effect of Outliers andNonhealthy Individuals on Reference Interval Estimation," ClinicalChemistry, pp. 2137–2145, 2001.

      [18] S. Roberts, “Extreme Value Statistics for Novelty Detection inBiomedical Signal Processing,” International Conference on Advancesin Medical Signal and Information Processing. pp. 166–172, 2002.

      [19] M. Prastawa, E. Bullitt, S. Ho, and G. Gerig, "A Brain TumorSegmentation Framework based on Outlier Detection, Medical ImageAnalysis," pp. 275–283, 2004.

      [20] https://www.physionet.org/physiobank/database/mitdb/

      [21] J. Chen, et al., "Blue scale: Early detection of impending congestiveheart failure events via wireless daily self-monitoring," IEEE HealthcareInnovation Conference (HIC), pp. 63-66, 8-10 Oct. 2014.

      [22] A. Ukil, S. Bandyopadhyay, C. Puri, and A. Pal, "Heart-trend: anaffordable heart condition monitoring system exploiting morphologicalpattern," IEEE International Conference on Acoustics, Speech andSignal Processing (ICASSP), 2016 (accepted).

      [23] A. Ukil, S. Bandyopadhyay, J. Joseph, V. Banahatti, and S. Lodha,Negotiation-based privacy preservation scheme in internet of thingsplatform," IEEE International Conference on Security of Internet ofThings, pp. 75- 84, 2012.

      [24] L. Clifton, D.A. Clifton, M.A.F. Pimentel, P.J. Watkinson,and L.Tarassenko, "Predictive monitoring of mobile patients by combiningclinical observations with data from wearable sensors," IEEE Journal ofBiomedical and Health Informatics, vol.18, no.3, pp.722-730, May2014.

      [25] A. Ukil, S. Bandyopadhyay, A. Bhattacharyya, A. Pal, T. Bose., "Auth-Lite: Lightweight M2M authentication reinforcing DTLS for CoAP," inPervasive Computing and Communications Workshops (PERCOMWorkshops), vol., no., pp.215-219, 24-28 March 2014.

      [26] K. Raghuraman, M. Senthurpandian, M. Shanmugasundaram, M.Bhargavi, V. Vaidehi, "Online incremental learning algorithm foranomaly detection and prediction in health care," International Conference on Recent Trends in Information Technology (ICRTIT),2014.

      [27] S. Bandyopadhyay, A. Ukil, C. Puri, A. Pal, R.Singh, T. Bose, “Demo:IAS: Information analytics for sensors,” 13th ACM Conference onEmbedded Networked Sensor Systems, Sensys 2015.

      [28] A. Ukil, S. Bandyopadhyay, A. Bhattacharyya, A. Pal., "Lightweight security scheme for vehicle tracking system using CoAP," Ubicomp-ASPI Workshop.


 

View

Download

Article ID: 13886
 
DOI: 10.14419/ijet.v7i2.33.13886




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.