SlideShare a Scribd company logo
1 of 29
Enabling Data Protection
 through PKI encryption
in IoT m-Health Devices
Charalampos Doukas, Ilias Maglogiannis, Vassiliki Koufi,
     Flora Malamateniou, George Vassilacopoulos




                                                       S
Introduction
Introduction
Introduction
Introduction


S Emerging global information service architecture

S Providing Internet access to devices
  S Sensors
  S Actuators

S Collaboration of services and integration of information
  between different resources
Introduction


S Great impact on healthcare:

S Patient context and status awareness

S Critical information retrieval (e.g., medical record)

S Smart actions:
  S Recommendations for better living (nutrition, activity, etc.)
  S Emergency care
Challenges


S Many:

S Interoperability
  S Information retrieval from different resources

S Ethical

S Business models => different entities involved

S Security
Challenges
Securit
  y
S Data encryption
   S Limited resources for many sensor devices

S Proper authentication
   S User authentication
   S Device authentication

S Integrity, confidentiality, etc.
The presented work


S A prototype Cloud-based system, which complies with the
  IoT concept

S Manages data collected by wearable – textile sensors

S Utilizes the IoT gateway notion
  S Data encryption, user access control and secure
    transmission
  S PKI technology
Some Related Work


S Growing interest in the utilization of IoT-based systems in
    a wide range of applications, including homecare
    applications

S Most works address sensor, data collection and
    networking issues

S   Data encryption and confidentiality:
    S Some solutions utilize hop-by-hop encrypted data
      aggregation some end-to-end encrypted data aggregation
    S Most works present proprietary and ‘closed’ sensor systems
PKI for IoT Devices


S Hop-by-hop encryption of data

S Secure hop-by-hop data aggregation protocol (SEDAN)

S   What about intermediate nodes?
    S hold decrypted sensor data
    S Easy to tamper with

S This vulnerability can be addressed by end-to-end techniques
    for data encryption

S A key is shared among all sensors and the system where
    aggregated data are transmitted to
PKI for IoT Devices




S PKI (Public Key Encryption) constitutes an effective approach
   to data encryption
S If one key is used to encrypt information, then only the related
   key can decrypt that information
S In case the public key gets compromised, still it is not
   computationally feasible to retrieve the private key
PKI for IoT Devices


S For IoT and Healthcare:            S Main Challenge:

S Devices that generate patient-     S Even the encryption process
  related information can encrypt      with the public key requires
  data using a public key              computational and memory
                                       resources
S health monitoring applications
  can use the private key to         S Existing wireless sensor
  decrypt the data                     technologies do not provide,
                                       especially when frequent data
S Using      also   PKI    digital     transmission is required (e.g.,
  certificates    the     proper       heart signal transmission)
  authentication of the devices        S Typical sensor
  can be achieved, in addition to         microcontroller unit: 32MHz,
  the secure data transmission.           512Kb memory
The Proposed Solution


S Introduction of IoT Gateways

S Have the computational resources (>1 GHz CPU,
  >500MB RAM) to perform PKI

S Come with additional network interfaces

  S Communication with wireless sensor networks

S No issues with power consumption

S Can be easily installed (similar to home routers)
The Proposed Solution


S Can also address an additional security issue for IoT devices:
   registration of new sensor devices and key management
S When a new monitoring device is introduced, the device needs to
   have access to the public key
S By using an IoT gateway key management is essential only for the
   gateway device itself and not every sensor device connecting to
   the latter
S The communication between the IoT gateway and the sensor
   device can be secured using symmetric encryption (which is less
   computational intensive than PKI)
S In addition, the gateway has the ability to receive a new key if
   required since it is a central communication point always
   connected to the Internet
The Proposed Solution


S Mainly of three components; the mobile and contextual
  sensors, the IoT gateways and the Back-end
  infrastructure
Mobile & Contextual Sensors


S Continuously or periodically sense data about the patient
  status
  S heart/pulse rate, temperature, etc.

S Patient context
  S room temperature, air quality, lighting conditions, etc.

S Sensor Devices = MCUs + Analog/Digital Sensors +
  Wireless Interfaces (ZigBee, Bluetooth, etc.)
IoT Gateways


S Computational devices
  S RaspberryPi, Beagleboard, etc.
  S Typical price range: 25$ - 150$

S Complete OS (Linux)

S Networking Interfaces
  S WiFi or Ethernet (Communication to the Internet)
  S ZigBee
  S Bluetooth
  S Zwave, RF, etc.
IoT Gateways


S Computational resources:
  S Perform proper data encryption
  S Authentication
  S (PKI)
  S Used for Data processing
     S   Sensor data filtering
     S   Data mining

S I/O ports
  S Connecting wireless interfaces
IoT Gateways
Cloud (Back-end)
             Infrastructure

S Convenient, on-demand network access to shared group
  of configurable computing resources
  S CPU
  S Storage (Scalability)
  S Services
  S Pay as you go model
  S Maintenance-free
Cloud (Back-end)
             Infrastructure

S Suitable model for back-end infrastructures

S Support data management and visualization of IoT m-
  health devices

S Resources for PKI and key management
System Overview
                                              Cloud Infrastructure
Medical devices




                                        Certificates



                           Public Key
          Symmetrically
          encrypted data
Initial System Evaluation


S Prototype implementation
  S Wireless (Bluetooth) Pulse Oxymeter
  S A contextual sensor (temp, humidity, air quality and light)
  S An IoT Gateway
  S A Cloud-back end system for data management
Initial System Evaluation


S Contextual sensor
  S Arduino microcontroller
  S A digital temperature sensor
  S A digital humidity sensor
  S An analog light sensor
  S An analog air quality sensor.


The Arduino can be connected to the home network of the user
either through Ethernet of WiFi network interfaces.
Initial System Evaluation


S The IoT gateway
   S   An open source, WiFi enabled gateway board properly modified to host
       additional wireless interfaces (like Bluetooth and ZigBee)
   S   A Beagle board Linux board computer.
S The gateway board collects all information and forwards the
  data to the Beagleboard using a serial interface.
S The Beagleboard runs a Python script that accepts data from
  the UART interface and then applies PKI encryption using a
  pre-stored public key (1024 bit key length).
S Then encrypted data are forwarded to a sample Cloud
  application using a REST Web Service. The Cloud application
  decrypts the data using the private key and presents sensor
  data to users.
Initial System Evaluation


S Data (average sensor values) are transmitted in 1-minute
    intervals
S   The Python script that encrypts the data has been modified to
    provide information about the time needed to encrypt the
    sensor readings (total message length less than 100Kb).
S   Respectively, the J2EE application on the Cloud has been
    modified to present the time needed to decrypt the data before
    presenting them to users.
S   According to initial metrics, the total encryption process adds a
    24.5% overhead in the total transmission time (about 800msec)
    and less than 1 second overhead in data decryption.
S   The latter overhead is acceptable in both cases for mobile
    health applications.
Conclusion


S The Internet of Things can lead to more accurate and
  instant diagnosis of health incidents
S Data protection is also weak since
  S sensor devices lack the resources for anonymity, proper
    authentication and data encryption

S In this paper we presented the conceptual design and
  prototype implementation of a system based on IoT
  gateways that aggregate health sensor data and resolve
  security issues through digital certificates and PKI data
  encryption
Conclusion


S The IoT gateway can both resolve sensor communication
    interoperability issues and provide a less vulnerable
    mean for securely authenticating to services and sending
    patient data

S   Future work:
    S extended evaluation of the system with more sensors
    S in a real environment
    S private key management and access control should be
      further investigated.

More Related Content

What's hot

Security Fundamental for IoT Devices; Creating the Internet of Secure Things
Security Fundamental for IoT Devices; Creating the Internet of Secure ThingsSecurity Fundamental for IoT Devices; Creating the Internet of Secure Things
Security Fundamental for IoT Devices; Creating the Internet of Secure ThingsDesign World
 
IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process EC-Council
 
Application layer Security in IoT: A Survey
Application layer Security in IoT: A SurveyApplication layer Security in IoT: A Survey
Application layer Security in IoT: A SurveyAdeel Ahmed
 
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT SecurityRyan Wilson
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT SecurityCAS
 
Internet of Things Security
Internet of Things SecurityInternet of Things Security
Internet of Things SecurityTutun Juhana
 
Internet of Things: Identity & Security with Open Standards
Internet of Things: Identity & Security with Open StandardsInternet of Things: Identity & Security with Open Standards
Internet of Things: Identity & Security with Open StandardsGeorge Fletcher
 
IoT Security Imperative: Stop your Fridge from Sending you Spam
IoT Security Imperative: Stop your Fridge from Sending you SpamIoT Security Imperative: Stop your Fridge from Sending you Spam
IoT Security Imperative: Stop your Fridge from Sending you SpamAmit Rohatgi
 
IoT Security: How Your TV and Thermostat are Attacking the Internet
IoT Security: How Your TV and Thermostat are Attacking the InternetIoT Security: How Your TV and Thermostat are Attacking the Internet
IoT Security: How Your TV and Thermostat are Attacking the InternetNathan Wallace, PhD, PE
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoTgr9293
 
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsMark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsStanford School of Engineering
 
Securing the Internet of Things
Securing the Internet of ThingsSecuring the Internet of Things
Securing the Internet of ThingsChristopher Frenz
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of ThingsForgeRock
 
Track 5 session 2 - st dev con 2016 - security iot best practices
Track 5   session 2 - st dev con 2016 - security iot best practicesTrack 5   session 2 - st dev con 2016 - security iot best practices
Track 5 session 2 - st dev con 2016 - security iot best practicesST_World
 

What's hot (20)

Security Fundamental for IoT Devices; Creating the Internet of Secure Things
Security Fundamental for IoT Devices; Creating the Internet of Secure ThingsSecurity Fundamental for IoT Devices; Creating the Internet of Secure Things
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
 
IoT Security, Mirai Revisited
IoT Security, Mirai RevisitedIoT Security, Mirai Revisited
IoT Security, Mirai Revisited
 
IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process
 
IoT Security: Cases and Methods
IoT Security: Cases and MethodsIoT Security: Cases and Methods
IoT Security: Cases and Methods
 
Application layer Security in IoT: A Survey
Application layer Security in IoT: A SurveyApplication layer Security in IoT: A Survey
Application layer Security in IoT: A Survey
 
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT Security
 
IoT Security: Cases and Methods [CON5446]
IoT Security: Cases and Methods [CON5446]IoT Security: Cases and Methods [CON5446]
IoT Security: Cases and Methods [CON5446]
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT Security
 
Internet of Things Security
Internet of Things SecurityInternet of Things Security
Internet of Things Security
 
Internet of Things: Identity & Security with Open Standards
Internet of Things: Identity & Security with Open StandardsInternet of Things: Identity & Security with Open Standards
Internet of Things: Identity & Security with Open Standards
 
IoT Security Imperative: Stop your Fridge from Sending you Spam
IoT Security Imperative: Stop your Fridge from Sending you SpamIoT Security Imperative: Stop your Fridge from Sending you Spam
IoT Security Imperative: Stop your Fridge from Sending you Spam
 
IoT Security: How Your TV and Thermostat are Attacking the Internet
IoT Security: How Your TV and Thermostat are Attacking the InternetIoT Security: How Your TV and Thermostat are Attacking the Internet
IoT Security: How Your TV and Thermostat are Attacking the Internet
 
ioT-SecurityECC-v1
ioT-SecurityECC-v1ioT-SecurityECC-v1
ioT-SecurityECC-v1
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
 
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsMark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
 
Securing the Internet of Things
Securing the Internet of ThingsSecuring the Internet of Things
Securing the Internet of Things
 
IoT-SecurityECC-v4
IoT-SecurityECC-v4IoT-SecurityECC-v4
IoT-SecurityECC-v4
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of Things
 
Track 5 session 2 - st dev con 2016 - security iot best practices
Track 5   session 2 - st dev con 2016 - security iot best practicesTrack 5   session 2 - st dev con 2016 - security iot best practices
Track 5 session 2 - st dev con 2016 - security iot best practices
 
IOT Security
IOT SecurityIOT Security
IOT Security
 

Viewers also liked

Webroot - self-defending IoT devices & gateways
Webroot - self-defending IoT devices & gateways Webroot - self-defending IoT devices & gateways
Webroot - self-defending IoT devices & gateways IISPEastMids
 
IoT based Women Smart Sec.
IoT based Women Smart Sec.IoT based Women Smart Sec.
IoT based Women Smart Sec.Arjun Dattaraju
 
Monet, an IoT Energy Management Platform based on MongoDB
Monet, an IoT Energy Management Platform based on MongoDBMonet, an IoT Energy Management Platform based on MongoDB
Monet, an IoT Energy Management Platform based on MongoDBSam_Francis
 
Cryptography and PKI
Cryptography and PKICryptography and PKI
Cryptography and PKIRabei Hassan
 
Self defense 2
Self defense 2Self defense 2
Self defense 2107750
 
Enhancing System Security Using PKI
Enhancing System Security Using PKIEnhancing System Security Using PKI
Enhancing System Security Using PKIChin Wan Lim
 
Introduction to PCI DSS
Introduction to PCI DSSIntroduction to PCI DSS
Introduction to PCI DSSSaumya Vishnoi
 
PCI DSS Simplified: What You Need to Know
PCI DSS Simplified: What You Need to KnowPCI DSS Simplified: What You Need to Know
PCI DSS Simplified: What You Need to KnowAlienVault
 
National Retail Payment System and Proposed Payment Systems Act
National Retail Payment System and Proposed Payment Systems ActNational Retail Payment System and Proposed Payment Systems Act
National Retail Payment System and Proposed Payment Systems ActJanette Toral
 
IoT Security Elements
IoT Security ElementsIoT Security Elements
IoT Security ElementsEurotech
 
E-Commerce in the Philippines 2016-2017
E-Commerce in the Philippines 2016-2017E-Commerce in the Philippines 2016-2017
E-Commerce in the Philippines 2016-2017Janette Toral
 
Data Security - English
Data Security - EnglishData Security - English
Data Security - EnglishData Security
 
E-commerce Law in the Philippines
E-commerce Law in the PhilippinesE-commerce Law in the Philippines
E-commerce Law in the PhilippinesRaiaR
 
Security Vulnerabilities, the Current State of Consumer Protection Law, & how...
Security Vulnerabilities, the Current State of Consumer Protection Law, & how...Security Vulnerabilities, the Current State of Consumer Protection Law, & how...
Security Vulnerabilities, the Current State of Consumer Protection Law, & how...Wendy Knox Everette
 

Viewers also liked (20)

Webroot - self-defending IoT devices & gateways
Webroot - self-defending IoT devices & gateways Webroot - self-defending IoT devices & gateways
Webroot - self-defending IoT devices & gateways
 
IoT based Women Smart Sec.
IoT based Women Smart Sec.IoT based Women Smart Sec.
IoT based Women Smart Sec.
 
IoT introduction
IoT introductionIoT introduction
IoT introduction
 
Introduction to IOT
Introduction to IOTIntroduction to IOT
Introduction to IOT
 
IoT: An introduction
IoT: An introductionIoT: An introduction
IoT: An introduction
 
Monet, an IoT Energy Management Platform based on MongoDB
Monet, an IoT Energy Management Platform based on MongoDBMonet, an IoT Energy Management Platform based on MongoDB
Monet, an IoT Energy Management Platform based on MongoDB
 
Cryptography and PKI
Cryptography and PKICryptography and PKI
Cryptography and PKI
 
Self defense 2
Self defense 2Self defense 2
Self defense 2
 
Data privacy act of 2012 presentation
Data privacy act of 2012 presentationData privacy act of 2012 presentation
Data privacy act of 2012 presentation
 
Enhancing System Security Using PKI
Enhancing System Security Using PKIEnhancing System Security Using PKI
Enhancing System Security Using PKI
 
Introduction to PCI DSS
Introduction to PCI DSSIntroduction to PCI DSS
Introduction to PCI DSS
 
PCI DSS Simplified: What You Need to Know
PCI DSS Simplified: What You Need to KnowPCI DSS Simplified: What You Need to Know
PCI DSS Simplified: What You Need to Know
 
National Retail Payment System and Proposed Payment Systems Act
National Retail Payment System and Proposed Payment Systems ActNational Retail Payment System and Proposed Payment Systems Act
National Retail Payment System and Proposed Payment Systems Act
 
PCI DSS 3.2
PCI DSS 3.2PCI DSS 3.2
PCI DSS 3.2
 
IoT Security Elements
IoT Security ElementsIoT Security Elements
IoT Security Elements
 
E-Commerce in the Philippines 2016-2017
E-Commerce in the Philippines 2016-2017E-Commerce in the Philippines 2016-2017
E-Commerce in the Philippines 2016-2017
 
Data Security - English
Data Security - EnglishData Security - English
Data Security - English
 
E-commerce Law in the Philippines
E-commerce Law in the PhilippinesE-commerce Law in the Philippines
E-commerce Law in the Philippines
 
IoT security (Internet of Things)
IoT security (Internet of Things)IoT security (Internet of Things)
IoT security (Internet of Things)
 
Security Vulnerabilities, the Current State of Consumer Protection Law, & how...
Security Vulnerabilities, the Current State of Consumer Protection Law, & how...Security Vulnerabilities, the Current State of Consumer Protection Law, & how...
Security Vulnerabilities, the Current State of Consumer Protection Law, & how...
 

Similar to Enabling Data Protection through PKI encryption in IoT m-Health Devices

Io t a_de_techgigwebinar_04nov2016
Io t a_de_techgigwebinar_04nov2016Io t a_de_techgigwebinar_04nov2016
Io t a_de_techgigwebinar_04nov2016Dr. Aloknath De
 
internet of things(Architecture and components).pptx
internet of  things(Architecture and components).pptxinternet of  things(Architecture and components).pptx
internet of things(Architecture and components).pptxvikramkagitapu
 
Iot transforming the future of agriculture
Iot transforming the future of agricultureIot transforming the future of agriculture
Iot transforming the future of agricultureDr.R. Gunavathi Ramasamy
 
IoT Notes Syllabus .pdf
IoT Notes Syllabus .pdfIoT Notes Syllabus .pdf
IoT Notes Syllabus .pdfAnujashejwal
 
IoT and IIoT - Security Challenges and Innovative Approaches
IoT and IIoT - Security Challenges and Innovative ApproachesIoT and IIoT - Security Challenges and Innovative Approaches
IoT and IIoT - Security Challenges and Innovative ApproachesShashi Kiran
 
Module 1 Internet of Things (2).ppt.pdf on iot
Module 1 Internet of Things (2).ppt.pdf on iotModule 1 Internet of Things (2).ppt.pdf on iot
Module 1 Internet of Things (2).ppt.pdf on iotspreya772
 
Zero Trust security for connected devices, critical IoT infrastructure and 5G...
Zero Trust security for connected devices, critical IoT infrastructure and 5G...Zero Trust security for connected devices, critical IoT infrastructure and 5G...
Zero Trust security for connected devices, critical IoT infrastructure and 5G...Block Armour
 
The Need For IoT Gateway.docx
The Need For IoT Gateway.docxThe Need For IoT Gateway.docx
The Need For IoT Gateway.docxSVITSEEERK
 
IoT from edge to cloud: bringing order to the chaos
IoT from edge to cloud: bringing order to the chaosIoT from edge to cloud: bringing order to the chaos
IoT from edge to cloud: bringing order to the chaosXylos
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)Shailesh Kachi
 
Emerging chapter 4.pptx
Emerging chapter 4.pptxEmerging chapter 4.pptx
Emerging chapter 4.pptxAderawAlemie
 
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...IRJET Journal
 
Harnessing Blockchain technology for Cybersecurity (Smart City, Smart Nation)
Harnessing Blockchain technology for Cybersecurity (Smart City, Smart Nation)Harnessing Blockchain technology for Cybersecurity (Smart City, Smart Nation)
Harnessing Blockchain technology for Cybersecurity (Smart City, Smart Nation)NUS-ISS
 
IOT Based Smart Home System Technologies
IOT Based Smart Home System TechnologiesIOT Based Smart Home System Technologies
IOT Based Smart Home System TechnologiesIJERDJOURNAL
 
OCS352-IOT -UNIT-1.pdf
OCS352-IOT -UNIT-1.pdfOCS352-IOT -UNIT-1.pdf
OCS352-IOT -UNIT-1.pdfgopinathcreddy
 

Similar to Enabling Data Protection through PKI encryption in IoT m-Health Devices (20)

IoT and the Future of work
IoT and the Future of work IoT and the Future of work
IoT and the Future of work
 
Io t a_de_techgigwebinar_04nov2016
Io t a_de_techgigwebinar_04nov2016Io t a_de_techgigwebinar_04nov2016
Io t a_de_techgigwebinar_04nov2016
 
internet of things(Architecture and components).pptx
internet of  things(Architecture and components).pptxinternet of  things(Architecture and components).pptx
internet of things(Architecture and components).pptx
 
Iot transforming the future of agriculture
Iot transforming the future of agricultureIot transforming the future of agriculture
Iot transforming the future of agriculture
 
IoT Notes Syllabus .pdf
IoT Notes Syllabus .pdfIoT Notes Syllabus .pdf
IoT Notes Syllabus .pdf
 
IoT and IIoT - Security Challenges and Innovative Approaches
IoT and IIoT - Security Challenges and Innovative ApproachesIoT and IIoT - Security Challenges and Innovative Approaches
IoT and IIoT - Security Challenges and Innovative Approaches
 
Module 1 Internet of Things (2).ppt.pdf on iot
Module 1 Internet of Things (2).ppt.pdf on iotModule 1 Internet of Things (2).ppt.pdf on iot
Module 1 Internet of Things (2).ppt.pdf on iot
 
Zero Trust security for connected devices, critical IoT infrastructure and 5G...
Zero Trust security for connected devices, critical IoT infrastructure and 5G...Zero Trust security for connected devices, critical IoT infrastructure and 5G...
Zero Trust security for connected devices, critical IoT infrastructure and 5G...
 
IOT- UNIT-1.pptx
IOT- UNIT-1.pptxIOT- UNIT-1.pptx
IOT- UNIT-1.pptx
 
The Need For IoT Gateway.docx
The Need For IoT Gateway.docxThe Need For IoT Gateway.docx
The Need For IoT Gateway.docx
 
IoT from edge to cloud: bringing order to the chaos
IoT from edge to cloud: bringing order to the chaosIoT from edge to cloud: bringing order to the chaos
IoT from edge to cloud: bringing order to the chaos
 
Io t first(1)
Io t first(1)Io t first(1)
Io t first(1)
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
 
IoT Presentation.pptx
IoT Presentation.pptxIoT Presentation.pptx
IoT Presentation.pptx
 
Emerging chapter 4.pptx
Emerging chapter 4.pptxEmerging chapter 4.pptx
Emerging chapter 4.pptx
 
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
 
Harnessing Blockchain technology for Cybersecurity (Smart City, Smart Nation)
Harnessing Blockchain technology for Cybersecurity (Smart City, Smart Nation)Harnessing Blockchain technology for Cybersecurity (Smart City, Smart Nation)
Harnessing Blockchain technology for Cybersecurity (Smart City, Smart Nation)
 
IOT Based Smart Home System Technologies
IOT Based Smart Home System TechnologiesIOT Based Smart Home System Technologies
IOT Based Smart Home System Technologies
 
IOT_PPT1.pdf
IOT_PPT1.pdfIOT_PPT1.pdf
IOT_PPT1.pdf
 
OCS352-IOT -UNIT-1.pdf
OCS352-IOT -UNIT-1.pdfOCS352-IOT -UNIT-1.pdf
OCS352-IOT -UNIT-1.pdf
 

More from Charalampos Doukas

Adoptive Gateways for dIverse MuLtiple Environments
Adoptive Gateways for dIverse MuLtiple EnvironmentsAdoptive Gateways for dIverse MuLtiple Environments
Adoptive Gateways for dIverse MuLtiple EnvironmentsCharalampos Doukas
 
AGILE Gateway for Internet of Things
AGILE Gateway for Internet of ThingsAGILE Gateway for Internet of Things
AGILE Gateway for Internet of ThingsCharalampos Doukas
 
The IoT Open Source World: Where WSO2 stands
The IoT Open Source World: Where WSO2 standsThe IoT Open Source World: Where WSO2 stands
The IoT Open Source World: Where WSO2 standsCharalampos Doukas
 
Enabling IoT devices to talk Web: The Community approach
Enabling IoT devices to talk Web: The Community approachEnabling IoT devices to talk Web: The Community approach
Enabling IoT devices to talk Web: The Community approach Charalampos Doukas
 
Fostering Connectivity & Interactivity Between all Urban Entities
Fostering Connectivity & Interactivity Between all Urban EntitiesFostering Connectivity & Interactivity Between all Urban Entities
Fostering Connectivity & Interactivity Between all Urban EntitiesCharalampos Doukas
 
Open Source IoT Building Blocks for Startups
Open Source IoT Building Blocks for StartupsOpen Source IoT Building Blocks for Startups
Open Source IoT Building Blocks for StartupsCharalampos Doukas
 
A Full End-to-End Platform as a Service for Smart City Applications
A Full End-to-End Platform as a Service for SmartCity ApplicationsA Full End-to-End Platform as a Service for SmartCity Applications
A Full End-to-End Platform as a Service for Smart City ApplicationsCharalampos Doukas
 
Involving communities in IoT EU Projects
Involving communities in IoT EU ProjectsInvolving communities in IoT EU Projects
Involving communities in IoT EU ProjectsCharalampos Doukas
 
Introduction to the Internet of Things and Open Data
Introduction to the Internet of Things and Open DataIntroduction to the Internet of Things and Open Data
Introduction to the Internet of Things and Open DataCharalampos Doukas
 
Building an IoT Marketplace for Makers & Entrepreneurs
Building an IoT Marketplace for Makers & EntrepreneursBuilding an IoT Marketplace for Makers & Entrepreneurs
Building an IoT Marketplace for Makers & EntrepreneursCharalampos Doukas
 
Utilising IoT & Open Source Technologies for Interactive Teaching
Utilising IoT & Open Source Technologies for Interactive TeachingUtilising IoT & Open Source Technologies for Interactive Teaching
Utilising IoT & Open Source Technologies for Interactive TeachingCharalampos Doukas
 
My personal experiment on QS and IoT for Motivation
My personal experiment on QS and IoT for MotivationMy personal experiment on QS and IoT for Motivation
My personal experiment on QS and IoT for MotivationCharalampos Doukas
 
IoT Basics, current trends, the future
IoT Basics, current trends, the futureIoT Basics, current trends, the future
IoT Basics, current trends, the futureCharalampos Doukas
 
Hardware Challenges for the IoT
Hardware Challenges for the IoTHardware Challenges for the IoT
Hardware Challenges for the IoTCharalampos Doukas
 
Open / Free Cloud platforms and Open Hardware Systems
Open / Free Cloud platforms and Open Hardware SystemsOpen / Free Cloud platforms and Open Hardware Systems
Open / Free Cloud platforms and Open Hardware SystemsCharalampos Doukas
 

More from Charalampos Doukas (15)

Adoptive Gateways for dIverse MuLtiple Environments
Adoptive Gateways for dIverse MuLtiple EnvironmentsAdoptive Gateways for dIverse MuLtiple Environments
Adoptive Gateways for dIverse MuLtiple Environments
 
AGILE Gateway for Internet of Things
AGILE Gateway for Internet of ThingsAGILE Gateway for Internet of Things
AGILE Gateway for Internet of Things
 
The IoT Open Source World: Where WSO2 stands
The IoT Open Source World: Where WSO2 standsThe IoT Open Source World: Where WSO2 stands
The IoT Open Source World: Where WSO2 stands
 
Enabling IoT devices to talk Web: The Community approach
Enabling IoT devices to talk Web: The Community approachEnabling IoT devices to talk Web: The Community approach
Enabling IoT devices to talk Web: The Community approach
 
Fostering Connectivity & Interactivity Between all Urban Entities
Fostering Connectivity & Interactivity Between all Urban EntitiesFostering Connectivity & Interactivity Between all Urban Entities
Fostering Connectivity & Interactivity Between all Urban Entities
 
Open Source IoT Building Blocks for Startups
Open Source IoT Building Blocks for StartupsOpen Source IoT Building Blocks for Startups
Open Source IoT Building Blocks for Startups
 
A Full End-to-End Platform as a Service for Smart City Applications
A Full End-to-End Platform as a Service for SmartCity ApplicationsA Full End-to-End Platform as a Service for SmartCity Applications
A Full End-to-End Platform as a Service for Smart City Applications
 
Involving communities in IoT EU Projects
Involving communities in IoT EU ProjectsInvolving communities in IoT EU Projects
Involving communities in IoT EU Projects
 
Introduction to the Internet of Things and Open Data
Introduction to the Internet of Things and Open DataIntroduction to the Internet of Things and Open Data
Introduction to the Internet of Things and Open Data
 
Building an IoT Marketplace for Makers & Entrepreneurs
Building an IoT Marketplace for Makers & EntrepreneursBuilding an IoT Marketplace for Makers & Entrepreneurs
Building an IoT Marketplace for Makers & Entrepreneurs
 
Utilising IoT & Open Source Technologies for Interactive Teaching
Utilising IoT & Open Source Technologies for Interactive TeachingUtilising IoT & Open Source Technologies for Interactive Teaching
Utilising IoT & Open Source Technologies for Interactive Teaching
 
My personal experiment on QS and IoT for Motivation
My personal experiment on QS and IoT for MotivationMy personal experiment on QS and IoT for Motivation
My personal experiment on QS and IoT for Motivation
 
IoT Basics, current trends, the future
IoT Basics, current trends, the futureIoT Basics, current trends, the future
IoT Basics, current trends, the future
 
Hardware Challenges for the IoT
Hardware Challenges for the IoTHardware Challenges for the IoT
Hardware Challenges for the IoT
 
Open / Free Cloud platforms and Open Hardware Systems
Open / Free Cloud platforms and Open Hardware SystemsOpen / Free Cloud platforms and Open Hardware Systems
Open / Free Cloud platforms and Open Hardware Systems
 

Enabling Data Protection through PKI encryption in IoT m-Health Devices

  • 1. Enabling Data Protection through PKI encryption in IoT m-Health Devices Charalampos Doukas, Ilias Maglogiannis, Vassiliki Koufi, Flora Malamateniou, George Vassilacopoulos S
  • 5. Introduction S Emerging global information service architecture S Providing Internet access to devices S Sensors S Actuators S Collaboration of services and integration of information between different resources
  • 6. Introduction S Great impact on healthcare: S Patient context and status awareness S Critical information retrieval (e.g., medical record) S Smart actions: S Recommendations for better living (nutrition, activity, etc.) S Emergency care
  • 7. Challenges S Many: S Interoperability S Information retrieval from different resources S Ethical S Business models => different entities involved S Security
  • 8. Challenges Securit y S Data encryption S Limited resources for many sensor devices S Proper authentication S User authentication S Device authentication S Integrity, confidentiality, etc.
  • 9. The presented work S A prototype Cloud-based system, which complies with the IoT concept S Manages data collected by wearable – textile sensors S Utilizes the IoT gateway notion S Data encryption, user access control and secure transmission S PKI technology
  • 10. Some Related Work S Growing interest in the utilization of IoT-based systems in a wide range of applications, including homecare applications S Most works address sensor, data collection and networking issues S Data encryption and confidentiality: S Some solutions utilize hop-by-hop encrypted data aggregation some end-to-end encrypted data aggregation S Most works present proprietary and ‘closed’ sensor systems
  • 11. PKI for IoT Devices S Hop-by-hop encryption of data S Secure hop-by-hop data aggregation protocol (SEDAN) S What about intermediate nodes? S hold decrypted sensor data S Easy to tamper with S This vulnerability can be addressed by end-to-end techniques for data encryption S A key is shared among all sensors and the system where aggregated data are transmitted to
  • 12. PKI for IoT Devices S PKI (Public Key Encryption) constitutes an effective approach to data encryption S If one key is used to encrypt information, then only the related key can decrypt that information S In case the public key gets compromised, still it is not computationally feasible to retrieve the private key
  • 13. PKI for IoT Devices S For IoT and Healthcare: S Main Challenge: S Devices that generate patient- S Even the encryption process related information can encrypt with the public key requires data using a public key computational and memory resources S health monitoring applications can use the private key to S Existing wireless sensor decrypt the data technologies do not provide, especially when frequent data S Using also PKI digital transmission is required (e.g., certificates the proper heart signal transmission) authentication of the devices S Typical sensor can be achieved, in addition to microcontroller unit: 32MHz, the secure data transmission. 512Kb memory
  • 14. The Proposed Solution S Introduction of IoT Gateways S Have the computational resources (>1 GHz CPU, >500MB RAM) to perform PKI S Come with additional network interfaces S Communication with wireless sensor networks S No issues with power consumption S Can be easily installed (similar to home routers)
  • 15. The Proposed Solution S Can also address an additional security issue for IoT devices: registration of new sensor devices and key management S When a new monitoring device is introduced, the device needs to have access to the public key S By using an IoT gateway key management is essential only for the gateway device itself and not every sensor device connecting to the latter S The communication between the IoT gateway and the sensor device can be secured using symmetric encryption (which is less computational intensive than PKI) S In addition, the gateway has the ability to receive a new key if required since it is a central communication point always connected to the Internet
  • 16. The Proposed Solution S Mainly of three components; the mobile and contextual sensors, the IoT gateways and the Back-end infrastructure
  • 17. Mobile & Contextual Sensors S Continuously or periodically sense data about the patient status S heart/pulse rate, temperature, etc. S Patient context S room temperature, air quality, lighting conditions, etc. S Sensor Devices = MCUs + Analog/Digital Sensors + Wireless Interfaces (ZigBee, Bluetooth, etc.)
  • 18. IoT Gateways S Computational devices S RaspberryPi, Beagleboard, etc. S Typical price range: 25$ - 150$ S Complete OS (Linux) S Networking Interfaces S WiFi or Ethernet (Communication to the Internet) S ZigBee S Bluetooth S Zwave, RF, etc.
  • 19. IoT Gateways S Computational resources: S Perform proper data encryption S Authentication S (PKI) S Used for Data processing S Sensor data filtering S Data mining S I/O ports S Connecting wireless interfaces
  • 21. Cloud (Back-end) Infrastructure S Convenient, on-demand network access to shared group of configurable computing resources S CPU S Storage (Scalability) S Services S Pay as you go model S Maintenance-free
  • 22. Cloud (Back-end) Infrastructure S Suitable model for back-end infrastructures S Support data management and visualization of IoT m- health devices S Resources for PKI and key management
  • 23. System Overview Cloud Infrastructure Medical devices Certificates Public Key Symmetrically encrypted data
  • 24. Initial System Evaluation S Prototype implementation S Wireless (Bluetooth) Pulse Oxymeter S A contextual sensor (temp, humidity, air quality and light) S An IoT Gateway S A Cloud-back end system for data management
  • 25. Initial System Evaluation S Contextual sensor S Arduino microcontroller S A digital temperature sensor S A digital humidity sensor S An analog light sensor S An analog air quality sensor. The Arduino can be connected to the home network of the user either through Ethernet of WiFi network interfaces.
  • 26. Initial System Evaluation S The IoT gateway S An open source, WiFi enabled gateway board properly modified to host additional wireless interfaces (like Bluetooth and ZigBee) S A Beagle board Linux board computer. S The gateway board collects all information and forwards the data to the Beagleboard using a serial interface. S The Beagleboard runs a Python script that accepts data from the UART interface and then applies PKI encryption using a pre-stored public key (1024 bit key length). S Then encrypted data are forwarded to a sample Cloud application using a REST Web Service. The Cloud application decrypts the data using the private key and presents sensor data to users.
  • 27. Initial System Evaluation S Data (average sensor values) are transmitted in 1-minute intervals S The Python script that encrypts the data has been modified to provide information about the time needed to encrypt the sensor readings (total message length less than 100Kb). S Respectively, the J2EE application on the Cloud has been modified to present the time needed to decrypt the data before presenting them to users. S According to initial metrics, the total encryption process adds a 24.5% overhead in the total transmission time (about 800msec) and less than 1 second overhead in data decryption. S The latter overhead is acceptable in both cases for mobile health applications.
  • 28. Conclusion S The Internet of Things can lead to more accurate and instant diagnosis of health incidents S Data protection is also weak since S sensor devices lack the resources for anonymity, proper authentication and data encryption S In this paper we presented the conceptual design and prototype implementation of a system based on IoT gateways that aggregate health sensor data and resolve security issues through digital certificates and PKI data encryption
  • 29. Conclusion S The IoT gateway can both resolve sensor communication interoperability issues and provide a less vulnerable mean for securely authenticating to services and sending patient data S Future work: S extended evaluation of the system with more sensors S in a real environment S private key management and access control should be further investigated.

Editor's Notes

  1. Population ageing, along with the increasing survival rates from disabling accidents and illnesses, is expected to lead to an increase in the proportion of the population with impairments, disabilities or chronic illnesses.
  2. Ambient Assisted Living services can provide support for these people in their daily routine to allow an independent and safe lifestyle for as long as possible
  3. AAL services utilize mostly home-based assistive technologies (e.g. intelligent, highly personalized network embedded objects, such as wireless devices and sensors, wireless communication technologies and data mining for status awareness. These however are also the main components of a new notion knows as the Internet of Things
  4. The “Internet of Things” is an emerging global information service architecture. Its notion is based on providing Internet connectivity to various devices (can be sensors, like medical sensors, or actuators, e.g., smart doors,power management systems, etc. The key feature of IoT is the collaboration of services and integration of information between different resources. How information from sensors, like current user status, information from external resources (like a medical record) can be combined to drive decsions: e.g, initiate a doctor visit.
  5. So the impact of IoT in healthcare is very important since the key features can facilitate the proper identification of patient context and status awareness and through critical information retrieval can drive smart actions that improve patients living or even save their lives
  6. However the realization of IoT and healthcare solutions has not been yet achieved. There are many challenges to overcome, like interoperability between devices, operators and services, ethical and privacy issues to resolve, even how to build effective pricing models with many entities involved, and of course security.
  7. The term security subsumes a wide range of different concepts, chief among them authentication, confidentiality, integrity and authorization. The major challenge in this case are the limited computational resources of many sensor devices: no proper data encryption or authentication schemes can be applied on wearable heart rate or oxymeter devices.
  8. This paper presents a prototype Cloud-based system, which complies with the IoT concept. The proposed system manages data collected by wearable – textile sensors (i.e. biosignals, motion data and contextual data (like location, ambient temperature, activity status, etc.), which, are forwarded to a gateway utilizing established techniques for IoT communication and then to the Cloud infrastructure. To resolve the aforementioned security challenges we have introduced the IoT gateway notion that provides proper data encryption, access control and transmission based on applying PKI technology.
  9. The past few years a number of key distribution schemes have been proposed for hop-by-hop encryption of data. In addition, a secure hop-by-hop data aggregation protocol, namely SEDAN has been proposed, according to which each node can verify immediately the integrity of its two hops neighbors.However, all proposed approaches could be considered vulnerable since the intermediate aggregator nodes, which hold decrypted sensor data, are easy to tamper with.This vulnerability can be addressed by end-to-end techniques for data encryption. These techniques also use a key scheme.
  10. Public Key Encryption constitutes an effective approach to data encryption as it can provide an increased level of confidence for exchanging information over an increasingly insecure environment, such as IoT. Public key cryptography uses a pair of mathematically related keys. If one key is used to encrypt information, then only the related key can decrypt that information. In case the public key gets compromised, still it is not computationally feasible to retrieve the private key.
  11. In the case of IoT and healthcare, devices that generate patient-related information (like body sensor readings) can encrypt data using a public key and the health monitoring applications (e.g., cloud or web systems operated by caregivers or relatives) can use the private key to decrypt the data. Using also PKI digital certificates the proper authentication of the devices can be achieved, in addition to the secure data transmission.However the establishment of PKI in IoT systems introduces a major challenge: Even the encryption process with the public key requires computational and memory resources that existing wireless sensor technologies do not provide, especially when frequent data transmission is required (e.g., heart signal transmission
  12. he proposed system addresses this issue by introducing IoT-enabled gateways. The IoT gateways are devices with computational abilities comparable to desktop computers, come with integrated full operating system (usually Linux) and have many communication interfaces
  13. These gateways can also address an additional security issue for IoT devices: registration of new sensor devices and key management. When a new monitoring device that transmits data through the Internet is introduced, the device needs to have access to the public key for properly encrypting the data. The latter process raises key management and distribution issues. By using an IoT gateway key management is essential only for the gateway device itself and not every sensor device connecting to the latter. The communication between the IoT gateway and the sensor device can be secured using symmetric encryption (which is less computational intensive than PKI). In addition, the gateway has the ability to receive a new key if required since it is a central communication point always connected to the Internet.
  14. The proposed system enables medical data collection from various mobile/wearable sensors, contextual data (like room conditions, user habits, etc.) collection and secure transmission to caregivers and family members using a Cloud-based infrastructure.The architecture consists mainly of three components; the mobile and contextual sensors, the IoT gateways and the Back-end infrastructure.
  15. The gateways have better computational resources (usually come with at least 1GHz ARM processor and 512Mb or RAM memory) and host a complete operating system that provides PKI tools (like the OpenSSL).
  16. So they can perform data encryption, authentication, ….
  17. Data Flow Diagram illustrating the basic functionality of an IoT gateway.An additional feature is the ability to perform some initial data preprocessing (e.g., data filtering, compression or pattern analysis) before data is encrypted using PKI and forwarded to the Internet using a WiFi or an Ethernet network interface.
  18. Cloud Computing is a model for enabling convenient, on-demand network access to a shared group of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.
  19. The latter features make Cloud computing a very suitable model for building back-end infrastructures that support data management and visualization of IoT m-health devices. In addition, Cloud resources can provide the essential requirements for PKI information encryption/decryption (like computational resources) and encryption/decryption key management
  20. The Internet of Things enables the collective aggregation of patient data and patient information that can lead to more accurate and instant diagnosis of health incidents Data protection is also quite weak since sensor devices lack the resources for protecting user anonymity, and providing proper authentication and data encryption at the same time