Вы находитесь на странице: 1из 3

The drive for a virtualized physical world of no actual contact between objects

and needless of human intervention in a densely sensory but heterogenous wirele


ss interconnectivity of animate and inanimate things is what has fuelled the eme
rgence of Internet of Things (IoT). In contrast to already known Internet and C
loud computing that powers outsourced network of integrated computer applicatio
n and mobile services from data centers, IoT is a step further to the functional
ity of sensors and actuators in consumers devices and the earth ecosystem in a n
eural data exchange. In such a community of things, not much concentration will
be giving to the media, people and content. The fixation in objects and human wi
th internet connectivity offers opportunity not only to track the objects and ga
ther data but to generate knowledge capable to perform a far more intelligent ov
ersight functions.[1], [2].
The proliferation and miniaturization of personal medical devices (PMDs) has gra
dually falls into the technology of IoT. the PMDs are small, resource constraine
d electronic devices that have a modest hardware and a small firmware. [A. Mohan
, "Cyber Security for Personal Medical Devices Internet of Things," 2014 IEEE In
ternational Conference on Distributed Computing in Sensor Systems, Marina Del Re
y, CA, 2014, pp. 372-374. : http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnu
mber=6846193&isnumber=6846129 doi: 10.1109/DCOSS.2014.49] it enable patients to
be mobile and independent much longer thereby delaying need for assisted living
for them. These devices typically have a wireless interface to communicate with
a base station that is used to read medical reports from the devices, read devi
ce status, change the parameters, or update the firmware on the device. These wi
reless interface expose the device to security threats and raises security and p
rivacy concerns for the patient [ K. Fu and J. Blum, Inside Risks Controlling for
Cybersecurity Risks of Medical Device Software, Communications of the ACM, Vol.
56, No. 10, October 2013. Online: http://www.csl.sri.com/users/neumann/cacm231.p
df]
IoT has brought an era where aggregation of data enable objects to perform routi
ne task at convenience and proactively; creating inftrastructure, objects perfor
m actions IoT can be defined as physical objects that connect to the internet th
rough embedded systems and sensors, interacting with it to generate meaningful r
esults and convenience to the end-user community [http://www.ey.com/Publication/
vwLUAssets/EY-cybersecurity-and-the-internet-of-things/$FILE/EY-cybersecurity-an
d-the-internet-of-things.pdf] Refers to as network of sensors that uses Radio f
requency identification (RFID) is a major prerequisite to the IoT that identifie
s an object attached with an RFID tag using radio waves [http://0-ieeexplore.iee
e.org.brum.beds.ac.uk/stamp/stamp.jsp?arnumber=7721738]
The potential for it to enable any aspect of our lives is what is encouraging th
is idea to become established and flourish. The new IPv6 makes it possible to as
sign a communications address to billions of devices. These are Edge devices and
simplified devices with limited resources that are used within an IoT system i
n massive quantities. An edge device is a limited resource device typically desi
gned to perform a single function
[Mine] Internet of things (IoT) medical care is a practice for collection and
transfers of patients information using sensors and communication network techno
logy. It also involve remote control, administration and monitoring of patience
health care system[J. Caedo and A. Skjellum, "Adding scalability to Internet of T
hings gateways using parallel computation of edge device data," 2016 IEEE High P
erformance Extreme Computing Conference (HPEC), Waltham, MA, USA, 2016, pp. 1-5.
doi: 10.1109/HPEC.2016.7761601 http://0-ieeexplore.ieee.org.brum.beds.ac.uk/sta
mp/stamp.jsp?tp=&arnumber=7761601&isnumber=7761574]. A technological attack on t
he health system is an attack to life of connected patience, it could both resul
t to financial loss and death. It is such a sensitive technological innovation
that require cross-wide research and cautious implementation.
USE THIS ... IoT [Paraphrase to last sentence] Networks of sensors measure and r
ecord everything from temperature, light, and motion to biohazards and physical
indicators from the body. Sensor-enabled devices communicate with each other thr
ough the internet of things, ingestible sensors monitor the body from the inside,
and intelligent swarms of sensors co-ordinate with each other to collect data. D
eclining costs and advancements in sensor technology make it accessible, widely
used and an integral part of the 2020s digital ecosystem. [Gov2020: A Journey int
o the Future of Government 17, By William D. Eggers and Paul Macmillan]
Sun [2] defines IoT based on the use of technologies such as infrared sensors, g
lobal positioning systems (GPS), laser scanners, and radio frequency identificat
ion (RFID) to connect any object to the internet in order to communicate and exc
hange information, making it possible to identify, monitor, track, and manage a
network intelligently. Currently, these technologies have been widely used in in
dustrial and business environments, providing greater efficiency and speed to op
erations [C. Sun , Application of RFID technology for logistics on Internet of T
hings , AASRI Procedia , vol. 1 , pp. 106 - 111 , 2012]. What happens when human
body becomes part of the network? In which case a sensor device is planted in th
e body or within range of interactivity to what [D. Kune , Ghost talk: Mitigating
EMI signal injection attacks against analog sensors, in Proc. IEEE Symp. Security
Privacy, pp-145-159,May 2013] identified as Wireless Body Area Networks (WBANs)
responsible for the transmission of physical, chemical and sensory behaviours a
person. [J. Siddiquee, A. Roy, A. Datta, P. Sarkar, S. Saha and S. S. Biswas, "S
mart asthma attack prediction system using Internet of Things," 2016 IEEE 7th An
nual Information Technology, Electronics and Mobile Communication Conference (IE
MCON), Vancouver, BC, Canada, 2016, pp. 1-4.] doi: 10.1109/IEMCON.2016.7746252
http://0-ieeexplore.ieee.org.brum.beds.ac.uk/stamp/stamp.jsp?tp=&arnumber=774625
2&isnumber=7746074 ] successfully implemented Smart Asthma Attack Prediction Sys
tem. An IoT system which will help an asthma patient to avoid some situations wh
ich cause breathing trouble. Whenever he or she is about to have an asthma attac
k, a warning is sent to their smart phone as a notification. Thus the person mov
es away to some safe zone free from factors which can trigger the attack [paraph
rase]
However, the aggregation of computing devices and applications in a wireless env
ironment poses not only an interoperability trust issues, but as well scalable
security threats to the infrastructure and data flowing between sensible consum
ers devices, edge of computing nodes and at the data centers. More worrisome is
preservation of security and privacy of data at the edge of computing devices at
which point data is first processed and could serve as an entry point by attack
ers to other nods of IoT system.
The study discuss emerging security threats and privacy issues at the edge of Io
T consumers where there is an uphill to physically secure smart devices, to ensu
re trust and privacy of data exchange at the user s network.
security considerations of IOT. This
includes physical and information security. While the physical
security deals with the Bluetooth and GPS security, on the
other hand, information security handles the RFID and
wireless sensor security

http://www.infoworld.com/category/security/
http://www.infoworld.com/article/3144362/devops/10-key-security-terms-devops-nin
jas-need-to-know.html//
[Paraphrase the paragrapgh: ReWrite in your own words] However, the integrat
ion of these smart things into the standard Internet , Moreover, commercializati
on of IoT has led to public security concerns, including personal privacy issues
, threat of cyber attacks, and organized crime. , this survey attempts to provid
e a comprehensive list of vulnerabilities and countermeasures against services o
n the edge-side layer of IoT, which consists of three levels: (i) edge nodes, (i
i) communication, and (iii) edge computing. To achieve this goal, a brief discus
sion of three widely-known IoT reference models and definition of security in t
he context of IoT healthcare is made. Second, we discuss the possible applicatio
ns of IoT and potential motivations of the attackers who target this new paradig
m. Third, we discuss different attacks and threats [Arsalan Mohsen Nia, Student
Member, IEEE and Niraj K. Jha, A Comprehensive Study of Security of Internet-of-T
hings Fellow, IEEEhttp://0-ieeexplore.ieee.org.brum.beds.ac.uk/stamp/stamp.jsp?ar
number=7562568]
[Mine]Consideration for preservation of security at the edge of computing device
s at which point data is processed and Your insecure product may not be the ult
imate target but could provide the pivot point for an attack elsewhere in the sy
stem.The study survey models and standard of IoT in the healthcare practices an
d identifies emerging security threats and privacy issues at the edge of IoT con
sumer patience where there is an uphill to physically secure smart devices, heal
th safety, to ensure trust and privacy of data exchange on the patience network.
This paper surveys both physical and data security issues, including privacy co
ncern at the edge side layer of IoT. [Mine]. The paper is more concerned with Io
T consumer technologies involving the technologies and the users. Emphasis is pl
aced on security of human medical health systems at the edge side layer of IoT r
eference model.
A. Mohsen Nia; N. K. Jha, "A Comprehensive Study of Security of Internet-of-Thin
gs," in IEEE Transactions on Emerging Topics in Computing , vol.PP, no.99, pp.1-
1 doi: 10.1109/TETC.2016.2606384
II THE IoT SYSTEM MODEL
{For|Intended for} knowledge of security challenges in IoT system, it is imperat
ive to understand the building block with regard to functionality and requiremen
t. The survey considers the CISCO seven layers model in [A. Mohsen Nia; N. K. Jh
a, "A Comprehensive Study of Security of Internet-of-Things," in IEEE Transactio
ns on Emerging Topics in Computing , vol.PP, no.99, pp.1-1 doi: 10.1109/TETC.201
6.2606384 [Mine]

Вам также может понравиться