Security Performance of Internet of Medical Things
Taiwo Adenaiye,
Waleed Bul’ajoul,
Funminiyi Olajide
Issue:
Volume 9, Issue 1, June 2021
Pages:
1-18
Received:
11 January 2021
Accepted:
18 January 2021
Published:
2 February 2021
Abstract: Internet of Medical Things is the internet connection of medical devices to perform services and processes to support the healthcare sector. Wearable Technology in Healthcare has seen tremendous growth in recent times. This is due to a global increase in the aging population, the need for disease management, and effective patient monitoring. The prevalent technology of wearable devices is Bluetooth technology due to its low cost, low energy, and size. Despite the growth recorded in the adoption of Bluetooth Wearable IoMT, there are concerns by users and other healthcare stakeholders about security and privacy issues with its adoption. Our paper presents a simulation of passive and active attacks on 3 wearable IoMT devices, followed by analysis and evaluation of the experiment outcomes. Thereafter, countermeasures for the identified weaknesses were provided. It was discovered that some of the standard security features of Bluetooth Technology to mitigate privacy and security issues were not implemented in some of the devices, which can result in data compromise in the devices. A security assessment framework was developed to assess the security of Bluetooth IoMT devices using the Bayesian Network model. This is used to rank devices, identify their vulnerabilities, and apply security measures on the identified vulnerabilities. Our paper further provides recommendations on improving the security of Bluetooth IoMT devices.
Abstract: Internet of Medical Things is the internet connection of medical devices to perform services and processes to support the healthcare sector. Wearable Technology in Healthcare has seen tremendous growth in recent times. This is due to a global increase in the aging population, the need for disease management, and effective patient monitoring. The pr...
Show More
Intent-based Networking for Connectivity and Cloud Services
Issue:
Volume 9, Issue 1, June 2021
Pages:
19-22
Received:
13 February 2021
Accepted:
1 March 2021
Published:
10 March 2021
Abstract: Recent developments in networking and services technologies increased number of choices for users and complexity of networks and services. At the same time, there is substantial effort in the industry to enhance user experiences with services. The enhancement of user experiences is tightly coupled with mapping of user intents to services by shielding customers from the complexity and automating management processes involved in ordering and delivering services. The mapping is an iterative process. Its accuracy is expected to be improved as Service Providers gain experience with the process. Automating management processes in a management infrastructure with non-virtualized OSSs (Operating Support Systems) is lengthy and difficult. Virtualization and artificial intelligence/machine learning (AI/ML) techniques accelerate the automation greatly. The automation improves not only user experiences with services, but also the management of networks and applications by network administrators. This paper will describe user intents, a method for mapping user intents to connectivity and cloud services, and the design process, with examples. The concepts and methods described here are expected to be used by consumers and administrators of networks and applications forming services. The intents and their mappings can be expanded for each service by adding unique capabilities and attributes for connectivity and application options of a given service.
Abstract: Recent developments in networking and services technologies increased number of choices for users and complexity of networks and services. At the same time, there is substantial effort in the industry to enhance user experiences with services. The enhancement of user experiences is tightly coupled with mapping of user intents to services by shieldi...
Show More