Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2019 Dec;27(4):253-258.
doi: 10.5455/aim.2019.27.253-258.

Security Requirements of Internet of Things-Based Healthcare System: a Survey Study

Affiliations

Security Requirements of Internet of Things-Based Healthcare System: a Survey Study

Somayeh Nasiri et al. Acta Inform Med. 2019 Dec.

Abstract

Introduction: Internet of Things (IoT), which provides smart services and remote monitoring across healthcare systems according to a set of interconnected networks and devices, is a revolutionary technology in this domain. Due to its nature to sensitive and confidential information of patients, ensuring security is a critical issue in the development of IoT-based healthcare system.

Aim: Our purpose was to identify the features and concepts associated with security requirements of IoT in healthcare system.

Methods: A survey study on security requirements of IoT in healthcare system was conducted. Four digital databases (Web of Science, Scopus, PubMed and IEEE) were searched from 2005 to September 2019. Moreover, we followed international standards and accredited guidelines containing security requirements in cyber space.

Results: We identified two main groups of security requirements including cyber security and cyber resiliency. Cyber security requirements are divided into two parts: CIA Triad (three features) and non-CIA (seven features). Six major features for cyber resiliency requirements including reliability, safety, maintainability, survivability, performability and information security (cover CIA triad such as availability, confidentiality and integrity) were identified.

Conclusion: Both conventional (cyber security) and novel (cyber resiliency) requirements should be taken into consideration in order to achieve the trustworthiness level in IoT-based healthcare system.

Keywords: Healthcare System; Internet of Things; Requirement; Security.

PubMed Disclaimer

Conflict of interest statement

There are no conflict of interest.

Figures

Figure 1.
Figure 1.. Security requirements in cyber space (13)

References

    1. Deogirikar J, Vidhate A. Security attacks in IoT: A survey; Proceeding of 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC). 2017 Feb 10-11; 2017; Palladam, India. IEEE; pp. 32–37.
    1. Gupta BB, Quamara M. An overview of Internet of Things (IoT): Architectural aspects, challenges, and protocols. Concurr Comput. 2018:e4946, 1–24.
    1. Islam SMR, Kwak D, Kabir MH, Hossain M, Kwak KS. The Internet of Things for Health Care: A Comprehensive Survey. IEEE Access. 2015;3:678–708.
    1. Gholamhosseini L, Sadoughi F, Ahmadi H, Safaei A. Health Internet of Things: Strengths, Weakness, Opportunity, and Threats; Proceeding of 2019 5th International Conference on Web Research (ICWR). 24-25 April 2019; 2019; Tehran, Iran. IEEE; pp. 287–296.
    1. Strielkina A, Kharchenko V, Uzun D. Availability models for healthcare IoT systems: Classification and research considering attacks on vulnerabilities; Proceeding of 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT). 2018 May 24-27; 2018; Kiev, Ukraine. IEEE; pp. 58–62.

LinkOut - more resources