Skip to main content

Security, Privacy and Trust Issues in Internet of Things and Machine Learning Based e-Healthcare

  • Chapter
  • First Online:
Intelligent Interactive Multimedia Systems for e-Healthcare Applications

Abstract

The Internet of Things (IoT) or Internet Connected Things is the networking of physical devices that are both connected and smart. These devices are embedded with software, sensors, and network connectivity that enables them to collect and exchange data. The number of IoT enabled devices developed makes the application of IoT more interesting. The utilization of IoT-based gadgets is changing individuals’ ways of life, especially in exercises identified with healthcare. But using these devices in many applications creates several serious drawbacks or pitfalls. This work provides information about avoidance, identification, treatment, and control of overweight and heftiness, and different sicknesses or medical issues. IoT can be absolutely an insurgency in the field as significant on the worldwide scale as medical services. In this work, we present a survey of the cutting edge of exploration including the IoT in healthcare, especially concerning overweight, corpulence, and ongoing degenerative infections. IoT implementation relies on different security and privacy challenges. To make use of IoT in real-life application confidentiality, integrity, authentication, authorization, trust, verification, information storage, and management, availability challenges need to be addressed. This work also gives an outline of Security, Privacy, Trust issues in IoT-Machine Learning based healthcare systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Baker, S., Xiang, W., & Atkinson, I. M. Internet of things for smart healthcare: Technologies, challenges, and opportunities. http://www.ieee.org/publications_standards/publications/rights/index.html

  2. Riazul Islam, S. M., et al. The internet of things for health care: A comprehensive survey. http://www.ieee.org/publications_standards/publications/rights/index.html

  3. Darling-Hammond, L., Flook, L., Cook-Harvey, C., & Barron, B. Implications for educational practice of the science of learning and development. https://doi.org/10.1080/10888691.2018.1537791

  4. Motlagh, N. H., Mohammadrezaei, M., Hunt, J., & Zakeri, B. Internet of things (IoT) and the energy sector. IEEE Access 2017.https://doi.org/10.3390/en13020494

  5. Atlam, H. F., & Wills, G. IoT security, privacy, safety and ethics. Springer Nature Switzerland AG 2020. https://doi.org/10.1007/978-3-030-18732

  6. Vazquez et al. (2012). Mhealth—A proposal for using the internet of things concept to increase children’s health awareness. IEEE 2012 22nd international conference on electrical communications and computers (CONIELECOMP) (pp. 168–172). https://doi.org/10.1109/CONIELECOMP.2012.6189903

  7. Vilallonga et al. Transforming a surgical department during the outbreak of new coronavirus pandemic. Clinical Implications, Langenbeck’s Archives of Surgery, 405(6), 867–875. https://doi.org/10.1007/s00423-020-01931-x

  8. Zaragoza et al. (2015). Projected growth of the adult congenital heart disease population in the United States to 2050: An integrative systems modeling approach. Population Health Metrics, 13(1), 29. https://doi.org/10.1186/s12963-015-0063-z

  9. Lee, B. M., & Ouyang, J. (2014). Intelligent healthcare service by using collaborations between IoT personal health devices. International Journal of Bio-Science and Bio-Technology, 6(1), 155–164.

    Google Scholar 

  10. Hiremath et al. (2014, January). Wearable internet of things: Concept, architectural components and promises for person-centered healthcare. International conference on wireless mobile communication and healthcare—Transforming healthcare through innovations in mobile and wireless technologies. https://doi.org/10.4108/icst.mobihealth.2014.257440

  11. Vázquez, et al. (2007). Comparison of body mass index, waist circumference, and waist/hip ratio in predicting incident diabetes: A meta-analysis. PMID: 17494056. Epidemiologic Reviews, 29(1), 115–128. https://doi.org/10.1093/epirev/mxm008

    Article  Google Scholar 

  12. Kim, et al. (2015). Youth-centered design and usage results of the iN Touch mobile self-management program for overweight/obesity. Personal and Ubiquitous Computing, 9, 59–68.

    Article  Google Scholar 

  13. Alloghani et al. (2016, April 21–23). A mobile health monitoring application for obesity management and control using the internet-of-things. Sixth international conference on digital information processing and communications (ICDIPC) (pp. 19–24).

    Google Scholar 

  14. Wibisono, G., & Astawa, I. G. B. (2016). Designing machine-to-machine (M2M) prototype system for weight loss program for obesity and overweight patients. IEEE 2016 7th international conference on intelligent systems, modelling and simulation (ISMS) (pp. 138–143). https://doi.org/10.1109/ISMS.2016.5

  15. Dobbins et al. (2017). Detecting physical activity within lifelogs towards preventing obesity and aiding ambient assisted living. Neurocomputing, 230, 110–132. https://doi.org/10.1016/j.neucom.2016.02.088

  16. Shin et al. (2017). Empirical study of the IoT-learning for obese patients that require personal training. Advances in Computer Science and Ubiquitous Computing, 421, 1005–1012.

    Google Scholar 

  17. Liu, C.-H., et al. (2012). The enhancement of security in healthcare information systems. Journal of Medical System, 36, 1673–1688.

    Article  Google Scholar 

  18. Paschou, M., et al. (2013). Health Internet of Things: metrics and methods for efficient data transfer. Simulation Modelling Practice and Theory Elsevier, 1569–190X.

    Google Scholar 

  19. Ziegeldorf, et al. (2014). Privacy in the internet of things: Threats and challenges. Security and Communication Networks, 7(12), 2728–2742. https://doi.org/10.1002/sec.795

    Article  Google Scholar 

  20. Sawand, et al. (2015). Toward energy-efficient and trustworthy eHealth monitoring system. China Communications, 12(1), 46–65. https://doi.org/10.1109/CC.2015.708438

    Article  Google Scholar 

  21. Gope et al. (2015). BSN-Care: A Secure IoT-based modern healthcare system using body sensor network. IEEE Sensors Journal, 1–1. https://doi.org/10.1109/JSEN.2015.2502401

  22. Benssalah, et al. (2016). Dual cooperative RFID-telecare medicine information system authentication protocol for healthcare environments. Security and Communication Networks. https://doi.org/10.1002/sec.1665

    Article  Google Scholar 

  23. Li et al. (2015). A secure RFID tag authentication protocol with privacy preserving in telecare medicine information system. Journal of Medical Systems, 39(8), 77. https://doi.org/10.1007/s10916-015-0260-0

  24. Karjagi, R., & Jindal, M. (2016, July). Medical internet of things and big data in healthcare. Healthcare Informatics Research, 22(3), 156–163. Published online 2016, July 31. https://doi.org/10.4258/hir.2016.22.3.156

  25. Landaluce, H., et al. (2020, May). A review of IoT sensing applications and challenges using RFID and wireless sensor networks. Sensors (Basel), 20(9), 2495. Published online 2020 April 28. https://doi.org/10.3390/s20092495

  26. Tyagi, A. K., Nair, M. M. (2020). Internet of Everything (IoE) and Internet of Things (IoTs): Threat Analyses, Possible Opportunities for Future. Journal of Information Assurance & Security (JIAS), 15(4).

    Google Scholar 

  27. Islam, R., et al. (2015). The internet of things for health care: A comprehensive survey. IEEE Access, 3, 678–708. https://doi.org/10.1109/ACCESS.2015.2437951

  28. Acampora, et al. (2013). A survey on ambient intelligence in healthcare. Proceedings of the IEEE, 101(12), 2470–2494. https://doi.org/10.1109/JPROC.2013.2262913

    Article  Google Scholar 

  29. Sethi, P., Sarangi, S. R. (2017). Internet of things: Architectures, protocols, and applications. Journal of Electrical and Computer Engineering. Article Id: 9324035.

    Google Scholar 

  30. Ali, S., et al.(2014, December). Sensors and mobile phones: Evolution and state-of-the-art. Journal of Science, 66(4),386–400.

    Google Scholar 

  31. Tyagi, A. K., Rekha, G., & Sreenath, N. (2020). Beyond the hype: Internet of things concepts, security and privacy concerns. In S. Satapathy, K. Raju, K. Shyamala, D. Krishna, & M. Favorskaya (Eds.) Advances in decision sciences, image processing, security and computer vision (Vol. 3). ICETE 2019. Learning and Analytics in Intelligent Systems. Springer. https://doi.org/10.1007/978-3-030-24322-7_50

  32. Siddharth, M. N., Ramesh, V. & Tyagi, A. K. (2021). Issues and challenges (Privacy, security, and trust) in blockchain-based applications. In Opportunities and challenges for blockchain technology in autonomous vehicles (p. 14). https://doi.org/10.4018/978-1-7998-3295-9.ch012

  33. Reddy, K. S., Agarwal, K., Tyagi, A. K. (2021). Beyond Things: A Systematic Study of Internet of Everything. In: A. Abraham, M. Panda, S. Pradhan, L. Garcia-Hernandez, K. Ma (Eds.) Innovations in Bio-Inspired Computing and Applications. IBICA 2019. Advances in Intelligent Systems and Computing, vol 1180. Springer, Cham. https://doi.org/10.1007/978-3-030-49339-4_23.

  34. Goyal, D., & Tyagi, A. (2020). A Look at Top 35 Problems in the Computer Science Field for the Next Decade. https://doi.org/10.1201/9781003052098-40.

  35. Tyagi, A. K., & Goyal, D. (2020). A Survey of Privacy Leakage and Security Vulnerabilities in the Internet of Things. In 2020 5th International Conference on Communication and Electronics Systems (ICCES), pp. 386–394, https://doi.org/10.1109/ICCES48766.2020.9137886.

  36. Tyagi, A. K., & Shamila, M. (March 20, 2019). Spy in the Crowd: How user’s privacy is getting affected with the integration of internet of thing’s devices. In Proceedings of International Conference on Sustainable Computing in Science, Technology and Management (SUSCOM), Amity University Rajasthan, Jaipur - India, February 26–28, 2019.

    Google Scholar 

  37. Nair, M. M., Tyagi, A. K., & Sreenath, N. (2021). The Future with Industry 4.0 at the Core of Society 5.0: Open Issues, Future Opportunities and Challenges. In 2021 International Conference on Computer Communication and Informatics (ICCCI), pp. 1–7, https://doi.org/10.1109/ICCCI50826.2021.9402498.

  38. Aupetit, M., Fernandez-Luque, L., Singh, M., & Srivastava, J. (2017, June 22–24). Visualization of wearable data and biometrics for analysis and recommendations in childhood obesity. In Proceedings of the 2017 IEEE 30th international symposium on computer-based medical systems (CBMS) (pp. 678–679), Thessaloniki, Greece.

    Google Scholar 

  39. Nair, M. M., Kumari, S., Tyagi, A. K., & Sravanthi, K. (2021). Deep learning for medical image recognition: open issues and a way to forward. In D. Goyal, A. K. Gupta, V. Piuri, M. Ganzha, & M. Paprzycki (Eds.) Proceedings of the second international conference on information management and machine intelligence (Vol. 166). Lecture Notes in Networks and Systems. Springer, Singapore. https://doi.org/10.1007/978-981-15-9689-6_38

  40. Tajer, et al. (2019). Non-linear state recovery in power system under bad data and cyber-attacks. Journal of Modern Power Systems and Clean Energy. https://doi.org/10.1007/s40565-019-0561-2

    Article  Google Scholar 

  41. Nguyen, et al. (2008). A survey of techniques for internet traffic classification using machine learning. IEEE Communications Surveys & Tutorials, 10, 56–76.

    Article  Google Scholar 

  42. Miaou, S. G., et al. (2000). A secure data hiding technique with heterogeneous data-combining capability or electronic patient records. Proceeding of the 22nd annual EMBS international conference (Vol. 1, pp. 280–283).

    Google Scholar 

  43. Atzori, et al. (2012). The social internet of things (SIoT)—when social networks meet the internet of things: Concept, architecture and network characterization. Computer Networks, 56(16), 3594–3608.

    Article  Google Scholar 

  44. Carl, G., et al. (2006, January–February). Denial-of-service attack-detection techniques. IEEE Internet Computing, 10(1), 82–89. https://doi.org/10.1109/MIC.2006.5

  45. Adashi, E. Y., & Thomasian, N. M. (2020). Medical devices in Harm’s Way: Medjacking. JAMA Health Forum. https://doi.org/10.1001/jamahealthforum.2020.0007

  46. Shamila, M., Vinuthna, K., & Tyagi, A. (2019). A review on several critical issues and challenges in IoT based e-healthcare system. 1036–1043. https://doi.org/10.1109/ICCS45141.2019.9065831

  47. Tyagi, A. K., Nair, M. M., Niladhuri, S., & Abraham, A. (2020). Security, privacy research issues in various computing platforms: A survey and the road ahead. Journal of Information Assurance & Security, 15(1), 1–16, 16p.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Kute, S.S., Tyagi, A.K., Aswathy, S.U. (2022). Security, Privacy and Trust Issues in Internet of Things and Machine Learning Based e-Healthcare. In: Tyagi, A.K., Abraham, A., Kaklauskas, A. (eds) Intelligent Interactive Multimedia Systems for e-Healthcare Applications. Springer, Singapore. https://doi.org/10.1007/978-981-16-6542-4_15

Download citation

Publish with us

Policies and ethics