Cargando…
Security Requirements of Internet of Things-Based Healthcare System: a Survey Study
INTRODUCTION: Internet of Things (IoT), which provides smart services and remote monitoring across healthcare systems according to a set of interconnected networks and devices, is a revolutionary technology in this domain. Due to its nature to sensitive and confidential information of patients, ensu...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Academy of Medical sciences
2019
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7004290/ https://www.ncbi.nlm.nih.gov/pubmed/32055092 http://dx.doi.org/10.5455/aim.2019.27.253-258 |
_version_ | 1783494691400974336 |
---|---|
author | Nasiri, Somayeh Sadoughi, Farahnaz Tadayon, Mohammad Hesam Dehnad, Afsaneh |
author_facet | Nasiri, Somayeh Sadoughi, Farahnaz Tadayon, Mohammad Hesam Dehnad, Afsaneh |
author_sort | Nasiri, Somayeh |
collection | PubMed |
description | INTRODUCTION: Internet of Things (IoT), which provides smart services and remote monitoring across healthcare systems according to a set of interconnected networks and devices, is a revolutionary technology in this domain. Due to its nature to sensitive and confidential information of patients, ensuring security is a critical issue in the development of IoT-based healthcare system. AIM: Our purpose was to identify the features and concepts associated with security requirements of IoT in healthcare system. METHODS: A survey study on security requirements of IoT in healthcare system was conducted. Four digital databases (Web of Science, Scopus, PubMed and IEEE) were searched from 2005 to September 2019. Moreover, we followed international standards and accredited guidelines containing security requirements in cyber space. RESULTS: We identified two main groups of security requirements including cyber security and cyber resiliency. Cyber security requirements are divided into two parts: CIA Triad (three features) and non-CIA (seven features). Six major features for cyber resiliency requirements including reliability, safety, maintainability, survivability, performability and information security (cover CIA triad such as availability, confidentiality and integrity) were identified. CONCLUSION: Both conventional (cyber security) and novel (cyber resiliency) requirements should be taken into consideration in order to achieve the trustworthiness level in IoT-based healthcare system. |
format | Online Article Text |
id | pubmed-7004290 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2019 |
publisher | Academy of Medical sciences |
record_format | MEDLINE/PubMed |
spelling | pubmed-70042902020-02-13 Security Requirements of Internet of Things-Based Healthcare System: a Survey Study Nasiri, Somayeh Sadoughi, Farahnaz Tadayon, Mohammad Hesam Dehnad, Afsaneh Acta Inform Med Original Paper INTRODUCTION: Internet of Things (IoT), which provides smart services and remote monitoring across healthcare systems according to a set of interconnected networks and devices, is a revolutionary technology in this domain. Due to its nature to sensitive and confidential information of patients, ensuring security is a critical issue in the development of IoT-based healthcare system. AIM: Our purpose was to identify the features and concepts associated with security requirements of IoT in healthcare system. METHODS: A survey study on security requirements of IoT in healthcare system was conducted. Four digital databases (Web of Science, Scopus, PubMed and IEEE) were searched from 2005 to September 2019. Moreover, we followed international standards and accredited guidelines containing security requirements in cyber space. RESULTS: We identified two main groups of security requirements including cyber security and cyber resiliency. Cyber security requirements are divided into two parts: CIA Triad (three features) and non-CIA (seven features). Six major features for cyber resiliency requirements including reliability, safety, maintainability, survivability, performability and information security (cover CIA triad such as availability, confidentiality and integrity) were identified. CONCLUSION: Both conventional (cyber security) and novel (cyber resiliency) requirements should be taken into consideration in order to achieve the trustworthiness level in IoT-based healthcare system. Academy of Medical sciences 2019-12 /pmc/articles/PMC7004290/ /pubmed/32055092 http://dx.doi.org/10.5455/aim.2019.27.253-258 Text en © 2019 Somayeh Nasiri, Farahnaz Sadoughi, Mohammad Hesam Tadayon, Afsaneh Dehnad http://creativecommons.org/licenses/by-nc/4.0/ This is an Open Access article distributed under the terms of the Creative Commons Attribution Non-Commercial License (http://creativecommons.org/licenses/by-nc/4.0/) which permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original work is properly cited. |
spellingShingle | Original Paper Nasiri, Somayeh Sadoughi, Farahnaz Tadayon, Mohammad Hesam Dehnad, Afsaneh Security Requirements of Internet of Things-Based Healthcare System: a Survey Study |
title | Security Requirements of Internet of Things-Based Healthcare System: a Survey Study |
title_full | Security Requirements of Internet of Things-Based Healthcare System: a Survey Study |
title_fullStr | Security Requirements of Internet of Things-Based Healthcare System: a Survey Study |
title_full_unstemmed | Security Requirements of Internet of Things-Based Healthcare System: a Survey Study |
title_short | Security Requirements of Internet of Things-Based Healthcare System: a Survey Study |
title_sort | security requirements of internet of things-based healthcare system: a survey study |
topic | Original Paper |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7004290/ https://www.ncbi.nlm.nih.gov/pubmed/32055092 http://dx.doi.org/10.5455/aim.2019.27.253-258 |
work_keys_str_mv | AT nasirisomayeh securityrequirementsofinternetofthingsbasedhealthcaresystemasurveystudy AT sadoughifarahnaz securityrequirementsofinternetofthingsbasedhealthcaresystemasurveystudy AT tadayonmohammadhesam securityrequirementsofinternetofthingsbasedhealthcaresystemasurveystudy AT dehnadafsaneh securityrequirementsofinternetofthingsbasedhealthcaresystemasurveystudy |