Project presentation ASSET - ADAPTIVE SECURITY FOR SMART INTERNET OF THINGS IN EHEALTH



Similar documents
RESEARCH OF IOT CONCEPT IN MONITORING THE ACTIVITIES OF THE ELDERLY PERSON

Summer projects for Dept. of IT students in the summer 2015

Edge Gateway and virtualization for IoT connectivity

An Introduction to the Internet of Things (IoT)

Towards an Internet of Things: Android meets NFC. Dipartimento di Scienze dell Informazione Università di Bologna

Internet of Things, 5G, Big Smart Data Interplay. The Convergence and Integration of Mobile Communications, Internet, and Smart Data Processing

MEPTEC. Ecosystem for MCU, Sensors and MEMS for IoT Tony Massimini Chief of Technology Semico Research Corp. May 20, 2015

Challenges. Department of Informatics University of Oslo. Presenter. October 25, 2011

Can the smartphone sensors be used for wheelchair accessibility studies? Dr. Manik Gupta Dr. Behzad Heravi Dr. Catherine Holloway Prof.

CPS: Communications. Dr. Bheemarjuna Reddy Tamma IIT HYDERABAD

M 2 M IWG. Eclipse, M2M and the Internet of Things. Overview. M 2 M Industry WorkGroup! M2M?

The Internet of Things: Opportunities & Challenges

A Cloud-Assisted Internet of Things Framework for Pervasive Healthcare in Smart City Environment

THE Internet is a powerful tool used in all kinds of the

Application Intelligence and Vision in Internet of Things (IoT)

Short-range Low Power Wireless Devices and Internet of Things (IoT)

STMicroelectronics is pleased to present the. SENSational. Attend a FREE One-Day Technical Seminar Near YOU!

The Wireless World - 5G and Beyond. Björn Ekelund Ericsson Research

Sensor Fusion Mobile Platform Challenges and Future Directions Jim Steele VP of Engineering, Sensor Platforms, Inc.

Fig. 1 BAN Architecture III. ATMEL BOARD

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis,

Remote Patient Monitoring in Telemedicine using computer communication network through Bluetooth, Wi-Fi, Internet Android Mobile

Depiction of Body Area Network in Cloud Environment

IOT the Last Miles. Tze Chiew (PSM) Jaap Breepoel (FAE)

IoTSec - Security in IoT for Smart Grids

Overview of the Internet of things

Mobile and Sensor Systems

INTRODUCTION TO WIRELESS SENSOR NETWORKS. Marco Zennaro, ICTP Trieste-Italy

CLOUD BASED DYNAMIC MONITORING OF PATIENT HEALTH PARAMETERS USING RTM-WISE ARCHITECTURE

Key Challenges in Cloud Computing to Enable Future Internet of Things

Internet of Things. Key Enabler for the Digital Economy. Luis Jaraquemada VP Technology Huawei Chile

Mobile Sensing: A new IoT paradigm. Shin-Ming Cheng Assistant Professor,

Connecting IPv6 capable Bluetooth Low Energy sensors with the Internet of Things

Connecting things. Creating possibilities. A point of view

PERFORMANCE ANALYSIS OF THE IEEE BASED ECG MONITORING NETWORK

Ubiquitous Healthcare Monitor System Using Wearable Wireless Sensor Network

Internet of Things based approach to Agriculture Monitoring

Graduation Project Ideas Proposed By Faculty Members Department of Communication and Networks

A NEW ARCHITECTURE OF A UBIQUITOUS HEALTH MONITORING SYSTEM:

Wireless Mobile Workforce

Design of Home Automation Framework With Social Network Integration

Horizontal IoT Application Development using Semantic Web Technologies

Mobile Adaptive Opportunistic Junction for Health Care Networking in Different Geographical Region

Fact Sheet: M2M at a Glance. 1. General

Wi-Fi, Bluetooth, and the Internet of Things

A Peek into the Future-''Internet of Things''

Using Smartphones to Detect Car Accidents and Provide Situational Awareness to First Responders

A MEDICAL HEALTH CARE SYSTEM WITH HIGH SECURITY USING ANDROID APPLICATION

Internet of Things. Laurent Toutain. June 11, Caen () IPv6 opérateur June 11, / 14

Demystifying Wireless for Real-World Measurement Applications

How To Understand The Power Of The Internet Of Things

Creating an IoT Ecosystem

Short range low power wireless devices and Internet of Things (IoT)

A Study of the Design of Wireless Medical Sensor Network based u- Healthcare System

Triathlon of Lightweight Block Ciphers for the Internet of Things

High rate and Switched WiFi. WiFi QoS, Security 2G. WiFi a/b/g. PAN LAN Cellular MAN

Role of Multi-biometrics in Usable Multi- Factor Authentication

Networking technologies and applications

National Cybersecurity Challenges and NIST. Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity

Conference. Smart Future Networks THE NEXT EVOLUTION OF THE INTERNET FROM INTERNET OF THINGS TO INTERNET OF EVERYTHING

A Forrester Consulting Thought Leadership Paper Commissioned By Zebra Technologies. November 2014

Human Performance Applications for MEMS and Sensors

Affordable Building Automation System Enabled by the Internet of Things (IoT)

Cisco Context-Aware Mobility Solution: Put Your Assets in Motion

11 Internet of Things (IoT) Protocols You Need to Know About

THE FUTURE OF SMART GRID COMMUNICATIONS

Hvor går RFID forskning og utvikling?

Towards an On board Personal Data Mining Framework For P4 Medicine

Powering Security and Easy Authentication in a Multi-Channel World

INTERNET OF THE THINGS (IoT): An introduction to wireless sensor networking middleware

Wireless Clinical Scale!

IoT Security & Privacy

IOT WPAN technologies IoT binnen handbereik. EA IoT 2015 Pepijn Herman

Healthcare Delivery. Transforming. through Mobility Solutions. A Solution White Paper - version 1.0

GOVERNMENT AND THE INTERNET OF THINGS (IOT) FINDINGS AND RECOMMENDATION OF ATARC S INTERNET OF THINGS INNOVATION LAB NOVEMBER, 2015

Lucent VPN Firewall Security in x Wireless Networks

Wzzard Sensing Platform Bluetooth App User Manual

Security Requirements for Wireless Networking

Manufacturing and the Internet of Everything

ANTILOPE Handover workshop. Franck Le Gall, Easy Global Market Constantinos Pattichis, University of Cyprus

Transcription:

Project presentation ASSET - ADAPTIVE SECURITY FOR SMART INTERNET OF THINGS IN EHEALTH Habtamu Abie, Dr. Scient., Principal Scientist ASSET Project Manager Norwegian Computing Center Tuesday 19 th of March 2013, 09:30-17:00, Telenor, Oslo, Norway.

The ASSET Project IoTs can improve eheath Digital Health Ecosystems and IOT IoTs simplify everyday life and improve quality of lives IoTs are also vulnerable to attacks Goals and objectives Project partners Case study: Patient monitoring ASSET lab setup Summary

Digital Health Ecosystems create digital environments for networked health organizations IoT is one of the building blocks of the digital health ecosystem Source: L. D. Serbanati et al., Steps towards a digital health ecosystem, Journal of Biomedical Informatics, 44(4), August 2011, 621 636

IoTs can improve quality of lives at home, while travelling, when sick, at work, when jogging, and/or at gym Can be used to track objects and people identify and authenticate people collect and sense data automatically Source: Digital Medicine

IoTs are also vulnerable to attacks Communication is wireless Limited physical security No centralized control Energy and computationally constrained operations Dynamic topology and behavior Unwanted side-effects of deployment in new context photos.com, 2013

Context-aware adaptive security for IoT from three related viewpoints: from the Things that are connected from the environments in which they are situated, and from the interactions that occur between Things, their environments and their human users Some types of modern IoT applications require instant adaptation of their security mechanisms due to their exposure to increasing situational dynamics

Motivating Projects FP7 GEMOM Genetic message-oriented secure middleware utrustit - Usable TRUST in the Internet of Things e-sense - Capturing Ambient Intelligence for Mobile Communications through Wireless Sensor Networks UbiSec&Sens - Ubiquitous Security and Sensing in the European Homeland National PETweb I & II Privacy-respecting Identity Management for e-norge SAMPOS - Strategies for Seamless Deployment of Mobile Patient Monitoring Systems

Goals and objectives Goals develop risk-based adaptive security methods and mechanisms for IoT in ehealth adapt to dynamic changing conditions of IoT, including usability, threats, and diversity/heterogeneity Objectives Build risk estimating and predicting models Build methodology for security measurement and metrics Prototype and validate the adaptive methods in patient monitoring scenarios in Oslo University Hospital Build light-weight abilities in smart things

Project partners National Partners Norwegian Computing Center Gjøvik University College Oslo University Hospital International partners VTT Technical Research Center of Finland Queen Mary University of London 2 PhD fellows and 2 Master s students Risk estimation and prediction Risk-based adaptive security Adaptive lab and simulation testbed for IoT in ehealth Adaptive intrusion detection for WBAN

Risk-based security adaptation Risk-based adaptation access could be authorized according to the measured risk measurable risk to strengthen the security of IoT systems Implements quantified risk adaptive security solutions measuring risk establishing an acceptable risk level ensuring that the information is used, accessed and distributed all the way up to the acceptable risk level Self-adaptiive risk-based protection Based on risk levels, automatically adjust the settings and actions to satisfy protection requirements of the new operating conditions

Alignment of ISMS, ISRM and ASSET Information Security Management System (ISMS) Process Plan Do Check Act Information Security Risk Management (ISRM) Process Establishing the context Risk assessment Risk treatment planning Risk acceptance Implementation of risk treatment plan Continual monitoring and reviewing of risks Maintain and improve the Information Security Risk Management Process ASSET Adaptive Risk Management Process/Methodology Analyze (Plan) Adapt (Execute) Monitor Adapt (Learn) ISO/IEC 27005:2007 ASSET: Monitor-Analyze-Adapt (plan, learn, execute)

Risk-based Adaptive Security Framework Alignment of ISMS and ASSET Processes ISMS Process Plan Do Check Act ASSET Process Analyze (Plan) Adapt (Execute) Monitor Adapt (Learn) H. Abie and I. Balasingham, Risk-Based Adaptive Security for Smart IoT in ehealth, 7th International Conference on Body Area Networks (BODYNETS 2012)

Case Study: Patient Monitoring Patient monitoring systems major data source in healthcare environments maintain a certain level availability quality of service (QoS) security and privacy of the patient Two different scenarios home environments hospital environments

The Home Scenario and its Core Scenarios

The Hospital Scenario and its Core Scenarios

ASSET Lab Set Up EEG Blood pressure SpO 2 ECG Relay node PDA/Tablet Heartbeat WBAN Controller Patient monitoring EMG Patient monitoring Data Center Acronyms - ECG (Electrocardiography) - EEG (Electroencephalography) - SpO2 (Oxygen Saturation) - EMG (Electromyography) - WBAN (Wireless Body Area Network) Devices in use: - Smartphones: Sony Xperia, Galaxy Nexus - Motes: Shimmer kit - Dash7: Wizzikit - Tablet Samsung Galaxy 10 - PCs: Laptops Radio types: - IEEE 802.15.4 -Wifi - Bluetooth -ZigBee - NFC - GPRS/ GSM Sensor types: - Heartbeat, blood pressure, blood sugar level - EEG, ECG, EMG, temperature, light, humidity - Accelerometer, Gyro, Magnetometer, GSR - Strain Gauge, GPS, Barometric Pressure, SpO2 - Vibration switch, NFC, proximity sensor, etc.

Summary Challenges models for accurately predicting future and unknown events and adapting accordingly adaptation causing minimal deviations from normal operation enabling adaptation across multiple time scales where and how much risk to take how could risk damages be controlled optimize algorithms for different IoT processing capabilities improve the light-weight abilities of smart things by improving their context-awareness and self-abilities

Summary An innovative risk-based adaptive security for IoT in ehealth identify unknown threats to IoT ehealth systems estimate and predict risk damages and future benefits adapt security decisions upon those predictions Goals increase understanding of, and thus ability to develop, techniques and algorithms for predicting unknown risk contribute to the IoT vision to become secure Internet of anything, anywhere, connected, anyhow

Thanks! The End!