Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

Secure by Design Real-Time IoMT Architecture for e-Health Population Monitoring (RTPM)

Version 1 : Received: 5 June 2024 / Approved: 6 June 2024 / Online: 10 June 2024 (12:27:46 CEST)

How to cite: Marchang, J.; McDonald, J.; Keishing, S.; Zoughalian, K.; Mawanda, R.; Delhon-Bugard, C.; Bouillet, N. Secure by Design Real-Time IoMT Architecture for e-Health Population Monitoring (RTPM). Preprints 2024, 2024060403. https://doi.org/10.20944/preprints202406.0403.v1 Marchang, J.; McDonald, J.; Keishing, S.; Zoughalian, K.; Mawanda, R.; Delhon-Bugard, C.; Bouillet, N. Secure by Design Real-Time IoMT Architecture for e-Health Population Monitoring (RTPM). Preprints 2024, 2024060403. https://doi.org/10.20944/preprints202406.0403.v1

Abstract

The healthcare sector has undergone a profound transformation, owing to the influential role played by IoMT (Internet of Medical Things) technology. However, there are substantial concerns over these devices' security and privacy-preserving nature. Current literature on IoMT tends to focus on specific security features like data confidentiality or data integrity or data availability or access control and most solutions are simulated and not tested in a real-world live network. This paper proposes a smart secure by design solution that safeguards user’s data during health and wellbeing monitoring of patients locally (home, care-home, and hospital) and remotely. The proposed innovative solution is known as Secure by Design Real Time IoMT Architecture for e-Health Population Monitoring (RTPM) for smart hospitals and any healthcare monitoring management. In this system, keys can also be generated by the patient monitoring system independent to maintain high privacy standard and trust during the monitoring process and to enable the IoMT devices run independently even if the server is compromised and are made safe from external exploits to the client nodes. However, the session keys are controlled by the trusted IoMT server to lighten the IoMT devices overheads and the session keys are securely exchanged between the client system and the monitoring server. The proposed RTPM focuses on addressing the major security requirements for an IoMT system: confidentiality, integrity, availability, conducts authentication, protect from DoS attacks and prevent from non-repudiation attack of patient medical data and the devices in a real time, sensory data communication environment for live e-health monitoring. A secure communication is tested by capturing the live network traffic and the system’s performance analysis of RTPM using different security algorithms with different key sizes of RSA, AES, and SHA shows that resource constraint low powered system can also successfully integrate with high-end state-of-the-art secure parameters and features and have the potential to support real time secure interaction. A stress test is also conducted to ensure that the system can withstand huge key sizes and different data types including multi-media information.

Keywords

secure IoMT; secure IoT; patient health monitoring; secure monitoring; secure healthcare

Subject

Computer Science and Mathematics, Security Systems

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.