Paper written for Masters of Mobile Application Development 16 Aug 2016.
Elizabeth H Burgess 11571039
ITC571 โ Innovation and Emerging Technologies
Session 201660
Charles Sturt University
Abstract
In previous research various security issues that are of concern for Machine-to-Machine (M2M) communication in the application electronic Health (eHealth). These security concerns are not only just for eHealth; they are for all M2M communications within the domains of Smart Grids, Vehicular Networks and Smart Cars, Smart Houses, and other such networks. Part of this concern is the actual network topologies that are in use along with the networking standards. The other part is the size of the hardware/application used in eHealth, in regards to memory and power supply. There have been some novel proposals of eHealth applications and what these may look like, yet when the discussion happens at the time of proposal, security takes second place in the implementation. Security is an afterthought. We live in a world that, unfortunately, has unscrupulous people within it. Any application we devise for eHealth needs to not only protect the usersโ information it also needs to protect their privacy. The approach to security within the eHealth or even the now touted mobile health (mHealth) arenas requires a multidisciplinary approach to solving some the security concerns within the use of such devices. eHealth can be separated into several subdomains; each having a set of requirements. From a network point of view, to standardised some of the componetry to provide secure transmission of data is a must. To use the now converging technologies of Internet of Things (IoT), Wireless Body Area Networks (WBANs) and cloud computing will allow standardisation of security as well as improvements in the care of patients by being more patient-centric in the monitoring of their health. This research will focus on collecting and comparing architectural models as well as how security has been proposed in these. Some of the security implementations are novel, yet all authors have come to the same conclusion that traditional security policies and measures are not appropriate for the new paradigm that is the Internet of Things and eHealth. This research will show the most appropriate way to ensure a patientโs privacy and security of data from the various models proposed.