Author
Mahmud Hossain
Other affiliations: University of Alabama, Temple University, Samsung
Bio: Mahmud Hossain is an academic researcher from University of Alabama at Birmingham. The author has contributed to research in topic(s): Universal Plug and Play & Service provider. The author has an hindex of 9, co-authored 24 publication(s) receiving 1889 citation(s). Previous affiliations of Mahmud Hossain include University of Alabama & Temple University.
Papers
More filters
TL;DR: An intelligent collaborative security model to minimize security risk is proposed; how different innovations such as big data, ambient intelligence, and wearables can be leveraged in a health care context is discussed; and various IoT and eHealth policies and regulations are addressed to determine how they can facilitate economies and societies in terms of sustainable development.
Abstract: The Internet of Things (IoT) makes smart objects the ultimate building blocks in the development of cyber-physical smart pervasive frameworks. The IoT has a variety of application domains, including health care. The IoT revolution is redesigning modern health care with promising technological, economic, and social prospects. This paper surveys advances in IoT-based health care technologies and reviews the state-of-the-art network architectures/platforms, applications, and industrial trends in IoT-based health care solutions. In addition, this paper analyzes distinct IoT security and privacy features, including security requirements, threat models, and attack taxonomies from the health care perspective. Further, this paper proposes an intelligent collaborative security model to minimize security risk; discusses how different innovations such as big data, ambient intelligence, and wearables can be leveraged in a health care context; addresses various IoT and eHealth policies and regulations across the world to determine how they can facilitate economies and societies in terms of sustainable development; and provides some avenues for future research on IoT-based health care based on a set of open issues and challenges.
1,690 citations
02 Jul 2018
TL;DR: FIF-IoT presents a framework that ensures integrity, confidentiality, anonymity, and non-repudiation of the evidence stored in the public digital ledger, and provides a mechanism to acquire evidence from the ledger and to verify the integrity of the obtained evidence.
Abstract: The increased deployment of Internet of Things (IoT) devices will make them targets for attacks. IoT devices can also be used as tools for committing crimes. In this regard, we propose FIF-IoT – a forensic investigation framework using a public digital ledger to find facts in criminal incidents in IoT-based systems. FIF-IoT collects interactions that take place among various IoT entities (clouds, users, and IoT devices) as evidence and store them securely as transactions in a public, distributed and decentralized blockchain network which is similar to the Bitcoin network. Hence, FIF-IoT eliminates a single entity's control over the evidence storage, avoids single-point-offailure on the storage media, and ensures high availability of evidence. FIF-IoT presents a framework that ensures integrity, confidentiality, anonymity, and non-repudiation of the evidence stored in the public digital ledger. Furthermore, FIF-IoT provides a mechanism to acquire evidence from the ledger and to verify the integrity of the obtained evidence. We present a case study of a forensic investigation to demonstrate that FIF-IoT is secure against evidence tampering. We also implement a prototype to evaluate the performance of FIF-IoT.
33 citations
15 Apr 2018
TL;DR: Probe-IoT — a forensic investigation framework using a public digital ledger to find facts in criminal incidents in IoT-based systems and provides a mechanism to acquire evidence from the ledger and verify the authenticity and integrity of the obtained evidence.
Abstract: The increased deployment of Internet of Things (IoT) devices will make them targets for attacks IoT devices can also be used as tools for committing crimes In this regard, we propose Probe-IoT — a forensic investigation framework using a public digital ledger to find facts in criminal incidents in IoT-based systems Probe-IoT collects interactions that take place among various IoT entities (clouds, users, and IoT devices) as evidence and stores them securely as transactions in public, distributed and decentralized blockchain network which is similar to the Bitcoin network Probe-IoT presents a scheme that ensures integrity, confidentiality, anonymity, and non-repudiation of the evidence stored in the public ledger Furthermore, during the investigation of a malicious incident, Probe-IoT provides a mechanism to acquire evidence from the ledger and verify the authenticity and integrity of the obtained evidence
31 citations
25 Jun 2017
TL;DR: This article proposes TrustIoV – a digital forensic framework for the IoV systems that provides mechanisms to collect and store trustworthy evidence from the distributed infrastructure and maintains a secure provenance of the evidence to ensure the integrity of the stored evidence.
Abstract: The Internet of Vehicles (IoV) is a complex and dynamic mobile network system that enables information sharing between vehicles, their surrounding sensors, and clouds. While IoV opens new opportunities in various applications and services to provide safety on the road, it introduces new challenges in the field of digital forensics investigations. The existing tools and procedures of digital forensics cannot meet the highly distributed, decentralized, dynamic, and mobile infrastructures of the IoV. Forensic investigators will face challenges while identifying necessary pieces of evidence from the IoV environment, and collecting and analyzing the evidence. In this article, we propose TrustIoV – a digital forensic framework for the IoV systems that provides mechanisms to collect and store trustworthy evidence from the distributed infrastructure. Trust-IoV maintains a secure provenance of the evidence to ensure the integrity of the stored evidence and allows investigators to verify the integrity of the evidence during an investigation. Our experimental results on a simulated environment suggest that Trust-IoV can operate with minimal overhead while ensuring the trustworthiness of evidence in a strong adversarial scenario.
29 citations
05 Jun 2017
TL;DR: This paper provides a systematic analysis of security issues of IoT-based systems and highlights a set of open problems and provides a detailed description for each.
Abstract: The Internet of Things (IoT) is becoming a key infrastructure for the development of smart ecosystems. However, the increased deployment of IoT devices with poor security has already rendered them increasingly vulnerable to cyber attacks. In some cases, they can be used as a tool for committing serious crimes. Although some researchers have already explored such issues in the IoT domain and provided solutions for them, there remains the need for a thorough analysis of the challenges, solutions, and open problems in this domain. In this paper, we consider this research gap and provide a systematic analysis of security issues of IoT-based systems. Then, we discuss certain existing research projects to resolve the security issues. Finally, we highlight a set of open problems and provide a detailed description for each. We posit that our systematic approach for understanding the nature and challenges in IoT security will motivate researchers to addressing and solving these problems.
20 citations
Cited by
More filters
1,778 citations
TL;DR: This study aims to serve as a useful manual of existing security threats and vulnerabilities of the IoT heterogeneous environment and proposes possible solutions for improving the IoT security architecture.
Abstract: The Internet of things (IoT) has recently become an important research topic because it integrates various sensors and objects to communicate directly with one another without human intervention. The requirements for the large-scale deployment of the IoT are rapidly increasing with a major security concern. This study focuses on the state-of-the-art IoT security threats and vulnerabilities by conducting an extensive survey of existing works in the area of IoT security. The taxonomy of the current security threats in the contexts of application, architecture, and communication is presented. This study also compares possible security threats in the IoT. We discuss the IoT security scenario and provide an analysis of the possible attacks. Open research issues and security implementation challenges in IoT security are described as well. This study aims to serve as a useful manual of existing security threats and vulnerabilities of the IoT heterogeneous environment and proposes possible solutions for improving the IoT security architecture.
620 citations
TL;DR: The paper presents a brief overview of smart cities, followed by the features and characteristics, generic architecture, composition, and real-world implementations ofSmart cities, and some challenges and opportunities identified through extensive literature survey on smart cities.
Abstract: Smart city is an application of Internet of Things (IoT) notion. Unceasing growth of population and urbanization have intensified innovative ways to handle urbanization with minimal impact on environment, citizen lifestyles, and governance. Initial integration of information communication technology (ICT) into city operations have promoted telicity, information city, and digital city concepts. Later, the conception of IoT has founded the smart cities, which support the city operations intelligently with minimal human interaction. Smart city emerged as a solution to address the challenges arise with exponential growth of urbanization and population. However, smart city concept is still evolving and not mainstreamed throughout the globe due to technological, economical, and governing barriers. Therefore, this paper aims to deliver the essence of smart cities. The paper presents a brief overview of smart cities, followed by the features and characteristics, generic architecture, composition, and real-world implementations of smart cities. Finally, we present some challenges and opportunities identified through extensive literature survey on smart cities.
550 citations
TL;DR: It is proposed that this requires a transition from the clinic-centric treatment to patient-centric healthcare where each agent such as hospital, patient, and services are seamlessly connected to each other, and needs a multi-layer architecture.
Abstract: Internet of Things (IoT) offers a seamless platform to connect people and objects to one another for enriching and making our lives easier This vision carries us from compute-based centralized schemes to a more distributed environment offering a vast amount of applications such as smart wearables, smart home, smart mobility, and smart cities In this paper we discuss applicability of IoT in healthcare and medicine by presenting a holistic architecture of IoT eHealth ecosystem Healthcare is becoming increasingly difficult to manage due to insufficient and less effective healthcare services to meet the increasing demands of rising aging population with chronic diseases We propose that this requires a transition from the clinic-centric treatment to patient-centric healthcare where each agent such as hospital, patient, and services are seamlessly connected to each other This patient-centric IoT eHealth ecosystem needs a multi-layer architecture: (1) device, (2) fog computing and (3) cloud to empower handling of complex data in terms of its variety, speed, and latency This fog-driven IoT architecture is followed by various case examples of services and applications that are implemented on those layers Those examples range from mobile health, assisted living, e-medicine, implants, early warning systems, to population monitoring in smart cities We then finally address the challenges of IoT eHealth such as data management, scalability, regulations, interoperability, device–network–human interfaces, security, and privacy
491 citations
TL;DR: This paper presents a HealthIIoT-enabled monitoring framework, where ECG and other healthcare data are collected by mobile devices and sensors and securely sent to the cloud for seamless access by healthcare professionals.
Abstract: The promising potential of the emerging Internet of Things (IoT) technologies for interconnected medical devices and sensors has played an important role in the next-generation healthcare industry for quality patient care. Because of the increasing number of elderly and disabled people, there is an urgent need for a real-time health monitoring infrastructure for analyzing patients' healthcare data to avoid preventable deaths. Healthcare Industrial IoT (HealthIIoT) has significant potential for the realization of such monitoring. HealthIIoT is a combination of communication technologies, interconnected apps, Things (devices and sensors), and people that would function together as one smart system to monitor, track, and store patients' healthcare information for ongoing care. This paper presents a HealthIIoT-enabled monitoring framework, where ECG and other healthcare data are collected by mobile devices and sensors and securely sent to the cloud for seamless access by healthcare professionals. Signal enhancement, watermarking, and other related analytics will be used to avoid identity theft or clinical error by healthcare professionals. The suitability of this approach has been validated through both experimental evaluation, and simulation by deploying an IoT-driven ECG-based health monitoring service in the cloud.
478 citations