Exploring the Opportunities, Security Vulnerabilities, and Privacy Risks in Edge-Centric Health Monitoring Systems

Authors

  • Mukesh Kumar Research Scholar, Department of Computer Science, Capital University, Koderma, Jharkhand
  • Navin Kumar Associate Professor, Department of Computer Science, Capital University, Koderma, Jharkhand.

DOI:

https://doi.org/10.69968/ijisem.2025v4si166-72

Keywords:

IoT, Edge Computing (EC), Wearable Devices, Security and Privacy Risk

Abstract

Human civilization has always been inventing new technologies that can make its way of living comfortable, efficient, and useful. Healthcare, smart homes, entertainment, transportation, education, and other industries have all adopted the Internet of Things (IoT).  In recent years, there have been a lot of inventions in technology that have significantly transformed the healthcare sector. It has enabled more efficient, accurate, and real-time patient monitoring. The exponential growth of IoT wearable devices leads to the requirement to process results in real time and a better way to store data. However, the significant increase in IoT devices and the large amount of data they generate at the network's edge have added extra challenges that conventional cloud architecture with central repository is not able to handle properly. As a consequence, the Internet of Things (IoT) based on Edge Computing (EC) is evolving into a contemporary approach that provides storage and processing of data for near end users. It results in real-time response and the patient’s life could be saved in critical situations. It has opened new avenues for continuous health monitoring, data collection, and analysis through the employment of various wearable devices. This paradigm presents significant privacy and security of data threats in addition to its distinctive characteristics and enhanced quality of service. Because location and health data are sensitive, it is critical to ensure that users have a high degree of security. In this paper, I have tried to conduct a comprehensive investigation into security and privacy issues in the context of Edge based health monitoring system, and explored possible solutions.

References

[1] Gulraiz J. Joyia, Rao M. Liaqat, Aftab Farooq, and Saad Rehman, Internet of Medical Things (IOMT): Applications, Benefits and Future Challenges in Healthcare Domain, Journal of Communications Vol. 12, No. 4, April 2017.

[2] Botta, A., De Donato, W., Persico, V., et al.: 'Integration of cloud computing and internet of things: a survey', Future Gener. Comput. Syst., 2016, 56, pp. 684-700,https://doi.org/10.1016/j.future.2015.09.021

[3] Salah, K., El Kafhali, S.: 'Performance modelling and analysis of hypoexponential network servers', J. Telecommun. Syst., 2017, 65, (4), pp. 717-728,https://doi.org/10.1007/s11235-016-0262-3

[4] Li, J., Cai, J., Khan, F., Rehman, A. U., Balasubramaniam, V., Sun, J., & Venu, P. (2020). A secured framework for sdn-based edge computing in IOT-enabled healthcare system. IEEE Access, 8, 135479-135490.https://doi.org/10.1109/ACCESS.2020.3011503

[5] J. Zhang, B. Chen, Y. Zhao, X. Cheng, and F. Hu, "Data security and privacy-preserving in edge computing paradigm: Survey and open issues," IEEE Access, vol. 6, pp. 18 209-18 237, 2018.https://doi.org/10.1109/ACCESS.2018.2820162

[6] Jeong IC, Bychkov D, Searson PC. Wearable devices for precision medicine and health state monitoring. IEEE Trans Biomed Eng 2019 May;66(5):1242-1258.https://doi.org/10.1109/TBME.2018.2871638

[7] Guk K, Han G, Lim J, Jeong K, Kang T, Lim E, et al. Evolution of wearable devices with real-time disease monitoring for personalized health care. Nanomaterials (Basel) 2019 May 29;9(6),https://doi.org/10.3390/nano9060813

[8] Yapici, M. K. & Alkhidir, T. E. Intelligent medical garments with graphene functionalized smart-cloth ECG sensors. Sensors 17, 1-12 (2017).https://doi.org/10.3390/s17040875

[9] Kabiri Ameri, S. et al. Graphene electronic tattoo sensors. ACS Nano 11, 7634-7641 (2017),https://doi.org/10.1021/acsnano.7b02182

[10] Someya, T. & Amagai, M. Toward a new generation of smart skins. Nat. Biotechnol. 37, 382-388 (2019),https://doi.org/10.1038/s41587-019-0079-1

[11] Li, Z., Zheng, Q., Wang, Z. L. & Li, Z. Nanogenerator-based self-powered sensors for wearable and implantable electronics. Research 2020, 1-25 (2020).https://doi.org/10.34133/2020/8710686

[12] Sethi, P.; Sarangi, S.R. Internet of things: Architectures, protocols, and applications. J. Electr. Comput. Eng. 2017, 2017, 9324035,https://doi.org/10.1155/2017/9324035

[13] Williams, P.A.; Woodward, A.J. Cybersecurity vulnerabilities in medical devices: A complex environment and multifaceted problem. Med. Devices 2015, 8, 305.https://doi.org/10.2147/MDER.S50048

[14] Aghili, S.F.; Mala, H.; Kaliyar, P.; Conti, M. SecLAP: Secure and lightweight RFID authentication protocol for Medical IoT. Future Gener. Comput. Syst. 2019, 101, 621-634.https://doi.org/10.1016/j.future.2019.07.004

[15] Sun, Y.; Lo, F.P.W.; Lo, B. Security and privacy for the internet of medical things enabled healthcare systems: A survey. IEEE Access 2019, 7, 183339-183355,https://doi.org/10.1109/ACCESS.2019.2960617

[16] J. Lin et al., "A survey on Internet of Things: Architecture, enabling technologies, security and privacy, and applications," IEEE Internet Things J.,vol. 4, no. 5, pp. 1125-1142, Oct. 2017,https://doi.org/10.1109/JIOT.2017.2683200

[17] V. Hassija et al., "A survey on IoT security: Application areas, security threats, and solution architectures," IEEE Access, vol. 7, pp. 82721-82743, 2019,https://doi.org/10.1109/ACCESS.2019.2924045

[18] J. Ni, X. Lin, and X. S. Shen, "Toward edge-assisted internet of things: From security and efficiency perspectives," IEEE Network, vol. 33, no. 2, pp. 50-57, March 2019.https://doi.org/10.1109/MNET.2019.1800229

[19] Health Statistics Of India, Report of the National Commission on Macroeconomics and Health, Ministry of Health & Family Welfare, Govt. of India August 2005, retrieved from: https://www.indushealthplus.com/health-statistics-of-india.html Accessed on 26th December 2024.

[20] PIB Delhi, (2022, February 8), Status of Non-Communicable Diseases (NCDs) in India, retrieved from:https://pib.gov.in/PressReleaseIframePage.aspx?PRID=1796435 Accessed on 27th December 2024.

[21] A. Minhas, (2023, Jul 12), Estimated number of public and private hospitals in India 2019, retrieved from:https://www.statista.com/statistics/1128425/india-number-of-public-and-private-hospitals-estimated/ Accessed on 27th December 2024.

[22] Cisco Annual Internet Report (2018-2023) White Paper, March 9, 2020, retrieved from:https://www.cisco.com/c/en/us/solutions/collateral/executive-perspectives/annual-internet-report/white-paper-c11-741490.html, Accessed on 28th December 2024.

[23] Amft O, Lukowicz P. From backpacks to smartphones: past, present, and future of wearable computers. IEEE Pervasive Comput 2009 Jul;8(3):8-13,https://doi.org/10.1109/MPRV.2009.44

[24] Medical-grade Smartwatch CardiacSense receives approval in India, February 17, 2023, retrieved from: https://www.financialexpress.com/business/healthcare-medical-grade-smartwatch-cardiacsense-receives-approval-in-india-2983982/ Accessed on 28th December 2024.

[25] Identity Theft Resource Center, "2020 End-of-Year Data Breach Report", retrieved from:https://www.idtheftcenter.org/2020-data-breaches/ Accessed on 29th December 2024.

[26] Anthem to pay $39M to state AGs to settle landmark 2015 data breach, September 30, 2020, retrieved from: https://www.fiercehealthcare.com/tech/anthem-to-pay-39m-to-state-ags-to-settle-landmark-2015-data-breach Accessed on 28th December 2024.

[27] Richmond, S. Stopping the Attacks: Cybersecurity In Healthcare Manufacturing, 2021.https://www.forbes.com/sites/forbestechcouncil/2021/08/17/stopping-the-attacks-cybersecurity-in-healthcare-manufacturing/?sh=4db312231a8d Accessed on 1st January 2025.

[28] Healthcare Data Breach Statistics, Posted by Steve Alder on 3oth December 2024,https://www.hipaajournal.com/healthcare-data-breach-statistics/, Accessed on 4th January 2025.

[29] Kesavan, E. 2023. Internet of Things (IoT): A Review of Security Challenges and Solutions. International Journal of Innovations in Science, Engineering And Management. 2, 4 (Dec. 2023), 65-71.https://doi.org/10.69968/ijisem.2023v2i465-71

Downloads

Published

28-04-2025

Issue

Section

Articles

How to Cite

[1]
Kumar, M. and Kumar, N. 2025. Exploring the Opportunities, Security Vulnerabilities, and Privacy Risks in Edge-Centric Health Monitoring Systems. International Journal of Innovations in Science, Engineering And Management. 4, 1 (Apr. 2025), 66–72. DOI:https://doi.org/10.69968/ijisem.2025v4si166-72.