Affiliation:
1. Department of Informatics and Telecommunications, University of Ioannina, 471 00 Arta, Greece
2. Industrial Systems Institute, Athena RC, 265 04 Patra, Greece
Abstract
Human activity recognition systems (HARSs) are vital in a wide range of real-life applications and are a vibrant academic research area. Although they are adopted in many fields, such as the environment, agriculture, and healthcare and they are considered assistive technology, they seem to neglect the aspects of security and privacy. This problem occurs due to the pervasive nature of sensor-based HARSs. Sensors are devices with low power and computational capabilities, joining a machine learning application that lies in a dynamic and heterogeneous communication environment, and there is no generalized unified approach to evaluate their security/privacy, but rather only individual solutions. In this work, we studied HARSs in particular and tried to extend existing techniques for these systems considering the security/privacy of all participating components. Initially, in this work, we present the architecture of a real-life medical IoT application and the data flow across the participating entities. Then, we briefly review security and privacy issues and present possible vulnerabilities of each system layer. We introduce an architecture over the communication layer that offers mutual authentication, solving many security and privacy issues, particularly the man-in-the-middle attack (MitM). Relying on the proposed solutions, we manage to prevent unauthorized access to critical information by providing a trustworthy application.
Funder
Ecosystem for European Education Mobility as a Service: Model with Portal Demo
Reference84 articles.
1. Human activity recognition in artificial intelligence framework: A narrative review. Sensor-based Vision-based Radio frequency-based identification Device-free Imaging Deep learning Machine learning and hybrid models Abbreviations *CIT Citations AAL Ambient assistive living ADL Activity of daily living;Gupta;Artif. Intell. Rev.,2022
2. Gheid, Z., and Challal, Y. (2016, January 18–21). Novel Efficient and Privacy-Preserving Protocols for Sensor-Based Human Activity Recognition. Proceedings of the 13th International Conference on Ubiquitous Intelligence and Computing (UIC 2016), Toulouse, France.
3. Haris, M., and Kong, H. (2023, January 20). Privacy Leakage in Mobile Computing: Tools, Methods, and Characteristics. Available online: https://www.google.com/glass/start/.
4. Selmic, R.R., Phoha, V.V., and Serwadda, A. (2016). Wireless Sensor Networks, Springer.
5. An Improved Anonymous Authentication Protocol for Wearable Health Monitoring Systems;Mo;Wirel. Commun. Mob. Comput.,2020
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献