Documentos de Académico
Documentos de Profesional
Documentos de Cultura
net/publication/316981947
Intrusion and Attacks over Mobile Networks and Cloud Health Systems
CITATIONS READS
0 180
4 authors:
Some of the authors of this publication are also working on these related projects:
Energy Optimization Techniques in Cloud and Mobile Cloud Computing View project
All content following this page was uploaded by Loai Tawalbeh on 26 May 2017.
Abstract: In every existed technical tool and Among the new technologies and developing trends
specific-purpose application, security must be in is the Internet of Things is a hot topic in both
watch all the time. Each of these has its security business and technology circles. IoT defines a range
implications that need to be considered specifically of technologies that allow us to potentially connect
in order to protect all users’ data and information anything electronic with each other in a network of
and prevent putting them at risk. Moreover, the machines, appliance, devices and sensors [2]. It is
rapid development and spread of many technologies
becoming an integral part of the Internet. By enabling
such as mobile networks and smart phones, IoT,
smart cities, and cloud computing, resulted in easy access and interaction with a wide variety of
increasing the demand on more security. There is a devices such as, for instance, home appliances,
needs to secure the communication networks that surveillance cameras, monitoring sensors, displays,
transfer the users data, the application itself that and vehicles, the IoT achieves the goal of making the
manipulates this data, the mobile device that runs Internet even more immersive and pervasive [3].
that application, and the cloud environment that Many different domain use IoT application such as
process and store this information. There is a home and industrial automation and mobile
variety of the user’s information that need to be healthcare systems.
protected including financial transactions, personal
data, and medical records. In the last few years, However, no secure internet that guarantees the
there are many health care providers worldwide privacy of the user’s information [4]. A lack of IoT
integrated their systems with the mobile and cloud
security is a major concern holding back its rapid
environment solutions to compete in the IT-based
growth. Consumers are constantly exposed to cyber
services. This integration brought up the need to
secure healthcare applications and systems against attacks due to the use of a wide range of available
cyber attacks. In this paper, we discuss the security smart devices because these devices are insecure and
of associated technologies with mobile networks and users often do not know about security threats on
cloud-based health care systems. Also, we present a these appliances, applications and mobile
combination of meet in the middle attack and Side technologies they use [5]. The application of the IoT
Channel Attack. paradigm to an urban context is of particular interest,
as a smart city which a huge number of machines
Key Words: Security; Mobile Cloud, Health Care
devices interconnected with each other and with
Systems; Cyber Attacks
higher level control systems.
In paper [10] authors presented smart grid which is To protect the privacy of the users over mobile
power industry is integrating the electrical networks, the users are recommended to stop sharing
distribution system with communication networks to private information such as names and addresses with
form a two directional power and information flow strangers) [14]. One of the dangerous threats of
infrastructure , the background and requirements for Social Networks is to de-anonymize user’s identities
smart grid communication security. Authors and share their private information with third
summarized the cyber security requirements and the advertising party. Sybil attack is another dangerous
possible vulnerabilities in smart grid , found smart threat in which attackers claim several fake identities
grid faced several cyber related attacks even with in order to expose the network and break the honesty
that great performance benefit from it to power of it [15]. This attack is performed when the attackers
industry . Also surveying the current solutions on have goals like ruining a voting application and
cyber security for smart grid communications and changing its results and like breaking a specific
the major challenge of its security. network’s trust mechanism [15]. A threat is
introduced which is a new kind of a web robot that
In paper [11] authors proposed importance of an perform software scripts over the interne that is
urban IoT in everyday life and some Socialbots [16]. It is a computer algorithm that acts
implementations such as home appliances, brings out content and react to humans’ behavior
monitoring sensors, actuators, displays, vehicles, and over Social Media like a human.
so on and analyzed the solutions currently available
for the implementation of urban IoTs . Authors The authors in [17] proposed an efficient and secure
presented an urban IoT system that are designed to mobile cloud computing model based on software
support the Smart City vision , overview some of the defined approach. The model addresses the security
useful services in smart cities that might be enabled issue in mobile cloud applications from software
by an urban IoT paradigm because they can realize perspective. The authors provide secure model and at
the win–win situation of increasing the quality and the same time keeping high level of efficiency.
enhancing the services offered to the citizens such as
smart parking ,smart lighting , air quality monitoring
and so on also provided survey of the enabling
technologies, protocols, and architecture for an urban
Figure 1: MiTM-Side Channel combined attack