From the course: Securing the IoT: Secure Architectures

Unlock the full course today

Join today to access over 22,400 courses taught by industry experts or purchase this course individually.

Ehealth IoT security architecture

Ehealth IoT security architecture

From the course: Securing the IoT: Secure Architectures

Start my 1-month free trial

Ehealth IoT security architecture

- [Instructor] The subject of IoT security and eHealth has been researched by David Lake and his colleagues. The full paper is available here. Let's review some of the highlights of it to see the kind of architecture that they suggest. The overall architectural model for eHealth security conforms to the application, network, and devices domains approach, but brings in new external domains of health providers and health partners. Security's considered in each of these domains. The authors consider three attack surfaces. The first of which is the patient data. In looking at the life cycle model, there are two types of data to be considered, Real-time data and historical data. The data flows from the source, typically a sensor of some sort, across network paths to the destination application and is then stored. The data may be transmitted upstream to the application systems without being stored in the sensor or it may be locally cached. The path taken by the data includes the gateway…

Contents