 
								Security Performance of Internet of Medical Things
								
									
										
											
											
												Taiwo Adenaiye,
											
										
											
											
												Waleed Bul’ajoul,
											
										
											
											
												Funminiyi Olajide
											
										
									
								 
								
									
										Issue:
										Volume 9, Issue 1, June 2021
									
									
										Pages:
										1-18
									
								 
								
									Received:
										11 January 2021
									
									Accepted:
										18 January 2021
									
									Published:
										2 February 2021
									
								 
								
								
								
									
									
										Abstract: Internet of Medical Things is the internet connection of medical devices to perform services and processes to support the healthcare sector. Wearable Technology in Healthcare has seen tremendous growth in recent times. This is due to a global increase in the aging population, the need for disease management, and effective patient monitoring. The prevalent technology of wearable devices is Bluetooth technology due to its low cost, low energy, and size. Despite the growth recorded in the adoption of Bluetooth Wearable IoMT, there are concerns by users and other healthcare stakeholders about security and privacy issues with its adoption. Our paper presents a simulation of passive and active attacks on 3 wearable IoMT devices, followed by analysis and evaluation of the experiment outcomes. Thereafter, countermeasures for the identified weaknesses were provided. It was discovered that some of the standard security features of Bluetooth Technology to mitigate privacy and security issues were not implemented in some of the devices, which can result in data compromise in the devices. A security assessment framework was developed to assess the security of Bluetooth IoMT devices using the Bayesian Network model. This is used to rank devices, identify their vulnerabilities, and apply security measures on the identified vulnerabilities. Our paper further provides recommendations on improving the security of Bluetooth IoMT devices.
										Abstract: Internet of Medical Things is the internet connection of medical devices to perform services and processes to support the healthcare sector. Wearable Technology in Healthcare has seen tremendous growth in recent times. This is due to a global increase in the aging population, the need for disease management, and effective patient monitoring. The pr...
										Show More
									
								
								
							
							
								 
								Intent-based Networking for Connectivity and Cloud Services
								
								
									
										Issue:
										Volume 9, Issue 1, June 2021
									
									
										Pages:
										19-22
									
								 
								
									Received:
										13 February 2021
									
									Accepted:
										1 March 2021
									
									Published:
										10 March 2021
									
								 
								
								
								
									
									
										Abstract: Recent developments in networking and services technologies increased number of choices for users and complexity of networks and services. At the same time, there is substantial effort in the industry to enhance user experiences with services. The enhancement of user experiences is tightly coupled with mapping of user intents to services by shielding customers from the complexity and automating management processes involved in ordering and delivering services. The mapping is an iterative process. Its accuracy is expected to be improved as Service Providers gain experience with the process. Automating management processes in a management infrastructure with non-virtualized OSSs (Operating Support Systems) is lengthy and difficult. Virtualization and artificial intelligence/machine learning (AI/ML) techniques accelerate the automation greatly. The automation improves not only user experiences with services, but also the management of networks and applications by network administrators. This paper will describe user intents, a method for mapping user intents to connectivity and cloud services, and the design process, with examples. The concepts and methods described here are expected to be used by consumers and administrators of networks and applications forming services. The intents and their mappings can be expanded for each service by adding unique capabilities and attributes for connectivity and application options of a given service.
										Abstract: Recent developments in networking and services technologies increased number of choices for users and complexity of networks and services. At the same time, there is substantial effort in the industry to enhance user experiences with services. The enhancement of user experiences is tightly coupled with mapping of user intents to services by shieldi...
										Show More