Sensor Networks Security for Pervasive Healthcare

Author(s):  
Ioannis Krontiris

Body-worn sensors and wireless interconnection of distributed embedded devices facilitate the use of lightweight systems for monitoring vital health parameters like heart rate, respiration rate and blood pressure. Patients can simply wear monitoring systems without restricting their mobility and everyday life. This is particularly beneficial in the context of world’s ageing society with many people suffering chronic ailments. However, wireless transmission of sensitive patient data through distributed embedded devices presents several privacy and security implications. In this book chapter the authors’ first highlight the security threats in a biomedical sensor networks and identify the requirements that a security solution has to offer. Then the authors’ review some popular architectures proposed in the bibliography over the last few years and they discuss the methods that they employ in order to offer security. Finally the authors’ discuss some open research questions that have not been addressed so far and which they believe offer promising directions towards making these kinds of networks more secure.

2012 ◽  
pp. 967-983
Author(s):  
Ioannis Krontiris

Body-worn sensors and wireless interconnection of distributed embedded devices facilitate the use of lightweight systems for monitoring vital health parameters like heart rate, respiration rate and blood pressure. Patients can simply wear monitoring systems without restricting their mobility and everyday life. This is particularly beneficial in the context of world’s ageing society with many people suffering chronic ailments. However, wireless transmission of sensitive patient data through distributed embedded devices presents several privacy and security implications. In this book chapter the authors’ first highlight the security threats in a biomedical sensor networks and identify the requirements that a security solution has to offer. Then the authors’ review some popular architectures proposed in the bibliography over the last few years and they discuss the methods that they employ in order to offer security. Finally the authors’ discuss some open research questions that have not been addressed so far and which they believe offer promising directions towards making these kinds of networks more secure.


2020 ◽  
Vol 2020 ◽  
pp. 1-16
Author(s):  
Ijaz Ahmad Awan ◽  
Muhammad Shiraz ◽  
Muhammad Usman Hashmi ◽  
Qaisar Shaheen ◽  
Rizwan Akhtar ◽  
...  

The tremendous growth of computational clouds has attracted and enabled intensive computation on resource-constrained client devices. Predominantly, smart mobiles are enabled to deploy data and computational intensive applications by leveraging on the demand service model of remote data centres. However, outsourcing personal and confidential data to the remote data servers is challenging for the reason of new issues involved in data privacy and security. Therefore, the traditional advanced encryption standard (AES) algorithm needs to be enhanced in order to cope with the emerging security threats in the cloud environment. This research presents a framework with key features including enhanced security and owner’s data privacy. It modifies the 128 AES algorithm to increase the speed of the encryption process, 1000 blocks per second, by the double round key feature. However, traditionally, there is a single round key with 800 blocks per second. The proposed algorithm involves less power consumption, better load balancing, and enhanced trust and resource management on the network. The proposed framework includes deployment of AES with 16, 32, 64, and 128 plain text bytes. Simulation results are visualized in a way that depicts suitability of the algorithm while achieving particular quality attributes. Results show that the proposed framework minimizes energy consumption by 14.43%, network usage by 11.53%, and delay by 15.67%. Hence, the proposed framework enhances security, minimizes resource utilization, and reduces delay while deploying services of computational clouds.


2013 ◽  
Vol 9 (7) ◽  
pp. 471917 ◽  
Author(s):  
Ruan Delgado Gomes ◽  
Marcéu Oliveira Adissi ◽  
Abel Cavalcante Lima-Filho ◽  
Marco Aurélio Spohn ◽  
Francisco Antônio Belo

2015 ◽  
Vol 15 (6) ◽  
pp. 3514-3523 ◽  
Author(s):  
Roman Lara ◽  
Diego Benitez ◽  
Antonio Caamano ◽  
Marco Zennaro ◽  
Jose Luis Rojo-Alvarez

2014 ◽  
Vol 556-562 ◽  
pp. 5976-5978
Author(s):  
Ke Zhao ◽  
Long Fei Xiao ◽  
Ya Long Hu ◽  
Zhong Wang

With the advance of technology, people is more and more nervous to security threats posed by wireless sensor. Therefore, Based on security technology, this paper puts forward a suitable for the safety management unit used in wireless sensor network, And the provisions of its agreement, authentication methods and security processing methods, making wireless sensor networks can transmit user information in a secure environment, while simulation analysis the affect design module on date security transmission, when the wireless sensor networks have security management unit, it will a better, more reliable transmission environments.


Author(s):  
Sandip Bisui ◽  
Subhas Chandra Misra

This article discusses the issues and concerns related to the adoption of Personalized Medicine in modern healthcare system. In this chapter the authors have elaborated the critical challenges while adopting this new medicare system. The changes required for this adoption have also been discussed by the authors. They have also give a glimpse of the critical success factors and consumer trust concerns along with the privacy and security threats for the successful adoption of Personalized Medicine system.


Sign in / Sign up

Export Citation Format

Share Document