Body Sensor Network Processing Mechanism for Micro-Data Security Publishing

2014 ◽  
Vol 1049-1050 ◽  
pp. 1536-1539
Author(s):  
Na Li

Individuals’ privacy protection when publishing data for research has recently put great attention on data mining and information resources sharing fields. Privacy preservation is an important and challenging problem in micro-data publishing. This paper aimed to find an available directly way protect patient privacy. Processing numeric values which got from body sensor network (BSN). Firstly, we analyze the characteristics of medical data which collected from BSN, and then the records will be grouped according to the Quasi-identifier. The last step is to inspect the diversity of sensitive attributes.

2021 ◽  
Author(s):  
Mubeen Aslam Momin ◽  
Nutan Suresh Bhagwat ◽  
Akshay Vishwas Dhiwar ◽  
Sneha Bharat Chavhate ◽  
N S Devekar

In the modern health care environment, the usage of IoT technologies brings convenience of physicians and patients, since they are applied to various medical areas. The body sensor network (BSN) technology is one of the core technologies of IoT developments in healthcare system, where a patient can be monitored using a collection of tiny-powered and lightweight wireless sensor nodes. However, the development of this new technology in healthcare applications without considering security makes patient privacy vulnerable. In this paper, at first, we highlight the major security requirements in BSN-based modern healthcare system. Subsequently, we propose a secure IoT-based healthcare system using BSN, called BSN-Care, which can efficiently accomplish those requirements. The body sensor network (BSN) technology is one of the most imperative technologies used in IoT-based modern healthcare system. It is basically a collection of low-power and lightweight wireless sensor nodes that are used to monitor the human body functions and surrounding environment. Since BSN nodes are used to collect sensitive (life-critical) information and may operate in hostile environments, accordingly, they require strict security mechanisms to prevent malicious interaction with the system.


Sensors ◽  
2014 ◽  
Vol 14 (10) ◽  
pp. 18583-18610 ◽  
Author(s):  
Peter Vanveerdeghem ◽  
Patrick Van Torre ◽  
Christiaan Stevens ◽  
Jos Knockaert ◽  
Hendrik Rogier

Author(s):  
Edmund Y.W. Seto ◽  
Annarita Giani ◽  
Victor Shia ◽  
Curtis Wang ◽  
Posu Yan ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document