Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications
TLDR
A new field known as wireless body area networks (WBAN or simply BAN) has emerged to address the growing use of sensor technology in healthcare applications and security and privacy concerns are discussed.Abstract:
The use of wireless sensor networks (WSN) in healthcare applications is growing in a fast pace. Numerous applications such as heart rate monitor, blood pressure monitor and endoscopic capsule are already in use. To address the growing use of sensor technology in this area, a new field known as wireless body area networks (WBAN or simply BAN) has emerged. As most devices and their applications are wireless in nature, security and privacy concerns are among major areas of concern. Due to direct involvement of humans also increases the sensitivity. Whether the data gathered from patients or individuals are obtained with the consent of the person or without it due to the need by the system, misuse or privacy concerns may restrict people from taking advantage of the full benefits from the system. People may not see these devices safe for daily use. There may also possibility of serious social unrest due to the fear that such devices may be used for monitoring and tracking individuals by government agencies or other private organizations. In this paper we discuss these issues and analyze in detail the problems and their possible measures.read more
Citations
More filters
Proceedings ArticleDOI
Secure provenance in Wireless Sensor Networks - a survey of provenance schemes
Khizar Hameed,Junaid Haseeb,Muhammad Tayyab,Muhammad Junaid,Talal Bin Maqsood,Mustahsan Hammad Naqvi +5 more
TL;DR: This is the very first survey that explores the secure provenance schemes in context of addressed challenges, security properties, and detected attacks in wireless sensor networks.
Proceedings ArticleDOI
A robust ECG steganography method
S. Edward Jero,Palaniappan Ramu +1 more
TL;DR: An attempt has been made to perform ECG steganography using Discrete Wavelet Transform - Singular Value Decomposition method with additive quantization scheme and it is observed that the robustness of hidden data is improved owing to BCH codes.
Proceedings ArticleDOI
The Problems of Information Security of Electronic Personal Health Data
TL;DR: The paper considers the legal framework of the personal data protection in Azerbaijan and justifies the expediency of normative and methodological documents development in the country, which would regulate the information security of thepersonal health information.
Proceedings ArticleDOI
Security challenges in pervasive wireless medical systems and devices
Ar Kar Kyaw,Brian Cusack +1 more
TL;DR: The vulnerabilities created by the professional and end user expectations, and theorized ways to mitigate wireless risks are assessed.
Proceedings ArticleDOI
Big Data Opportunities for Disease Outbreaks Detection in Global Mass Gatherings
TL;DR: An overview of the main existing approaches for monitoring outbreaks of infectious diseases in these events is presented and the perspectives and opportunities of Big Data in these application areas are illustrated.
References
More filters
Journal ArticleDOI
A wireless body area network of intelligent motion sensors for computer assisted physical rehabilitation
TL;DR: A multi-tier telemedicine system that performs real-time analysis of sensors' data, provides guidance and feedback to the user, and can generate warnings based on the user's state, level of activity, and environmental conditions is introduced.
Journal ArticleDOI
Wireless sensor networks for personal health monitoring: Issues and an implementation
TL;DR: The authors' prototype sensor network for health monitoring that utilizes off-the-shelf 802.15.4 compliant network nodes and custom-built motion and heart activity sensors is described and the authors' solutions for time synchronization, power management, and on-chip signal processing are presented.
Journal ArticleDOI
A survey of security issues in wireless sensor networks
TL;DR: This article outlines the constraints, security requirements, and attacks with their corresponding countermeasures in WSNs, and presents a holistic view of security issues, classified into five categories: cryptography, key management, secure routing, secure data aggregation, and intrusion detection.
Proceedings Article
CodeBlue: An Ad Hoc Sensor Network Infrastructure for Emergency Medical Care
TL;DR: The architecture of CodeBlue, a wireless infrastructure intended for deployment in emergency medical care, integrating low-power, wireless vital sign sensors, PDAs, and PC-class systems, is introduced and research challenges being addressed are highlighted.
Journal ArticleDOI
The Rise of People-Centric Sensing
Andrew T. Campbell,Shane B. Eisenman,Nicholas D. Lane,Emiliano Miluzzo,Ronald Peterson,Hong Lu,Xiao Zheng,Mirco Musolesi,Kristof Fodor,Gahng-Seop Ahn +9 more
TL;DR: In the MetroSense Project's vision of people-centric sensing, users are the key architectural system component, enabling a host of new application areas such as personal, public, and social sensing.