Nothing Special   »   [go: up one dir, main page]

skip to main content
article

Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications

Published: 01 February 2012 Publication History

Abstract

The use of wireless sensor networks (WSN) in healthcare applications is growing in a fast pace. Numerous applications such as heart rate monitor, blood pressure monitor and endoscopic capsule are already in use. To address the growing use of sensor technology in this area, a new field known as wireless body area networks (WBAN or simply BAN) has emerged. As most devices and their applications are wireless in nature, security and privacy concerns are among major areas of concern. Due to direct involvement of humans also increases the sensitivity. Whether the data gathered from patients or individuals are obtained with the consent of the person or without it due to the need by the system, misuse or privacy concerns may restrict people from taking advantage of the full benefits from the system. People may not see these devices safe for daily use. There may also possibility of serious social unrest due to the fear that such devices may be used for monitoring and tracking individuals by government agencies or other private organizations. In this paper we discuss these issues and analyze in detail the problems and their possible measures.

References

[1]
Campbell, A. T., Eisenman, S. B., Lane, N. D., Miluzzo, E., Peterson, R. A., Lu, H., Zheng, X., Musolesi, M., Fodor, K., and Ahn, G., The rise of people-centric sensing. IEEE Internet Comput. 12(4):12-21, 2008.
[2]
Dohler, A., Wireless sensor networks: The biggest cross-community design exercise to-date. Recent Patents Comput. Sci 1:9-25, 2008.
[3]
Hanna L., and Hailes S., Privacy and wireless sensor networks. University College, London, www.petsfinebalance.com/docrepo/ privacy_and_WSN.PDF
[4]
Jovanov, E., Milenkovic, A., Otto, C., and de Groen, P. C., Awireless body area network of intelligent motion sensors for computer assisted physical rehabilitation. J. Neuro. Eng. Rehabil. 2:6, 2005.
[5]
Kargl, F., Lawrence E., Fischer M., and Lim Y. Y., Security, privacy and legal issues in pervasive ehealth monitoring systems. 7th International Conference on Mobile Business icmb, pp. 296- 304, 2008.
[6]
KouvatsosD., Min G., andQureshi B., Performance issues in a secure health monitoring wireless sensor network. In Proceedings of 4th Int. Conference on Performance Modelling and Evaluation of Heterogeneous Networks (HET-NETs'2006), British Computer Society (BCS), IEE, Ilkley, UK, September 11-13, 2006, pp. WP01(1-6).
[7]
Maurer U., Rowe A., Smailagic A., and Siewiorek D. P., eWatch: a wearable sensor and notification platform. International Workshop on BSN, Wearable and Implantable Body Sensor Networks. 2006, pp.4-145, 3-5 April 2006.
[8]
Meingast, M., Roosta, T., and Sastry, S., Security and privacy issues with health care information technology. 28th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBS '06., vol., no., pp.5453-5458, Aug. 30-Sept. 3 2006.
[9]
Milenkovic, A., Otto, C., and Jovanov, E., Wireless sensor network for personal health monitoring: issues and an implementation. Comput. Commun. 29:2521-2533, 2006.
[10]
Munir, S. A., Yu, W. B., Ren, B., and Ma, M., Fuzzy logic based congestion estimation for qos in wireless sensor network. Wireless Communications and Networking Conference, 2007. WCNC 2007. IEEE, pp.4336-4341, 11-15 March 2007.
[11]
Ng, H. S., Sim, M. L., and Tan, C. M., Security issues of wireless sensor networks in healthcare applications. BT Technol. J. 24 (2):138-144, 2006.
[12]
Oliver, N., and Flores-Mangas, F., HealthGear: a real-time wearable system for monitoring and analyzing physiological signals. International Workshop on Wearable and Implantable Body Sensor Networks, 2006. BSN 2006, pp. 4 pp.-, 3-5 April 2006.
[13]
Varshney, U., Using wireless technologies in healthcare. Int. J. Mobile. Comm. 4(3):354-368, 2006.
[14]
Vaudenay S., A Classical introduction to cryptography: Applications for communications security. Springer, 2006.
[15]
Wolf, L., and Saadaoui, S, Architecture concept of a wireless body area sensor network for health monitoring of elderly people. Consumer Communications and Networking Conference, 2007. CCNC 2007. 4th IEEE, pp.722-726, Jan. 2007.
[16]
Yong, W., Attebury, G., and Ramamurthy, B., A survey of security issues in wireless sensor networks. IEEE Commun. Surv. Tutor. 8 (2):2-23, 2006. Second Quarter.
[17]
Zia, T., and Zomaya, A., Security issues in wireless sensor networks. In Proceedings of International Conference on Systems and Networks Communications, 2006. ICSNC '06, vol., no., pp.40-40, Oct. 2006.
[18]
Welsh, M., Malan, D., Duncan, B., Fulford-Jones, T., and Moulton, S., Wireless sensor networks for emergency medical care. GE Global Research Conference, Boston, 2004.
[19]
www.researchandmarkets.com
[20]
http://fiji.eecs.harvard.edu/CodeBlue
[21]
http://limserver.com/vitaljacket/index.php
[22]
http://www.cms.hhs.gov/
[23]
http://www.its.bldrdoc.gov/
[24]
http://www.mobihealth.org/
[25]
http://www.the-infoshop.com
[26]
http://www.ubimon.net/
[27]
Zhen, B., Li, H. -B., and Kohno, R. Networking issues in medical implant communications. International Journal of Multimedia and Ubiquitous Engineering. 4(1), January, 2009.
[28]
Ashraf, A., Rajput, A., Mussadiq, M., Chowdhry, B. S., and Hashmani, M. SNR based digital estimation of security in wireless sensor networks. In Communications Infrastructure. Systems and Applications in Europe, Vol. 16: 35-45, 2009.
[29]
Zhu, X., Fang, Y., and Wang, Y., How to secure multidomain wireless mesh networks. Wireless Networks, July 2009.
[30]
Ma, D., Soriente, C., and Tsudik, G., New adversary and new threats: Security in unattended sensor networks. IEEE Netw. 23 (2):43-48, 2009.

Cited By

View all
  • (2025)Securing the future: exploring post-quantum cryptography for authentication and user privacy in IoT devicesCluster Computing10.1007/s10586-024-04799-428:2Online publication date: 1-Apr-2025
  • (2024)OASIS: An Organizational CertificateLess Aggregate Signature Scheme in Distributed Networks for IoTProceedings of the 39th ACM/SIGAPP Symposium on Applied Computing10.1145/3605098.3635923(1341-1349)Online publication date: 8-Apr-2024
  • (2024)Touchscreens Can Reveal User Identity: Capacitive Plethysmogram-Based BiometricsIEEE Transactions on Mobile Computing10.1109/TMC.2022.321484623:1(895-908)Online publication date: 1-Jan-2024
  • Show More Cited By

Index Terms

  1. Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications
              Index terms have been assigned to the content through auto-classification.

              Recommendations

              Comments

              Please enable JavaScript to view thecomments powered by Disqus.

              Information & Contributors

              Information

              Published In

              cover image Journal of Medical Systems
              Journal of Medical Systems  Volume 36, Issue 1
              Feb 2012
              411 pages

              Publisher

              Plenum Press

              United States

              Publication History

              Published: 01 February 2012

              Author Tags

              1. BAN
              2. Healthcare systems
              3. Privacy
              4. Security
              5. Wireless sensor networks

              Qualifiers

              • Article

              Contributors

              Other Metrics

              Bibliometrics & Citations

              Bibliometrics

              Article Metrics

              • Downloads (Last 12 months)0
              • Downloads (Last 6 weeks)0
              Reflects downloads up to 25 Feb 2025

              Other Metrics

              Citations

              Cited By

              View all
              • (2025)Securing the future: exploring post-quantum cryptography for authentication and user privacy in IoT devicesCluster Computing10.1007/s10586-024-04799-428:2Online publication date: 1-Apr-2025
              • (2024)OASIS: An Organizational CertificateLess Aggregate Signature Scheme in Distributed Networks for IoTProceedings of the 39th ACM/SIGAPP Symposium on Applied Computing10.1145/3605098.3635923(1341-1349)Online publication date: 8-Apr-2024
              • (2024)Touchscreens Can Reveal User Identity: Capacitive Plethysmogram-Based BiometricsIEEE Transactions on Mobile Computing10.1109/TMC.2022.321484623:1(895-908)Online publication date: 1-Jan-2024
              • (2024)Multi-objective intelligent clustering routing schema for internet of things enabled wireless sensor networks using deep reinforcement learningCluster Computing10.1007/s10586-023-04218-027:4(4941-4961)Online publication date: 9-Jan-2024
              • (2023)A Comprehensive Review of the State-of-the-Art on Security and Privacy Issues in HealthcareACM Computing Surveys10.1145/357115655:12(1-38)Online publication date: 28-Mar-2023
              • (2023)BACKM-EHA: A Novel Blockchain-enabled Security Solution for IoMT-based E-healthcare ApplicationsACM Transactions on Internet Technology10.1145/351189823:3(1-28)Online publication date: 21-Aug-2023
              • (2023)Cryptanalysis and improvement of REAS‐TMISSecurity and Privacy10.1002/spy2.2686:1Online publication date: 16-Jan-2023
              • (2022)Understanding the Behavior, Challenges, and Privacy Risks in Digital Technology Use by Nursing ProfessionalsProceedings of the ACM on Human-Computer Interaction10.1145/35557636:CSCW2(1-22)Online publication date: 11-Nov-2022
              • (2022)Healthcare Data Encryption Technique Using Hybrid Cellular Automata in IoT NetworksWireless Personal Communications: An International Journal10.1007/s11277-022-09850-4126:4(3021-3039)Online publication date: 1-Oct-2022
              • (2022)QMLFD Based RSA Cryptosystem for Enhancing Data Security in Public Cloud Storage SystemWireless Personal Communications: An International Journal10.1007/s11277-021-08924-z122:1(755-782)Online publication date: 1-Jan-2022
              • Show More Cited By

              View Options

              View options

              Figures

              Tables

              Media

              Share

              Share

              Share this Publication link

              Share on social media