2008
DOI: 10.1002/sec.40
|View full text |Cite
|
Sign up to set email alerts
|

Enforcing patient privacy in healthcare WSNs through key distribution algorithms

Abstract: Patient data privacy, as one of the foremost security concerns in healthcare applications, must be enforced through the use of strong cryptography. However, in the scenario where the patient wears a body network in which lightweight, battery-operated wireless sensors monitor various health variables of interest, the requirements for strong cryptography must often be balanced against the requirements for energy efficiency. In this paper, we describe two algorithms for key distribution. The first algorithm relie… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2010
2010
2022
2022

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(12 citation statements)
references
References 21 publications
0
12
0
Order By: Relevance
“…• Public-key based solutions assume that a public-key cryptosystem, such as DiffieHellman key exchange protocol [8] or RSA [27], is used to establish a secret key for encryption on the basis of the public keys. Typical examples of public-key based solutions include [11], [13], [17], [19], [21], [22]. These solutions facilitate key distribution and update.…”
Section: Fig 1 Alarm-net Architecturementioning
confidence: 99%
“…• Public-key based solutions assume that a public-key cryptosystem, such as DiffieHellman key exchange protocol [8] or RSA [27], is used to establish a secret key for encryption on the basis of the public keys. Typical examples of public-key based solutions include [11], [13], [17], [19], [21], [22]. These solutions facilitate key distribution and update.…”
Section: Fig 1 Alarm-net Architecturementioning
confidence: 99%
“…In situations where patients' data may be collected through automated systems, and in real time, there is a high possibility of constraints (Mišić & Mišić 2008). Thus, software applications and other devices that are used to store, access and manage health data should be integrated with mechanisms such as privacy protection, access control and secure transmission modules (Hsu, Lee & Su 2013).…”
Section: What Are the Factors That Influence Social Media Big Data?mentioning
confidence: 99%
“…Technological devices can be used to collect, access and manage big data, remotely and from different locations (Al Ameen et al 2012). However, the host databases should be situated in a secured location to prevent theft and destruction (Mišić & Mišić 2008). • Transformation -Rapidly increasing patients' heterogeneous big data helps to provide a valuable resource for use in the course of improving healthcare service delivery, which include medical decision-making (Christodoulakis et al 2016).…”
Section: What Are the Factors That Influence Big Data In Healthcare?mentioning
confidence: 99%
See 1 more Smart Citation
“…In contrast to the physiological parameter based schemes, the cryptography based schemes are more mature and flexible which can be applied in both intrabody communication and external-body communication (authentication between service provider and controller). The cryptography based schemes can be divided into three types in general: symmetric cryptography based schemes [39][40][41][42][43][44], traditional public key infrastructure (PKI) based schemes [45][46][47][48][49][50], and some special cryptographic methods based schemes such as identity cryptography [51] and certificateless cryptography [52]. Compared with the latter two methods, symmetric cryptography based schemes need relatively low computational cost but support limited security functions and create key distribution problem; PKI based scheme needs relatively higher computational cost compared with symmetric cryptography based schemes; the special cryptographic methods support richer security service but need the highest computational cost.…”
Section: Related Workmentioning
confidence: 99%