Proceedings of the 6th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services 2009
DOI: 10.4108/icst.mobiquitous2009.6832
|View full text |Cite
|
Sign up to set email alerts
|

Security for Pervasive Medical Sensor Networks

Abstract: Abstract-Wireless sensor networks are going to allow for ubiquitous health monitoring, improving users' well-being, the healthcare system, and helping to quickly react on emergency situations. Meeting the strict security needs of these ubiquitous medical applications is a big challenge, since safety and privacy of medical data has to be guaranteed all the way from the sensor nodes to the back-end services, the system has to fulfill latency needs, and lots of mobility is expected.In this paper, we introduce a d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0

Year Published

2010
2010
2017
2017

Publication Types

Select...
3
3
3

Relationship

2
7

Authors

Journals

citations
Cited by 29 publications
(23 citation statements)
references
References 24 publications
0
23
0
Order By: Relevance
“…Since security, and in that context the protection of private data, is extremely important [5], solutions as presented in [6] need to be integrated into medical monitoring systems as well. We encourage to include strong cryptography mechanism within these systems, e.g., based on Advanced Encryption Standard (AES).…”
Section: Related Workmentioning
confidence: 99%
“…Since security, and in that context the protection of private data, is extremely important [5], solutions as presented in [6] need to be integrated into medical monitoring systems as well. We encourage to include strong cryptography mechanism within these systems, e.g., based on Advanced Encryption Standard (AES).…”
Section: Related Workmentioning
confidence: 99%
“…Since security, and in this context cryptographic means as the key technology to protect private data, is extremely important [8], solutions as presented in [9] need to be integrated into medical monitoring systems. To the best of our knowledge, there exist no mobile e-health systems based on common smartphones that does not need to decrypt and newly encrypt data on the smartphone before the data are forwarded again.…”
Section: Related Workmentioning
confidence: 99%
“…Here, the sensors comprising the PAN of a user should be able to decide in a dynamic way on the disclosure of the sensed data. Recent work [7][1 1] [14] describes how cryptographic keys can be generated, access control roles can be verified by means of lightweight primitives or public-key cryptography, and analyzes how access control decisions can be taken on sensor nodes from the network and communication point of views. However, several key technical aspects, which are required by the above application, remain unsolved.…”
Section: P Ervasive H Eal Thcare and A Ccess C Ontrolmentioning
confidence: 99%
“…• Digital certifIcate verifIcation -Upon receiving the digital certifIcate from access request, the module verifIes the validity of the certifIcate by means of existing techniques [7][1 1].…”
Section: ) Context-aware Role Enrolment Modulementioning
confidence: 99%