2011
DOI: 10.3844/jcssp.2011.1465.1473
|View full text |Cite
|
Sign up to set email alerts
|

Ubiquitous Health Monitoring Systems: Addressing Security Concerns

Abstract: Problem statement:It is important to secure the transmission of patient's EHR in remote health monitoring systems. Security is among the main issues that need to be realized for the adaption of this monitoring technology. The face of healthcare is changing as ubiquitous computing technologies are being incorporated into the existing infrastructure. We specify the requirements, needed security mechanism, outstanding issues and the future challenges as well as the open problems that need to be achieved. Approach… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…Communications amongst devices in the IoT can be heterogeneous and seamless. In IoT healthcare applications for example, information are typically supplied by a range of heterogeneous devices . Low‐power and low‐cost sensors devices, will have the capabilities of automatically sensing, communicating, and processing the information collected from their environments and their users, including medical and health information.…”
Section: Related Workmentioning
confidence: 99%
“…Communications amongst devices in the IoT can be heterogeneous and seamless. In IoT healthcare applications for example, information are typically supplied by a range of heterogeneous devices . Low‐power and low‐cost sensors devices, will have the capabilities of automatically sensing, communicating, and processing the information collected from their environments and their users, including medical and health information.…”
Section: Related Workmentioning
confidence: 99%
“…In reference to security of data, 'security' and 'privacy' are often used interchangeably (e.g. Ahamed et al 2007a;Armac et al 2009;Busnel and Giroux 2010;Chan et al 2008;Dhukaram et al 2011;Elkhodr et al 2011;Garcia-Morchon et al 2009;Mana et al 2011;Stuart et al 2008;Wang et al 2008). The concepts must be differentiated by their ends: security is concerned with guaranteeing the quality of the data collected by and passing through a system in terms of "confidentiality, integrity and availability" (Giannotti and Saygin 2010, p. 75), enabling users to protect privacy by controlling dissemination of their data and preventing hacks or breaches (Peppet 2014).…”
Section: Informational Privacymentioning
confidence: 99%
“…SSL is used to established a secure network for information exchanges (Markovic, 2006;Ulieru and Ionescu, 2004). The commonly used security protection for mobile device that uses wireless LAN are user authentication and encrypted wireless network (Elkhodr et al, 2011;Jaizanuar, 2009;Yu et al, 2008;Ahmad, 2003). In addition SSL is also used on wireless devices to provide transport level security (Gupta and Gupta, 2001;Marti et al, 2004).…”
Section: Security Technologiesmentioning
confidence: 99%