A Study of Security Requirements in Wireless Sensor Networks for Smart Home Healthcare Systems

Smart home healthcare are systems used to monitor patient in home by expecting and responding to their needs and granting their independence. This remote patient's monitoring is becoming more feasible as specialized sensors can be placed inside homes. In fact, wireless sensor network are used to collect medical data such as vital signs and personal data to transmit it to the caregiver. Therefore, the preserving security and privacy of this sensitive information is very crucial. This is particularly challenging because of the specific characteristics of WSN (e.g. limited resources: energy, storage, computation, communication) and the specific smart home environment. This paper tends to analyze the security related issues in smart home healthcare systems and proposes security requirements for these systems. We highlight the security threats for networks in healthcare, discuss issues related to the existing security systems and also present the proposed and derived requirements of security in this context.

[1]  Qun Li,et al.  Efficient Implementation of Public Key Cryptosystems on Mote Sensors (Short Paper) , 2006, ICICS.

[2]  A Min Tjoa,et al.  Security aspects of ubiquitous computing in health care , 2006, Elektrotech. Informationstechnik.

[3]  Vojislav B. Misic,et al.  Security Issues in Wireless Sensor Networks Used in Clinical Information Systems , 2007 .

[4]  Bruno Dutertre,et al.  Lightweight Key Management in Wireless Sensor Networks by Leveraging Initial Trust , 2004 .

[5]  Muhammad Zahir Shah,et al.  Security and Privacy Issues in Wireless Sensor Networks , 2011 .

[6]  Elfed Lewis,et al.  Analysis of Hardware Encryption Versus Software Encryption on Wireless Sensor Network Motes , 2008 .

[7]  Biswanath Mukherjee,et al.  Wireless sensor network survey , 2008, Comput. Networks.

[8]  By Ciarán Morrison What is a ‘ Smart Home ’ ? , 2019 .

[9]  Alfred Menezes,et al.  Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.

[10]  Xiaojiang Du,et al.  Detection of Selective Forwarding Attacks in Heterogeneous Sensor Networks , 2008, 2008 IEEE International Conference on Communications.

[11]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, ACM Trans. Inf. Syst. Secur..

[12]  Emil C. Lupu,et al.  A lightweight policy system for body sensor networks , 2009, IEEE Transactions on Network and Service Management.

[13]  Luis Filipe Coelho Antunes,et al.  Usable access control policy and model for healthcare , 2011, 2011 24th International Symposium on Computer-Based Medical Systems (CBMS).

[14]  Risto Myllylä,et al.  Design Issues and Implementation of Query-Driven Healthcare System Using Wireless Sensor Ad-hoc Network , 2007, BSN.

[15]  Kyung Sup Kwak,et al.  Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications , 2010, Journal of Medical Systems.

[16]  Rakesh Singh,et al.  Analysis of Lifetime of Wireless Sensor Network , 2013 .

[17]  Che Hamid,et al.  Health care monitoring using wireless sensor network (H-Caring) , 2012 .

[18]  Weisong Shi,et al.  Wireless Sensor Network Security: A Survey , 2006 .

[19]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[20]  Hyeong Seon Yoo,et al.  On the Security Issues in Wireless Body Area Networks , 2009, J. Digit. Content Technol. its Appl..

[21]  Noureddine Boudriga,et al.  Digital Investigation of Wormhole Attacks in Wireless Sensor Networks , 2009, 2009 Eighth IEEE International Symposium on Network Computing and Applications.

[22]  Yee Wei Law,et al.  Survey and benchmark of block ciphers for wireless sensor networks , 2006, TOSN.

[23]  Tai-hoon Kim,et al.  Applications, Systems and Methods in Smart Home Technology: A Review , 2010 .

[24]  Basil Hamed,et al.  Design & Implementation of Smart House Control Using LabVIEW , 2012 .

[25]  Christof Paar,et al.  A Survey of Lightweight-Cryptography Implementations , 2007, IEEE Design & Test of Computers.

[26]  Rajiv Chakravorty,et al.  A programmable service architecture for mobile medical care , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06).

[27]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[28]  Anupam Joshi,et al.  Security for wireless sensor networks , 2004 .