Security for pervasive medical sensor networks

Wireless sensor networks are going to allow for ubiquitous health monitoring, improving users' well-being, the healthcare system, and helping to quickly react on emergency situations. Meeting the strict security needs of these ubiquitous medical applications is a big challenge, since safety and privacy of medical data has to be guaranteed all the way from the sensor nodes to the back-end services, the system has to fulfill latency needs, and lots of mobility is expected. In this paper, we introduce a deployment model for wireless sensor networks for pervasive healthcare based on the concepts of patient area networks and medical sensor networks, and propose a complete and efficient security framework for them. Our security framework is organized into three layers, addressing the operational requirements and security needs at the patient area network, medical sensor network and back-end levels. We specify how these layers are interconnected with each other as well as the needed security mechanisms that allow for the efficient and practical deployment of secure pervasive healthcare systems based on wireless sensor networks.

[1]  Óscar García-Morchón,et al.  Resource-efficient security for medical body sensor networks , 2006, International Workshop on Wearable and Implantable Body Sensor Networks (BSN'06).

[2]  Vipul Gupta,et al.  Sizzle: a standards-based end-to-end security architecture for the embedded Internet , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[3]  Stephen G. Wilson,et al.  Body-coupled communication for body sensor networks , 2008, BODYNETS.

[4]  J. Hsu,et al.  Context-aware Access Control in Pervasive Healthcare , 2005 .

[5]  Matt Welsh,et al.  Sensor networks for medical care , 2005, SenSys '05.

[6]  Ning Zhang,et al.  A Linkable Identity Privacy Algorithm for HealthGrid , 2005, HealthGrid.

[7]  Carlos Cordeiro,et al.  Body area networking standardization: present and future directions , 2007, BODYNETS.

[8]  K.K. Venkatasubramanian,et al.  EKG-based key agreement in Body Sensor Networks , 2008, IEEE INFOCOM Workshops 2008.

[9]  Thomas Falck,et al.  Plug 'n Play Simplicity for Wireless Medical Body Sensors , 2006, 2006 Pervasive Health Conference and Workshops.

[10]  Carmen C. Y. Poon,et al.  A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health , 2006, IEEE Communications Magazine.

[11]  Peng Ning,et al.  2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .

[12]  Kaisa Nyberg,et al.  Trust model, communication and configuration security for Personal Area , 2002 .

[13]  Upkar Varshney,et al.  Pervasive Healthcare , 2003, Computer.

[14]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[15]  K.K. Venkatasubramanian,et al.  Security for Pervasive Health Monitoring Sensor Applications , 2006, 2006 Fourth International Conference on Intelligent Sensing and Information Processing.

[16]  Heribert Baldus,et al.  A Deterministic Pairwise Key Pre-distribution Scheme for Mobile Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[17]  Heribert Baldus,et al.  Reliable Set-Up of Medical Body-Sensor Networks , 2004, EWSN.

[18]  John A. Stankovic,et al.  ALARM-NET: Wireless Sensor Networks for Assisted-Living and Residential Monitoring , 2006 .

[19]  Jelena V. Misic,et al.  Wireless Sensor Networks for Clinical Information Systems: A Security Perspective , 2006, 26th IEEE International Conference on Distributed Computing Systems Workshops (ICDCSW'06).

[20]  Moti Yung,et al.  Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..

[21]  Oscar Garcia Morchon,et al.  Efficient distributed security for wireless medical sensor networks , 2008, 2008 International Conference on Intelligent Sensors, Sensor Networks and Information Processing.

[22]  Refik Molva,et al.  Efficient access control for wireless sensor data , 2008, 2008 IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications.

[23]  Brief announcement: lightweight key agreement and digital certificates for wireless sensor networks , 2009, PODC '09.

[24]  Jakob E. Bardram,et al.  BLIG: A New Approach for Sensor Identification, Grouping, and Authorisation in Body Sensor Networks , 2007, BSN.

[25]  H. S. Ng,et al.  Security issues of wireless sensor networks in healthcare applications , 2006 .

[26]  Emil C. Lupu,et al.  Securing body sensor networks: Sensor association and key management , 2009, 2009 IEEE International Conference on Pervasive Computing and Communications.