Survey on cybersecurity issues in wireless mesh networks based eHealthcare

Information and Communication Technologies (ICT) based applications for Ambient Assisted Living (AAL) help elderly or individual people living home alone. AAL system reliability is mostly based on the recent emerging class of network that is known as wireless mesh network (WiMesh). In WiMesh the information security is the most difficult problem to tackle because the medium is open to cyber-attacks. Moreover, when we talk about AAL where the complete personal information is digitized and stored, the need for implementation and maintenance of strict security measures is essential. In this article, we present a critical literature survey on communication security issues in e-health care environments. We highlight and explore the representative state of the art security prototypes for eHealthcare environments and also provide the details of their security characteristics. In addition, we discuss in detail the challenges and opportunities of these systems.

[1]  Mahmoud Al-Qutayri,et al.  Extended abstract: Theorem proving verification of privacy in WBSN for healthcare systems , 2013, 2013 IEEE 20th International Conference on Electronics, Circuits, and Systems (ICECS).

[2]  Muddassar Farooq,et al.  BeeAIS: Artificial Immune System Security for Nature Inspired, MANET Routing Protocol, BeeAdHoc , 2007, ICARIS.

[3]  Mehmet A. Orgun,et al.  Secure transfer of environmental data to enhance human decision accuracy , 2015, Comput. Hum. Behav..

[4]  Gordon S. Blair,et al.  Reconfigurable Ubiquitous Networked Embedded Systems , 2005 .

[5]  Abdelouahid Derhab,et al.  Low delay and secure M2M communication mechanism for eHealthcare , 2014, 2014 IEEE 16th International Conference on e-Health Networking, Applications and Services (Healthcom).

[6]  K. Ducatel,et al.  Scenarios for Ambient Intelligence in 2010 Final Report , 2001 .

[7]  Mahmoud Al-Qutayri,et al.  An automatic ECG generator for testing and evaluating ECG sensor algorithms , 2015, 2015 10th International Design & Test Symposium (IDT).

[8]  Joel J. P. C. Rodrigues,et al.  Mobile-health: A review of current state in 2015 , 2015, J. Biomed. Informatics.

[9]  Peter Vink,et al.  Amigo Architecture: Service Oriented Architecture for Intelligent Future In-Home Networks , 2007, AmI Workshops.

[10]  David E. Bloom,et al.  Population Aging: Facts, Challenges, and Responses , 2011 .

[11]  Mahmoud Al-Qutayri,et al.  Formalizing electrocardiogram (ECG) signal behavior in event-B , 2014, 2014 IEEE 16th International Conference on e-Health Networking, Applications and Services (Healthcom).

[12]  Mahmoud Al-Qutayri,et al.  A verification methodology for a wireless body sensor network functionality , 2014, IEEE-EMBS International Conference on Biomedical and Health Informatics (BHI).

[13]  John L. Campbell,et al.  The impact of social isolation on the health status and health-related quality of life of older people , 2011, Quality of Life Research.

[14]  Joel J. P. C. Rodrigues,et al.  Intelligent Personal Assistants Based on Internet of Things Approaches , 2018, IEEE Systems Journal.

[15]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[16]  Mahmoud Al-Qutayri,et al.  Formal validation of QRS wave within ECG , 2015, 2015 International Conference on Information and Communication Technology Research (ICTRC).

[17]  Werner Kurschl,et al.  A survey on situation-aware ambient intelligence systems , 2011, J. Ambient Intell. Humaniz. Comput..

[18]  Y. M. Huang,et al.  Pervasive, secure access to a hierarchical sensor-based healthcare monitoring architecture in wireless heterogeneous networks , 2009, IEEE Journal on Selected Areas in Communications.

[19]  Mahmoud Al-Qutayri,et al.  Reliability analysis of healthcare information systems: State of the art and future directions , 2015, 2015 17th International Conference on E-health Networking, Application & Services (HealthCom).

[20]  Tanzeem Choudhury,et al.  Activity-aware ECG-based patient authentication for remote health monitoring , 2009, ICMI-MLMI '09.

[21]  Stefan Fenz,et al.  Pseudonymization for improving the Privacy in E-Health Applications , 2008, Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008).

[22]  Insup Lee,et al.  Toward patient safety in closed-loop medical device systems , 2010, ICCPS '10.

[23]  Mehmet A. Orgun,et al.  Analysis of the Scalability and Stability of an ACO Based Routing Protocol for Wireless Sensor Networks , 2015, 2015 12th International Conference on Information Technology - New Generations.

[24]  Verena Fuchsberger,et al.  Ambient assisted living: elderly people's needs and how to face them , 2008, SAME '08.

[25]  Abdelouahid Derhab,et al.  Analysis of Denial of Service Impact on Data Routing in Mobile eHealth Wireless Mesh Network , 2016, Mob. Inf. Syst..

[26]  E. Gould,et al.  Social isolation delays the positive effects of running on adult neurogenesis , 2006, Nature Neuroscience.

[27]  Abdelouahid Derhab,et al.  Human-oriented design of secure Machine-to-Machine communication system for e-Healthcare society , 2015, Comput. Hum. Behav..

[28]  Hong Liu,et al.  Authentication and key relay in medical cyber-physical systems , 2016, Secur. Commun. Networks.