Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1248054.1248058acmconferencesArticle/Chapter ViewAbstractPublication PagesmobisysConference Proceedingsconference-collections
Article

Addressing security in medical sensor networks

Published: 11 June 2007 Publication History

Abstract

We identify the security challenges facing a sensor network for wireless health monitoring, and propose an architecture called "SNAP" (Sensor Network for Assessment of Patients) to address these challenges. SNAP protects the privacy, authenticity, and integrity of medical data, with low-cost energy-efficient mechanisms. We have incorporated the following mechanisms in SNAP: (1)an ECC-based secure key exchange protocol to set up shared keys between sensor nodes and base stations; (2)symmetric encryption and decryption for protecting data con?dentiality and integrity; (3) a two-tier authentication scheme for verifying data source. We have developed a prototype on the Tmote Sky platform for evaluating the proposed architecture and mechanisms.

References

[1]
Fujitsu MBF200 Solid State Fingerprint Sensor. http://www.fujitsu.com/emea/services/microelectronics/sensors/.
[2]
Certicom Research. Standards for Efficient Cryptography (SEC)1: Elliptic Curve Cryptography. Sept. 2000.
[3]
Certicom Research. Standards for Efficient Cryptography (SEC)2: Recommended Elliptic Curve Domain Parameters. Sept. 2000.
[4]
D. Chaum and E. van Heijst. Group Signatures. In Advances in Cryptology - Eurocrypt '91 pages 257--265, 1991.
[5]
Crossbow Solutions Newsletter. Motes for mobile communication and tele-medicine. 2005.
[6]
Crossbow Technology. MPR/MIB mote hardware users manual. http://www.xbow.com/Support/manuals.htm,Jan. 2006.
[7]
D. Eastlake and P. Jones. US Secure Hash Algorithm 1. RFC 3174, http://www.ietf.org/rfc/rfc3174.txt,Sept.2001.
[8]
R. Fischer, L. Ohno-Machado, D. Curtis, R. Greenes, T. Stair, and J. Guttag. SMART: Scalable medical alert response technology. In Smart Medical Technologies Summit (SMT) 2004.
[9]
N. Gura, A. Patel, A. Wander, H. Eberle, and S. C. Shantz. Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs. In Workshop on Cryptographic Hardware and Embedded Systems Aug. 2004.
[10]
H. Wang and B. Sheng and Q. Li. TelosB implementation of elliptic curve cryptography over primary ?eld. Technical Report WM-CS-2005-12, Dept. of Computer Science, College of William and Mary, Oct. 2005.
[11]
H. G. Hosseini, D. Luo, and K. J. Reynolds. The Comparison of Different Feed Forward Neural Network Architectures for ECG Signal Diagnosis.Medical Engineering and Physics 28:372--378, 2006.
[12]
S. A. Israel, J. M. Irvine, A. Cheng, M. D. Wiederhold, and B. K. Wiederhold. ECG to identify individuals. Pattern Recognition 38:133--142, 2005.
[13]
B. Kaliski. PKCS #5: Password-Based Cryptography Specification. RFC 2898, http://www.ietf.org/rfc/rfc2898.txt, Sept. 2000.
[14]
H. Krawczyk, M. Bellare, and R. Canetti. HMAC: Keyed-Hashing for Message Authentication. RFC 2104, http://www.ietf.org/rfc/rfc2104.txt,Feb.1997.
[15]
A. Liu, P. Kampanakis, and P. Ning. TinyECC: Elliptic Curve Cryptography for Sensor Networks. http://discovery.csc.ncsu.edu/software/TinyECC/.
[16]
Moteiv Corporation. Tmote Sky. http://www.moteiv.com/products/tmotesky.php,2007.
[17]
C. Park, P. H. Chou,Y. Bai, R. Matthews, and A. Hibbs. An Ultra-Wearable, Wireless, Low Power ECG Monitoring System. Proceedings of IEEE BioCAS Nov. 2006.
[18]
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar. SPINS: Security protocols for sensor networks. In Proceedings of the ACM MOBICOM 2001.
[19]
S. C. Shantz. From Euclid's GCD to Montgomery Multiplication to the Great Divide. Technical Report TR-2001--95, Sun Microsystems, June 2001.
[20]
V. Shnayder, B.-R. Chen, K. Lorincz, T. R. F. Fulford-Jones, and M. Welsh. Sensor networks for medical care. Technical Report TR-08-05, Harvard University, Apr. 2005.
[21]
Q. Wang, W. Shin, X. Liu, Z. Zeng, C. Oh, B. Al-Shebli, M. Caccamo, C. Gunter, E. Gunter, J. Hou, K. Karahalios, and L. Sha. I-Living: An open system architecture for assisted living. In Proceedings of the IEEE SMC 2006.
[22]
A. Wood, G. Virone, T. Doan, Q. Cao, L. Selavo, Y. Wu, L. Fang, Z. He, S. Lin, and J. Stankovic. ALARM-NET: Wireless Sensor Networks for Assisted-Living and Health Monitoring. Technical Report CS-2006--01, University of Virginia, 2006.

Cited By

View all
  • (2023)Dissecting wireless body area networks routing protocols: Classification, comparative analysis, and research challengesInternational Journal of Communication Systems10.1002/dac.563737:1Online publication date: 29-Oct-2023
  • (2022)A Survey on Big Data Technologies and Their Applications to the Metaverse: Past, Current and FutureMathematics10.3390/math1101009611:1(96)Online publication date: 26-Dec-2022
  • (2022)A Novel Review on Healthcare Data Encryption TechniquesInternational Conference on Innovative Computing and Communications10.1007/978-981-19-3679-1_40(489-498)Online publication date: 8-Nov-2022
  • Show More Cited By

Index Terms

  1. Addressing security in medical sensor networks

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    HealthNet '07: Proceedings of the 1st ACM SIGMOBILE international workshop on Systems and networking support for healthcare and assisted living environments
    June 2007
    110 pages
    ISBN:9781595937674
    DOI:10.1145/1248054
    • General Chairs:
    • Robin Kravets,
    • Chiara Petrioli
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 11 June 2007

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Tmote sky
    2. elliptic curve cryptography
    3. medical sensor networks

    Qualifiers

    • Article

    Conference

    Mobisys07
    Sponsor:

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)8
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 01 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Dissecting wireless body area networks routing protocols: Classification, comparative analysis, and research challengesInternational Journal of Communication Systems10.1002/dac.563737:1Online publication date: 29-Oct-2023
    • (2022)A Survey on Big Data Technologies and Their Applications to the Metaverse: Past, Current and FutureMathematics10.3390/math1101009611:1(96)Online publication date: 26-Dec-2022
    • (2022)A Novel Review on Healthcare Data Encryption TechniquesInternational Conference on Innovative Computing and Communications10.1007/978-981-19-3679-1_40(489-498)Online publication date: 8-Nov-2022
    • (2021)Towards Green Computing Oriented Security: A Lightweight Postquantum Signature for IoESensors10.3390/s2105188321:5(1883)Online publication date: 8-Mar-2021
    • (2020)ECG Monitoring Systems: Review, Architecture, Processes, and Key ChallengesSensors10.3390/s2006179620:6(1796)Online publication date: 24-Mar-2020
    • (2019)Authenticated Group Key Agreement Protocols for Error Detection and CorrectionInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology10.32628/CSEIT195390(332-337)Online publication date: 20-May-2019
    • (2019)An End-to-End Secure and Energy-Aware Routing Mechanism for IoT-Based Modern Health Care SystemImmunological Tolerance10.1007/978-981-13-3600-3_35(379-388)Online publication date: 17-Jan-2019
    • (2019)Pervasive Healthcare System Based on Environmental MonitoringIntelligent Pervasive Computing Systems for Smarter Healthcare10.1002/9781119439004.ch7(159-178)Online publication date: 5-Jul-2019
    • (2018)Chronic Diseases and Health Monitoring Big Data: A SurveyIEEE Reviews in Biomedical Engineering10.1109/RBME.2018.282970411(275-288)Online publication date: 2018
    • (2018)A Physical Layer Security Scheme for Mobile Health Cyber-Physical SystemsIEEE Internet of Things Journal10.1109/JIOT.2017.27802635:1(295-309)Online publication date: Feb-2018
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media