Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3286606.3286832acmotherconferencesArticle/Chapter ViewAbstractPublication PagessmartcityappConference Proceedingsconference-collections
research-article

A Study of Security Requirements in Wireless Sensor Networks for Smart Home Healthcare Systems

Published: 10 October 2018 Publication History

Abstract

Smart home healthcare are systems used to monitor patient in home by expecting and responding to their needs and granting their independence. This remote patient's monitoring is becoming more feasible as specialized sensors can be placed inside homes. In fact, wireless sensor network are used to collect medical data such as vital signs and personal data to transmit it to the caregiver. Therefore, the preserving security and privacy of this sensitive information is very crucial. This is particularly challenging because of the specific characteristics of WSN (e.g. limited resources: energy, storage, computation, communication) and the specific smart home environment. This paper tends to analyze the security related issues in smart home healthcare systems and proposes security requirements for these systems. We highlight the security threats for networks in healthcare, discuss issues related to the existing security systems and also present the proposed and derived requirements of security in this context.

References

[1]
Jennifer Yick and Biswanath Mukherjee and Dipak Ghosal. Wireless sensor network survey. The International Journal of Computer and Telecommunications Networking.ACM 52(August 2008), 2292--2330.
[2]
Hussain, M. Z., Singh M. P. & Singh R. K. Analysis of Lifetime of Wireless Sensor Network. International Journal of Advanced Science and Technology. Springer 53 (April 2013), 1.
[3]
Nik Nur Farah Ayu Bt Che Hamid. 2012. Health Care Monitoring Using Wireless Sensor Network (H-Caring). Ph.D. Dissertation. Faculty of Electrical & Electronics Engineering. University Malaysia Pahang.
[4]
Misic J. Misic, V.B. Security Issues in Wireless Sensor Networks Used in Clinical Information Systems. Wireless Network Security Sign Commun Tech. 2007.
[5]
John Paul Walters, Zhengqiang Liang, Weisong Shi, and Vipin Chaudhary, Wireless Sensor Network Security: A Survey, Security in Distributed, Grid, and Pervasive Computing, Auerbach Publications, CRC Press, 2006
[6]
Misic, J., Misic V.B. Security Issues in Wireless Sensor Networks Used in Clinical Information Systems. Wirel. Netw. Secur. Sign. Commun. Tech. 2007.
[7]
Weippl, Holzinger, Tjoa. Security Aspects of Ubiquitous Computing in Healthcare. Available online: http://www.springerlink.com/content/et5gt8088j388115/fulltext.pdf (accessed on 10 June 2011).
[8]
Ameen, M.A., Liu, J., Kwak, K. Security and Privacy Issues in Wireless Sensor Networks forHealthcare Applications. J. Med. Syst. 2010.
[9]
Chung, W.Y., Walia, G., Lee, Y.D., Myllyla, R. Design Issues and Implementation of Query-Driven Healthcare System Using Wireless Sensor Ad Hoc Network. In Proceedings of 4th International Workshop on Wearable and Implantable Body Sensor Network (BSN 2007), Aachen, Germany, 26-28 March 2007.
[10]
What is a Smart Home. {Online}. Available: http://www.smarthomeusa.com/info/smarthome/.
[11]
Rosslin John Robles, Tai-hoon Kim.Applications, Systems and Methods in Smart HomeTechnology: A Review. International Journal of Advanced Science and Technology Vol. 15, February, 2010.
[12]
Basil Hamed. Design & Implementation of Smart House Control Using LabVIEW. International Journal of Soft Computing and EngiYee Wei Law, Jeroen Doumen, and Pieter Hartel. Survey and benchmark of block ciphers for wireless sensor networks. ACM Transactions on Sensor Networks (TOSN), 2(1) Pages:65--93, 2006. neering (IJSCE) ISSN: 2231-2307, Volume-1, Issue-6, January 2012.
[13]
Jeffery Undercoffer, Sasikanth Avancha, Anupam Joshi and John Pinkston. In Security for Sensor Networks.
[14]
J. Brown and X. Du Detection of selective forwarding attacks in heterogeneous sensor networks. ICC. pp. 1583--1587 2008.
[15]
B. Triki S. Rekhis and N. Boudriga Digital investigation of wormhole attacks in wireless sensor networks. Eighth IEEE International Symposium on Network Computing and Applications, pp. 179--186 2009.
[16]
Shahnaz Saleem, Sana Ullah, Hyeong Seon Yoo, On the Security Issues in Wireless Body Area Networks, International Journal of Digital Content Technology and its Applications, Vol 3, Sept 2009.
[17]
Chakravorty, R. A Programmable Service Architecture for Mobile Medical Care. In Proceedings of 4th Annual IEEE International Conference on Pervasive Computing and Communication Workshop (PERSOMW 06), Pisa, Italy, 13-17 March 2006.
[18]
Thomas Eisenbarth, Sandeep Kumar, Christof Paar, Axel Poschmann, and Leif Uhsadel. A survey of lightweight-cryptography implementations. IEEE Design & Test of Computers, 24(6)Pages: 522--533, 2007.
[19]
Michael Healy, Thomas Newe, and Elfed Lewis. Analysis of hardware encryption versus software encryption on wireless sensor network motes. In Smart Sensors and Sensing Technology, pages 3--14. Springer, 2008.
[20]
Yee Wei Law, Jeroen Doumen, and Pieter Hartel. Survey and benchmark of block ciphers for wireless sensor networks. ACM Transactions on Sensor Networks (TOSN), 2(1) Pages:65--93, 2006.
[21]
Haodong Wang and Qun Li. Efficient implementation of public key cryptosystems on mote sensors (short paper). In Information and Communications Security, pages 519--528. Springer, 2006.
[22]
Bruno Dutertre, Steven Cheung, and Joshua Levy. Lightweight key management in wireless sensor networks by leveraging initial trust. Technical Report SRI-SDL-04- 02, SRI International, 2004.
[23]
Darrel Hankerson, Scott Vanstone, and Alfred J Menezes. Guide to elliptic curve cryptography. Springer, 2004
[24]
Haowen Chan, Adrian Perrig, and Dawn Song. Random key predistribution schemes for sensor networks. In Security and Privacy, 2003. Proceedings. 2003 Symposium on, pages 197--213. IEEE, 2003.
[25]
Laurent Eschenauer and Virgil D Gligor. A key-management scheme for distributed sensor networks. In Proceedings of the 9th ACM conference on Computer and communications security, pages 41--47. ACM, 2002.
[26]
Donggang Liu, Peng Ning, and Rongfang Li. Establishing pairwise keys in distributed sensor networks. ACM Transactions on Information and System Security (TISSEC), 8(1) Pages:41--77, 2005.
[27]
Zhu, Y., Keoh, S.L., Sloman, M., Lupu, E.C. A lightweight policy system for body sensor network. IEEE Trans. Netw. Serv. Manag. 2009, 6, 137--148.
[28]
Ferreria, A., Correia, R., Monterio, H., Brito, M., Antunes, L. Usable access control policy and model for healthcare. In Proceedings of 2011 24th International Symposium on Computer Based Medical Systems (CBMS), Bristol, UK, 27-30 June 2011; pp. 1--6.

Cited By

View all
  • (2024)Exploring the Landscape of Ubiquitous In-home Health Monitoring: A Comprehensive SurveyACM Transactions on Computing for Healthcare10.1145/36708545:4(1-43)Online publication date: 23-Oct-2024
  • (2023)"I... caught a person casing my house... and scared him off:" The Use of Security-Focused Smart Home Devices by People with DisabilitiesProceedings of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544548.3581007(1-16)Online publication date: 19-Apr-2023
  • (2023)A Security-Enhanced and Privacy-Preserving Certificateless Aggregate Signcryption Scheme-Based Artificial Neural Network in Wireless Medical Sensor NetworkIEEE Sensors Journal10.1109/JSEN.2023.324758123:7(7440-7450)Online publication date: 1-Apr-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
SCA '18: Proceedings of the 3rd International Conference on Smart City Applications
October 2018
580 pages
ISBN:9781450365628
DOI:10.1145/3286606
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 10 October 2018

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Privacy
  2. Security issues
  3. Smart Home Healthcare Systems
  4. Wireless Sensor Networks (WSN)

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

SCA '18

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)27
  • Downloads (Last 6 weeks)2
Reflects downloads up to 13 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Exploring the Landscape of Ubiquitous In-home Health Monitoring: A Comprehensive SurveyACM Transactions on Computing for Healthcare10.1145/36708545:4(1-43)Online publication date: 23-Oct-2024
  • (2023)"I... caught a person casing my house... and scared him off:" The Use of Security-Focused Smart Home Devices by People with DisabilitiesProceedings of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544548.3581007(1-16)Online publication date: 19-Apr-2023
  • (2023)A Security-Enhanced and Privacy-Preserving Certificateless Aggregate Signcryption Scheme-Based Artificial Neural Network in Wireless Medical Sensor NetworkIEEE Sensors Journal10.1109/JSEN.2023.324758123:7(7440-7450)Online publication date: 1-Apr-2023
  • (2023)Toward Secure Fault-Tolerant Wireless Sensor Communication: Challenges and ApplicationsIntelligent Communication Technologies and Virtual Mobile Networks10.1007/978-981-99-1767-9_14(177-188)Online publication date: 2-Jun-2023
  • (2021)An Overview of Sensors, Design and Healthcare Challenges in Smart Homes: Future Design QuestionsHealthcare10.3390/healthcare91013299:10(1329)Online publication date: 5-Oct-2021

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media