Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2162081.2162092acmconferencesArticle/Chapter ViewAbstractPublication PageshotmobileConference Proceedingsconference-collections
research-article

An amulet for trustworthy wearable mHealth

Published: 28 February 2012 Publication History

Abstract

Mobile technology has significant potential to help revolutionize personal wellness and the delivery of healthcare. Mobile phones, wearable sensors, and home-based tele-medicine devices can help caregivers and individuals themselves better monitor and manage their health. While the potential benefits of this "mHealth" technology include better health, more effective healthcare, and reduced cost, this technology also poses significant security and privacy challenges. In this paper we propose Amulet, an mHealth architecture that provides strong security and privacy guarantees while remaining easy to use, and outline the research and engineering challenges required to realize the Amulet vision.

References

[1]
S. Avancha, A. Baxi, and D. Kotz. Privacy in mobile technology for personal healthcare. ACM Computing Surveys, 2012. At http://www.cs.dartmouth.edu/~dfk/papers/avancha-survey.pdf.
[2]
E. M. Berke, T. Choudhury, S. Ali, and M. Rabbi. Objective measurement of sociability and activity: Mobile sensing in the community. Annals of Family Medicine, 9(4):344--350, July 2011.
[3]
D. Bichler, G. Stromberg, M. Huemer, and M. Löw. Key generation based on acceleration data of shaking processes. Proceedings of Ubiquitous Computing (UbiComp), 4717:304--317, 2007.
[4]
A. G. Bonomi, A. H. C. Goris, B. Yin, and K. R. Westerterp. Detection of type, duration, and intensity of physical activity using an accelerometer. Medicine & Science in Sports & Exercise, 41(9):1770, 2009.
[5]
S. Bugiel, L. Davi, A. Dmitrienko, S. Heuser, A. R. Sadeghi, and B. Shastry. Practical and lightweight domain isolation on android. In Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, SPSM '11, pages 51--62, New York, NY, USA, 2011. ACM.
[6]
F. Buttussi and L. Chittaro. Smarter phones for healthier lifestyles: An adaptive fitness game. IEEE Pervasive Computing, 9(4):51--57, Oct. 2010.
[7]
C. Cornelius and D. Kotz. Recognizing whether sensors are on the same body. In Proceedings of the International Conference on Pervasive Computing, Lecture Notes in Computer Science, pages 332--349. Springer, June 2011.
[8]
Verizon, VMware plan dual-persona phone software. At http://tiny.cc/x0lmm, visited 2011.
[9]
A. Felt, M. Finifter, E. Chin, S. Hanna, and D. Wagner. A survey of mobile malware in the wild. In Proceedings of the ACM Workshop on Security and Privacy in Mobile Devices (SPSM), Oct. 2011. At http://www.cs.berkeley.edu/~daw/papers/mobilemal-spsm11.pdf.
[10]
G. Fenu and G. Steri. Two methods for body parameter analysis using body sensor networks. In International Conference on Ultra Modern Telecommunications & Workshops (ICUMT), pages 1--5. IEEE, Oct. 2009.
[11]
R. W. Gardner, S. Garera, M. W. Pagano, M. Green, and A. D. Rubin. Securing medical records on smart phones. In Proceedings of the Workshop on Security and Privacy in Medical and Home-Care Systems (SPIMACS), pages 31--40. ACM Press, Nov. 2009.
[12]
K. Gudeth, M. Pirretti, K. Hoeper, and R. Buskey. Delivering secure applications on commercial mobile devices: the case for bare metal hypervisors. In Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, SPSM '11, pages 33--38, New York, NY, USA, 2011. ACM.
[13]
HealthPAL, mobile health monitoring device. At http://medapps.net/healthpal.html, visited Jan. 2012.
[14]
R. Kainda, I. Flechais, and A. W. Roscoe. Usability and security of out-of-band channels in secure device pairing protocols. In Proceedings of Symposium on Usable Privacy and Security (SOUPS). ACM, 2009.
[15]
J. Liu, L. Zhong, J. Wickramasuriya, and V. Vasudevan. uWave: Accelerometer-based personalized gesture recognition and its applications. Pervasive and Mobile Computing, 5(6):657--675, Dec. 2009.
[16]
S. Mare, J. Sorber, M. Shin, C. Cornelius, and D. Kotz. Adapt-lite: Privacy-aware, secure, and efficient mhealth sensing. In Proceedings of the Workshop on Privacy in the Electronic Society (WPES), Oct. 2011.
[17]
MetaWatch. At http://www.metawatch.org, visited Jan. 2012.
[18]
MOTOACTV. At http://motoactv.com, visited Jan. 2012.
[19]
MSP430 competitive benchmarking. At http://www.ti.com/lit/an/slaa205c/slaa205c.pdf, visited Oct. 2011.
[20]
C. Otto, A. Milenkovic, C. Sanders, and E. Jovanov. System architecture of a wireless body area sensor network for ubiquitous health monitoring. Journal of Mobile Multimedia, 1(4):307--326, 2006. At http://www.ece.uah.edu/~milenka/docs/coamej_jmm06.pdf.
[21]
C. C. Y. Poon, Y.-T. Zhang, and S.-D. Bao. A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health. IEEE Communications Magazine, 44(4):73--81, May 2006.
[22]
S. Saleem, S. Ullah, and H. S. Yoo. On the security issues in wireless body area networks. International Journal of Digital Content Technology and its Applications, 3(3):178--184, 2009.
[23]
L. A. Saxon, D. L. Hayes, F. R. Gilliam, P. A. Heidenreich, J. Day, M. Seth, T. E. Meyer, P. W. Jones, and J. P. Boehmer. Long-term outcome after ICD and CRT implantation and influence of remote device follow-up: The ALTITUDE survival study. Circulation, 122(23):2359--2367, Dec. 2010.
[24]
J. Sriram, M. Shin, T. Choudhury, and D. Kotz. Activity-aware ECG-based patient authentication for remote health monitoring. In Proceedings of the International Conference on Multimodal Interfaces and Workshop on Machine Learning for Multi-modal Interaction (ICMI-MLMI), pages 297--304. ACM Press, Nov. 2009.
[25]
J. Sriram, M. Shin, D. Kotz, A. Rajan, M. Sastry, and M. Yarvis. Challenges in data quality assurance in pervasive health monitoring systems. In D. Gawrock, H. Reimer, A.-R. Sadeghi, and C. Vishik, editors, Future of Trust in Computing, pages 129--142. Vieweg+Teubner Verlag, July 2009.
[26]
F. Stajano and R. Anderson. The resurrecting duckling: security issues for ubiquitous computing. Computer, 35(4):22--26, Apr. 2002.
[27]
D. Walters, A. Sarela, A. Fairfull, K. Neighbour, C. Cowen, B. Stephens, T. Sellwood, B. Sellwood, M. Steer, M. Aust, R. Francis, C. K. Lee, S. Hoffman, G. Brealey, and M. Karunanithi. A mobile phone-based care model for outpatient cardiac rehabilitation: the care assessment platform (CAP). BMC Cardiovascular Disorders, 10(1):5+, Jan. 2010.
[28]
WIMM labs. At http://www.wimm.com, visited Oct. 2011.

Cited By

View all
  • (2022)Acceptability of an mHealth Family Self-management Intervention (myFAMI) for Pediatric Transplantation Families: Qualitative FocusJMIR Nursing10.2196/392635:1(e39263)Online publication date: 15-Jul-2022
  • (2022)Protecting adaptive sampling from information leakage on low-power sensorsProceedings of the 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems10.1145/3503222.3507775(240-254)Online publication date: 28-Feb-2022
  • (2021)Securing Implantable Medical Devices Using Ultrasound WavesIEEE Access10.1109/ACCESS.2021.30835769(80170-80182)Online publication date: 2021
  • Show More Cited By
  1. An amulet for trustworthy wearable mHealth

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    HotMobile '12: Proceedings of the Twelfth Workshop on Mobile Computing Systems & Applications
    February 2012
    92 pages
    ISBN:9781450312073
    DOI:10.1145/2162081
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 28 February 2012

    Permissions

    Request permissions for this article.

    Check for updates

    Qualifiers

    • Research-article

    Conference

    HotMobile '12
    Sponsor:

    Acceptance Rates

    HotMobile '12 Paper Acceptance Rate 14 of 68 submissions, 21%;
    Overall Acceptance Rate 96 of 345 submissions, 28%

    Upcoming Conference

    HOTMOBILE '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)4
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 27 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)Acceptability of an mHealth Family Self-management Intervention (myFAMI) for Pediatric Transplantation Families: Qualitative FocusJMIR Nursing10.2196/392635:1(e39263)Online publication date: 15-Jul-2022
    • (2022)Protecting adaptive sampling from information leakage on low-power sensorsProceedings of the 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems10.1145/3503222.3507775(240-254)Online publication date: 28-Feb-2022
    • (2021)Securing Implantable Medical Devices Using Ultrasound WavesIEEE Access10.1109/ACCESS.2021.30835769(80170-80182)Online publication date: 2021
    • (2021)Security and Usability Considerations for an mHealth Application for Emergency Medical ServicesAdvances in Computer Vision and Computational Biology10.1007/978-3-030-71051-4_31(399-422)Online publication date: 6-Aug-2021
    • (2020)IMDfence: Architecting a Secure Protocol for Implantable Medical DevicesIEEE Access10.1109/ACCESS.2020.30156868(147948-147964)Online publication date: 2020
    • (2020)Pilot study protocol of a mHealth self‐management intervention for family members of pediatric transplant recipientsResearch in Nursing & Health10.1002/nur.2201043:2(145-154)Online publication date: 27-Jan-2020
    • (2019)Counting Bites With Bits: Expert Workshop Addressing Calorie and Macronutrient Intake MonitoringJournal of Medical Internet Research10.2196/1490421:12(e14904)Online publication date: 4-Dec-2019
    • (2019)ExperienceThe 25th Annual International Conference on Mobile Computing and Networking10.1145/3300061.3345432(1-14)Online publication date: 5-Aug-2019
    • (2019)Amulet: an open-source wrist-worn platform for mHealth research and education2019 11th International Conference on Communication Systems & Networks (COMSNETS)10.1109/COMSNETS.2019.8711407(891-897)Online publication date: Jan-2019
    • (2019)Ultra Wide Band Body Area Networks: Design and Integration with Computational CloudsTarget Identification and Validation in Drug Discovery10.1007/978-3-030-16272-6_10(279-306)Online publication date: 26-Mar-2019
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media