A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Location-based pairwise key establishments for static sensor networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
An Indoor Localization Mechanism Using Active RFID Tag
SUTC '06 Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing -Vol 1 (SUTC'06) - Volume 01
PIKM 2010: ACM workshop for ph.d. students in information and knowledge management
CIKM '10 Proceedings of the 19th ACM international conference on Information and knowledge management
Emerging multidisciplinary research across database management systems
ACM SIGMOD Record
A sensitive data aggregation scheme for body sensor networks based on data hiding
Personal and Ubiquitous Computing
Hi-index | 0.00 |
Remote health monitoring has tremendous potential to improve quality of health care services in modern and ubiquitous medical environments. It helps to cut the cost in modern healthcare by avoiding unnecessary hospital visits for frequent checkups. In this context, security and protection of sensitive medical data such as Electronic Health Records (EHR), data integrity and protection of patient's privacy to be monitored are important aspects in order to increase user's acceptance of these new technologies. Secure communication protects data from unauthorized users and usually requires pair-wise keys. In all existing schemes these keys are generated and distributed to nodes wishing to communicate. The key generation phase is usually well-secured but the key distribution is not, as a result, they are vulnerable to security threats. This paper presents an overview of security threats in pervasive healthcare and presents a secure communication scheme which unlike other schemes does not store a key chain in the memory from a universal key space and eliminate key broadcast. Simulation and results indicate that our scheme outperforms the existing schemes by decreasing transmission and storage cost.