Handbook of Applied Cryptography
Handbook of Applied Cryptography
Perfectly-Secure Key Distribution for Dynamic Conferences
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Sizzle: A Standards-Based End-to-End Security Architecture for the Embedded Internet (Best Paper)
PERCOM '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications
Establishing pairwise keys in distributed sensor networks
ACM Transactions on Information and System Security (TISSEC)
A Deterministic Pairwise Key Pre-distribution Scheme for Mobile Sensor Networks
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
Security issues of wireless sensor networks in healthcare applications
BT Technology Journal
Wireless Sensor Networks for Clinical Information Systems: A Security Perspective
ICDCSW '06 Proceedings of the 26th IEEE International ConferenceWorkshops on Distributed Computing Systems
TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks
IPSN '08 Proceedings of the 7th international conference on Information processing in sensor networks
Body area networking standardization: present and future directions
Proceedings of the ICST 2nd international conference on Body area networks
Body-coupled communication for body sensor networks
BodyNets '08 Proceedings of the ICST 3rd international conference on Body area networks
Brief announcement: lightweight key agreement and digital certificates for wireless sensor networks
Proceedings of the 28th ACM symposium on Principles of distributed computing
Securing body sensor networks: Sensor association and key management
PERCOM '09 Proceedings of the 2009 IEEE International Conference on Pervasive Computing and Communications
The ANGEL WSN Security Architecture
SENSORCOMM '09 Proceedings of the 2009 Third International Conference on Sensor Technologies and Applications
Modular context-aware access control for medical sensor networks
Proceedings of the 15th ACM symposium on Access control models and technologies
A security architecture for mobile wireless sensor networks
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health
IEEE Communications Magazine
Secure and efficient dynamic program update in wireless sensor networks
Security and Communication Networks
The Role of Privacy Protection in Healthcare Information Systems Adoption
Journal of Medical Systems
Hi-index | 0.00 |
Ubiquitous 24/7 health monitoring systems based on wireless medical sensors are going to play a key role for pervasive e-health applications. These systems allow care givers to early detect and act on signs of patients' clinical deterioration improving quality of care in a reliable unobtrusive and cost effective way. Ensuring the privacy and security of the exchanged information is challenging in pervasive e-health environments due to the resource constraints of tiny wireless medical sensors and operational requirements such as user mobility, strict latency needs, or the multitude of parties involved in the system. This paper describes a comprehensive and practical security framework for these pervasive health monitoring systems. We distinguish three layers addressing the specific security needs at the patient area network, medical sensor network, and back-end levels. Thereby our architecture accommodates the healthcare institution-centric approach predominant today while making provisions for the more patient-centric vision of pervasive e-health environments. The tailored security mechanisms for each individual layer as well as their interworking are presented and evaluated in detail. The analysis shows that our proposed security framework allows the deployment of wireless medical sensor networks in a very efficient way. Copyright © 2010 John Wiley & Sons, Ltd.