Advertisement

A Study of Security Requirements in Smart Home Healthcare Systems Using Wireless Sensor Networks

  • Ahlam AlamiEmail author
  • Laila Benhlima
  • Slimane Bah
Conference paper
Part of the Lecture Notes in Intelligent Transportation and Infrastructure book series (LNITI)

Abstract

Smart home healthcare are systems used to monitor patient in home by expecting and responding to their needs and granting their independence. This remote patient’s monitoring is becoming more feasible as specialized sensors can be placed inside homes. In fact, wireless sensor network are used to collect medical data such as vital signs and personal data to transmit it to the caregiver. Therefore, the preserving security and privacy of this sensitive information is very crucial. This is particularly challenging because of the specific characteristics of WSN (e.g. limited resources: energy, storage, computation, communication) and the specific smart home environment. This paper tends to analyze the security related issues in smart home healthcare systems and proposes security requirements for these systems. We highlight the security threats for networks in healthcare, discuss issues related to the existing security systems and also present the proposed and derived requirements of security in this context.

Keywords

Wireless Sensor Networks (WSN) Smart Home Healthcare Systems Security issues Privacy 

References

  1. 1.
    Yick, J., Mukherjee, B., Ghosal, D.: Wireless sensor network survey. Int. J. Comput. Telecommun. Netw. (ACM) 52, 2292–2330 (2008)CrossRefGoogle Scholar
  2. 2.
    Hussain, M.Z., Singh, M.P., Singh, R.K.: Analysis of lifetime of wireless sensor network. Int. J. Adv. Sci. Technol. (Springer) 53, 1 (2013)Google Scholar
  3. 3.
    Che Hamid, N.N.F.A.: Health care monitoring using wireless sensor network (H-caring). Ph.D. dissertation. Faculty of Electrical & Electronics Engineering. University Malaysia Pahang (2012)Google Scholar
  4. 4.
    Misic, J., Misic, V.B.: Security issues in wireless sensor networks used in clinical information systems. Wireless Netw. Secur. Sign Commun. Tech. (2007)  https://doi.org/10.1007/978-0-387-33112-6_13
  5. 5.
    Walters, J.P., Liang, Z., Shi, W., Chaudhary, V.: Wireless Sensor Network Security: A Survey, Security in Distributed, Grid, and Pervasive Computing. Auerbach Publications. CRC Press (2006)Google Scholar
  6. 6.
    Misic, J., Misic, V.B.: Security issues in wireless sensor networks used in clinical information systems. Wirel. Netw. Secur. Sign. Commun. Tech. (2007)  https://doi.org/10.1007/978-0-387-33112-6_13
  7. 7.
    Weippl, E., Holzinger, A., Tjoa, A.M.: Security aspects of ubiquitous computing in healthcare. Available online: http://www.springerlink.com/content/et5gt8088j388115/fulltext.pdf. Accessed on 10 June 2011
  8. 8.
    Ameen, M.A., Liu, J., Kwak, K.: Security and privacy issues in wireless sensor networks for healthcare applications. J. Med. Syst. (2010).  https://doi.org/10.1007/s10916-010-9449-4CrossRefGoogle Scholar
  9. 9.
    Chung, W.Y., Walia, G., Lee, Y.D., Myllyla, R.: Design issues and implementation of query-driven healthcare system using wireless sensor ad hoc network. In: Proceedings of 4th International Workshop on Wearable and Implantable Body Sensor Network (BSN 2007), Aachen, Germany, 26–28 Mar 2007Google Scholar
  10. 10.
    What is a Smart Home: [Online]. Available: http://www.smarthomeusa.com/info/smarthome/
  11. 11.
    Robles, R.J., Kim, T.: Applications, systems and methods in smart home technology: a review. Int. J. Adv. Sci. Technol. 15, Feb 2010Google Scholar
  12. 12.
    Hamed, B.: Design & implementation of smart house control using LabVIEW. Int. J. Softw. Comput. Eng. Law, Y.W., Doumen, J., Hartel, P.: Survey and benchmark of block ciphers for wireless sensor networks. ACM Trans. Sens. Netw. (TOSN) 2(1), 65–93 (2006)Google Scholar
  13. 13.
    Undercoffer, J., Avancha, S., Joshi, A., Pinkston, J.: In: Security for sensor networksGoogle Scholar
  14. 14.
    Triki, B., Rekhis, S., Boudriga, N.: Digital investigation of wormhole attacks in wireless sensor networks. In: Eighth IEEE International Symposium on Network Computing and Applications, pp. 179–186 (2009)Google Scholar
  15. 15.
    Brown, J., Du, X.: Detection of selective forwarding attacks in heterogeneous sensor networks. In: ICC, pp. 1583–1587 (2008)Google Scholar
  16. 16.
    Saleem, S., Ullah, S., Yoo, H.S.: On the security issues in wireless body area networks. Int. J. Digit. Content Technol. Appl. 3 (2009)Google Scholar
  17. 17.
    Chakravorty, R.: A programmable service architecture for mobile medical care. In: Proceedings of 4th Annual IEEE International Conference on Pervasive Computing and Communication Workshop (PERSOMW 06), Pisa, Italy, 13–17 Mar 2006Google Scholar
  18. 18.
    Eisenbarth, T., Kumar, S., Paar, C., Poschmann, A., Uhsadel, L.: A survey of lightweight-cryptography implementations. IEEE Des. Test Comput. 24(6), 522–533 (2007)CrossRefGoogle Scholar
  19. 19.
    Healy, M., Newe, T., Lewis, E.: Analysis of hardware encryption versus software encryption on wireless sensor network motes. In: Smart Sensors and Sensing Technology, pp. 3–14. Springer (2008)Google Scholar
  20. 20.
    Law, Y.W., Doumen, J.., Hartel, P.: Survey and benchmark of block ciphers for wireless sensor networks. ACM Trans. Sens. Netw. (TOSN) 2(1), 65–93 (2006)CrossRefGoogle Scholar
  21. 21.
    Wang, H., Li, Q.: Efficient implementation of public key cryptosystems on mote sensors (short paper). In: Information and Communications Security, pp. 519–528. Springer (2006)Google Scholar
  22. 22.
    Dutertre, B., Cheung, S., Levy, J.: Lightweight key management in wireless sensor networks by leveraging initial trust. Technical Report SRI-SDL-04-02, SRI International (2004)Google Scholar
  23. 23.
    Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proceedings. 2003 Symposium on Security and Privacy, 2003, pp. 197–213. IEEE (2003)Google Scholar
  24. 24.
    Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM conference on Computer and Communications Security, pp. 41–47. ACM (2002)Google Scholar
  25. 25.
    Liu, D., Ning, P., Li, R.: Establishing pairwise keys in distributed sensor networks. ACM Trans. Inf. Syst. Secur. (TISSEC) 8(1), 41–77 (2005)CrossRefGoogle Scholar
  26. 26.
    Zhu, Y., Keoh, S.L., Sloman, M., Lupu, E.C.: A lightweight policy system for body sensor network. IEEE Trans. Netw. Serv. Manag. 6, 137–148 (2009)CrossRefGoogle Scholar
  27. 27.
    Ferreria, A., Correia, R., Monterio, H., Brito, M., Antunes, L.: Usable access control policy and model for healthcare. In: Proceedings of 2011 24th International Symposium on Computer Based Medical Systems (CBMS), pp. 1–6, Bristol, UK, 27–30 June 2011Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Computer Science Department, Mohammadia School of Engineers (EMI)Mohammed V UniversityRabatMorocco

Personalised recommendations