Security and Privacy Issues in Health Monitoring Systems: eCare@Home Case Study

Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 187)

Abstract

Automated systems for monitoring elderly people in their home are becoming more and more common. Indeed, an increasing number of home sensor networks for healthcare can be found in the recent literature, indicating a clear research direction in smart homes for healthcare. Although the huge amount of sensitive data these systems deal with and expose to the external world, security and privacy issues are surprisingly not taken into consideration. The aim of this paper is to raise some key security and privacy issues that home health monitor systems should face with. The analysis is based on a real world monitoring sensor network for healthcare built in the context of the eCare@Home project.

References

  1. 1.
    Pantelopoulos, A., Bourbakis, N.G.: A survey on wearable sensor-based systems for health monitoring, prognosis. IEEE Trans. Syst. Man Cybern. Part C (Applications, Reviews) 40(1), 1–12 (2010)Google Scholar
  2. 2.
    Tsukiyama, T.: In-home health monitoring system for solitary elderly. In: Proceedings of EUSPN/ICTH’15, Procedia Computer Science, vol. 63, 229–235 (2015)Google Scholar
  3. 3.
    Kotz, D., Avancha, S., Baxi, A.: A privacy framework for mobile health and home-care systems. In: Proceedings of SPIMACS’09. ACM (2009)Google Scholar
  4. 4.
    Dasios, A., Gavalas, D., Pantziou, G., Konstantopoulos, C.: Wireless sensor network deployment for remote elderly care monitoring. In: Proceedings of PETRA’15. ACM (2015)Google Scholar
  5. 5.
    Contiki Pull Request Containing A.E.S. Encryption, July 2016. https://github.com/contiki-os/contiki/pull/557
  6. 6.
    Dworkin, M.: NIST SP 800-38A, Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality 2002, July 2016. http://csrc.nist.gov/publications/nistpubs/800-38a/spp.800-38a.pdf
  7. 7.
    SQLite Encryption Extension: Documentation, July 2016. https://www.sqlite.org/see
  8. 8.
    Bloomberg: Your Medical Records Are for Sale, July 2016. http://www.bloomberg.com/news/articles/2013-08-08/your-medical-records-are-for-sale
  9. 9.
    SQLite, July 2016. https://www.sqlite.org/

Copyright information

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2016

Authors and Affiliations

  1. 1.Technical University of Denmark (DTU)Kongens LyngbyDenmark
  2. 2.Örebro UniversityÖrebroSweden

Personalised recommendations