Security Issues in Monitoring Medical Disease Through Vehicular Ad hoc Network

  • Priyanka Deodi
  • Shruti Shrivastava
  • Mukta Bhatele
Conference paper
Part of the Lecture Notes in Bioengineering book series (LNBE)


Several diseases and medical conditions require constant monitoring of physiological signals and vital signs on daily bases, such as diabetics, hypertension, etc. In order to make these patients capable of living their daily life, it is necessary to provide a platform and infrastructure that allows the constant collection of physiological data even when the patient is not inside the coverage area. Ad hoc networks are a new wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely on each other to keep the network connected. The medical, military, tactical, and other security-sensitive operations are still the main applications of ad hoc networks, although there is a trend to adopt ad hoc networks for commercial uses due to their unique properties. One main challenge in design of these networks is their vulnerability to security attacks. In this chapter, we study the threats an ad hoc network faces and the security goals to be achieved. We identify the new challenges and opportunities posed by this new networking environment and explore new approaches to secure its communication.


Security Ad hoc network Routing protocols Error detection and correction 


  1. 1.
    Haas ZJ, Liang B (1999) Ad hoc mobility management using quorum systems. IEEE/ACM Trans Networking 7:2Google Scholar
  2. 2.
    Lee U, Magistretti E, Zhou B, Gerla M, Bellavista P, Corradi A (2006) Mobeyes: smart mobs for urban monitoring with a vehicular sensor network. IEEE Wirel Commun 13(5):52Google Scholar
  3. 3.
    Feldman P (1987) A practical scheme for non-interactive verifiable secret sharing. In: Proceedings of the 28th annual symposium on the foundations of computer science, pp 427–437. IEEE, 12–14 Oct 1987Google Scholar
  4. 4.
    Hauser R, Przygienda T, Tsudik G (1999) Lowering security overhead in link state routing. Comput Netw 31(8):885–894CrossRefGoogle Scholar
  5. 5.
    Kumar B (1993) Integration of security in network routing protocols. SIGSAC Rev 11(2):18–25CrossRefGoogle Scholar
  6. 6.
    Desmedt Y, Jajodia S (1997) Redistributing secret shares to new access structures and its applications. Technical report ISSE TR-97-01, George Mason UniversityGoogle Scholar
  7. 7.
    Gong L (1993) Increasing availability and security of an authentication service. IEEE J Sel Areas Commun 11(5):657–662CrossRefGoogle Scholar

Copyright information

© Springer India 2013

Authors and Affiliations

  • Priyanka Deodi
    • 1
  • Shruti Shrivastava
    • 1
  • Mukta Bhatele
    • 1
  1. 1.Gyan Ganga College of TechnologyJabalpurIndia

Personalised recommendations