| Literature DB >> 22368458 |
Abstract
Healthcare applications are considered as promising fields for wireless sensor networks, where patients can be monitored using wireless medical sensor networks (WMSNs). Current WMSN healthcare research trends focus on patient reliable communication, patient mobility, and energy-efficient routing, as a few examples. However, deploying new technologies in healthcare applications without considering security makes patient privacy vulnerable. Moreover, the physiological data of an individual are highly sensitive. Therefore, security is a paramount requirement of healthcare applications, especially in the case of patient privacy, if the patient has an embarrassing disease. This paper discusses the security and privacy issues in healthcare application using WMSNs. We highlight some popular healthcare projects using wireless medical sensor networks, and discuss their security. Our aim is to instigate discussion on these critical issues since the success of healthcare application depends directly on patient security and privacy, for ethic as well as legal reasons. In addition, we discuss the issues with existing security mechanisms, and sketch out the important security requirements for such applications. In addition, the paper reviews existing schemes that have been recently proposed to provide security solutions in wireless healthcare scenarios. Finally, the paper ends up with a summary of open security research issues that need to be explored for future healthcare applications using WMSNs.Entities:
Keywords: healthcare applications; healthcare security issues; medical sensor networks; patient privacy issues; wireless body area network; wireless sensor network
Mesh:
Year: 2011 PMID: 22368458 PMCID: PMC3279202 DOI: 10.3390/s120100055
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1.Interdisciplinary research of WMSN.
Difference between generic WSN and WMSN.
| Automatic and standalone | Human involvement |
| Scalability ( | Scalability ( |
| Fixed or distributed deployment | Mobility |
| Reliability (data rate depend on applications) | Reliability (high data rate) |
Figure 2.Healthcare application using wireless medical sensor networks.
Figure 3.Risks to patient privacy.
Figure 4.ALARM-NET architecture.
Figure 5.UbiMon system architecture.
Figure 6.MobiCare patient monitoring architecture.
Figure 7.Healthcare architecture of MEDiSN.
Figure 8.Application scenarios for a nursing home, home care, and in-hospital.
Figure 9.Selective Forwarding Attack.
Figure 10.Sinkhole Attack.
Figure 11.Sybil Attack.
Denial-of-service attacks at each network layers.
| Jamming, Node tampering | |
| Collision, exhaustion, and unfairness | |
| Neglect and greed, homing, misdirection, spoofing, replaying, routing-control traffic or clustering messages | |
| Flooding and De-synchronization | |
| Overwhelming sensors, reprogramming attack |
Denial-of-Service attacks and countermeasures at each network layer.
| Jamming | Detect and sleep, route around jammed areas | |
| Node tampering | Temper-proof boxing | |
| Collision, unfairness and | Authentication and anti-replay protection | |
| Denial of sleep | Authentication and anti-replay, detect and sleep, broadcast attack protection | |
| Neglect and greed, misdirection, spoofing, replaying, routing-control traffic or clustering | Authentication and anti-replay protection, Secure cluster formation | |
| Homing | Header encryption and dummy packets | |
| Hello floods | Pair-wise authentication, geographic routing | |
| Flooding | SYN cookies | |
| De-synchronization | Packet authentication | |
| Overwhelming sensors | Sensor tuning, data aggregation | |
| Reprogramming attack | Authentication and anti-replay protection | |
| Path-based DoS | Authentication and anti-replay protection |