| Literature DB >> 26729130 |
An Braeken1, Pawani Porambage2, Andrei Gurtov3, Mika Ylianttila4.
Abstract
Video surveillance is widely deployed for many kinds of monitoring applications in healthcare and assisted living systems. Security and privacy are two promising factors that align the quality and validity of video surveillance systems with the caliber of patient monitoring applications. In this paper, we propose a symmetric key-based security framework for the reactive video surveillance of patients based on the inputs coming from data measured by a wireless body area network attached to the human body. Only authenticated patients are able to activate the video cameras, whereas the patient and authorized people can consult the video data. User and location privacy are at each moment guaranteed for the patient. A tradeoff between security and quality of service is defined in order to ensure that the surveillance system gets activated even in emergency situations. In addition, the solution includes resistance against tampering with the device on the patient's side.Entities:
Keywords: authentication; patient monitoring; privacy; security; visual sensor networks
Mesh:
Year: 2016 PMID: 26729130 PMCID: PMC4732065 DOI: 10.3390/s16010032
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Network system architecture.
Notations used in the proposed security scheme.
| Notation | Description |
|---|---|
| Master key of key distribution center (KDC) | |
| Secret key shared among D’s and KDC | |
| Identity and nonce of patient | |
| Identity of the doctor D | |
| Group key in WBAN | |
| Secret key between D and KDC | |
| Key to encrypt video by VC | |
| Identifier for all VCs | |
| Control status of message | |
| Security material related to | |
| Concatenation of | |
| One-way hash function, e.g., Secure Hash Algorithm 3 (SHA3) | |
| Symmetric authenticated key encryption using key |
Performance of the body gateway (BG) and video camera (VC).
| Phase | BG | VC |
|---|---|---|
| Video request | 0 | |
| Video recording |
Communication length at the BG and VC.
| BG | VC | |||
|---|---|---|---|---|
| Phase 1 | Phase 2 | Phase 1 | Phase 2 | |
| Transmission | 80 bytes | – | – | 64 bytes + |
| Reception | – | 32 bytes | 80 bytes | – |
Energy consumption at the BG and VC.
| Operation | Time (ms) | Energy (mJ) | |
|---|---|---|---|
| BG | Process video request | 25 | 1.575 |
| Transmit video process request to VC | 25 | 4.095 | |
| Receive confirmation from VC | 21 | 1.793 | |
| Authenticate VC | 45 | 2.835 | |
| Total at BG | 116 | 10.298 | |
| VC | Receive request from BG | 25 | 2.135 |
| Authenticate BG | 47 | 2.961 | |
| Transmit ACK to BG | 21 | 3.440 | |
| Total at VC | 93 | 8.536 | |
| VC | Transmit 2-s video to cloud | 19,438 | 38,876 |