Sensor network security for pervasive e‐health
Identifieur interne : 001090 ( Istex/Corpus ); précédent : 001089; suivant : 001091Sensor network security for pervasive e‐health
Auteurs : Oscar Garcia Orchon ; Thomas Falck ; Klaus WehrleSource :
- Security and Communication Networks [ 1939-0114 ] ; 2011-11.
English descriptors
Abstract
Ubiquitous 24/7 health monitoring systems based on wireless medical sensors are going to play a key role for pervasive e‐health applications. These systems allow care givers to early detect and act on signs of patients' clinical deterioration improving quality of care in a reliable unobtrusive and cost effective way. Ensuring the privacy and security of the exchanged information is challenging in pervasive e‐health environments due to the resource constraints of tiny wireless medical sensors and operational requirements such as user mobility, strict latency needs, or the multitude of parties involved in the system. This paper describes a comprehensive and practical security framework for these pervasive health monitoring systems. We distinguish three layers addressing the specific security needs at the patient area network, medical sensor network, and back‐end levels. Thereby our architecture accommodates the healthcare institution‐centric approach predominant today while making provisions for the more patient‐centric vision of pervasive e‐health environments. The tailored security mechanisms for each individual layer as well as their interworking are presented and evaluated in detail. The analysis shows that our proposed security framework allows the deployment of wireless medical sensor networks in a very efficient way. Copyright © 2010 John Wiley & Sons, Ltd.
Url:
DOI: 10.1002/sec.247
Links to Exploration step
ISTEX:A06A6C491E1817291DF5CF36DFD564BAF8C9D86BLe document en format XML
<record><TEI wicri:istexFullTextTei="biblStruct"><teiHeader><fileDesc><titleStmt><title xml:lang="en">Sensor network security for pervasive e‐health</title>
<author><name sortKey="Garcia Orchon, Oscar" sort="Garcia Orchon, Oscar" uniqKey="Garcia Orchon O" first="Oscar" last="Garcia Orchon">Oscar Garcia Orchon</name>
<affiliation><mods:affiliation>Philips Research Europe, Distributed Sensor Systems, Eindhoven, The Netherlands</mods:affiliation>
</affiliation>
</author>
<author><name sortKey="Falck, Thomas" sort="Falck, Thomas" uniqKey="Falck T" first="Thomas" last="Falck">Thomas Falck</name>
<affiliation><mods:affiliation>Philips Research Europe, Distributed Sensor Systems, Eindhoven, The Netherlands</mods:affiliation>
</affiliation>
</author>
<author><name sortKey="Wehrle, Klaus" sort="Wehrle, Klaus" uniqKey="Wehrle K" first="Klaus" last="Wehrle">Klaus Wehrle</name>
<affiliation><mods:affiliation>RWTH Aachen University, Distributed Systems, Aachen, Germany</mods:affiliation>
</affiliation>
</author>
</titleStmt>
<publicationStmt><idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:A06A6C491E1817291DF5CF36DFD564BAF8C9D86B</idno>
<date when="2011" year="2011">2011</date>
<idno type="doi">10.1002/sec.247</idno>
<idno type="url">https://api.istex.fr/document/A06A6C491E1817291DF5CF36DFD564BAF8C9D86B/fulltext/pdf</idno>
<idno type="wicri:Area/Istex/Corpus">001090</idno>
</publicationStmt>
<sourceDesc><biblStruct><analytic><title level="a" type="main" xml:lang="en">Sensor network security for pervasive e‐health</title>
<author><name sortKey="Garcia Orchon, Oscar" sort="Garcia Orchon, Oscar" uniqKey="Garcia Orchon O" first="Oscar" last="Garcia Orchon">Oscar Garcia Orchon</name>
<affiliation><mods:affiliation>Philips Research Europe, Distributed Sensor Systems, Eindhoven, The Netherlands</mods:affiliation>
</affiliation>
</author>
<author><name sortKey="Falck, Thomas" sort="Falck, Thomas" uniqKey="Falck T" first="Thomas" last="Falck">Thomas Falck</name>
<affiliation><mods:affiliation>Philips Research Europe, Distributed Sensor Systems, Eindhoven, The Netherlands</mods:affiliation>
</affiliation>
</author>
<author><name sortKey="Wehrle, Klaus" sort="Wehrle, Klaus" uniqKey="Wehrle K" first="Klaus" last="Wehrle">Klaus Wehrle</name>
<affiliation><mods:affiliation>RWTH Aachen University, Distributed Systems, Aachen, Germany</mods:affiliation>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series><title level="j">Security and Communication Networks</title>
<title level="j" type="abbrev">Security Comm. Networks</title>
<idno type="ISSN">1939-0114</idno>
<idno type="eISSN">1939-0122</idno>
<imprint><publisher>John Wiley & Sons, Ltd</publisher>
<pubPlace>Chichester, UK</pubPlace>
<date type="published" when="2011-11">2011-11</date>
<biblScope unit="volume">4</biblScope>
<biblScope unit="issue">11</biblScope>
<biblScope unit="page" from="1257">1257</biblScope>
<biblScope unit="page" to="1273">1273</biblScope>
</imprint>
<idno type="ISSN">1939-0114</idno>
</series>
<idno type="istex">A06A6C491E1817291DF5CF36DFD564BAF8C9D86B</idno>
<idno type="DOI">10.1002/sec.247</idno>
<idno type="ArticleID">SEC247</idno>
</biblStruct>
</sourceDesc>
<seriesStmt><idno type="ISSN">1939-0114</idno>
</seriesStmt>
</fileDesc>
<profileDesc><textClass><keywords scheme="KwdEn" xml:lang="en"><term>cryptography</term>
<term>medical sensor network</term>
<term>patient area network</term>
<term>pervasive healthcare</term>
<term>security</term>
</keywords>
</textClass>
<langUsage><language ident="en">en</language>
</langUsage>
</profileDesc>
</teiHeader>
<front><div type="abstract" xml:lang="en">Ubiquitous 24/7 health monitoring systems based on wireless medical sensors are going to play a key role for pervasive e‐health applications. These systems allow care givers to early detect and act on signs of patients' clinical deterioration improving quality of care in a reliable unobtrusive and cost effective way. Ensuring the privacy and security of the exchanged information is challenging in pervasive e‐health environments due to the resource constraints of tiny wireless medical sensors and operational requirements such as user mobility, strict latency needs, or the multitude of parties involved in the system. This paper describes a comprehensive and practical security framework for these pervasive health monitoring systems. We distinguish three layers addressing the specific security needs at the patient area network, medical sensor network, and back‐end levels. Thereby our architecture accommodates the healthcare institution‐centric approach predominant today while making provisions for the more patient‐centric vision of pervasive e‐health environments. The tailored security mechanisms for each individual layer as well as their interworking are presented and evaluated in detail. The analysis shows that our proposed security framework allows the deployment of wireless medical sensor networks in a very efficient way. Copyright © 2010 John Wiley & Sons, Ltd.</div>
</front>
</TEI>
<istex><corpusName>wiley</corpusName>
<author><json:item><name>Oscar Garcia‐Morchon</name>
<affiliations><json:string>Philips Research Europe, Distributed Sensor Systems, Eindhoven, The Netherlands</json:string>
</affiliations>
</json:item>
<json:item><name>Thomas Falck</name>
<affiliations><json:string>Philips Research Europe, Distributed Sensor Systems, Eindhoven, The Netherlands</json:string>
</affiliations>
</json:item>
<json:item><name>Klaus Wehrle</name>
<affiliations><json:string>RWTH Aachen University, Distributed Systems, Aachen, Germany</json:string>
</affiliations>
</json:item>
</author>
<subject><json:item><lang><json:string>eng</json:string>
</lang>
<value>pervasive healthcare</value>
</json:item>
<json:item><lang><json:string>eng</json:string>
</lang>
<value>medical sensor network</value>
</json:item>
<json:item><lang><json:string>eng</json:string>
</lang>
<value>patient area network</value>
</json:item>
<json:item><lang><json:string>eng</json:string>
</lang>
<value>security</value>
</json:item>
<json:item><lang><json:string>eng</json:string>
</lang>
<value>cryptography</value>
</json:item>
</subject>
<articleId><json:string>SEC247</json:string>
</articleId>
<language><json:string>eng</json:string>
</language>
<qualityIndicators><score>7.376</score>
<pdfVersion>1.3</pdfVersion>
<pdfPageSize>595 x 782 pts</pdfPageSize>
<refBibsNative>true</refBibsNative>
<keywordCount>5</keywordCount>
<abstractCharCount>1384</abstractCharCount>
<pdfWordCount>11232</pdfWordCount>
<pdfCharCount>66148</pdfCharCount>
<pdfPageCount>17</pdfPageCount>
<abstractWordCount>198</abstractWordCount>
</qualityIndicators>
<title>Sensor network security for pervasive e‐health</title>
<genre.original><json:string>article</json:string>
</genre.original>
<genre><json:string>article</json:string>
</genre>
<host><volume>4</volume>
<publisherId><json:string>SEC</json:string>
</publisherId>
<pages><total>17</total>
<last>1273</last>
<first>1257</first>
</pages>
<issn><json:string>1939-0114</json:string>
</issn>
<issue>11</issue>
<subject><json:item><value>Special Issue Paper</value>
</json:item>
</subject>
<genre><json:string>journal</json:string>
</genre>
<language><json:string>unknown</json:string>
</language>
<eissn><json:string>1939-0122</json:string>
</eissn>
<title>Security and Communication Networks</title>
<doi><json:string>10.1002/(ISSN)1939-0122</json:string>
</doi>
</host>
<publicationDate>2011</publicationDate>
<copyrightDate>2011</copyrightDate>
<doi><json:string>10.1002/sec.247</json:string>
</doi>
<id>A06A6C491E1817291DF5CF36DFD564BAF8C9D86B</id>
<fulltext><json:item><original>true</original>
<mimetype>application/pdf</mimetype>
<extension>pdf</extension>
<uri>https://api.istex.fr/document/A06A6C491E1817291DF5CF36DFD564BAF8C9D86B/fulltext/pdf</uri>
</json:item>
<json:item><original>false</original>
<mimetype>application/zip</mimetype>
<extension>zip</extension>
<uri>https://api.istex.fr/document/A06A6C491E1817291DF5CF36DFD564BAF8C9D86B/fulltext/zip</uri>
</json:item>
<istex:fulltextTEI uri="https://api.istex.fr/document/A06A6C491E1817291DF5CF36DFD564BAF8C9D86B/fulltext/tei"><teiHeader><fileDesc><titleStmt><title level="a" type="main" xml:lang="en">Sensor network security for pervasive e‐health</title>
</titleStmt>
<publicationStmt><authority>ISTEX</authority>
<publisher>John Wiley & Sons, Ltd</publisher>
<pubPlace>Chichester, UK</pubPlace>
<availability><p>WILEY</p>
</availability>
<date>2011</date>
</publicationStmt>
<sourceDesc><biblStruct type="inbook"><analytic><title level="a" type="main" xml:lang="en">Sensor network security for pervasive e‐health</title>
<author><persName><forename type="first">Oscar</forename>
<surname>Garcia‐Morchon</surname>
</persName>
<note type="correspondence"><p>Correspondence: Distributed Sensor Systems, Philips Research Europe, HTC 34, 1.067, 5656 AE, Eindhoven, The Netherlands.</p>
</note>
<affiliation>Philips Research Europe, Distributed Sensor Systems, Eindhoven, The Netherlands</affiliation>
</author>
<author><persName><forename type="first">Thomas</forename>
<surname>Falck</surname>
</persName>
<affiliation>Philips Research Europe, Distributed Sensor Systems, Eindhoven, The Netherlands</affiliation>
</author>
<author><persName><forename type="first">Klaus</forename>
<surname>Wehrle</surname>
</persName>
<affiliation>RWTH Aachen University, Distributed Systems, Aachen, Germany</affiliation>
</author>
</analytic>
<monogr><title level="j">Security and Communication Networks</title>
<title level="j" type="abbrev">Security Comm. Networks</title>
<idno type="pISSN">1939-0114</idno>
<idno type="eISSN">1939-0122</idno>
<idno type="DOI">10.1002/(ISSN)1939-0122</idno>
<imprint><publisher>John Wiley & Sons, Ltd</publisher>
<pubPlace>Chichester, UK</pubPlace>
<date type="published" when="2011-11"></date>
<biblScope unit="volume">4</biblScope>
<biblScope unit="issue">11</biblScope>
<biblScope unit="page" from="1257">1257</biblScope>
<biblScope unit="page" to="1273">1273</biblScope>
</imprint>
</monogr>
<idno type="istex">A06A6C491E1817291DF5CF36DFD564BAF8C9D86B</idno>
<idno type="DOI">10.1002/sec.247</idno>
<idno type="ArticleID">SEC247</idno>
</biblStruct>
</sourceDesc>
</fileDesc>
<profileDesc><creation><date>2011</date>
</creation>
<langUsage><language ident="en">en</language>
</langUsage>
<abstract xml:lang="en"><p>Ubiquitous 24/7 health monitoring systems based on wireless medical sensors are going to play a key role for pervasive e‐health applications. These systems allow care givers to early detect and act on signs of patients' clinical deterioration improving quality of care in a reliable unobtrusive and cost effective way. Ensuring the privacy and security of the exchanged information is challenging in pervasive e‐health environments due to the resource constraints of tiny wireless medical sensors and operational requirements such as user mobility, strict latency needs, or the multitude of parties involved in the system. This paper describes a comprehensive and practical security framework for these pervasive health monitoring systems. We distinguish three layers addressing the specific security needs at the patient area network, medical sensor network, and back‐end levels. Thereby our architecture accommodates the healthcare institution‐centric approach predominant today while making provisions for the more patient‐centric vision of pervasive e‐health environments. The tailored security mechanisms for each individual layer as well as their interworking are presented and evaluated in detail. The analysis shows that our proposed security framework allows the deployment of wireless medical sensor networks in a very efficient way. Copyright © 2010 John Wiley & Sons, Ltd.</p>
</abstract>
<abstract xml:lang="en" style="graphical"><p>Our security framework for pervasive e‐health is divided into three layers addressing the specific security needs at the patient area network, medical sensor network, and backend levels. Thereby our architecture accommodates the healthcare institution‐centric approach predominant today while making provisions for the more patient‐centric vision of pervasive e‐health environments. The tailored security mechanisms for each individual layer as well as their interworking are presented and evaluated in detail showing their practical feasibility.</p>
</abstract>
<textClass xml:lang="en"><keywords scheme="keyword"><list><head>keywords</head>
<item><term>pervasive healthcare</term>
</item>
<item><term>medical sensor network</term>
</item>
<item><term>patient area network</term>
</item>
<item><term>security</term>
</item>
<item><term>cryptography</term>
</item>
</list>
</keywords>
</textClass>
<textClass><keywords scheme="Journal Subject"><list><head>article-category</head>
<item><term>Special Issue Paper</term>
</item>
</list>
</keywords>
</textClass>
</profileDesc>
<revisionDesc><change when="2011-11">Published</change>
</revisionDesc>
</teiHeader>
</istex:fulltextTEI>
<json:item><original>false</original>
<mimetype>text/plain</mimetype>
<extension>txt</extension>
<uri>https://api.istex.fr/document/A06A6C491E1817291DF5CF36DFD564BAF8C9D86B/fulltext/txt</uri>
</json:item>
</fulltext>
<metadata><istex:metadataXml wicri:clean="Wiley, elements deleted: body"><istex:xmlDeclaration>version="1.0" encoding="UTF-8" standalone="yes"</istex:xmlDeclaration>
<istex:document><component type="serialArticle" version="2.0" xml:lang="en" xml:id="sec247"><header xml:id="sec247-hdr-0001"><publicationMeta level="product"><publisherInfo><publisherName>John Wiley & Sons, Ltd</publisherName>
<publisherLoc>Chichester, UK</publisherLoc>
</publisherInfo>
<doi>10.1002/(ISSN)1939-0122</doi>
<issn type="print">1939-0114</issn>
<issn type="electronic">1939-0122</issn>
<idGroup><id type="product" value="SEC"></id>
</idGroup>
<titleGroup><title type="main" xml:lang="en" sort="SECURITY AND COMMUNICATION NETWORKS">Security and Communication Networks</title>
<title type="short">Security Comm. Networks</title>
</titleGroup>
</publicationMeta>
<publicationMeta level="part" position="110"><doi>10.1002/sec.v4.11</doi>
<copyright ownership="publisher">Copyright © 2011 John Wiley & Sons, Ltd.</copyright>
<numberingGroup><numbering type="journalVolume" number="4">4</numbering>
<numbering type="journalIssue">11</numbering>
</numberingGroup>
<coverDate startDate="2011-11">November 2011</coverDate>
</publicationMeta>
<publicationMeta level="unit" type="article" position="40" status="forIssue"><doi>10.1002/sec.247</doi>
<idGroup><id type="unit" value="SEC247"></id>
</idGroup>
<countGroup><count type="pageTotal" number="17"></count>
</countGroup>
<titleGroup><title type="articleCategory">Special Issue Paper</title>
<title type="tocHeading1">Special Issue Papers</title>
</titleGroup>
<copyright ownership="publisher">Copyright © 2010 John Wiley & Sons, Ltd.</copyright>
<eventGroup><event type="xmlConverted" agent="Converter:JWSART34_TO_WML3G version:2.3.25.1 mode:FullText mathml2tex" date="2011-10-19"></event>
<event type="xmlCorrected" agent="SPi Global" date="2011-10-19"></event>
<event type="publishedOnlineEarlyUnpaginated" date="2010-12-13"></event>
<event type="publishedOnlineFinalForm" date="2011-10-21"></event>
<event type="firstOnline" date="2010-12-13"></event>
<event type="xmlConverted" agent="Converter:WILEY_ML3G_TO_WILEY_ML3GV2 version:3.8.8" date="2014-02-08"></event>
<event type="xmlConverted" agent="Converter:WML3G_To_WML3G version:4.1.7 mode:FullText,remove_FC" date="2014-11-03"></event>
</eventGroup>
<numberingGroup><numbering type="pageFirst">1257</numbering>
<numbering type="pageLast">1273</numbering>
</numberingGroup>
<correspondenceTo>Distributed Sensor Systems, Philips Research Europe, HTC 34, 1.067, 5656 AE, Eindhoven, The Netherlands.</correspondenceTo>
<linkGroup><link type="toTypesetVersion" href="file:SEC.SEC247.pdf"></link>
</linkGroup>
</publicationMeta>
<contentMeta><titleGroup><title type="main" xml:lang="en">Sensor network security for pervasive e‐health</title>
<title type="short" xml:lang="en">Sensor network security for pervasive e‐health</title>
</titleGroup>
<creators><creator xml:id="sec247-cr-0001" creatorRole="author" affiliationRef="#sec247-aff-0001" corresponding="yes"><personName><givenNames>Oscar</givenNames>
<familyName>Garcia‐Morchon</familyName>
</personName>
<contactDetails><email>Oscar.Garcia@Philips.com</email>
</contactDetails>
</creator>
<creator xml:id="sec247-cr-0002" creatorRole="author" affiliationRef="#sec247-aff-0001"><personName><givenNames>Thomas</givenNames>
<familyName>Falck</familyName>
</personName>
</creator>
<creator xml:id="sec247-cr-0003" creatorRole="author" affiliationRef="#sec247-aff-0002"><personName><givenNames>Klaus</givenNames>
<familyName>Wehrle</familyName>
</personName>
</creator>
</creators>
<affiliationGroup xml:id="sec247-affgp-0001"><affiliation xml:id="sec247-aff-0001" countryCode="NL" type="organization"><unparsedAffiliation>Philips Research Europe, Distributed Sensor Systems, Eindhoven, The Netherlands</unparsedAffiliation>
</affiliation>
<affiliation xml:id="sec247-aff-0002" countryCode="DE" type="organization"><unparsedAffiliation>RWTH Aachen University, Distributed Systems, Aachen, Germany</unparsedAffiliation>
</affiliation>
</affiliationGroup>
<keywordGroup xml:lang="en" type="author"><keyword xml:id="sec247-kwd-0001">pervasive healthcare</keyword>
<keyword xml:id="sec247-kwd-0002">medical sensor network</keyword>
<keyword xml:id="sec247-kwd-0003">patient area network</keyword>
<keyword xml:id="sec247-kwd-0004">security</keyword>
<keyword xml:id="sec247-kwd-0005">cryptography</keyword>
</keywordGroup>
<abstractGroup><abstract xml:id="sec247-abs-0001" type="main" xml:lang="en"><title type="main">ABSTRACT</title>
<p xml:id="sec247-para-0001">Ubiquitous 24/7 health monitoring systems based on wireless medical sensors are going to play a key role for pervasive e‐health applications. These systems allow care givers to early detect and act on signs of patients' clinical deterioration improving quality of care in a reliable unobtrusive and cost effective way. Ensuring the privacy and security of the exchanged information is challenging in pervasive e‐health environments due to the resource constraints of tiny wireless medical sensors and operational requirements such as user mobility, strict latency needs, or the multitude of parties involved in the system. This paper describes a comprehensive and practical security framework for these pervasive health monitoring systems. We distinguish three layers addressing the specific security needs at the patient area network, medical sensor network, and back‐end levels. Thereby our architecture accommodates the healthcare institution‐centric approach predominant today while making provisions for the more patient‐centric vision of pervasive e‐health environments. The tailored security mechanisms for each individual layer as well as their interworking are presented and evaluated in detail. The analysis shows that our proposed security framework allows the deployment of wireless medical sensor networks in a very efficient way. Copyright © 2010 John Wiley & Sons, Ltd.</p>
</abstract>
<abstract xml:id="sec247-abs-0002" type="graphical" xml:lang="en"><p xml:id="sec247-para-0002">Our security framework for pervasive e‐health is divided into three layers addressing the specific security needs at the patient area network, medical sensor network, and backend levels. Thereby our architecture accommodates the healthcare institution‐centric approach predominant today while making provisions for the more patient‐centric vision of pervasive e‐health environments. The tailored security mechanisms for each individual layer as well as their interworking are presented and evaluated in detail showing their practical feasibility. <blockFixed type="graphic"><mediaResourceGroup><mediaResource alt="image" href="urn:x-wiley:19390114:media:sec247:sec247-gra-0001"></mediaResource>
<mediaResource mimeType="image/jpg" rendition="webOriginal" alt="image" href=""></mediaResource>
</mediaResourceGroup>
</blockFixed>
</p>
</abstract>
</abstractGroup>
</contentMeta>
</header>
</component>
</istex:document>
</istex:metadataXml>
<mods version="3.6"><titleInfo lang="en"><title>Sensor network security for pervasive e‐health</title>
</titleInfo>
<titleInfo type="abbreviated" lang="en"><title>Sensor network security for pervasive e‐health</title>
</titleInfo>
<titleInfo type="alternative" contentType="CDATA" lang="en"><title>Sensor network security for pervasive e‐health</title>
</titleInfo>
<name type="personal"><namePart type="given">Oscar</namePart>
<namePart type="family">Garcia‐Morchon</namePart>
<affiliation>Philips Research Europe, Distributed Sensor Systems, Eindhoven, The Netherlands</affiliation>
<description>Correspondence: Distributed Sensor Systems, Philips Research Europe, HTC 34, 1.067, 5656 AE, Eindhoven, The Netherlands.</description>
<role><roleTerm type="text">author</roleTerm>
</role>
</name>
<name type="personal"><namePart type="given">Thomas</namePart>
<namePart type="family">Falck</namePart>
<affiliation>Philips Research Europe, Distributed Sensor Systems, Eindhoven, The Netherlands</affiliation>
<role><roleTerm type="text">author</roleTerm>
</role>
</name>
<name type="personal"><namePart type="given">Klaus</namePart>
<namePart type="family">Wehrle</namePart>
<affiliation>RWTH Aachen University, Distributed Systems, Aachen, Germany</affiliation>
<role><roleTerm type="text">author</roleTerm>
</role>
</name>
<typeOfResource>text</typeOfResource>
<genre type="article" displayLabel="article"></genre>
<originInfo><publisher>John Wiley & Sons, Ltd</publisher>
<place><placeTerm type="text">Chichester, UK</placeTerm>
</place>
<dateIssued encoding="w3cdtf">2011-11</dateIssued>
<copyrightDate encoding="w3cdtf">2011</copyrightDate>
</originInfo>
<language><languageTerm type="code" authority="rfc3066">en</languageTerm>
<languageTerm type="code" authority="iso639-2b">eng</languageTerm>
</language>
<physicalDescription><internetMediaType>text/html</internetMediaType>
</physicalDescription>
<abstract lang="en">Ubiquitous 24/7 health monitoring systems based on wireless medical sensors are going to play a key role for pervasive e‐health applications. These systems allow care givers to early detect and act on signs of patients' clinical deterioration improving quality of care in a reliable unobtrusive and cost effective way. Ensuring the privacy and security of the exchanged information is challenging in pervasive e‐health environments due to the resource constraints of tiny wireless medical sensors and operational requirements such as user mobility, strict latency needs, or the multitude of parties involved in the system. This paper describes a comprehensive and practical security framework for these pervasive health monitoring systems. We distinguish three layers addressing the specific security needs at the patient area network, medical sensor network, and back‐end levels. Thereby our architecture accommodates the healthcare institution‐centric approach predominant today while making provisions for the more patient‐centric vision of pervasive e‐health environments. The tailored security mechanisms for each individual layer as well as their interworking are presented and evaluated in detail. The analysis shows that our proposed security framework allows the deployment of wireless medical sensor networks in a very efficient way. Copyright © 2010 John Wiley & Sons, Ltd.</abstract>
<abstract type="graphical" lang="en">Our security framework for pervasive e‐health is divided into three layers addressing the specific security needs at the patient area network, medical sensor network, and backend levels. Thereby our architecture accommodates the healthcare institution‐centric approach predominant today while making provisions for the more patient‐centric vision of pervasive e‐health environments. The tailored security mechanisms for each individual layer as well as their interworking are presented and evaluated in detail showing their practical feasibility.</abstract>
<subject lang="en"><genre>keywords</genre>
<topic>pervasive healthcare</topic>
<topic>medical sensor network</topic>
<topic>patient area network</topic>
<topic>security</topic>
<topic>cryptography</topic>
</subject>
<relatedItem type="host"><titleInfo><title>Security and Communication Networks</title>
</titleInfo>
<titleInfo type="abbreviated"><title>Security Comm. Networks</title>
</titleInfo>
<genre type="journal">journal</genre>
<subject><genre>article-category</genre>
<topic>Special Issue Paper</topic>
</subject>
<identifier type="ISSN">1939-0114</identifier>
<identifier type="eISSN">1939-0122</identifier>
<identifier type="DOI">10.1002/(ISSN)1939-0122</identifier>
<identifier type="PublisherID">SEC</identifier>
<part><date>2011</date>
<detail type="volume"><caption>vol.</caption>
<number>4</number>
</detail>
<detail type="issue"><caption>no.</caption>
<number>11</number>
</detail>
<extent unit="pages"><start>1257</start>
<end>1273</end>
<total>17</total>
</extent>
</part>
</relatedItem>
<identifier type="istex">A06A6C491E1817291DF5CF36DFD564BAF8C9D86B</identifier>
<identifier type="DOI">10.1002/sec.247</identifier>
<identifier type="ArticleID">SEC247</identifier>
<accessCondition type="use and reproduction" contentType="copyright">Copyright © 2011 John Wiley & Sons, Ltd.Copyright © 2010 John Wiley & Sons, Ltd.</accessCondition>
<recordInfo><recordContentSource>WILEY</recordContentSource>
<recordOrigin>John Wiley & Sons, Ltd</recordOrigin>
</recordInfo>
</mods>
</metadata>
<serie></serie>
</istex>
</record>
Pour manipuler ce document sous Unix (Dilib)
EXPLOR_STEP=$WICRI_ROOT/Ticri/CIDE/explor/OcrV1/Data/Istex/Corpus
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 001090 | SxmlIndent | more
Ou
HfdSelect -h $EXPLOR_AREA/Data/Istex/Corpus/biblio.hfd -nk 001090 | SxmlIndent | more
Pour mettre un lien sur cette page dans le réseau Wicri
{{Explor lien |wiki= Ticri/CIDE |area= OcrV1 |flux= Istex |étape= Corpus |type= RBID |clé= ISTEX:A06A6C491E1817291DF5CF36DFD564BAF8C9D86B |texte= Sensor network security for pervasive e‐health }}
This area was generated with Dilib version V0.6.32. |