Security in Wireless Medical Networks

نویسنده

  • Sigurd Eskeland
چکیده

In the medical scenario, electronic information management and wireless computer networks provide ubiquitous access possibilities to medical databases which may comprise hundreds of thousands of electronic patient records (EPRs). Such records may contain personal and highly sensitive patient data, and it is therefore necessary to limit the accessibility of such data to only concerning medical personnel. Criteria for granting (or authorization) of EPR access should be based on legitimacy and the need-to-know principle, meaning that only medical personnel that is going to provide medical care to a given patient should be granted access to the necessary medical data of the concerning patient they are going to provide care for. EPR access control based on such criteria would help to prevent illegitimate persons from accessing patient data. This could be implemented by means of patient consent, where EPR access is provided to legitimate medical practitioners due to the consent of the pertaining patient. It could also be implemented by group consensus, where the consensus of a minimum number of concerned participants could qualify for authorization of EPR access. Hence, a given number of associated medical practitioners, e.g., a medical team, could be recognized as a proper basis for trust. Since medical care is often provided by medical teams, the consensus of a minimum number of the team members would thus act as a qualifying criterion for such teams to acquire EPR access. The hierarchical ranking of medical practitioners is significant, since higher ranking implies more privileges. Medical practitioners of higher ranking (e.g., medical doctors) are accordingly in position to be entrusted access to more sensitive medical data than practitioners of lower ranking (e.g., nurses). An essential hierarchical security requirement is to ensure that the medical practitioners are only granted access to EPR data whose confidentiality level is in agreement with the user ranking, and to EPR data associated with the underlying confidentiality levels. In addition to the mentioned accessibility issues, protection of communicated data to and among multiple users is likewise of essential interest in the medical scenario. In this thesis, we present a number of cryptographic methods for secure establishment of EPR access according to the mentioned issues, and methods for secure transmission of medical data over insecure wireless networks.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Toward an energy efficient PKC-based key management system for wireless sensor networks

Due to wireless nature and hostile environment, providing of security is a critical and vital task in wireless sensor networks (WSNs). It is known that key management is an integral part of a secure network. Unfortunately, in most of the previous methods, security is compromised in favor of reducing energy consumption. Consequently, they lack perfect resilience and are not fit for applications ...

متن کامل

Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System

Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...

متن کامل

A Lightweight Intrusion Detection System Based on Specifications to Improve Security in Wireless Sensor Networks

Due to the prevalence of Wireless Sensor Networks (WSNs) in the many mission-critical applications such as military areas, security has been considered as one of the essential parameters in Quality of Service (QoS), and Intrusion Detection System (IDS) is considered as a fundamental requirement for security in these networks. This paper presents a lightweight Intrusion Detection System to prote...

متن کامل

An efficient solution for management of pre-distribution in wireless sensor networks

A sensor node is composed of different parts including processing units, sensor, transmitter, receiver, and security unit. There are many nodes in a sensor unit. These networks can be used for military, industrial, medicine, environmental, house, and many other applications. These nodes may be established in the lands of enemies to monitor the relations. Hence, it is important to consider conse...

متن کامل

The Role of Packet Tracer in Learning Wireless Networks and Managing IoT Devices

Wireless networks, Internet of Things (IoT), Internet of Everything (IoE), and smart homes have become extremely important terms in our present-day life. Most of the buildings, companies, institutions, and even homes depend onthese technologies for interaction, communication, automation, and everything surrounding humans. To understand the advanced topics in wireless networks and IoT devi...

متن کامل

LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring

Communication security of wireless sensor networks is achieved using cryptographic keys assigned to the nodes. Due to resource constraints in such networks, random key pre-distribution schemes are of high interest. Although in most of these schemes no location information is considered, there are scenarios that location information can be obtained by nodes after their deployment. In this paper,...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016