DocumentCode
1044
Title
Hard and soft security provisioning for computationally weak pervasive computing systems in E-health
Author
Trcek, D. ; Brodnik, A.
Author_Institution
Univ. of Ljubljana, Ljubljana, Slovenia
Volume
20
Issue
4
fYear
2013
fDate
Aug-13
Firstpage
22
Lastpage
29
Abstract
We are witnessing increasing penetration of pervasive computing into business and personal environments. Its advances, among other things, enable new opportunities for better health services but, as a side effect, it introduces new threats to privacy. If anywhere, it is in the health care sector that privacy is of utmost importance. Knowing further that internet of things devices typically lack computing and energy resources, the need for providing appropriate privacy is a hard issue. This paper therefore addresses privacy for internet of things technologies by focusing on the most "primitive" members, bare sensors and RFIDs. Based on lessons learned in this domain, a strategy of incrementally adjusting existing protocols is adopted for deployment in the area of wireless medical sensors body area networks. By doing so, new contributions that are quantifiably lightweight and that enable privacy, together with confidential exchange of captured measured quantities, are provided. In addition to such hard security solutions, the paper addresses trust management methods as a complementary, soft mean for security provisioning. This latter contribution also paves the way for further development and for applications of pervasive computing in general.
Keywords
Internet of Things; biomedical communication; computer network security; data privacy; health care; medical computing; radiofrequency identification; sensor placement; wireless sensor networks; Internet of Things technology; RFID; bare sensors; body area network deployment; computationally weak pervasive computing systems; data privacy; e-health; electronic health; hard security provisioning; health care sector; primitive member; soft security provisioning; wireless medical sensor deployment; Computer security; Electronic medical records; Logic gates; Medical services; Pervasive computing; Protocols; Radiofrequency identification; Security; Wireless sensor networks;
fLanguage
English
Journal_Title
Wireless Communications, IEEE
Publisher
ieee
ISSN
1536-1284
Type
jour
DOI
10.1109/MWC.2013.6590047
Filename
6590047
Link To Document