Skip to main content

Security and Privacy Issues in Remote Healthcare Systems Using Wireless Body Area Networks

  • Chapter
  • First Online:
Book cover Body Area Network Challenges and Solutions

Part of the book series: EAI/Springer Innovations in Communication and Computing ((EAISICC))

Abstract

In recent years, the advancement in wireless sensor networks which has led to body area networks (BAN) has become an emergent research technology. A BAN allows for remote health monitoring of patients. Patient monitoring is possible by deploying the low-power sensor nodes on human body as implant or an external wearable gadget. A huge amount of health data generated during the treatment process has been maintained as electronic healthcare record (EHCR) systems. To enhance the service provided by healthcare sectors, EHCRs could be possibly shared to a variability of users. This process has significant privacy and security issues related to its use in daily life. A large body of research is ongoing to derive standards and solutions to solve the aforementioned problems, by far generating meager solutions. In this chapter, a systematic literature review is conducted on the security and privacy issues of EHCR systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. M. Barua et al., An efficient and secure patient-centric access control scheme for eHealth care system in computer communications workshops, in International IEEE Conference (2011)

    Google Scholar 

  2. J.L. Fernández-Alemán et al., Security and privacy in electronic health records: a systematic literature review. J. Biomed. Inform., 541–562 (2013)

    Article  Google Scholar 

  3. K. Zhang, X.S. Shen, Security and Privacy for Mobile Healthcare Networks (Springer, Berlin, 2015)

    Book  Google Scholar 

  4. S.S. Shinde, D. Patil, Review on security and privacy for mobile healthcare networks: from a quality of protection perspective. Int. J. Eng. Res. 3, 6 (2015)

    Google Scholar 

  5. S. Om, M. Talib, Wireless ad-hoc network under black-hole attack. Int. J. Digital Inform. Wireless Commun. 2011, 591–596 (2011)

    Google Scholar 

  6. K. Habib, A. Torjusen, W. Leister, Security analysis of a patient monitoring system for the Internet of Things in eHealth, in Proceedings of the International Conference on eHealth, Telemedicine, and Social Medicine (2015)

    Google Scholar 

  7. S. Saleem, S. Ullah, K.S. Kwak, A study of IEEE 802.15.4 security framework for wireless body area networks. J. Sens., 1383–1395 (2011)

    Article  Google Scholar 

  8. K. Chelli, Security issues in wireless sensor networks: attacks and counter measures, in Proceedings of the World Congress on Engineering (2015)

    Google Scholar 

  9. P. Kumar, H.J. Lee, Security issues in healthcare applications using wireless medical sensor networks: a survey. J. Sens., 55–91 (2011)

    Article  Google Scholar 

  10. S. Salee, S. Ullah, H.S. Yoo, On the security issues in wireless body area networks. JDCTA 3, 178–184 (2009)

    Google Scholar 

  11. R. Ramli, N. Zakaria, P. Sumari, Privacy issues in pervasive healthcare monitoring system: a review. World Acad Sci Eng Technol 4, 741–747 (2010)

    Google Scholar 

  12. J. Partala et al., Security threats against the transmission chain of a medical health monitoring system in e-Health Networking, Applications & Services, in 15th IEEE International Conference (2013)

    Google Scholar 

  13. P. Niksaz, M. Branch, Wireless body area networks: attacks and countermeasures. Int. J. Sci. Eng. Res. 6(9), 556–568 (2015)

    Google Scholar 

  14. T.H. Bonab, M. Masdari, Security attacks in wireless body area networks: challenges and issues, Academic royale des sciences d outre-mer bulletin des seances, pp. 100–107 (2015)

    Google Scholar 

  15. C. Santos-Pereira et al., A secure RBAC mobile agent access control model for healthcare institutions, in Proceedings of the 26th IEEE International Symposium on Computer-Based Medical Systems (2013)

    Google Scholar 

  16. R. Zhan, L. Liu, Security models and requirements for healthcare application clouds, in IEEE 3rd International Conference on Cloud Computing (2010)

    Google Scholar 

  17. G. Drosatos et al., Towards privacy by design in personal e-Health systems (2016)

    Google Scholar 

  18. N. Fatema, R. Brad, Security requirements, counter attacks and projects in healthcare applications using WSNs—a review. arXiv 1406, 1795 (2014)

    Google Scholar 

  19. K. Wellington, Cyber-attacks on medical devices and hospital networks: legal gaps and regulatory solutions. Santa Clara High Tech. L. J. 139 (2013)

    Google Scholar 

  20. S. Yu et al., Achieving secure, scalable, and fine-grained data access control in cloud computing, in INFOCOM, Proceedings IEEE (2010)

    Google Scholar 

  21. K. Zhang et al., Security and privacy for mobile healthcare networks: from a quality of protection perspective. IEEE Wirel. Commun., 104–112 (2015)

    Article  Google Scholar 

  22. K. Zhang et al., Sybil attacks and their defences in the internet of things. IEEE Internet Things J 1, 372–383 (2014)

    Article  Google Scholar 

  23. J. Wang et al., A research on security and privacy issues for patient related data in medical organization system. Int. J. Secur. Appl., 287–298 (2013)

    Google Scholar 

  24. L. Sun, H. Wang: A purpose based usage access control model for e-healthcare services, in International Conference on Data and Knowledge Engineering (ICDKE) (2011)

    Google Scholar 

  25. A. Altamimi, Sec FHIR: a security specification model for fast healthcare interoperability resources. Int. J. Adv. Comput. Sci. Appl. 7, 350–355 (2016)

    Google Scholar 

  26. T. Sahama, L. Simpson, B. Lane: Security and privacy in eHealth: is it possible? In e-Health networking, applications & services, in IEEE 15th International Conference (2013), pp. 249–253

    Google Scholar 

  27. N. Leyla, W. Mac Caull, A Personalized Access Control Framework for Workflow-Based Health Care Information. International Conference on Business Process Management (Springer, Berlin, 2011), pp. 273–284

    Google Scholar 

  28. A. Boonyarattaphan, A. Bai, S. Chung, A security framework for e-health service authentication and e-health data transmission, in 9th International Symposium IEEE on Communications and Information Technology (2009)

    Google Scholar 

  29. O. Garcia-Morchon, W. Wehrle, Efficient and context-aware access control for pervasive medical sensor networks, in 8th IEEE International Conference Pervasive Computing and Communications Workshops (PERCOM Workshops) (2010)

    Google Scholar 

  30. S. Amini et al., Toward a security model for a body sensor platform, in IEEE International Conference on Consumer Electronics (ICCE), (2011)

    Google Scholar 

  31. H.A. Maw, H. Xiao, B. Christianson, An adaptive access control model for medical data in wireless sensor networks. IEEE 15th International Conference on e-Health Networking, Applications & Services (Healthcom) (2013)

    Google Scholar 

  32. T. Linciya, K. Anandkumar, Enhanced three tier security architecture for WSN against mobile sink replication attacks using mutual authentication scheme. Int. J. Wireless Mobile Netw. 5, 81 (2013)

    Article  Google Scholar 

  33. A. Rasheed, R.N. Mahapatra, The three-tier security scheme in wireless sensor networks with mobile sinks, in IEEE Transactions on Parallel and Distributed Systems (2012), pp. 958–965

    Article  Google Scholar 

  34. S.N. Ramli et al., A biometric-based security for data authentication in wireless body area network (WBAN), in IEEE 15th International Conference on Advanced Communication Technology (ICACT) (2013)

    Google Scholar 

  35. K. Mu, L. Li, An efficient pair wise key pre distribution scheme for wireless sensor networks. J. Networks, 277–282 (2014)

    Google Scholar 

  36. A. Lehab, A.L. Rassan, N. Khan, Secure and energy efficient key management scheme for WBAN-A hybrid approach. Int. J. Comput. Sci. Netw. Secur. 11(6), 169–172 (2011)

    Google Scholar 

  37. M. Mohammed, F. Mohammed, A.B. Boucif, Trust key management scheme for wireless body area networks. J. Netw. Secur. 12(2), 75–83 (2011)

    Google Scholar 

  38. N. Kahani, K. Elgazzar, J.R. Cordy, Authentication and access control in e-Health systems in the cloud

    Google Scholar 

  39. Z. Guan, T. Yang, X. Du, Achieving secure and efficient data access control for cloud-integrated body sensor networks. Int. J. Distribut. Sens. Netw. 2015, 142 (2015)

    Google Scholar 

  40. M.A. Simplicio et al., Secure health: a delay-tolerant security framework for mobile health data collection. IEEE J. Biomed. Health Inform. 19, 761–772 (2015)

    Article  Google Scholar 

  41. D. Singelée, B. Latré, B. Braem, M. Peeters, M. De Soete, P. De Cleyn, B. Preneel, I. Moerman, C. Blondia, A secure cross-layer protocol for multi-hop wireless body area networks. J. Ad-hoc Mobile Wireless Netw. 2008, 94–107 (2008)

    Google Scholar 

  42. S.S. Iyengar, D. Aijan, P. Vamsi, R. Kannan, Data integrity protocol for sensor networks. Int. J. Distribut. Sens. Netw. 1(2), 205–214 (2005)

    Article  Google Scholar 

  43. K.R.R. Syed Muhammad et al., BARIT: a biometric based distributed key management approach for wireless body area networks. J. Sens. 10(4), 3911–3933 (2010)

    Google Scholar 

  44. V. Raghav, D. Saurabh, R. Shalini, S. Srinivas, A security suite for wireless body area networks. arXiv:1202.2171 4, 97 (2012)

    Google Scholar 

  45. W. Steve et al., Interoperability and security in wireless body area network infrastructures, in 27th Annual International Conference of Engineering in Medicine and Biology Society (2005), pp. 3837–3840

    Google Scholar 

  46. M.K.R.R. Syed, L. Young-Koo, H. Lee, S. Lee, BARI: a distributed key management approach for wireless body area networks. Int. Conf. Comput. Intell. Secur. 2, 324–329 (2009)

    Google Scholar 

  47. B. Mriimioy et al.: Secure and quality of service assurance scheduling scheme for wban with application to ehealth, in IEEE Conference on Wireless Communications and Networking (2011), pp. 1102–1106

    Google Scholar 

  48. L. Guo et al., Paas: a privacy-preserving attribute-based authentication system for ehealth networks, in International Conference of Distributed Computing Systems (ICDCS) (2012)

    Google Scholar 

  49. R. Gajanayake, R. Iannella, T. Sahama, Privacy oriented access control for electronic health records. J. Health Informat. 8, 15 (2014)

    Google Scholar 

  50. M. Barua, R. Lu, X. Shen, SPS: secure personal health information sharing with patient-centric access control in cloud computing, in IEEE Global Communications Conference (2013)

    Google Scholar 

  51. M.R. Kumar, M.D. Fathima, M. Mahendran, Personal health data storage protection on cloud using MA-ABE. Int. J. Comput. Appl. 75, 11–16 (2013)

    Google Scholar 

  52. H. Zhu et al., SPEMR: a new secure personal electronic medical record scheme with privilege separation, in IEEE International Conference on Communications Workshops (ICC) (2014)

    Google Scholar 

  53. V. Sunagar, C. Biradar, Securing Public Health Records in Cloud Computing Patient Centric and Fine Grained Data Access Control in Multi Owner Settings (2014)

    Google Scholar 

  54. W. Liu et al., Auditing and revocation enabled role-based access control over outsourced private EHRs in high performance computing and communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS), 2015 IEEE 12th International Conference on Embedded Software and Systems (ICESS) (2015)

    Google Scholar 

  55. J. Katz, Y. Lindell, Introduction to modern cryptography (CRC Press, Boca Raton, FL, 2014)

    MATH  Google Scholar 

  56. L. Jingwei, S.K. Kyung, Hybrid security mechanisms for wireless body area networks, in 2nd International Conference on Ubiquitous and Future Networks, (2010), pp. 98–103

    Google Scholar 

  57. F. Zubaydi et al., Security of mobile health (mHealth) systems, in IEEE 15th International Conference on Bioinformatics and Bioengineering (BIBE) (2015)

    Google Scholar 

  58. K.A. Nagaty, Mobile health care on a secured hybrid cloud. Cyber J 4, 1–9 (2014)

    Google Scholar 

  59. D. Kotz, A threat taxonomy for mHealth privacy in COMSNETS (2011)

    Google Scholar 

  60. S. Mare et al., Adapt-lite: privacy-aware, secure, and efficient mhealth sensing, in Proceedings of the 10th Annual ACM Workshop on Privacy in the Electronic Society (2011)

    Google Scholar 

  61. J. Sun et al., Security and privacy for mobile healthcare (m-Health) systems (Elsevier, Amsterdam, 2011)

    Google Scholar 

  62. L. Ren-Guey, C. Kuei-Chien, C. Shao-Shan, L. Hsin-Sheng, L. Chien-Chih, W. Ming-Shyan, A backup routing with wireless sensor network for bridge monitoring system. Measurement 40(1), 55–63 (2007)

    Article  Google Scholar 

  63. B. Jinsuk, S. Paul, J. Minho, H.-H. Fisher, A lightweight SCTP for partially reliable overlay video multicast service for mobile terminals. IEEE Trans. Multimedia 12(7), 754–766 (2010)

    Article  Google Scholar 

  64. L. Xiaohui, L. Xu, L. Rongxing, S. Qinghua, L. Xiaodong, Z. Weihua, Exploiting prediction to enable secure and reliable routing in wireless body area networks, in Proceedings of IEEE INFOCOM (2012), pp. 388–396

    Google Scholar 

  65. B. Julio et al., Using artificial intelligence in routing schemes for wireless networks. J. Comput. Commun. 30(14), 2802–2811 (2007)

    Google Scholar 

  66. Z. Xiuming, H. Song, M. Aloysius, H. Pei-Chi Huang, C. Deji, Mbstar: a real-time communication protocol for wireless body area networks, in 23rd Euro Micro Conferene on Real-Time System (2011), pp. 57–66

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Nidhya, R., Karthik, S. (2019). Security and Privacy Issues in Remote Healthcare Systems Using Wireless Body Area Networks. In: Maheswar, R., Kanagachidambaresan, G., Jayaparvathy, R., Thampi, S. (eds) Body Area Network Challenges and Solutions. EAI/Springer Innovations in Communication and Computing. Springer, Cham. https://doi.org/10.1007/978-3-030-00865-9_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-00865-9_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-00864-2

  • Online ISBN: 978-3-030-00865-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics