Skip to main content

A Study of Security Requirements in Smart Home Healthcare Systems Using Wireless Sensor Networks

  • Conference paper
  • First Online:
  • 1021 Accesses

Abstract

Smart home healthcare are systems used to monitor patient in home by expecting and responding to their needs and granting their independence. This remote patient’s monitoring is becoming more feasible as specialized sensors can be placed inside homes. In fact, wireless sensor network are used to collect medical data such as vital signs and personal data to transmit it to the caregiver. Therefore, the preserving security and privacy of this sensitive information is very crucial. This is particularly challenging because of the specific characteristics of WSN (e.g. limited resources: energy, storage, computation, communication) and the specific smart home environment. This paper tends to analyze the security related issues in smart home healthcare systems and proposes security requirements for these systems. We highlight the security threats for networks in healthcare, discuss issues related to the existing security systems and also present the proposed and derived requirements of security in this context.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Yick, J., Mukherjee, B., Ghosal, D.: Wireless sensor network survey. Int. J. Comput. Telecommun. Netw. (ACM) 52, 2292–2330 (2008)

    Article  Google Scholar 

  2. Hussain, M.Z., Singh, M.P., Singh, R.K.: Analysis of lifetime of wireless sensor network. Int. J. Adv. Sci. Technol. (Springer) 53, 1 (2013)

    Google Scholar 

  3. Che Hamid, N.N.F.A.: Health care monitoring using wireless sensor network (H-caring). Ph.D. dissertation. Faculty of Electrical & Electronics Engineering. University Malaysia Pahang (2012)

    Google Scholar 

  4. Misic, J., Misic, V.B.: Security issues in wireless sensor networks used in clinical information systems. Wireless Netw. Secur. Sign Commun. Tech. (2007) https://doi.org/10.1007/978-0-387-33112-6_13

  5. Walters, J.P., Liang, Z., Shi, W., Chaudhary, V.: Wireless Sensor Network Security: A Survey, Security in Distributed, Grid, and Pervasive Computing. Auerbach Publications. CRC Press (2006)

    Google Scholar 

  6. Misic, J., Misic, V.B.: Security issues in wireless sensor networks used in clinical information systems. Wirel. Netw. Secur. Sign. Commun. Tech. (2007) https://doi.org/10.1007/978-0-387-33112-6_13

  7. Weippl, E., Holzinger, A., Tjoa, A.M.: Security aspects of ubiquitous computing in healthcare. Available online: http://www.springerlink.com/content/et5gt8088j388115/fulltext.pdf. Accessed on 10 June 2011

  8. Ameen, M.A., Liu, J., Kwak, K.: Security and privacy issues in wireless sensor networks for healthcare applications. J. Med. Syst. (2010). https://doi.org/10.1007/s10916-010-9449-4

    Article  Google Scholar 

  9. Chung, W.Y., Walia, G., Lee, Y.D., Myllyla, R.: Design issues and implementation of query-driven healthcare system using wireless sensor ad hoc network. In: Proceedings of 4th International Workshop on Wearable and Implantable Body Sensor Network (BSN 2007), Aachen, Germany, 26–28 Mar 2007

    Google Scholar 

  10. What is a Smart Home: [Online]. Available: http://www.smarthomeusa.com/info/smarthome/

  11. Robles, R.J., Kim, T.: Applications, systems and methods in smart home technology: a review. Int. J. Adv. Sci. Technol. 15, Feb 2010

    Google Scholar 

  12. Hamed, B.: Design & implementation of smart house control using LabVIEW. Int. J. Softw. Comput. Eng. Law, Y.W., Doumen, J., Hartel, P.: Survey and benchmark of block ciphers for wireless sensor networks. ACM Trans. Sens. Netw. (TOSN) 2(1), 65–93 (2006)

    Google Scholar 

  13. Undercoffer, J., Avancha, S., Joshi, A., Pinkston, J.: In: Security for sensor networks

    Google Scholar 

  14. Triki, B., Rekhis, S., Boudriga, N.: Digital investigation of wormhole attacks in wireless sensor networks. In: Eighth IEEE International Symposium on Network Computing and Applications, pp. 179–186 (2009)

    Google Scholar 

  15. Brown, J., Du, X.: Detection of selective forwarding attacks in heterogeneous sensor networks. In: ICC, pp. 1583–1587 (2008)

    Google Scholar 

  16. Saleem, S., Ullah, S., Yoo, H.S.: On the security issues in wireless body area networks. Int. J. Digit. Content Technol. Appl. 3 (2009)

    Google Scholar 

  17. Chakravorty, R.: A programmable service architecture for mobile medical care. In: Proceedings of 4th Annual IEEE International Conference on Pervasive Computing and Communication Workshop (PERSOMW 06), Pisa, Italy, 13–17 Mar 2006

    Google Scholar 

  18. Eisenbarth, T., Kumar, S., Paar, C., Poschmann, A., Uhsadel, L.: A survey of lightweight-cryptography implementations. IEEE Des. Test Comput. 24(6), 522–533 (2007)

    Article  Google Scholar 

  19. Healy, M., Newe, T., Lewis, E.: Analysis of hardware encryption versus software encryption on wireless sensor network motes. In: Smart Sensors and Sensing Technology, pp. 3–14. Springer (2008)

    Google Scholar 

  20. Law, Y.W., Doumen, J.., Hartel, P.: Survey and benchmark of block ciphers for wireless sensor networks. ACM Trans. Sens. Netw. (TOSN) 2(1), 65–93 (2006)

    Article  Google Scholar 

  21. Wang, H., Li, Q.: Efficient implementation of public key cryptosystems on mote sensors (short paper). In: Information and Communications Security, pp. 519–528. Springer (2006)

    Google Scholar 

  22. Dutertre, B., Cheung, S., Levy, J.: Lightweight key management in wireless sensor networks by leveraging initial trust. Technical Report SRI-SDL-04-02, SRI International (2004)

    Google Scholar 

  23. Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proceedings. 2003 Symposium on Security and Privacy, 2003, pp. 197–213. IEEE (2003)

    Google Scholar 

  24. Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM conference on Computer and Communications Security, pp. 41–47. ACM (2002)

    Google Scholar 

  25. Liu, D., Ning, P., Li, R.: Establishing pairwise keys in distributed sensor networks. ACM Trans. Inf. Syst. Secur. (TISSEC) 8(1), 41–77 (2005)

    Article  Google Scholar 

  26. Zhu, Y., Keoh, S.L., Sloman, M., Lupu, E.C.: A lightweight policy system for body sensor network. IEEE Trans. Netw. Serv. Manag. 6, 137–148 (2009)

    Article  Google Scholar 

  27. Ferreria, A., Correia, R., Monterio, H., Brito, M., Antunes, L.: Usable access control policy and model for healthcare. In: Proceedings of 2011 24th International Symposium on Computer Based Medical Systems (CBMS), pp. 1–6, Bristol, UK, 27–30 June 2011

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ahlam Alami .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Alami, A., Benhlima, L., Bah, S. (2019). A Study of Security Requirements in Smart Home Healthcare Systems Using Wireless Sensor Networks. In: Ben Ahmed, M., Boudhir, A., Younes, A. (eds) Innovations in Smart Cities Applications Edition 2. SCA 2018. Lecture Notes in Intelligent Transportation and Infrastructure. Springer, Cham. https://doi.org/10.1007/978-3-030-11196-0_53

Download citation

Publish with us

Policies and ethics