Abstract
Recent developments of embedded wireless technologies, such as low-cost low-power wireless sensor platforms, uncovered big potential for novel applications. Health care and well-being are examples of two applications that can have large impact on society. Medical sensor networks via continuous monitoring of vital health parameters over a long period of time, can enable physicians to make more accurate diagnosis and provide better treatment. Such network allow emergency services to react fast to dangerous patient’s conditions and perhaps save more lives. For such applications to become viable, their design has to consider fail-safe mode of operation, protection of sensitive user data, and especially provide solution for efficient access control. Given the specifics of these applications, in this work we identify communication pattern that will guarantee the most secure way to exchange medical data, propose a standard based security protocol enabling authentication and data protection, and introduce a mechanism for access control—a crucial building block in privacy sensitive applications. To validate our design we implement a prototype on a wireless sensor platform.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Moskowitz, R., Nikander, P.: Host Identity Protocol architecture. IETF RFC 4423 (May 2006)
Moskowitz, R., Nikander, P., Jokela, P., Henderson, T.: Experimental Host Identity Protocol (HIP). IETF RFC 5201 (April 2008)
Gurtov, A.: Host Identity Protocol (HIP): Towards the Secure Mobile Internet. Wiley and Sons (2008)
Kyriacou, E., Chimonidou, P., Pattichis, C., Lambrinou, E., Barberis, V.I., Georghiou, G.P.: Post Cardiac Surgery Home-Monitoring System. In: Lin, J. (ed.) MobiHealth 2010. LNICST, vol. 55, pp. 61–68. Springer, Heidelberg (2011)
Shnayder, V., Chen, B., Lorincz, K., Fulford, J., Welsh, M.: Sensor networks for medical care. In: Proceedings of the 3rd International Conference on Embedded Networked Sensor Systems, SenSys 2005 (November 2005)
Shnayder, V., Chen, B., Lorincz, K., Fulford, J., Welsh, M.: Sensor networks for medical care. Harvard University Technical Report TR-08-05 (April 2005)
Malasri, K., Wang, L.: Design and implementation of a secure wireless mote-based medical sensor network. In: Proceedings of the 10th International Conference on Ubiquitous Computing, UbiComp 2008, pp. 172–181 (2008)
Venkatasubramanian, K., Gupta, S.K.S.: Security solutions for pervasive healthcare. In: Xiao, Y. (ed.) Security in Distributed, Grid, Mobile, and Pervasive Computing, pp. 443–464. Auerbach Publications, CRC Press (April 2007)
Garcia-Morchon, O., Flack, T., Heer, T., Wehrle, K.: Security for pervasive medical sensor networks. In: MobiQuitous 2009: Proc. of the 6th Annual International Conference on Mobile and Ubiquitous Systems. ICST/IEEE (July 2009)
Moskowitz, R.: HIP Diet EXchange (DEX): draft-moskowitz-hip-rg-dex-05 (March 2011), Expires in September 2011(work in progress)
Saxena, N., Ekberg, J.-E., Kostiainen, K., Asokan, N.: Secure device pairing based on a visual channel: Design and usability study. IEEE Transactions on Information Forensics and Security 6, 28–38 (2011)
Heer, T., Varjonen, S.: HIP Certificates: draft-ietf-hip-cert-12 (March 2011) (work in progress)
Laganier, J., Eggert, L.: Host Identity Protocol (HIP) rendezvous extension. IETF RFC 5204 (March 2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Kuptsov, D., Nechaev, B., Gurtov, A. (2012). Securing Medical Sensor Network with HIP. In: Nikita, K.S., Lin, J.C., Fotiadis, D.I., Arredondo Waldmeyer, MT. (eds) Wireless Mobile Communication and Healthcare. MobiHealth 2011. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 83. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29734-2_21
Download citation
DOI: https://doi.org/10.1007/978-3-642-29734-2_21
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-29733-5
Online ISBN: 978-3-642-29734-2
eBook Packages: Computer ScienceComputer Science (R0)