2010
DOI: 10.1002/sec.247
|View full text |Cite
|
Sign up to set email alerts
|

Sensor network security for pervasive e‐health

Abstract: Ubiquitous 24/7 health monitoring systems based on wireless medical sensors are going to play a key role for pervasive e-health applications. These systems allow care givers to early detect and act on signs of patients' clinical deterioration improving quality of care in a reliable unobtrusive and cost effective way. Ensuring the privacy and security of the exchanged information is challenging in pervasive e-health environments due to the resource constraints of tiny wireless medical sensors and operational re… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 28 publications
0
6
0
Order By: Relevance
“…Chan et al 2009;Demiris 2009;Jea et al 2008;Mitseva et al 2008;Mittelstadt et al 2011;Tentori et al 2006;Tiwari et al 2010;Garde-Perik et al 2006;van Hoof et al 2007). At its narrowest, informational privacy can be equated with hiding personally identifiable data from unauthorised parties (Garcia-Morchon et al 2011;Ahamed et al 2007), and can be quantifiable (Srinivasan et al 2008). As health data are normally considered as particularly sensitive both in an ethical and legal sense (Baldini et al 2016), informational privacy is a central concern for the design and deployment of H-IoT, insofar as it contributes to gain control over the spread of information about the user's health status and history.…”
Section: Informational Privacymentioning
confidence: 99%
See 2 more Smart Citations
“…Chan et al 2009;Demiris 2009;Jea et al 2008;Mitseva et al 2008;Mittelstadt et al 2011;Tentori et al 2006;Tiwari et al 2010;Garde-Perik et al 2006;van Hoof et al 2007). At its narrowest, informational privacy can be equated with hiding personally identifiable data from unauthorised parties (Garcia-Morchon et al 2011;Ahamed et al 2007), and can be quantifiable (Srinivasan et al 2008). As health data are normally considered as particularly sensitive both in an ethical and legal sense (Baldini et al 2016), informational privacy is a central concern for the design and deployment of H-IoT, insofar as it contributes to gain control over the spread of information about the user's health status and history.…”
Section: Informational Privacymentioning
confidence: 99%
“…However, risks of re-identification of anonymised data through aggregation and re-purposing, and the tradeoff between the scientific or commercial value of data and de-identification must be taken seriously (Peppet 2014;Ebersold and Glass 2016;Jiya 2016;Baldini et al 2016). For both identifiable and de-identified data, policies restricting access to identifiable data (Subramaniam et al 2010;Bagüés et al 2007b;Garcia-Morchon et al 2011) only for acceptable purposes (Massacci et al 2009;Chakraborty et al 2011;Beaudin et al 2006) can address privacy risks. For instance, access can be agreed upon ahead of time for researchers depending on the study to be developed (Master et al 2014).…”
Section: Informational Privacymentioning
confidence: 99%
See 1 more Smart Citation
“…Features that provide users with control over data collection and transmission should be included in the design of H-IoT. These include simple on/off switches (or an online/offline mode), "consent sliders" to set at the time of use which data are collected and how they transmitted, and complex privacy policy management systems that allow users to select granularly what data to share, for what purposes, and with whom [37,71,72]. "Offline" privacy barriers such as physical walls can be replicated by requiring explicit action by users to upload or share data to publicly accessible locations.…”
Section: Give Users Control Over Data Collection and Transmissionmentioning
confidence: 99%
“…Recently, wireless sensor networks (WSNs) have attracted a great deal of research attention because of their wide range of potential applications including military, healthcare, and security . A typical sensor network usually has one base station that serves as the commander and data sink.…”
Section: Introductionmentioning
confidence: 99%