Covert Communication in Wireless Sensor Networks for E-Health Applications

Covert Communication in Wireless Sensor Networks for E-Health Applications

Fahimeh Rezaei (University of Nebraska-Lincoln, USA), Pradhumna Lal Shrestha (University of Nebraska-Lincoln, USA), Michael Hempel (University of Nebraska-Lincoln, USA), Sushanta Mohan Rakshit (University of Nebraska-Lincoln, USA) and Hamid Sharif (University of Nebraska-Lincoln, USA)
Copyright: © 2015 |Pages: 20
DOI: 10.4018/978-1-4666-8251-1.ch014
OnDemand PDF Download:
No Current Special Offers


In this chapter, the authors introduce a threat in Wireless Sensor Network (WSN) E-Health applications that can be used for leaking patients' medical information, identity, personal data, and medical history. This threat is called covert communication, which establishes a secret path hidden within legitimate network traffic to transfer information. Based on the exploit used for this type of communication, covert channels have different categories and functionalities. The authors introduce various covert communication methods and their possible applications in transmitting e-health data secretly in WSNs. In addition, the authors discuss different methods and approaches to detect this type of communication in WSNs to prevent this form of malicious e-health information transfer.
Chapter Preview


In this section we first provide a background regarding telemedicine and e-health using WSN devices and technologies. In addition, we review various security topics and concepts that are discussed in previous literature in the area of e-health.

Complete Chapter List

Search this Book: