Sensor Networks Security for Pervasive Healthcare

Sensor Networks Security for Pervasive Healthcare

Ioannis Krontiris
ISBN13: 9781615207657|ISBN10: 1615207651|ISBN13 Softcover: 9781616922832|EISBN13: 9781615207664
DOI: 10.4018/978-1-61520-765-7.ch008
Cite Chapter Cite Chapter

MLA

Krontiris, Ioannis. "Sensor Networks Security for Pervasive Healthcare." Pervasive and Smart Technologies for Healthcare: Ubiquitous Methodologies and Tools, edited by Antonio Coronato and Giuseppe De Pietro, IGI Global, 2010, pp. 155-171. https://doi.org/10.4018/978-1-61520-765-7.ch008

APA

Krontiris, I. (2010). Sensor Networks Security for Pervasive Healthcare. In A. Coronato & G. De Pietro (Eds.), Pervasive and Smart Technologies for Healthcare: Ubiquitous Methodologies and Tools (pp. 155-171). IGI Global. https://doi.org/10.4018/978-1-61520-765-7.ch008

Chicago

Krontiris, Ioannis. "Sensor Networks Security for Pervasive Healthcare." In Pervasive and Smart Technologies for Healthcare: Ubiquitous Methodologies and Tools, edited by Antonio Coronato and Giuseppe De Pietro, 155-171. Hershey, PA: IGI Global, 2010. https://doi.org/10.4018/978-1-61520-765-7.ch008

Export Reference

Mendeley
Favorite

Abstract

Body-worn sensors and wireless interconnection of distributed embedded devices facilitate the use of lightweight systems for monitoring vital health parameters like heart rate, respiration rate and blood pressure. Patients can simply wear monitoring systems without restricting their mobility and everyday life. This is particularly beneficial in the context of world’s ageing society with many people suffering chronic ailments. However, wireless transmission of sensitive patient data through distributed embedded devices presents several privacy and security implications. In this book chapter the authors’ first highlight the security threats in a biomedical sensor networks and identify the requirements that a security solution has to offer. Then the authors’ review some popular architectures proposed in the bibliography over the last few years and they discuss the methods that they employ in order to offer security. Finally the authors’ discuss some open research questions that have not been addressed so far and which they believe offer promising directions towards making these kinds of networks more secure.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.