Security in E-Health Applications

Security in E-Health Applications

Victor Pomponiu
ISBN13: 9781609604691|ISBN10: 1609604695|EISBN13: 9781609604714
DOI: 10.4018/978-1-60960-469-1.ch005
Cite Chapter Cite Chapter

MLA

Pomponiu, Victor. "Security in E-Health Applications." E-Health, Assistive Technologies and Applications for Assisted Living: Challenges and Solutions, edited by Carsten Röcker and Martina Ziefle, IGI Global, 2011, pp. 94-118. https://doi.org/10.4018/978-1-60960-469-1.ch005

APA

Pomponiu, V. (2011). Security in E-Health Applications. In C. Röcker & M. Ziefle (Eds.), E-Health, Assistive Technologies and Applications for Assisted Living: Challenges and Solutions (pp. 94-118). IGI Global. https://doi.org/10.4018/978-1-60960-469-1.ch005

Chicago

Pomponiu, Victor. "Security in E-Health Applications." In E-Health, Assistive Technologies and Applications for Assisted Living: Challenges and Solutions, edited by Carsten Röcker and Martina Ziefle, 94-118. Hershey, PA: IGI Global, 2011. https://doi.org/10.4018/978-1-60960-469-1.ch005

Export Reference

Mendeley
Favorite

Abstract

Wireless sensor networks (WSNs) in e-health applications are acquiring an increasing importance due to the widespread diffusion of wearable vital sign sensors and location tags which can track both healthcare personnel and patient status location continuously in real-time mode. Despite the increased range of potential application frameworks the security breach between existing sensor network characteristics and the requirements of medical applications remains unresolved. Devising a sensor network architecture which complies with the security mechanisms is not a trivial task since the WSN devices are extremely limited in terms of power, computation and communication. This chapter presents an analysis of various WSN security techniques from the perspective of healthcare applications, and takes into consideration the significance of security to the efficient distribution of ubiquitous computing solutions.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.