skip to main content
10.1145/1579114.1579184acmotherconferencesArticle/Chapter ViewAbstractPublication PagespetraConference Proceedingsconference-collections
research-article

End to end secure communication in ad-hoc assistive medical environments using secure paths

Published:09 June 2009Publication History

ABSTRACT

Recent advances in technology introduce many new capabilities for several sectors. Among else, the continuous improvement and integration of new features in mobile devices, allow their interoperation and integration to a large number of environments; primarily the medical sector may suffice from their utilization in order to monitor efficiently the condition of patients and provide feedback to specialists, especially in cases of absence of a stable (wired) network infrastructure. Strict security requirements emerge due to the sensitivity of data being transmitted, often imposed by different international legislation processes. We present an architecture that allows secure dissemination of medical information in a secure manner in the absence of stable topologies and infrastructures built upon resource efficient devices. The presented architecture utilizes advanced management techniques, achieving secure and privacy-preserving transmission of sensitive data. A number of initial measurements show the effective operation of our architecture in presence of an adequately large number of users participating in the performance test-bed scenario.

References

  1. J. Jetcheva et. al., "A Simple Protocol for Multicast and Broadcast in Mobile Ad Hoc Networks", IETF MANET Working Group Internet Draft, Jul. 2001.Google ScholarGoogle Scholar
  2. "Pamvotis WLAN Simulator", Information available online at http://www.pamvotis.orgGoogle ScholarGoogle Scholar
  3. Vassis D., Belsis P., Skourlas C., Pantziou G.: A pervasive architectural framework for providing remote medical treatment, proceedings of 1st International Conference on PErvasive Technologies Related to Assistive Environments, June 2008, Greece, ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. H. J. Lee et al, Ubiquitous healthcare service using Zigbee and mobile phone for elderly patients Int J Med Inform. 2009 Mar, 78(3), pp. 193--198, Elsevier.Google ScholarGoogle Scholar
  5. K. Hung, Y. T. Zhang, Implementation of a WAP-based telemedicine system for patient monitoring, IEEE Trans. Inf. Technol. Biomed. 7 (2) (2003) pp. 101--107. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Y. H. Lin, I. C. Jan, P. C. Ko, Y. Y. Chen, J. M. Wong, G. J. Jan, A wireless PDA-based physiological monitoring system for patient transport, IEEE Trans. Inf. Technol. Biomed. 8 (4) (2004) pp. 439--447. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. S. Fischer, T. E. Stewart, S. Mehta, R. Wax, S. E. Lapinsky, Handheld computing in medicine, J. Am. Med. Inf. Assoc. 10 (2003) pp. 139--149.Google ScholarGoogle ScholarCross RefCross Ref
  8. R. G. Lee, C. C. Hsiao, C. C. Chen, M. H. Liu, A mobile-care system integrated with Bluetooth blood pressure and pulse monitor, and cellular phone, IEICE Trans. Inf. Syst. E89-D (5) (2006) pp. 1702--1711. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. http://www.pervasivehealthcare.dk/projects/index.htmlGoogle ScholarGoogle Scholar
  10. http://www.eecs.harvard.edu/~mdw/proj/codeblueGoogle ScholarGoogle Scholar
  11. Tentori, M., Favela, J and González, V, "Designing for Privacy in Ubiquitous Computing Environments," Proceedings of UCAMI '05, Granada, España.Google ScholarGoogle Scholar
  12. Sharmin, M., Ahmed, S., Khan, A. "Healthcare Aide: Towards a Virtual Assistant for Doctors Using Pervasive Middleware", Proc. of IEEE PerCom Workshops 2006, pp. 490--495. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. L' Hereux, B., McHugh, M., Privett, B., Kinicki, R. E., Agu E., "A Campus-Wide Mobile EMS Information Management System", Proc. of IEEE PerCom Workshops 2006, pp. 522--526. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. U. Anliker, J. A. Ward, P. Lukowitcz, et. al. AMON: A Wearable Multiparameter Medical Monitoring and Alert System. IEEE Transactions on Information Technology in Biomedicine, 8(4), pp. 415--427, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. R. Chakravorty. "Mobicare: A Programmable Service Architecture for Mobile Medical Care" Proc. of IEEE PerCom Workshop 2006, pp. 532--536. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. G. Theodorakopoulos and J. S. Baras, "On Trust Models and Trust Evaluation Metrics for Ad-Hoc Networks," IEEE Journal on Selected Areas in Communications (JSAC), Feb. 2006 Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. C.-C. Lin, et al., A pervasive health monitoring service system based on ubiquitous network technology, Int. J. Med. Inform. (2009), Elsevier (in press).Google ScholarGoogle Scholar
  18. P. Zimmerman, The PGP user guide, MIT Press, 1994 Cambridge.Google ScholarGoogle Scholar
  19. JADE Software Agent Development Platform, http://jade.tilab.com/Google ScholarGoogle Scholar
  20. HL7COmm application website: http://nule.orgGoogle ScholarGoogle Scholar

Index Terms

  1. End to end secure communication in ad-hoc assistive medical environments using secure paths

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          PETRA '09: Proceedings of the 2nd International Conference on PErvasive Technologies Related to Assistive Environments
          June 2009
          481 pages
          ISBN:9781605584096
          DOI:10.1145/1579114

          Copyright © 2009 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 9 June 2009

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader