ABSTRACT
Recent advances in technology introduce many new capabilities for several sectors. Among else, the continuous improvement and integration of new features in mobile devices, allow their interoperation and integration to a large number of environments; primarily the medical sector may suffice from their utilization in order to monitor efficiently the condition of patients and provide feedback to specialists, especially in cases of absence of a stable (wired) network infrastructure. Strict security requirements emerge due to the sensitivity of data being transmitted, often imposed by different international legislation processes. We present an architecture that allows secure dissemination of medical information in a secure manner in the absence of stable topologies and infrastructures built upon resource efficient devices. The presented architecture utilizes advanced management techniques, achieving secure and privacy-preserving transmission of sensitive data. A number of initial measurements show the effective operation of our architecture in presence of an adequately large number of users participating in the performance test-bed scenario.
- J. Jetcheva et. al., "A Simple Protocol for Multicast and Broadcast in Mobile Ad Hoc Networks", IETF MANET Working Group Internet Draft, Jul. 2001.Google Scholar
- "Pamvotis WLAN Simulator", Information available online at http://www.pamvotis.orgGoogle Scholar
- Vassis D., Belsis P., Skourlas C., Pantziou G.: A pervasive architectural framework for providing remote medical treatment, proceedings of 1st International Conference on PErvasive Technologies Related to Assistive Environments, June 2008, Greece, ACM. Google ScholarDigital Library
- H. J. Lee et al, Ubiquitous healthcare service using Zigbee and mobile phone for elderly patients Int J Med Inform. 2009 Mar, 78(3), pp. 193--198, Elsevier.Google Scholar
- K. Hung, Y. T. Zhang, Implementation of a WAP-based telemedicine system for patient monitoring, IEEE Trans. Inf. Technol. Biomed. 7 (2) (2003) pp. 101--107. Google ScholarDigital Library
- Y. H. Lin, I. C. Jan, P. C. Ko, Y. Y. Chen, J. M. Wong, G. J. Jan, A wireless PDA-based physiological monitoring system for patient transport, IEEE Trans. Inf. Technol. Biomed. 8 (4) (2004) pp. 439--447. Google ScholarDigital Library
- S. Fischer, T. E. Stewart, S. Mehta, R. Wax, S. E. Lapinsky, Handheld computing in medicine, J. Am. Med. Inf. Assoc. 10 (2003) pp. 139--149.Google ScholarCross Ref
- R. G. Lee, C. C. Hsiao, C. C. Chen, M. H. Liu, A mobile-care system integrated with Bluetooth blood pressure and pulse monitor, and cellular phone, IEICE Trans. Inf. Syst. E89-D (5) (2006) pp. 1702--1711. Google ScholarDigital Library
- http://www.pervasivehealthcare.dk/projects/index.htmlGoogle Scholar
- http://www.eecs.harvard.edu/~mdw/proj/codeblueGoogle Scholar
- Tentori, M., Favela, J and González, V, "Designing for Privacy in Ubiquitous Computing Environments," Proceedings of UCAMI '05, Granada, España.Google Scholar
- Sharmin, M., Ahmed, S., Khan, A. "Healthcare Aide: Towards a Virtual Assistant for Doctors Using Pervasive Middleware", Proc. of IEEE PerCom Workshops 2006, pp. 490--495. Google ScholarDigital Library
- L' Hereux, B., McHugh, M., Privett, B., Kinicki, R. E., Agu E., "A Campus-Wide Mobile EMS Information Management System", Proc. of IEEE PerCom Workshops 2006, pp. 522--526. Google ScholarDigital Library
- U. Anliker, J. A. Ward, P. Lukowitcz, et. al. AMON: A Wearable Multiparameter Medical Monitoring and Alert System. IEEE Transactions on Information Technology in Biomedicine, 8(4), pp. 415--427, 2004. Google ScholarDigital Library
- R. Chakravorty. "Mobicare: A Programmable Service Architecture for Mobile Medical Care" Proc. of IEEE PerCom Workshop 2006, pp. 532--536. Google ScholarDigital Library
- G. Theodorakopoulos and J. S. Baras, "On Trust Models and Trust Evaluation Metrics for Ad-Hoc Networks," IEEE Journal on Selected Areas in Communications (JSAC), Feb. 2006 Google ScholarDigital Library
- C.-C. Lin, et al., A pervasive health monitoring service system based on ubiquitous network technology, Int. J. Med. Inform. (2009), Elsevier (in press).Google Scholar
- P. Zimmerman, The PGP user guide, MIT Press, 1994 Cambridge.Google Scholar
- JADE Software Agent Development Platform, http://jade.tilab.com/Google Scholar
- HL7COmm application website: http://nule.orgGoogle Scholar
Index Terms
- End to end secure communication in ad-hoc assistive medical environments using secure paths
Recommendations
Identifying and utilizing secure paths in ad hoc assistive medical environments
As the capabilities of mobile devices continuously improve, a lot of environments that utilize such devices extend their functionalities; as a notable example, assistive environments offer a lot of characteristics that seemed inevitable a few years ago. ...
A Mobile Agent Approach for Secure Integrated Medical Information Systems
Different patient-related information in medical organizations is the primary reference for medical personnel diagnosing, treating, and caring patients. With the rapid development of information technology, paper-based medical records have gradually ...
A Secure IIoT Gateway Architecture based on Trusted Execution Environments
AbstractIndustrial Internet of Things (IIoT) gateways are affected by many cybersecurity threats, compromising their security and dependability. These gateways usually represent single points of failure on the IIoT infrastructure. When compromised, they ...
Comments