Increasing security in wireless e-health systems

被引:0
|
作者
Papalambrou, Andreas [1 ]
Gialelis, John
Serpanos, Dimitrios
机构
[1] Univ Patras, Ind Syst Inst RC ATHENA, GR-26110 Patras, Greece
关键词
traffic analysis; security; e-health;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we identify the security and privacy issues specific to wireless health monitoring devices and describe solutions for protecting wireless communications against side channel attacks and in particular traffic analysis attacks. This process takes place by means of data obfuscation and modifications of communication protocol architectures in order to limit exposed information of system architecture to potential attackers. Initial network simulations of the proposed methods show the feasibility of these methods.
引用
收藏
页码:15 / 20
页数:6
相关论文
共 50 条
  • [1] Trust assessment of security for e-health systems
    Bahtiyar, Erif
    Caglayan, Mehmet Ufuk
    [J]. ELECTRONIC COMMERCE RESEARCH AND APPLICATIONS, 2014, 13 (03) : 164 - 177
  • [2] Security Attacks and Solutions in Electronic Health (E-health) Systems
    Zeadally, Sherali
    Isaac, Jesus Tellez
    Baig, Zubair
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2016, 40 (12)
  • [3] Privacy and security shield for health information systems (e-health)
    Ulieru, M
    Ionescu, D
    [J]. IECON 2004 - 30TH ANNUAL CONFERENCE OF IEEE INDUSTRIAL ELECTRONICS SOCIETY, VOL. 1, 2004, : 496 - 501
  • [4] Privacy and security shield for health information systems (e-health)
    Ulieru, Mihaela
    Ionescu, Dan
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2006, 21 (03): : 215 - 221
  • [5] Security Attacks and Solutions in Electronic Health (E-health) Systems
    Sherali Zeadally
    Jesús Téllez Isaac
    Zubair Baig
    [J]. Journal of Medical Systems, 2016, 40
  • [6] Security Aspects of e-Health Systems Migration to the Cloud
    Michalas, Antonis
    Paladi, Nicolae
    Gehrmann, Christian
    [J]. 2014 IEEE 16TH INTERNATIONAL CONFERENCE ON E-HEALTH NETWORKING, APPLICATIONS AND SERVICES (HEALTHCOM), 2014, : 212 - 218
  • [7] A Security and Privacy Validation Methodology for e-Health Systems
    Amato, Flora
    Casola, Valentina
    Cozzolino, Giovanni
    Benedictis, Alessandra De
    Mazzocca, N. Icola
    Moscato, Francesco
    [J]. ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2021, 17 (02)
  • [8] Cloud E-health Systems: A Survay on Security Challenges and Solutions
    Kamoona, Mohammed Ali
    Altamimi, Ahmad Mousa
    [J]. 2018 8TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSIT), 2018, : 189 - 194
  • [9] Enhanced Security Framework for E-Health Systems using Blockchain
    Kubendiran, Mohan
    Singh, Satyapal
    Sangaiah, Arun Kumar
    [J]. JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2019, 15 (02): : 239 - 250
  • [10] A Comprehensive Overview of Security Monitoring Solutions for e-health Systems
    Katt, Basel
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON HEALTHCARE INFORMATICS (ICHI), 2014, : 364 - 364