A. Rghioui, Aziza L'aarje, F. Elouaai, M. Bouhorma
{"title":"用于医疗监控的物联网:安全审查和建议的解决方案","authors":"A. Rghioui, Aziza L'aarje, F. Elouaai, M. Bouhorma","doi":"10.1109/CIST.2014.7016651","DOIUrl":null,"url":null,"abstract":"The development of the Internet of Things will greatly facilitate the process of patient's diagnosis and monitoring, with small IP-based wireless sensors implemented on the patient's body, his physiological parameters, such as blood pressure and heart rate, can be monitored remotely and continuously. This scenario must absolutely respect the confidentiality and privacy of patient's medical information, only caregivers and authorized persons should possess the right to access these information. The security must be ensured throughout the healthcare application scenario. This paper presents a study of the potential security problems in this application, and proposes a security model as a solution. Our model is based on symmetric cryptography with a proposed key management system and network nodes authentication mechanism.","PeriodicalId":106483,"journal":{"name":"2014 Third IEEE International Colloquium in Information Science and Technology (CIST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"46","resultStr":"{\"title\":\"The Internet of Things for healthcare monitoring: Security review and proposed solution\",\"authors\":\"A. Rghioui, Aziza L'aarje, F. Elouaai, M. Bouhorma\",\"doi\":\"10.1109/CIST.2014.7016651\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The development of the Internet of Things will greatly facilitate the process of patient's diagnosis and monitoring, with small IP-based wireless sensors implemented on the patient's body, his physiological parameters, such as blood pressure and heart rate, can be monitored remotely and continuously. This scenario must absolutely respect the confidentiality and privacy of patient's medical information, only caregivers and authorized persons should possess the right to access these information. The security must be ensured throughout the healthcare application scenario. This paper presents a study of the potential security problems in this application, and proposes a security model as a solution. Our model is based on symmetric cryptography with a proposed key management system and network nodes authentication mechanism.\",\"PeriodicalId\":106483,\"journal\":{\"name\":\"2014 Third IEEE International Colloquium in Information Science and Technology (CIST)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"46\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 Third IEEE International Colloquium in Information Science and Technology (CIST)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CIST.2014.7016651\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 Third IEEE International Colloquium in Information Science and Technology (CIST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CIST.2014.7016651","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The Internet of Things for healthcare monitoring: Security review and proposed solution
The development of the Internet of Things will greatly facilitate the process of patient's diagnosis and monitoring, with small IP-based wireless sensors implemented on the patient's body, his physiological parameters, such as blood pressure and heart rate, can be monitored remotely and continuously. This scenario must absolutely respect the confidentiality and privacy of patient's medical information, only caregivers and authorized persons should possess the right to access these information. The security must be ensured throughout the healthcare application scenario. This paper presents a study of the potential security problems in this application, and proposes a security model as a solution. Our model is based on symmetric cryptography with a proposed key management system and network nodes authentication mechanism.