Skip to main content

Security and Privacy Issues in Health Monitoring Systems: eCare@Home Case Study

  • Conference paper
  • First Online:
Internet of Things Technologies for HealthCare (HealthyIoT 2016)

Abstract

Automated systems for monitoring elderly people in their home are becoming more and more common. Indeed, an increasing number of home sensor networks for healthcare can be found in the recent literature, indicating a clear research direction in smart homes for healthcare. Although the huge amount of sensitive data these systems deal with and expose to the external world, security and privacy issues are surprisingly not taken into consideration. The aim of this paper is to raise some key security and privacy issues that home health monitor systems should face with. The analysis is based on a real world monitoring sensor network for healthcare built in the context of the eCare@Home project.

Research partly supported by the eCare@Home project (www.ecareathome.se).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 44.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 60.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    An OS developed for the Internet-of-Things, http://www.contiki-os.org.

  2. 2.

    Robot Operating System, http://www.ros.org.

References

  1. Pantelopoulos, A., Bourbakis, N.G.: A survey on wearable sensor-based systems for health monitoring, prognosis. IEEE Trans. Syst. Man Cybern. Part C (Applications, Reviews) 40(1), 1–12 (2010)

    Google Scholar 

  2. Tsukiyama, T.: In-home health monitoring system for solitary elderly. In: Proceedings of EUSPN/ICTH’15, Procedia Computer Science, vol. 63, 229–235 (2015)

    Google Scholar 

  3. Kotz, D., Avancha, S., Baxi, A.: A privacy framework for mobile health and home-care systems. In: Proceedings of SPIMACS’09. ACM (2009)

    Google Scholar 

  4. Dasios, A., Gavalas, D., Pantziou, G., Konstantopoulos, C.: Wireless sensor network deployment for remote elderly care monitoring. In: Proceedings of PETRA’15. ACM (2015)

    Google Scholar 

  5. Contiki Pull Request Containing A.E.S. Encryption, July 2016. https://github.com/contiki-os/contiki/pull/557

  6. Dworkin, M.: NIST SP 800-38A, Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality 2002, July 2016. http://csrc.nist.gov/publications/nistpubs/800-38a/spp.800-38a.pdf

  7. SQLite Encryption Extension: Documentation, July 2016. https://www.sqlite.org/see

  8. Bloomberg: Your Medical Records Are for Sale, July 2016. http://www.bloomberg.com/news/articles/2013-08-08/your-medical-records-are-for-sale

  9. SQLite, July 2016. https://www.sqlite.org/

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nicola Dragoni .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Wearing, T., Dragoni, N. (2016). Security and Privacy Issues in Health Monitoring Systems: eCare@Home Case Study. In: Ahmed, M., Begum, S., Raad, W. (eds) Internet of Things Technologies for HealthCare. HealthyIoT 2016. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 187. Springer, Cham. https://doi.org/10.1007/978-3-319-51234-1_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-51234-1_29

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-51233-4

  • Online ISBN: 978-3-319-51234-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics