Skip to main content

Network and Application Security in Mobile e-Health Applications

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3090))

Abstract

Different IT applications require different network and application security services. We have been working in the area of e-health applications in mobile environments, and we have needed to integrate security services therein. This paper presents a specification of such network and application security services for mobile e-health applications and how we have implemented them. First, various security threats specific of e-health applications are described, like patients’ data eavesdropping and manipulation. The different security mechanisms to address these specific security threats are then described, e.g., data confidentiality and integrity. Following, the specification of the network and application security requirements and the implementation possibilities to address them in the mobile e-health applications are described. As an example of network and application security services integrated into an e-health system, the paper includes the description of the mobile e-health application MobiHealth, an application developed within the European Commission co-funded MobiHealth project (IST–2001–36006), focusing on the security services added to it.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kent, S., Atkinson, R.: Security Architecture for the Internet Protocol, RFC 2401 (1998)

    Google Scholar 

  2. Frier, A., Karlton, P., Kocher, P.: The SSL 3.0 Protocol. Netscape Communications Corp (1996)

    Google Scholar 

  3. Dierks, T., Allen, C.: The TLS Protocol Version 1.0, RFC 2246 (1999)

    Google Scholar 

  4. Rescorla, E.: HTTP Over TLS, RFC 2818 (2000)

    Google Scholar 

  5. Zimmerman, T.: Personal area networks (PAN): Near-field intra-body communication. IBM Systems Journal 35, 609–618 (1996)

    Article  Google Scholar 

  6. Jones, V., Bults, R., Konstantas, D., Vierhout, P.: AM: Healthcare PANs: Personal Area Networks for trauma care and home care. In: Fourth International Symposium on Wireless Personal Multimedia Communications (WPMC), Aalborg, Denmark (2001)

    Google Scholar 

  7. Van Dam, K., Pitchers, S., Barnard, M.: From PAN to BAN: Why Body Area Networks? In: Proceedings of the Wireless World Research Forum (WWRF) Second Meeting, Helsinki, Finland (2001)

    Google Scholar 

  8. IEEE wireless standards web page, http://standards.ieee.org/wireless/overview.html#802.15

  9. Martí, R., Delgado, J.: Security in a Wireless Mobile Health Care System. In: MobEA (Emerging Applications for Wireless and Mobile Access) Workshop collocated with WWW2003 conference, Budapest, Hungary (2003), http://www.research.att.com/~rjana/Marti-Delgado.pdf

  10. MobiHealth website, http://www.mobihealth.org/

  11. Jini Network Technology, http://www.sun.com/jini/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Martí, R., Delgado, J., Perramon, X. (2004). Network and Application Security in Mobile e-Health Applications. In: Kahng, HK., Goto, S. (eds) Information Networking. Networking Technologies for Broadband and Mobile Networks. ICOIN 2004. Lecture Notes in Computer Science, vol 3090. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-25978-7_100

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-25978-7_100

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-23034-2

  • Online ISBN: 978-3-540-25978-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics