Abstract
The adoption of Wireless Sensor Networks (WSNs) in the healthcare sector poses many security issues, mainly because medical information is considered particularly sensitive. The security mechanisms employed are expected to be more efficient in terms of energy consumption and scalability in order to cope with the constrained capabilities of WSNs and patients’ mobility. Towards this goal, cluster-based medical WSNs can substantially improve efficiency and scalability. In this context, we have proposed a general framework for cluster-based medical environments on top of which security mechanisms can rely. This framework fully covers the varying needs of both in-hospital environments and environments formed ad hoc for medical emergencies. In this paper, we further elaborate on the security of our proposed solution. We specifically focus on key establishment mechanisms and investigate the group key agreement protocols that can best fit in our framework.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Dembeyiotis, S., Konnis, G., Koutsouris, D.: A Novel Communications Network for the Provision of Medical Care in Disaster and Emergency Situations. In: 24th EMBS/IEEE, San Francisco (2004)
Bottazzi, D., Corradi, A., Montanari, R.: AGAPE: a location-aware group membership middleware for pervasive computing environments. In: 8th IEEE International Symposium on Computers and Communication, pp. 1185–1192. IEEE CS Press, Turkey (2003)
Misic, J., Misic, V.B.: Implementation of security policy for clinical information systems over wireless sensor networks. Ad Hoc Networks 5(1), 134–144 (2007)
Klaoudatou, E., Konstantinou, E., Kambourakis, G., Gritzalis, S.: Clustering Oriented Architectures in Medical Sensor Environments. In: International Workshop on Security and Privacy in e-Health, March 2008, pp. 929–934. IEEE CS Press, Barcelona (2008)
Schwiebert, L., Gupta, S.S., Weinmann, J.: Challenges in Wireless Networks of Biomedical Sensors. In: SIGMOBILE 2001, pp. 151–165 (2001)
Hu, F., Kumar, S.: QoS considerations in wireless sensor networks for telemedicine. In: SPIE ITCOM Conference, Orlando, FL (2003)
Hu, F., Tillett, J., Ziobro, J., Sharma, N.K.: Secure Tree-Zone-Based Wireless Sensor Networks for Telemedicine Applications. IEEE GLOBECOM, 345–349 (2003)
Chen, Y.J., Wang, Y.L., Wu, X.P., Le, P.D.: The Design of Cluster-based Group Key Management System in Wireless Networks. In: International Conference on Communication Technology (2006)
Karlof, C., Wagner, D.: Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures. Ad Hoc Network Journal, special issue on sensor network applications and protocols (2002)
Raymond, D.R., Midkiff, S.F.: Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses. IEEE Pervasive Computing 7(1), 74–81 (2008)
Kambourakis, G., Klaoudatou, E., Gritzalis, S.: Securing Medical Sensor Environments: The Codeblue framework case. In: 2nd International Conference on Availability, Reliability, and Security - 1st International Symposium on Frontiers in Availability, Reliability and Security, April 2007, pp. 637–643. IEEE CS Press, Austria (2007)
Shi, H., He, M., Qin, Z.: Authenticated and communication efficient group key agreement for clustered ad hoc networks. In: Pointcheval, D., Mu, Y., Chen, K. (eds.) CANS 2006. LNCS, vol. 4301, pp. 73–89. Springer, Heidelberg (2006)
Yao, G., Ren, K., Bao, F., Deng, R.H., Feng, D.: Making the key agreement protocol in mobile ad hoc network more efficient. In: Zhou, J., Yung, M., Han, Y. (eds.) ACNS 2003. LNCS, vol. 2846, pp. 343–356. Springer, Heidelberg (2003)
Chen, Y., Zhao, M., Zheng, S., Wang, Z.: An Efficient and Secure Group Key Agreement Using in the Group Communication of Mobile Ad-hoc Networks. In: IEEE CIS 2006, pp. 1136–1142. IEEE CS Press, Los Alamitos (2006)
Hietalahti, M.: A clustering-based group key agreement protocol for ad-hoc networks. Electronic Notes in Theoretical Computer Science 192, 43–53 (2008)
Teo, J.C.M., Tan, C.H.: Energy-Efficient and Scalable Group Key Agreement for Large Ad Hoc Networks. In: 2nd ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks, pp. 114–121 (2005)
Teo, J.C., Tan, C.H.: Denial-of-service resilience password-based group key agreement for wireless networks. In: 3rd ACM Workshop on QoS and Security For Wireless and Mobile Networks, Crete Island, Greece, pp. 136–143. ACM Press, New York (2007)
Lee, J., Chang, C.: Secure communications for cluster-based ad hoc networks using node identities. Journal of Network and Computer Applications 30(4), 1377–1396 (2007)
Abdel-Hafez, A., Miri, A., Oronzo-Barbosa, L.: Authenticated Group Key Agreement Protocols for Ad hoc Wireless Networks. International Journal of Network Security 4(1), 90–98 (2007)
Konstantinou, E.: Cluster-based Group Key Agreement for Wireless Ad Hoc Networks. In: ARES 2008, pp. 550–557. IEEE Press, Los Alamitos (2008)
Burmester, M., Desmedt, Y.G.: A secure and efficient conference key distribution system. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 275–286. Springer, Heidelberg (1995)
Joux, A.: A one round protocol for tripartite Diffie-Hellman. In: Bosma, W. (ed.) ANTS 2000. LNCS, vol. 1838, pp. 385–394. Springer, Heidelberg (2000)
Al-Riyami, S.S., Paterson, K.G.: Authenticated three party key agreement protocols from pairings. In: Paterson, K.G. (ed.) Cryptography and Coding 2003. LNCS, vol. 2898, pp. 332–359. Springer, Heidelberg (2003)
Zhang, F., Liu, S., Kim, K.: D-based one round authenticated tripartite key agreement protocol with pairings (2002), http://eprint.iacr.org
Szczechowiak, P., Oliveira, L.B., Scott, M., Collier, M., Dahab, R.: NanoECC: Testing the limits of elliptic curve cryptography in sensor networks. In: Verdone, R. (ed.) EWSN 2008. LNCS, vol. 4913, pp. 305–320. Springer, Heidelberg (2008)
Roman, R., Alcaraz, C., Lopez, J.: A survey of cryptographic primitives and implementations for hardware-constrained sensor network nodes. Mobile Networks Applications 12(4), 231–244 (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Klaoudatou, E., Konstantinou, E., Kambourakis, G., Gritzalis, S. (2009). A Cluster-Based Framework for the Security of Medical Sensor Environments. In: Fischer-Hübner, S., Lambrinoudakis, C., Pernul, G. (eds) Trust, Privacy and Security in Digital Business. TrustBus 2009. Lecture Notes in Computer Science, vol 5695. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03748-1_6
Download citation
DOI: https://doi.org/10.1007/978-3-642-03748-1_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-03747-4
Online ISBN: 978-3-642-03748-1
eBook Packages: Computer ScienceComputer Science (R0)