Abstract
This paper studies an approach to enhance the trust in the widespread use of Body Sensor Networks (BSN) in Healthcare. To address the wide variety in medical indications and differences between patients, we assume that such BSNs are programmable and highly flexible in their functionality. Yet this opens a vulnerability to malicious attacks and intrusion of the patient’s privacy. We study the work flow in a typical medical scenario, we map the (implied or evidence-based) trust relations and we use this to propose a scheme for verifying the authenticity and trustworthiness without prohibitively interfering with common practices. Our proposed framework is currently being refined in the VITRUVIUS project, for instance to test the feasibility of its implementation.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Bui, V.T., Lukkien, J.J., Verhoeven, R.: Toward a Trust Management Model for a Configurable Body Sensor Platform. In: Proceedings of the 6th ICST International Conference on Body Area Networks, Bodynets 2011, pp. 23–26 (November 2011)
Dolan, B.: First mobile medical app to get CE Mark in UK (January 2012), http://mobihealthnews.com/15707/first-mobile-medical-app-to-get-ce-mark-in-uk/
Gambetta, D.: Can We Trust Trust?. In: Trust: Making and Breaking Cooperative Relations, pp. 213–237. Basil Blackwell (1988)
de Groot, J., Linnartz, J.P.: Zero Leakage Quantization Scheme for Biometric Verification. In: 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1920–1923 (May 2011)
Holcomb, D., Burleson, W., Fu, K.: Power-Up SRAM State as an Identifying Fingerprint and Source of True Random Numbers. IEEE Transactions on Computers 58(9), 1198–1210 (2009)
Institute for Healthcare Improvement: Early Warning Systems: Scorecards That Save Lives, http://www.ihi.org/knowledge/Pages/ImprovementStories
Jøsang, A.: An Algebra for Assessing Trust in Certification Chains. In: Proceedings of the Network and Distributed Systems Security, NDSS (1999)
Jøsang, A., Hayward, R., Pope, S.: Trust Network Analysis with Subjective Logic. In: Proceedings of the 29th Australasian Computer Science Conference, ACSC 2006, vol. 48, pp. 85–94. Australian Computer Society, Inc., Darlinghurst (2006)
Jøsang, A., Ismail, R., Boyd, C.: A Survey of Trust and Reputation Systems for Online Service Provision. Decis. Support Syst. 43, 618–644 (2007)
Jøsang, A., Pope, S.: Semantic Constraints for Trust Transitivity. In: Proceedings of the 2nd Asia-Pacific conference on Conceptual modelling, APCCM 2005, vol. 43, pp. 59–68. Australian Computer Society, Inc., Darlinghurst (2005)
Linnartz, J.P., Lukkien, J., Benz, H., de Clercq, P., van Bussel, M.: VITRUVIUS Project Official Website (2008), http://vitruvius-project.com/
Linnartz, J.P., Tuyls, P.: New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates. In: Kittler, J., Nixon, M.S. (eds.) AVBPA 2003. LNCS, vol. 2688, pp. 393–402. Springer, Heidelberg (2003)
Maes, R., Tuyls, P., Verbauwhede, I.: A soft decision helper data algorithm for SRAM PUFs. In: IEEE International Symposium on Information Theory, ISIT 2009, pp. 2101–2105, June 28 - July 3 (2009)
Mcknight, D.H., Chervany, N.L.: The Meanings of Trust. Technical Report MISRC Working Paper Series 4, University of Minnesota, Management Information Systems Research Center (1996)
Pearson, S.D., Raeke, L.H.: Patients’ Trust in Physicians: Many theories, few measures, and little data. Journal of General Internal Medicine 15(7), 509–513 (2000)
Plataniotis, K., Hatzinakos, D., Lee, J.: ECG Biometric Recognition Without Fiducial Detection. In: 2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference, pp. 1–6, July19 - August 21 (2006)
Thompson, B.M.: FDA Regulation of Mobile Health. Tech. rep., MobiHealthNews (2010), http://mobihealthnews.com/research/fda-regulation-of-mobile-health/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
de Groot, J., Bui, V., Linnartz, JP., Lukkien, J., Verhoeven, R. (2013). Software Authentication to Enhance Trust in Body Sensor Networks. In: Jøsang, A., Samarati, P., Petrocchi, M. (eds) Security and Trust Management. STM 2012. Lecture Notes in Computer Science, vol 7783. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38004-4_16
Download citation
DOI: https://doi.org/10.1007/978-3-642-38004-4_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-38003-7
Online ISBN: 978-3-642-38004-4
eBook Packages: Computer ScienceComputer Science (R0)