You are not logged in.

Security considerations for wireless carrier agonistic bio-monitoring systems

Townsend, Ben and Abawajy, Jemal 2016, Security considerations for wireless carrier agonistic bio-monitoring systems. In Thuraisingham, Bhavani, Wang, XiaoFeng and Yegneswaran, Vinod (ed), Security and privacy in communication networks : 11th international conference, SecureComm 2015 Dallas, TX, USA, October 26-29, 2015 Revised Selected Papers, Springer, Berlin, Germany, pp.725-737, doi: 10.1007/978-3-319-28865-9_48.

Attached Files
Name Description MIMEType Size Downloads

Title Security considerations for wireless carrier agonistic bio-monitoring systems
Author(s) Townsend, Ben
Abawajy, Jemal
Title of book Security and privacy in communication networks : 11th international conference, SecureComm 2015 Dallas, TX, USA, October 26-29, 2015 Revised Selected Papers
Editor(s) Thuraisingham, Bhavani
Wang, XiaoFeng
Yegneswaran, Vinod
Publication date 2016
Series Lecture notes of the institute of computer sciences, social informatics and telecommunications engineering; v.164
Chapter number 48
Total chapters 48
Start page 725
End page 737
Total pages 13
Publisher Springer
Place of Publication Berlin, Germany
Keyword(s) bio-monitoring systems
medical monitoring
mobile communications
information security
information privacy
telemetry
medical telemetry
Summary Advances in information and communications technology has led to a significant advances in noncontact portable devices capable of monitoring vital signals of patients. These wearable and implantable bio-monitoring systems allow collections of wearable sensors to be constructed as a Body Area Network (BAN) to record biological data for a subject. Such systems can be used to improve the quality of life and treatment outcomes for patients. One of the main uses for a bio-monitoring system is to record biological data values from a subject and provide them to a doctor or other medical professional. However, wearable bio-monitoring systems raise unique security considerations. In this paper, we discuss some of the security considerations that have arisen in our work around communications agnostic bio-monitoring, and how we have addressed these concerns. Furthermore, the issues related to the identifying and trusting sender and receiver entities are discussed.
ISBN 9783319288642
9783319288659
ISSN 1867-8211
Language eng
DOI 10.1007/978-3-319-28865-9_48
Field of Research 080503 Networking and Communications
Socio Economic Objective 970108 Expanding Knowledge in the Information and Computing Sciences
HERDC Research category B1 Book chapter
ERA Research output type B Book chapter
Copyright notice ©2015, Springer
Persistent URL http://hdl.handle.net/10536/DRO/DU:30083445

Document type: Book Chapter
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 2 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 78 Abstract Views, 8 File Downloads  -  Detailed Statistics
Created: Fri, 13 May 2016, 12:32:53 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.