Security and Privacy in Communication Networks. 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papers

Research Article

Security Considerations for Wireless Carrier Agonistic Bio-Monitoring Systems

Download
246 downloads
  • @INPROCEEDINGS{10.1007/978-3-319-28865-9_48,
        author={Ben Townsend and Jemal Abawajy},
        title={Security Considerations for Wireless Carrier Agonistic Bio-Monitoring Systems},
        proceedings={Security and Privacy in Communication Networks. 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papers},
        proceedings_a={SECURECOMM},
        year={2016},
        month={2},
        keywords={Bio-monitoring systems Medical monitoring Mobile communications Information security Information privacy Telemetry Medical telemetry},
        doi={10.1007/978-3-319-28865-9_48}
    }
    
  • Ben Townsend
    Jemal Abawajy
    Year: 2016
    Security Considerations for Wireless Carrier Agonistic Bio-Monitoring Systems
    SECURECOMM
    Springer
    DOI: 10.1007/978-3-319-28865-9_48
Ben Townsend1, Jemal Abawajy1,*
  • 1: Deakin University
*Contact email: jemal.abawajy@deakin.edu.au

Abstract

Advances in information and communications technology has led to a significant advances in noncontact portable devices capable of monitoring vital signals of patients. These wearable and implantable bio-monitoring systems allow collections of wearable sensors to be constructed as a Body Area Network (BAN) to record biological data for a subject. Such systems can be used to improve the quality of life and treatment outcomes for patients. One of the main uses for a bio-monitoring system is to record biological data values from a subject and provide them to a doctor or other medical professional. However, wearable bio-monitoring systems raise unique security considerations. In this paper, we discuss some of the security considerations that have arisen in our work around communications agnostic bio-monitoring, and how we have addressed these concerns. Furthermore, the issues related to the identifying and trusting sender and receiver entities are discussed.