TITLE

Securing Health Sensing Using Integrated Circuit Metric

AUTHOR(S)
Tahir, Ruhma; Tahir, Hasan; McDonald-Maier, Klaus
PUB. DATE
October 2015
SOURCE
Sensors (14248220);Oct2015, Vol. 15 Issue 10, p26621
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
Convergence of technologies from several domains of computing and healthcare have aided in the creation of devices that can help health professionals in monitoring their patients remotely. An increase in networked healthcare devices has resulted in incidents related to data theft, medical identity theft and insurance fraud. In this paper, we discuss the design and implementation of a secure lightweight wearable health sensing system. The proposed system is based on an emerging security technology called Integrated Circuit Metric (ICMetric) that extracts the inherent features of a device to generate a unique device identification. In this paper, we provide details of how the physical characteristics of a health sensor can be used for the generation of hardware "fingerprints". The obtained fingerprints are used to deliver security services like authentication, confidentiality, secure admission and symmetric key generation. The generated symmetric key is used to securely communicate the health records and data of the patient. Based on experimental results and the security analysis of the proposed scheme, it is apparent that the proposed system enables high levels of security for health monitoring in resource optimized manner.
ACCESSION #
110621313

 

Related Articles

  • Circulation: Journal of the American Heart Association.  // Biomedical Market Newsletter;6/1/2012, Vol. 21, p1 

    The article offers information on the development of innovative safeguards which are designed to misuse of genetic data of the patients.

  • The Best Defense Is a Good Offense. Winslow, George // Broadcasting & Cable;3/11/2013, Vol. 143 Issue 10, p21 

    The article focuses on how to reduce computer hacking and piracy which requires new systems and better quality precautions for employee. Open Security Foundation stated that cybersecurity breaches reach record levels in 2012, with 1,520 incidents of data loss. It mentions that computer experts...

  • Medical Industry Addresses Security in Technology Age. Graves, Brad // San Diego Business Journal;4/9/2001, Vol. 22 Issue 15, p15 

    Reports on the health care sector's efforts to improve medical records security in the United States. Privacy and security demands of the Health Insurance Portability & Accountability Act (HIPAA); Proposals for uniform electronic records; Technological innovations in the field of security;...

  • HEALTHCARE IT: How SAFE is your patient data?. Lowes, Robert // Medical Economics;3/17/2006, Vol. 83 Issue 6, p22 

    The article reports on the stealing electronic health records (EHR) of patients in the U.S. Though EHR has its advantage but still privacy becomes a problem. The survey showed that privacy risk is up by 47 percent. The physicians using EHR should minimized the access of medical staff to chart...

  • Putting the finger on security.  // Health Data Management;Apr2006, Vol. 14 Issue 4, p48 

    The article focuses on the unique security threat posed by Tablet personal computers (PC) to U.S. health organizations. The devices can run complex applications such as electronic records software. Tablet PC are also expensive and are often owned by provider organizations instead of being the...

  • Worried About Stolen Laptops? Help is Here. Scott, Mike // H&HN: Hospitals & Health Networks;Feb2007, Vol. 81 Issue 2, p24 

    The article presents information on security devices for hospitals, including Mighty Key, a personal computer and laptop protector, detection software from Reconnex Inc. and CyberAngel data protection and tracking recovery solution from CyberAngel Security Solutions Inc.

  • Wireless security: It's up to you. Lowes, Robert // Medical Economics;11/17/2006, Vol. 83 Issue 22, following p50 

    The article discusses the importance of encryption as a wireless security system used in protecting confidential medical records against the alarming presence of piggybackers and wardrivers. According to reports, piggybackers and wardrivers are spreading widely, covertly tapping into other's...

  • David Newnham says privacy is a matter of taste. Newnham, David // Nursing Standard;8/25/2004, Vol. 18 Issue 50, p31 

    Comments on the concern of National Health Services on the importance of security of electronic medical records; Request of British Medical Association to boycott the system; Use of smartcards by health service personnel to access to the new databases.

  • Modern Data Security. Klein III, Robert R.; Nagle, Ray B.; Mount, David W. // Archives of Pathology & Laboratory Medicine;Mar2004, Vol. 128 Issue 3, p338 

    Informs the concerns raised about patient confidentiality due to the transformation of pathology reports from paper to the electronic format. Highlights of the Health Insurance Portability and Accountability Act of 1996 regarding the security of medical data; Problems of data security in...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics