Preserving Confidentiality in Wireless Medical Data

Authors

  • Ch. Sai Siva Durga  M.Tech, Department of Computer Science and Technology, SRKR Engineering College, Bhimavaram, West Godavari, Andhra Pradesh, India.
  • Smt. P. Neelima  Assistant Professor, Department of Computer Science and Technology, SRKR Engineering College, Bhimavaram, West Godavari, Andhra Pradesh, India.

Keywords:

Wireless medical sensor network, patient data privacy, Paillier cryptosystem, statistical analysis, EIGamal cryptosystems;

Abstract

In recent times, healthcare applications are widely being used for remote patient monitoring and in hospitals using wireless sensor networks. Wireless medical sensor networks are highly vulnerable to different kind of attacks such as eavesdropping, modification, data breach etc which is a potential threat to patient sensitive physiological data. Security for wireless medical sensor networks is one of the major requirements in order to attain few issues like authentication, integrity and confidentiality. A considerable measure of work has been done to secure wireless medical sensor networks. The existing healthcare solutions can protect information amid transmission but in any case fails to stop inside attack where the sensitive patient data will be revealed by the malicious database administrator. The proposed system presents a practical approach to overcome this issue by making use of multiple data servers for storing patient sensitive data. The primary contribution of this system is secure transmission of patient sensitive data to multiple data servers and performing statistical analysis on the patient data using Paillier cryptosystem and EIGamal cryptosystems by ensuring patients’ privacy.

References

  1. M. Ahmed, X. Huang, and H. Cui, "Smart Decision Making for Internal Attacks in Wireless Sensor Network," International Journal of Computer Science and Network Security,, vol. 12, no. 12, pp. 15-23, Dec. 2012.
  2. D. Bogdanov, S. Laur, J. Willemson. Sharemind: a Framework for Fast Privacy-Preserving Computations. In Proc. ESORICS’08, pages 192-206, 2008.
  3. Dan Baehr, Steve McKinney, Aaron Quirk, and Khaled Harfoush, "On the Practicality of Elliptic Curve Cryptography for Medical Sensor Networks", IEEE, 2013.
  4. X. Du and H.-H. Chen, "Security in wireless sensor networks," IEEE Wireless Communications, vol. 15, no. 4, pp. 60-66, 2008.
  5. H. Ghamgin, M. S. Akhgar, and M. T. Jafari, "Attacks in Wireless Sensor Network," vol. 5, no. 7, pp. 954-960, 2011.
  6. X. Huang, M. Ahmed, and D. Sharma, "Protecting from Inside Attacks in Wireless Sensor Networks," in 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing (DASC), 2011, pp. 186-191.
  7. X. Huang, M. Ahmed, and D. Sharma, "A Novel Algorithm for Protecting from Internal Attacks of Wireless Sensor Networks," in 2011 sIFIP 9th International Conference on Embedded and Ubiquitous Computing (EUC), pp. 344349, 2011
  8. X. Huang, M. R. Ahmed, D. Sharma, and H. Cui, "Protecting wireless sensor networks from internal attacks based on uncertain decisions", in 2013IEEE Wireless Communications and Networking Conference (WCNC), pp. 1854-1859, 2013.
  9. P. Kumar, Y. D. Lee, H. J. Lee. Secure Health Monitoring Using Medical Wireless Sensor Networks. In Proc. 6th International Conference on Networked Computing and Advanced Information Management, pages 491-494, Seoul, Korea, 16-18 August 2010.
  10. P. Kumar and H. J. Lee. Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey. Sensors 12: 55-91, 2012.
  11. X. H. Le, S. Lee, I. Butun, M. Khalid, R. Sankar, M. Kim, M-H. Han, Y-K. Lee, H. Lee. "An Energy-Efficient Access Control Scheme for Wireless Sensor Networks based on Elliptic Curve Cryptography. Journal of Communications and Networks, Special Issues on Secure Wireless Networking", December 2009.
  12. K. Lu, Y. Qian, and J. Hu, "A framework for distributed key management schemes in heterogeneous wireless sensor networks," IEEE Transactions on Wireless Communications, vol. 7, no. 2, pp. 639-647, Feb. 2008.
  13. Maurer U., Rowe A., Smailagic A., and Siewiorek P., "eWatch: a Wearable Sensor and Notification Platform," in Proceedings of International Workshop on BSN, Wearable and Implantable Body Sensor Networks, pp. 144-145, 2006.
  14. J. Misic, V. Misic. Enforcing Patient Privacy in Healthcare WSNs Through Key Distribution Algorithms. Secur. Commun. Network 1: 417-429, 2008.
  15. Oliver N. and Flores F., "HealthGear: A RealTime Wearable System for Monitoring and Analyzing Physiological Signals," International Workshop on Wearable and Implantable Body Sensor Networks, pp. 3-5, 2006.
  16. P. Paillier. Public-key Cryptosystems Based on Composite Degree Residuosity Classes. In Proc. EUROCRYPT’99, pages 223-238, 1999.
  17. A. Perrig, J. Stankovic, and D. Wagner, "Security in wireless sensor networks," Communications of the ACM, vol. 47, no. 6, p. 53, Jun. 2004.
  18. A. Siva Sangari et al., "light weight security and authentication in wireless body area network", Indian Journal of Computer Science and Engineering, Vol. 4 No. 6, 2014.
  19. X. Yi, J. Willemson, F. Nat-Abdesselam. Privacy-Preserving Wireless Medical Sensor Network. In Proc. TrustCom’13, pages 118-125, 2013.

Downloads

Published

2017-12-31

Issue

Section

Research Articles

How to Cite

[1]
Ch. Sai Siva Durga, Smt. P. Neelima, " Preserving Confidentiality in Wireless Medical Data, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 6, pp.178-183, November-December-2017.