Data security; energy consumption; Internet of Things; wireless communication; Battery powered devices; End-to-end security; Hospital networks; Medical sensor systems; Patient monitoring systems; Security operations; Technological challenges; Wearable sensor systems; Computer Science (all); Materials Science (all); Engineering (all); Electrical and Electronic Engineering; General Engineering; General Materials Science; General Computer Science
Abstract :
[en] In order to reduce the workload of hospital staff and to provide better services to hospitalized patients, attempts are made to integrate patient monitoring systems directly into hospital networks. Monitoring systems must respond to more and more technological challenges. They are ideally portable and wireless, to free the patient from the hospital bed. At the same time, to enable better patient follow-up, a large amount of information needs to be transmitted and processed in real time. Challenges in the design of such systems include energy-efficient processing and communication, and guaranteeing the security of the measured data. This paper describes a wearable sensor system, integrated into a hospital network, that supports high data rates generated by multiple sensors. With a strongly motivated focus on end-to-end security, we explore trade-offs with respect to security schemes and implementations, and wireless network protocols. The results show that the energy efficiency of the resulting system is comparable to existing systems that support far less sensor data and that compromise on end-to-end security by offloading security operations to a delegation server. To our knowledge, this is the first work that explores the impact of the security scheme and the wireless network protocol on the energy consumption of a wearable device, while providing true end-to-end security.
Disciplines :
Computer science
Author, co-author :
Winderickx, Jori ; IMEC-COSIC, Embedded Systems and Security, KU Leuven, Leuven, Belgium
Bellier, Pierre ; Université de Liège - ULiège > Département d'électricité, électronique et informatique (Institut Montefiore) > Systèmes microélectroniques intégrés
Duflot, Patrick ; Centre Hospitalier Universitaire de Liège - CHU > > Secteur Appui méthodologique aux Projets GSI et Planification (APP)
Mentens, Nele ; IMEC-COSIC, Embedded Systems and Security, KU Leuven, Leuven, Belgium ; LIACS, Leiden University, Leiden, Netherlands
Language :
English
Title :
Communication and Security Trade-Offs for Battery-Powered Devices: A Case Study on Wearable Medical Sensor Systems
Publication date :
27 April 2021
Journal title :
IEEE Access
ISSN :
2169-3536
Publisher :
Institute of Electrical and Electronics Engineers Inc.
Interreg V-A Euregio Meuse-Rhine EU - European Union ERDF - European Regional Development Fund
Funding text :
This work was supported in part by the WearIT4Health Project through the Interreg V-A Euregio Meuse-Rhine, in part by the European Union and the European Regional Development Fund, in part by the Province of Limburg - Belgium, and in part by the CyberSecurity Research Flanders under Grant VR20192203.
Commentary :
Our objective is the creation of a wearable multi-sensor monitoring device that is comfortable for the hospitalized patients and compatible with the IT infrastructure of the different hospitals of the Euregio Meuse-Rhine.
scite shows how a scientific paper has been cited by providing the context of the citation, a classification describing whether it supports, mentions, or contrasts the cited claim, and a label indicating in which section the citation was made.
Bibliography
The European Parliament and the Council of the European Union, "Regulation (eu) 2016/679 of the European parliament and of the council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing directive 95/46/ec (general data protection regulation)," Off. J. Eur. Union, vol. 2016, no. 679, p. 88, 2016. [Online]. Available: https://eur-lex.europa.eu/eli/reg/2016/679/oj
D. Malan, T. Fulford-Jones, M.Welsh, and S. Moulton, "CodeBlue: An ad hoc sensor network infrastructure for emergency medical care," in Proc. Int. Workshop Wearable Implant. Body Sensor Netw., 2004, p. 3. [Online]. Available: http://nrs.harvard.edu/urn-3:HUL.InstRepos:3191012
J. Ko, R. P. Dutton, J. H. Lim, Y. Chen, R. Musvaloiu-E, A. Terzis, G. M. Masson, T. Gao, W. Destler, and L. Selavo, "MEDiSN: Medical emergency detection in sensor networks," ACM Trans. Embed. Com-put. Syst., vol. 10, no. 1, pp. 1-29, Aug. 2010. [Online]. Available: http://portal.acm.org/citation.cfm?doid=1814539.1814550
H. Javdani and H. Kashanian, "Internet of Things in medical applications with a service-oriented and security approach: A survey," Health Technol., vol. 8, nos. 1-2, pp. 39-50, May 2018.
F. Samie, L. Bauer, and J. Henkel, "An approximate compressor for wearable biomedical healthcare monitoring systems," in Proc. Int. Conf. Hardw./Softw. Codesign Syst. Synth. (CODESCISSS), Oct. 2015, pp. 133-142. [Online]. Available: http://ieeexplore.ieee.org/document/ 7331376/
G. Kambourakis, E. Klaoudatou, and S. Gritzalis, "Securing medical sensor environments: The CodeBlue framework case," in Proc. 2nd Int. Conf. Availability, Rel. Secur. (ARES), Apr. 2007, pp. 637-643. [Online]. Available: https://ieeexplore.ieee.org/document/4159858/
R. Hummen, H. Shafagh, S. Raza, T. Voig, and K. Wehrle, "Delegationbased authentication and authorization for the IP-based Internet of Things," in Proc. 11th Annu. IEEE Int. Conf. Sens., Commun., Netw. (SECON), Jun. 2014, pp. 284-292. [Online]. Available: http://ieeexplore. ieee.org/document/6990364/
S. Raza, L. Seitz, D. Sitenkov, and G. Selander, "S3K: Scalable security with symmetric keys_DTLS key establishment for the Internet of Things," IEEE Trans. Autom. Sci. Eng., vol. 13, no. 3, pp. 1270-1280, Jul. 2016.
D. C. Neuman, S. Hartman, K. Raeburn, and T. Yu, The Kerberos Network Authentication Service (V5), document RFC 4120, Jul. 2005. [Online]. Available: https://rfc-editor.org/rfc/rfc4120.txt
S. R. Moosavi, T. N. Gia, E. Nigussie, A. M. Rahmani, S. Virtanen, H. Tenhunen, and J. Isoaho, "End-to-end security scheme for mobility enabled healthcare Internet of Things," Future Gener. Comput. Syst., vol. 64, pp. 108-124, Nov. 2016, doi: 10.1016/j.future.2016.02.020.
J.Winderickx, P. Bellier, P. Duot, D. Coppieters, and N. Mentens, "Workin-progress: Communication and security trade-offs for wearable medical sensor systems in hospitals," in Proc. Int. Conf. Embedded Softw. (EMSOFT). New York, NY, USA: IEEE Press, 2019, p. 2.
J.-S. Lee, Y.-W. Su, and C.-C. Shen, "A comparative study of wireless protocols: Bluetooth, UWB, ZigBee, and Wi-Fi," in Proc. IECON-33rd Annu. Conf. IEEE Ind. Electron. Soc., Nov. 2007, pp. 46-51. [Online]. Available: http://ieeexplore.ieee.org/document/4460126/
A. Shostack, Threat Modeling: Designing for Security. Hoboken, NJ, USA: Wiley, 2014. [Online]. Available: https://books.google. be/books?id=YiHcAgAAQBAJ
J. Daemen and V. Rijmen, The Design of Rijndael. New York, NY, USA: Springer-Verlag, 2002.
N. P. Smart, "Algorithms, key size and protocols report (2018), h2020-ict-2014-project 645421, d5.4," ECRYPT-CSA, Bristol, U.K., Tech. Rep. D5.4, Feb. 2018.
W. Diffie and M. Hellman, "New directions in cryptography," IEEE Trans. Inf. Theory, vol. IT-22, no. 6, pp. 644-654, Nov. 1976.
R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Commun. ACM, vol. 21, no. 2, pp. 120-126, Feb. 1978.
H. Tschofenig and P. Eronen, Pre-Shared Key Ciphersuites for Transport Layer Security (TLS), document RFC 4279, Dec. 2005. [Online]. Available: https://rfc-editor.org/rfc/rfc4279.txt
Information Technology_-Message Queuing Telemetry Transport (MQTT) V3.1.1, Standard ISO/IEC 20922:2016, International Organization for Standardization (ISO), Jun. 2016. [Online]. Available: https://www.iso.org/standard/69466.html
E. Rescorla and T. Dierks, The Transport Layer Security (TLS) Proto-col Version 1.2, document RFC 5246, Aug. 2008. [Online]. Available: https://rfc-editor.org/rfc/rfc5246.txt
T. I. Incorporated. (2019). Msp432p4011: Simplelink Ultra-Low-Power 32-Bit Arm Cortex-M4f MCU With Precision ADC, 2Mb Flash and 256Kb RAM. Accessed: Mar. 2019. [Online]. Available: http://www.ti.com/product/MSP432P4011
T. I. Incorporated. (2019). Cc3120: Simplelink Wi-Fi Network Processor, Internet-of-Things Solution for MCU Applications. Accessed: Mar. 2019. [Online]. Available: http://www.ti.com/product/CC3120
D. Incorporated. (2019). Docker Enterprise is the Industry-Leading Container Platform. Accessed: Mar. 2019. [Online]. Available: https://www.docker.com/products/docker-enterprise
P. S. Incorporated. (2019) Rabbitmq is the Most Widely Deployed Open Source Message Broker. Accessed: Mar. 2019. [Online]. Available: https://www.rabbitmq.com/
N. P. Smart, V. Rijmen, B. Gierlichs, K. Paterson, M. Stam, B. Warinschi, G. Watson, and R. Tirtea, "Algorithms key sizes and parameters report-2014," Eur. Union Agency Netw. Inf. Secur., vol. TP-05-14-084-ENN, p. 113, Nov. 2014. [Online]. Available: https://www.enisa.europa.eu/ publications/algorithms-key-size-and-parameters-report-2014
This website uses cookies to improve user experience. Read more
Save & Close
Accept all
Decline all
Show detailsHide details
Cookie declaration
About cookies
Strictly necessary
Performance
Strictly necessary cookies allow core website functionality such as user login and account management. The website cannot be used properly without strictly necessary cookies.
This cookie is used by Cookie-Script.com service to remember visitor cookie consent preferences. It is necessary for Cookie-Script.com cookie banner to work properly.
Performance cookies are used to see how visitors use the website, eg. analytics cookies. Those cookies cannot be used to directly identify a certain visitor.
Used to store the attribution information, the referrer initially used to visit the website
Cookies are small text files that are placed on your computer by websites that you visit. Websites use cookies to help users navigate efficiently and perform certain functions. Cookies that are required for the website to operate properly are allowed to be set without your permission. All other cookies need to be approved before they can be set in the browser.
You can change your consent to cookie usage at any time on our Privacy Policy page.