Estudio de la Seguridad en Redes de Sensores Corporales aplicadas al Ámbito Sanitario


Nowadays, the technology has become necessary in daily aspects of everyday life, included healthcare and healthy lifestyle. Thus, in the last years has taken place an important development of Body Sensor Networks (BSN) to let a continuous monitoring. Security is becoming increasingly important in all areas related to Information Technology, and becomes even more important when patient’s health is involved. Confiability and privacy are necessary requirements for patients to feel secure with the sensors, but the reliability is necessary too, because if all measured data are lost or damage before reaching their destination, it cannot be made an adequate monitor or make the best diagnosis. The aim of this work is to provide a review of the security for BSN applied to the healthcare, in order to enable the development of applications to improve the patient's diagnosis and treatment with chronic diseases.

Keywords: BSN, healthcare,confiability, reliability, chronic diseases.

[1] Bao, S. D. Y. T. Zhang and L. F. Shen, ”Physiological signal based entity authentication for body area sensor networks and mobile healthcare systems”, Proc. 27th IEEE Conference on Engineering in Medicine and Biology, pp. 2455-2458, 2005

[2] Cahyadi, W. A. T. Jeong, Y. H. Jim, Y. H. Chung and T. Adiono, ”Patient Monitoring Using Visible Light Uplink Data Transmission”, International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS) pp 9-12, 2015

[3] Cao, C. Z.; He, C. G., Bao, S. D. and Li, Y. ”Improvement of fuzzy vault scheme for securing key distribution in body sensor network, ”Proc. Annual Conference of IEEEEMBS, 2011, pp. 3563-3567

[4] He, D., Zeadally, S. and Wu, L. ”Certificateless Public Auditing Scheme for CloudAssisted Wireless Body Area Networks”, IEEE Systems Journal, pp 1932-8184, 2015

[5] Huang, X. X. Gao, and Z. Yan, ”Security protocols in body sensor networks using visible light communications”, International Journal of Communication Systems, 2015

[6] Lu, Y. and S. D. Bao, ”Efficient Fuzzy Vault Application in Node Recognition for Securing Body Sensor Networks”, IEEE International Conference on Communications (ICC), pp 3648 - 3651, 2014

[7] Mahapatro, A. and Mohan Khilar,P. ”Fault Diagnosis in Body Sensor Networks”, International Journal of Computer Information Systems and Industrial Management Applications. V 5, pp. 252-259, 2012

[8] Miao, F. Bao, S.-D. and Li, Y. ”A modified fuzzy vault scheme for biometrics-based body sensor networks security”, Proc. IEEE Global Telecommun. Conf. GLOBECOM, pp. 1-5, Dec. 2010

[9] Miao, Fen, Jiang, Lei Ye Li and Yuan-Ting Zhang, ”A Novel Biometrics Based Security Solution for Body Sensor Networks”, IEEE, 2009

[10] OMS. Organización Mundial de la Salud. ¿Qué son las enfermedades cardiovasculares?” 2017. (Último acceso 25/04/2015).

[11] OMS. Organización Mundial de la Salud. Informe mundial sobre la diabetes Abril 2016. (Último acceso 25/04/2017).

[12] Ramli, S.N. R. Ahmad, M.F. Abdollah, E. Dutkiewicz,” A Biometricbased Security for Data Authentication in Wireless Body Area Network (WBAN),” Advanced Communication Technology (ICACT), pp. 998-1001, Jan. 2013.

[13] Rekha, R. T. Gayathri Mathambigai, and Dr.R. Vidhyapriya, ”Secure Medical Data Transmission in Body Area Sensor Networks Using Dynamic Biometrics and Steganography”, Bonfring International Journal of Software Engineering and Soft Computing, 2012

[14] Sankari, V. and K. Nandhini, ”Steganography Technique to Secure Patient Confidential information using ECG Signal”, International Conference on Information Communication and Embedded Systems (ICICES), 2014

[15] Sarvabhatla, M. and C.S. Vorugunti, ”An energy efficient mutual authentication scheme for secure data exchange in health-care applications using wireless body sensor network”, Future Information Security Workshop, COMSNETS, 2015

[16] Shanthi, A. V. K ”FINE-GRAINED ACCESS OF PERSONAL HEALTH RECORD IN CLOUD COMPUTING”, ARPN Journal of Engineering and Applied Sciences, Vol 10, no. 22, 2015

[17] Shi, L., J. Yuan, S. Yu and M. Li, ”MASK-BAN: Movement-Aided Authenticated Secret Key Extraction Utilizing Channel Characteristics in Body Area Networks”, IEEE INTERNET OF THINGS JOURNAL, VOL. 2, NO. 1, pp 52-62, 2015

[18] Sil Lee, Y. B. Ndibanje, E. Alasaarela, T. Y. Kim and H. Lee, ”An Effective and Secure User Authentication and Key Agreement Scheme in m-Healthcare Systems”, 7th IEEE International Symposium on Cyberspace Safety and Security (CSS), 2015

[19] Sil Lee, Y. B. Ndibanje, E. Alasaarela, T. Y. Kim and H. Lee, ”An Effective and Secure User Authentication and Key Agreement Scheme in m-Healthcare Systems”, 7th IEEE International Symposium on Cyberspace Safety and Security (CSS), 2015

[20] Tian, Y. Y. Peng, X. Peng and H. Li, ”An Attribute-Based Encryption Scheme with Revocation for Fine-Grained Access Control in Wireless Body Area Networks”, Hindawi Publishing Corporation International Journal of Distributed Sensor Networks, 2014

[21] Venkatasubramanian, K. K, A. Banerjee, S. K. S. Gupta, ”PSKA: usable and secure key agreement scheme for body area networks, ” IEEE Transactions on Information Technology in Biomedicine, vol. 14, no. 1, 2010, pp. 60-68

[22] Wang, Y., Li. Xing, H. Wang and G. Levitin, ”Combinatorial analysis of body sensor networks subject to probabilistic competing failures”, Reliability Engineering & System Safety, V 142, pp 388-398, 2015

[23] Wu, G.; J. Ren, F. Xia and Z. Xu, ”An Adaptive Fault-Tolerant Communication Scheme for Body Sensor Networks”, Sensors, 2010

[24] Zheng, G., G. Fang, M. A. Orgun and R. Shankaran, ”A Comparison of Key Distribution Schemes Using Fuzzy Commitment and Fuzzy Vault within Wireless Body Area Networks”, 26th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC): Services Applications and Business, pp 2120-2125,