Vous êtes sur la page 1sur 8

Security Specification and Implementation for Mobile e-Health Services

Ramon Martí, Jaime Delgado, Xavier Perramon


Universitat Pompeu Fabra (UPF), Barcelona, Spain
{ramon.marti, jaime.delgado, xavier.perramon}@upf.edu

Abstract We present in this paper an architecture for an m-


health system, based on the concept of a BAN (Body
Different IT applications require different Security Area Network) linked via mobile telephony with a
Services. We have been working in the area of e-health hospital or a healthcare centre. Then we focus on the
applications in a mobile environment, and we have security services that must be provided by this m-health
needed to integrate specific Security Services. The paper system and how to implement them.
presents those Security Services for Mobile e-Health
Services and how we have implemented them. First, the 2. A Mobile e-Health System Architecture
different security threats specially oriented to the e-
health applications are described, like patients’ data Mobile e-Health Systems provide medical staff
eavesdropping and manipulation. Afterwards, the (doctors and nurses at a hospital or healthcare centre)
different security mechanisms to address these specific with real-time remote access to patients’ health data.
security threats are described, e.g. data confidentiality This section gives an overview of an architecture for
and integrity, together with the restrictions of dynamic Mobile e-Health Services, including the description of
IP addresses. Following, the specification of security all the components and the communications between
services requirements and the implementation them. Figure 1 presents the components of this mobile e-
possibilities to address them in the Mobile e-Health health architecture and the communication interactions
Services are described. As an example of security between them, which are described in the following
services integrated into an e-health system, the paper subsections.
includes the description of the mobile e-health service
Mobile
MobiHealth, an application developed under the Telephony
MobiHealth Project, co-funded by the European Wired/
Wireless
Commission (IST-2001-36006), focused on the security Sens
Mobile
Front-End

or e-Health End-User
services added to it. Communic.
Server Application
Actu Operator
ator
Internet /
1. Introduction mobile
Internet /
LAN
LAN

terminal

In a digital society, one of the services that will


Body Area
contribute to improve the citizens’ quality of life is Network
electronic healthcare, or e-health. A further step is the
use of mobile communication technologies to provide Fig. 1. Overview of a mobile e-health service
the so-called m-health service: mobile e-health service.
Depending on the severity of their diseases, patients will 2.1. Mobile e-Health Application Components
not need to stay at hospitals, but they will be able to lead
a normal life while their medical data are being According to this architecture, an m-health system
monitored by healthcare professionals. consists of a BAN (Body Area Network) linked to a
In this context, data protection and security is a key hospital or healthcare centre via mobile telephony. The
aspect in order to increase users’ acceptance of these concept of Body Area Network is a specialization of
new technologies, given the highly sensitive nature of Personal Area Network that has recently been
personal health data to be transmitted to and from introduced in the literature [1][2][3]. For our purposes,
mobile terminals. the BAN is a network of sensors (e.g. a pulse meter or a
glucose meter) and/or actuators (e.g. an insulin pump)

Proceedings of the 2004 IEEE International Conference on e-Technology, e-Commerce and e-Service (EEE’04)
0-7695-2073-1/04 $20.00 © 2004 IEEE
attached to the patient’s body, and interconnected in a the BAN. The following hop-to-hop interactions are
star topology to a hub or concentrator, where all data are considered:
collected. This interconnection can be through wires, but - Sensor ļ Front-End: Wired communication, or
also through short-range wireless techniques, such as wireless e.g. Bluetooth.
IEEE 802.15.1/Bluetooth or the more recently - Actuator ļ Front-End: Wired communication, or
developed IEEE 802.15.4/ZigBee [4]. The hub is a wireless e.g. Bluetooth.
device directly connected to a mobile communications - Front-End ļ Mobile terminal: Wired
terminal, typically a cellular phone, through which data communication, or wireless e.g. Bluetooth.
can be transmitted virtually anywhere using Internet - Mobile terminal ļ Network Operator: TCP/IP
protocols, and in particular to the hospital or healthcare communication through mobile telephony.
centre where the patient is being monitored. - Network Operator ļ e-Health Server: TCP/IP
In this architecture, a mobile e-health service is communication. This communication is through local
composed of the following components: LAN, when the e-HS is in the same location as the
- Sensor: A device, such as a photoelectric cell, that Network Operator, or through Internet when it is in a
receives and responds to a signal or stimulus. Sensors in different location.
the BAN can measure pulse, blood pressure, oxygen - e-Health Server ļ End-User Application: Remote
level, glucose level, etc. access of the client to the e-HS data. The access is
- Actuator: A device responsible for actuating a through application layer protocol and application data,
mechanical device, such as one connected to a computer and the communication through TCP/IP in Internet or
by a sensor link. In an e-health system, an actuator can LAN.
be an insulin pump for patients with diabetes.
- Front-End: Hub for all the sensors and actuators in The communication path between the Mobile
the BAN. It records all the data from all the sensors and terminal and the e-Health Server is used to transport
actuators, and can send them to the mobile terminal. application data through application layer protocols.
- Mobile terminal: A Mobile Phone or, alternatively,
some device with mobile communication capabilities, 3. Security Threats in e-Health Mobile
e.g. a PDA. Personal Area Network Communications
- Body Area Network (BAN): Patients network,
composed of Sensors, Actuators, a Front-End and a A mobile e-health service, like all information
Mobile terminal. technology systems, is subject to different kinds of
- Mobile communications Operator: Network security threats. We will not consider here threats of
operator with wireless telephony access to Internet. environmental origin (fire, etc.) or accidental ones (user
- e-Health Server (e-HS): Main server, where medical errors, software malfunction, etc.). The deliberate threats
data is received and distributed. It can be installed in the that we will consider can be categorized into 4 groups:
mobile communications service provider, or at the - threats to confidentiality,
Hospital. - threats to integrity,
- End-User Application (EUA): Computers in the - threats to authenticity (including non-repudiation),
Hospital (or Healthcare centre), used to access the - threats to system performance (availability,
information from the Sensors and Actuators and to send reliability and accountability).
new configuration parameters to the BAN, through the
access to the e-HS. It can be either a main server in the
3.1. Threats to Confidentiality
Hospital, that accesses the e-HS data and stores them in
the already existing patients database, or authorized
By exploiting threats to confidentiality an attacker
employees user computers, that access the e-HS stored
may gain access to private information. The attack
information, both from inside or outside the Hospital.
consists in eavesdropping the communication links,
without interfering with the transmissions, or in
2.2. Mobile e-Health Application inspecting data stored in the system.
Communication The main type of information that can be maliciously
accessed in a mobile e-health service is patient’s health
Different communication interactions exist in a data, either while generated and transmitted by the
mobile e-health service. These communications can be sensors or when stored in the servers.
done in two ways: from the BAN to the End-User
Application, but also from the End-User Application to

Proceedings of the 2004 IEEE International Conference on e-Technology, e-Commerce and e-Service (EEE’04)
0-7695-2073-1/04 $20.00 © 2004 IEEE
The following components of a mobile e-health The attack consists in forging the part of the data
service communications architecture may be subject to where the originator is identified (usually in the
confidentiality threats: headers). These threats apply both to entity identity and
- Communication between sensor or actuator and to data origin.
front-end, especially when a mobile link is used. The following components of the mobile e-health
- Communication between front-end and mobile service architecture may be subject to authenticity
terminal. threats:
- Communication between mobile terminal and the - Sensors or actuators.
network operator. - Front-end.
- Communication within the operator’s network. - Mobile terminal.
- Communication between the network operator and - e-Health Server.
e-Health Server. - End-user application.
- Data storage in the e-Health Server (or in other
components where sensitive data may be temporarily or The safeguards to protect against threats to
permanently stored). authenticity are based on shared secrets (Message
- Communication between e-Health Server and End- Authenticity Codes or MAC) or, if authentication before
user application. a third party is needed, on asymmetric cryptography.
Repudiation is a variant of this type of attacks that
The safeguards to protect against these threats are consists in denying authorship or the contents of data
based on symmetric cryptography: encrypted previously sent.
communication protocols at the various levels of the The safeguards applied to Authenticity also protect
communication (Bluetooth encrypted link, HTTPS, etc.) against Repudiation.
and encrypted storage.
3.4. Threats to System Performance
3.2. Threats to Integrity
The following aspects of system performance are in
By exploiting threats to integrity an attacker may alter general subject to these threats:
the information exchanges within a mobile e-health - Availability: system accessibility and usability upon
service. The attack consists in interfering with the demand by an authorized entity.
transmissions, so that the recipient gets data which are - Reliability: consistent behavior and results as
different from those sent by the originator, or in intended.
modifying data stored in the system. - Accountability: traceability of actions carried out by
The type of information that is subject to these threats an entity.
is the same as in the threats to confidentiality. Even if
the information is protected against eavesdropping by The general types of attacks that exploit these threats
means of encryption, the attacker may blindly modify are denial of service attacks.
this encrypted information. The results that the recipient Safeguards to protect against these threats exist for
will obtain when decrypting these data are unknown to certain specific attacks. In general, however, a solution
the attacker, but it is certain that they will be different may be difficult or costly to deploy.
from the original data.
The components of a mobile e-health service 4. Security Mechanisms Services for Mobile
architecture that may be subject to integrity threats are e-Health Services
the same as for confidentiality threats.
The safeguards to protect against threats to integrity Different security mechanisms are used to provide
are based on redundancy codes (Message Integrity the security services that are required for data:
Codes or MIC) added to the data. Confidentiality, Integrity, Authentication, Non
Repudiation and Access control.
3.3. Threats to Authenticity Those security mechanisms can be added to the
different communication layers, providing different
By exploiting threats to authenticity an attacker may security features depending on the layer where security
counterfeit false data and deceive the recipient into is included. In a mobile e-health service,
believing that they come from a different originator communications security includes protection of
(which the recipient takes as the authentic originator).

Proceedings of the 2004 IEEE International Conference on e-Technology, e-Commerce and e-Service (EEE’04)
0-7695-2073-1/04 $20.00 © 2004 IEEE
communications between the components of the IP address of some of the components of the system
application, in all the communication layers of the stack: have to be taken into account for the implementation.
- Data link layer: Bluetooth security, Zigbee security,
GPRS/UMTS security, etc. 5.1. Dynamic IP Address Restrictions in Mobile
- Network layer: IPsec [6], etc. e-Health Service Components
- Transport layer: SSL/TLS [7][8], HTTPS [9] etc.
- Application layer: Data encryption, signature, etc. One important issue in the final implementation of
mobile e-health service security, apart from the security
4.1. Data Link Layer Security requirements, is the use of Dynamic IP address for two
of the components of the application:
Security in the Data Link Layer provides hop-to-hop - Mobile terminal: The address is provided
protection (encryption and authentication), with no user dynamically by the network operator.
or application authentication. - End-User Application: If it is the Hospital server, it
Security provided by Bluetooth, Zigbee or the public will probably have static IP address, but if it is a
mobile telephony network, in each case, is an example Hospital employee accessing from outside the hospital it
of Data Link Layer protection. may have dynamic IP address, provided by the ISP.

4.2. Network Layer Security 5.2. Dynamic IP Address Restrictions in Mobile


e-Health Protocols
Security in the Network Layer provides node-to-node
protection (encryption and authentication), with no user The use of dynamic IP address has different
or application authentication. The node-to-node implications in the security protocols, which must be
protection in the network layer can be hop-to-hop taken into account in the specification of the security for
protection or end-to-end protection. a mobile e-health service.
For the Network Layer protection, IPsec is an - IPsec provides communications security with data
example, which can be used between systems using encryption and node authentication, based on node
static IP addresses. addresses. IPsec is not suitable for providing
communications security from components with
4.3. Transport Layer Security dynamic IP address. Then, IPsec is not suitable to
provide security to the mobile terminal ļ e-HS
Security in the Transport Layer provides an end-to- communication, or to the e-HS ļ EUA communication.
end protection. It provides application-to-application - SSL and HTTPS provide data transport-level
protection, and it can also include user authentication. security to communications requiring data encryption
SSL/TLS or HTTPS are examples of Transport Layer and user authentication, based on server node address.
security. SSL and HTTPS are suitable for providing
communications security from components with
4.4. Application Layer Security dynamic IP address. Then, it is suitable for mobile
terminal ļ e-HS or e-HS ļ EUA security.
Security in the Application Layer provides - Current mobile communication technologies and
application to application and application-user to Bluetooth are suitable for communications requiring
application-user protection, including user (sender and data encryption and terminal authentication.
receiver) authentication. Application Layer security is
provided through the encryption (symmetric or 6. Mobile e-Health Services Security
asymmetric) or/and signature of the data sent through Requirements Specification and
the communications stack.
SMIME or user-invoked cryptographic functions Implementation
(e.g. OpenSSL) are examples of tools that can be used to
encrypt and sign data for the Application Layer security. In a mobile e-health service different security
requirements related to the Architecture, the System
components and the Communications have to be taken
5. Dynamic IP Address Restrictions into account [5].
The following general security services are defined to
Before entering into the requirements for mobile e- avoid security threats: Confidentiality, Integrity,
health service security, some issues related to Dynamic Authentication, Non-repudiation, Access control, Data

Proceedings of the 2004 IEEE International Conference on e-Technology, e-Commerce and e-Service (EEE’04)
0-7695-2073-1/04 $20.00 © 2004 IEEE
storage security and Time stamping. The security Data transmitted externally to or from the e-Health
services requirements to be addressed by a mobile e- Server must not be read by unauthorized persons.
health service, and how they can be implemented are With regard to the link between the e-Health Server
presented in the following subsections. and the final client at the hospital, the Security
Architecture can also make use of Transport layer
6.1. Confidentiality security (like SSL/TLS). The same server certificate can
be used in this case. Therefore the confidentiality service
Confidentiality protects data to be (almost) is also provided for this link.
impossible to interpret for a non-authorized user during
communication or storage. These are the confidentiality Traffic characteristics of the transmissions to or
requirements to be addressed by a mobile e-health from the BAN (how many data are sent, how often,
service: from where to where, etc.) must be concealed so that
non-authorized observers cannot infer information
Data transmitted between the BAN sensors/actuators about the patient.
and the mobile terminal must not be read by Hiding traffic characteristics or, as it is usually
unauthorized persons. known, “traffic confidentiality”, can be provided to a
For those sensors connected to the mobile terminal certain extent by the Transport layer security (like
through mobile Bluetooth, the encryption methods built SSL/TLS). Source and destination addresses cannot be
into the Bluetooth communications allow for the concealed at the transport layer (it would be necessary to
fulfillment of this requirement. For those sensors with use a secure network layer protocol like IPsec), but
wired connection to the terminal, for the purposes of the length and frequency of packets can be concealed by
BAN it can be assumed that this requirement is already periodically sending packets with “dummy” information,
satisfied. that will be encrypted and will not be distinguishable
from real packets to an intruder.
Data transmitted externally to or from the BAN
must not be read by unauthorized persons. 6.2. Integrity
This requirement can be satisfied in a mobile e-health
service Security by the use of Transport layer security Integrity protects data against non-authorized
(like SSL/TLS) for the external communications in the modification, insertion, reordering or destruction during
BAN. With the secure transport protocol, both ends of communication or storage. The following are the
the communication, client and server, agree on an integrity requirements to be addressed:
encryption key to be used in the packets they will
exchange. In the negotiation of this encryption key, Data transmitted between the BAN sensors/actuators
public key cryptography is used, so that an intruder will and the mobile terminal must not be modified by
be unable to discover which key is being used for unauthorized persons.
encrypting the packets. Data transmitted externally to or from the BAN
The public key cryptography techniques used with must not be modified by unauthorized persons.
Transport layer security usually require that at least the Data transmitted externally to or from the e-Health
server authenticates itself by means of an X.509 Server must not be modified by unauthorized
certificate, issued by a Certification Authority (CA) persons.
trusted by the client. For integrity, the same considerations as for
In a mobile e-health service Security Architecture, Confidentiality apply, since the security protocols
the mobile terminal acts as a client. The communication provide Confidentiality and Integrity at the same time.
to the server makes use of different links (mobile
telephony network, e-HS, Internet, etc.), and each of 6.3. Authentication
these may provide its own security mechanisms at the
data link layer. On top of these link layer security Authentication provides the way to corroborate
mechanisms, the use of Transport layer security protects identity of the entities, sender and receiver, implied in
the communication all the way from the BAN to the the data creation or communication (entity
server. authentication). It can also provide authentication of the
data (data authentication). The following are the
authentication requirements to be addressed:

Proceedings of the 2004 IEEE International Conference on e-Technology, e-Commerce and e-Service (EEE’04)
0-7695-2073-1/04 $20.00 © 2004 IEEE
It must be possible to verify that data collected from which must have authenticated satisfactorily the mobile
the sensors were genuinely produced by the sensors terminal.
and not forged nor tampered with.
For those sensors connected to the mobile terminal 6.4. Non-Repudiation
via Bluetooth, the authentication methods built into the
Bluetooth communications allow for the fulfillment of Non-Repudiation protects against unilateral or mutual
this requirement. For sensors with wired connection to data repudiation. The following is the non-repudiation
the mobile terminal, for the purposes of a BAN it can be requirement to be addressed:
assumed that this requirement is already satisfied.
It must not be possible for a data sender to repudiate
It must be possible to verify that data transmitted the transmission of these data.
from the BAN were sent by the authentic BAN worn By satisfying the Authentication requirements, the
by the authentic patient. main non-repudiation requirements are also satisfied.
In the Transport layer security protocols (like
SSL/TLS) it is usually the server who authenticates itself 6.5. Access Control
to the client, but it is also possible to use client
authentication. For this requirement, the X.509 Access control protects the system and resources
certificate assigned to each patient's mobile terminal can against unauthorized use. The following are the access
be used for the terminal authentication in the initial control requirements to be addressed:
Transport layer security negotiation.
Additional client authentication can be optional, since It must not be possible for unauthorized users to
mobile terminal authentication can be enough in most of access the BAN.
the cases. Client authentication can also be implemented It must not be possible for unauthorized users to
through the use of a user X.509 certificate (instead of or access the e-Health Server.
in addition to the BAN certificate) to encrypt the data, An access control mechanism must be used by
with private key access restricted by the use of a authorized Patients and Nurses to access the BAN and
password or PIN. authorized Nurses and Doctors to access the e-HS. This
mechanism can be, e.g., through an X.509 certificate in
It must be possible to verify that data received by the the Secure transport layer, or even through a simple
BAN from the e-Health Server were sent by the password or PIN.
authentic originator.
This requirement is satisfied by Transport layer 6.6. Data Storage Security
security protocols (like SSL/TLS), where the server
authenticates itself during the connection negotiation Data storage security protects the stored data against
phase. This is closely bound to requirement above: unauthorized use. Depending on the security level
authentication and confidentiality are achieved by the desired for every type of application, it may be necessary
agreement of an encryption key using public key to fulfill some of the following requirements:
cryptography techniques.
Data collected from the sensors must never be stored
It must be possible to verify that data transmitted locally in the BAN.
from the End-User Application were sent by an The Security Architecture allows for direct data
allowed user. transmission from the BAN to the server. If this is not a
Users must authenticate themselves to the e-HS. An security requirement for a particular scenario, data can
X.509 certificate mechanism through a Transport layer optionally be stored in the BAN for subsequent
security protocol can be enough. transmission. Therefore, the Security Architecture
supports both options.
It must be possible to verify that data received by the
End-User Application from the e-Health Server were Data collected from the sensors must not be stored
sent by the authentic originator. locally in the BAN, except for temporary storage for
From the point of view of the EUA, authentication is later transmission while network connection is off.
carried forward by the e-HS. Now, the e-HS must This service may be required for mobile telephony
authenticate itself before the EUA through a secure out-of-coverage temporary situations. Then it is
transport protocol (like SSL/TLS), possibly using the necessary to use secure temporary storage: once the data
same server certificate. The EUA then trusts the e-HS,

Proceedings of the 2004 IEEE International Conference on e-Technology, e-Commerce and e-Service (EEE’04)
0-7695-2073-1/04 $20.00 © 2004 IEEE
are transmitted, all track must be completely and BT|ZB
GPRS|UMTS Back-End
System

securely removed from the BAN. This requirement must Sens


GPRS / Wireless

Front-End
Surrogate BANData
be addressed by the BAN Operating System, since it is or

Actu
UMTS
Operator
Service
Broker
Host Repository
End-User
Application

not related to communications security. ator


Internet /
Internet /
LAN
LAN
MBU

A log of data collected from the sensors must be


stored in the BAN. Body Area
Network

This is the opposite of the previous two requirements.


Fig. 2. Overview of the MobiHealth System
The security of this storage is also a matter of the BAN
Operating System as it is not related to communications
security.
7.2. MobiHealth Components

The MobiHealth architecture is largely based on the


A log of data transmitted externally to or from the
m-health architecture presented in the previous sections,
BAN must be kept locally.
with some adaptations: the mobile terminal is called the
This requirement must be satisfied by a module of the
Mobile Base Unit (MBU) in MobiHealth, and a new
secure communications, integrated with the BAN
component is introduced, the Wireless Service Broker
Operating System.
(WSB), as detailed below. These are the specific
components of the MobiHealth system:
6.7. Time Stamping - Mobile Base Unit (MBU): It corresponds to the
Mobile Terminal.
The following is the time stamping requirement to be
- Back-End System (BEsys): It corresponds the e-
addressed:
Health Server. It is a system composed of a Wireless
Service Broker, a Surrogate Host and a BANData
It must be possible to unforgeably determine at what Repository. BEsys are installed in some GPRS/UMTS
time data were originated. service providers, and some Hospitals.
If there is a need to associate a time with each piece - Wireless Service Broker (WSB): Authenticates and
of data, authenticated timestamps have to be included in authorizes mobile terminals.
the exchanged packets. - Surrogate Host (SH): Main server, where mobile
sensor and actuator objects are “surrogated” inside the
7. Example of Security Services in a Mobile wired Internet, and where medical data is received.
e-Health Application: MobiHealth - BANData Repository (BDR): A process that acts as
a client to the Surrogate Host (it is a Jini service user of
This section describes the MobiHealth [10] system the mobile terminal service provider). In addition, the
and the security services in it, as an example of the BDR writes the medical data (i.e. measurements) to
security services of a mobile e-health service. It includes persistent storage.
the description of its architecture, its components and the
communications between them. The mobile e-health 7.3. MobiHealth Communication
service MobiHealth is an application developed under
the MobiHealth Project, co-funded by the European The MobiHealth communication is also based on the
Commission (IST-2001-36006). The main goal of this m-health architecture presented previously, and taking
project is the development of an m-health service based into account the adaptation in the architecture. Different
on new generation mobile telephony: the so-called 2.5G communication interactions exist in MobiHealth. These
(GPRS: General Packet Radio Service) and the communications can be done in two ways: from the
forthcoming 3G (UMTS: Universal Mobile BAN to the EUA, but also from the EUA to the BAN.
Telecommunications System). The communication path between the MBU and the
BESys is used to transport application data through
7.1. MobiHealth Architecture application layer protocols.

Figure 2 presents the main components of the 7.4. MobiHealth Security Implementation
MobiHealth system and the communication interactions Summary
between them, which are described in the following
subsections. Taking into account the different issues related to the
security and to the MobiHealth requirements and

Proceedings of the 2004 IEEE International Conference on e-Technology, e-Commerce and e-Service (EEE’04)
0-7695-2073-1/04 $20.00 © 2004 IEEE
architecture, the following security options were potential users of the healthcare system, i.e. every
integrated. individual, can benefit from the improvement in quality
- Bluetooth | Zigbee security for encrypted and of life that m-health represents.
authenticated data transmission between the Front-End The MobiHealth project has also been presented as
and the MBU. an example. The main technical objective of this project
- HTTPS with user and server X.509 certificates for has been to prove the feasibility and the advantages of
encrypted and authenticated data transmission between using 2.5G-3G mobile telephony in a specific area of
the MBU and the WSB. application, namely m-health. But it also has other side
- HTTPS with user and server X.509 certificates for benefits, one of which has been the implementation of
encrypted and authenticated data transmission between the security services that we have presented in this
the WSB and the SH, if they are on different systems. paper, to enhance the quality of the service.
- RMI (Remote Method Invocation) security
(SSL|IPsec) for the BDR access to the SH data, when 9. References
both are in different systems.
- HTTPS security for the EUA access to the BDR [1] Thomas Zimmerman. “Personal area networks (PAN):
data. Near-field intra-body communication”. IBM Systems Journal,
- No data storage in the “disk”, but some data storage 35:609-618, 1996.
for buffering, for the Front-End, MBU, GPRS/UMTS
Operator, WSB and EUA (for employees computers). [2] Val Jones, Richard Bults, Dimitri Konstantas, Pieter AM
- Secure data storage, with confidentiality and user Vierhout. “Healthcare PANs: Personal Area Networks for
trauma care and home care”. Fourth International Symposium
access authentication, for the BDR and EUA (for
on Mobile Personal Multimedia Communications (WPMC),
Hospital Workstation with patients Database). Aalborg, Denmark, 2001.

7.5. Advantages and Disadvantages [3] Karen van Dam, Steve Pitchers, Mike Barnard. “From PAN
to BAN: Why Body Area Networks?” Proceedings of the
The Security in the MobiHealth system presents the Mobile World Research Forum (WWRF) Second Meeting,
following advantages: Helsinki, Finland, 2001.
- Use of standard user-oriented security mechanisms.
[4] IEEE mobile standards web page:
- No use of IPsec host-oriented security.
http://standards.ieee.org/mobile/overview.html#802.15
- All communications and data from the mobile
terminal to the Surrogate Host are secured through [5] Ramon Martí, Jaime Delgado. “Security in a Wireless
authentication and encryption, independently of the Mobile Health Care System”. MobEA (Emerging Applications
underlying network. for Wireless and Mobile Access) Workshop collocated with
WWW2003 conference, Budapest, Hungary, 2003
The main disadvantage is the following: (http://www.research.att.com/~rjana/Marti-Delgado.pdf)
- Since security services are added, there is an
increase in the traffic volume, which may represent a [6] RFC 2401, “Security Architecture for the Internet Protocol”
S. Kent, R. Atkinson, November 1998.
penalty in system performance. However, according to
measurements that we have carried out, the decrease in [7] SSL3, “The SSL 3.0 Protocol”, A. Frier, P. Karlton, and P.
throughput is relatively small (around 6%). Kocher, Netscape Communications Corp., November 18, 1996.

8. Conclusions [8] RFC2246, “The TLS Protocol Version 1.0”. T. Dierks, C.


Allen. January 1999.
This paper presents the security services required for
[9] RFC 2818, “HTTP Over TLS”, Rescorla, E., May 2000.
Mobile e-Health Services. The introduction of security
in these applications will enhance the quality of the [10] MobiHealth website: http://www.mobihealth.org/
service in the form of increased trust and acceptance
from the users of m-health services, which will add to
the social and economical advantages of mobile
healthcare for an important number of citizens. All

Proceedings of the 2004 IEEE International Conference on e-Technology, e-Commerce and e-Service (EEE’04)
0-7695-2073-1/04 $20.00 © 2004 IEEE

Vous aimerez peut-être aussi