Skip to main content

Software Authentication to Enhance Trust in Body Sensor Networks

  • Conference paper
Security and Trust Management (STM 2012)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7783))

Included in the following conference series:

  • 820 Accesses

Abstract

This paper studies an approach to enhance the trust in the widespread use of Body Sensor Networks (BSN) in Healthcare. To address the wide variety in medical indications and differences between patients, we assume that such BSNs are programmable and highly flexible in their functionality. Yet this opens a vulnerability to malicious attacks and intrusion of the patient’s privacy. We study the work flow in a typical medical scenario, we map the (implied or evidence-based) trust relations and we use this to propose a scheme for verifying the authenticity and trustworthiness without prohibitively interfering with common practices. Our proposed framework is currently being refined in the VITRUVIUS project, for instance to test the feasibility of its implementation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bui, V.T., Lukkien, J.J., Verhoeven, R.: Toward a Trust Management Model for a Configurable Body Sensor Platform. In: Proceedings of the 6th ICST International Conference on Body Area Networks, Bodynets 2011, pp. 23–26 (November 2011)

    Google Scholar 

  2. Dolan, B.: First mobile medical app to get CE Mark in UK (January 2012), http://mobihealthnews.com/15707/first-mobile-medical-app-to-get-ce-mark-in-uk/

  3. Gambetta, D.: Can We Trust Trust?. In: Trust: Making and Breaking Cooperative Relations, pp. 213–237. Basil Blackwell (1988)

    Google Scholar 

  4. de Groot, J., Linnartz, J.P.: Zero Leakage Quantization Scheme for Biometric Verification. In: 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1920–1923 (May 2011)

    Google Scholar 

  5. Holcomb, D., Burleson, W., Fu, K.: Power-Up SRAM State as an Identifying Fingerprint and Source of True Random Numbers. IEEE Transactions on Computers 58(9), 1198–1210 (2009)

    Article  MathSciNet  Google Scholar 

  6. Institute for Healthcare Improvement: Early Warning Systems: Scorecards That Save Lives, http://www.ihi.org/knowledge/Pages/ImprovementStories

  7. Jøsang, A.: An Algebra for Assessing Trust in Certification Chains. In: Proceedings of the Network and Distributed Systems Security, NDSS (1999)

    Google Scholar 

  8. Jøsang, A., Hayward, R., Pope, S.: Trust Network Analysis with Subjective Logic. In: Proceedings of the 29th Australasian Computer Science Conference, ACSC 2006, vol. 48, pp. 85–94. Australian Computer Society, Inc., Darlinghurst (2006)

    Google Scholar 

  9. Jøsang, A., Ismail, R., Boyd, C.: A Survey of Trust and Reputation Systems for Online Service Provision. Decis. Support Syst. 43, 618–644 (2007)

    Article  Google Scholar 

  10. Jøsang, A., Pope, S.: Semantic Constraints for Trust Transitivity. In: Proceedings of the 2nd Asia-Pacific conference on Conceptual modelling, APCCM 2005, vol. 43, pp. 59–68. Australian Computer Society, Inc., Darlinghurst (2005)

    Google Scholar 

  11. Linnartz, J.P., Lukkien, J., Benz, H., de Clercq, P., van Bussel, M.: VITRUVIUS Project Official Website (2008), http://vitruvius-project.com/

  12. Linnartz, J.P., Tuyls, P.: New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates. In: Kittler, J., Nixon, M.S. (eds.) AVBPA 2003. LNCS, vol. 2688, pp. 393–402. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  13. Maes, R., Tuyls, P., Verbauwhede, I.: A soft decision helper data algorithm for SRAM PUFs. In: IEEE International Symposium on Information Theory, ISIT 2009, pp. 2101–2105, June 28 - July 3 (2009)

    Google Scholar 

  14. Mcknight, D.H., Chervany, N.L.: The Meanings of Trust. Technical Report MISRC Working Paper Series 4, University of Minnesota, Management Information Systems Research Center (1996)

    Google Scholar 

  15. Pearson, S.D., Raeke, L.H.: Patients’ Trust in Physicians: Many theories, few measures, and little data. Journal of General Internal Medicine 15(7), 509–513 (2000)

    Article  Google Scholar 

  16. Plataniotis, K., Hatzinakos, D., Lee, J.: ECG Biometric Recognition Without Fiducial Detection. In: 2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference, pp. 1–6, July19 - August 21 (2006)

    Google Scholar 

  17. Thompson, B.M.: FDA Regulation of Mobile Health. Tech. rep., MobiHealthNews (2010), http://mobihealthnews.com/research/fda-regulation-of-mobile-health/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

de Groot, J., Bui, V., Linnartz, JP., Lukkien, J., Verhoeven, R. (2013). Software Authentication to Enhance Trust in Body Sensor Networks. In: Jøsang, A., Samarati, P., Petrocchi, M. (eds) Security and Trust Management. STM 2012. Lecture Notes in Computer Science, vol 7783. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38004-4_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-38004-4_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-38003-7

  • Online ISBN: 978-3-642-38004-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics