{"title":"提高无线电子医疗系统的安全性","authors":"A. Papalambrou, J. Gialelis, D. Serpanos","doi":"10.1109/ISSPIT.2013.6781847","DOIUrl":null,"url":null,"abstract":"In this paper, we identify the security and privacy issues specific to wireless health monitoring devices and describe solutions for protecting wireless communications against side channel attacks and in particular traffic analysis attacks. This process takes place by means of data obfuscation and modifications of communication protocol architectures in order to limit exposed information of system architecture to potential attackers. Initial network simulations of the proposed methods show the feasibility of these methods.","PeriodicalId":88960,"journal":{"name":"Proceedings of the ... IEEE International Symposium on Signal Processing and Information Technology. IEEE International Symposium on Signal Processing and Information Technology","volume":"192 1","pages":"000015-000020"},"PeriodicalIF":0.0000,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Increasing security in wireless e-health systems\",\"authors\":\"A. Papalambrou, J. Gialelis, D. Serpanos\",\"doi\":\"10.1109/ISSPIT.2013.6781847\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we identify the security and privacy issues specific to wireless health monitoring devices and describe solutions for protecting wireless communications against side channel attacks and in particular traffic analysis attacks. This process takes place by means of data obfuscation and modifications of communication protocol architectures in order to limit exposed information of system architecture to potential attackers. Initial network simulations of the proposed methods show the feasibility of these methods.\",\"PeriodicalId\":88960,\"journal\":{\"name\":\"Proceedings of the ... IEEE International Symposium on Signal Processing and Information Technology. IEEE International Symposium on Signal Processing and Information Technology\",\"volume\":\"192 1\",\"pages\":\"000015-000020\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the ... IEEE International Symposium on Signal Processing and Information Technology. IEEE International Symposium on Signal Processing and Information Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISSPIT.2013.6781847\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the ... IEEE International Symposium on Signal Processing and Information Technology. IEEE International Symposium on Signal Processing and Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISSPIT.2013.6781847","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
In this paper, we identify the security and privacy issues specific to wireless health monitoring devices and describe solutions for protecting wireless communications against side channel attacks and in particular traffic analysis attacks. This process takes place by means of data obfuscation and modifications of communication protocol architectures in order to limit exposed information of system architecture to potential attackers. Initial network simulations of the proposed methods show the feasibility of these methods.