- About this Journal ·
- Abstracting and Indexing ·
- Aims and Scope ·
- Annual Issues ·
- Article Processing Charges ·
- Articles in Press ·
- Author Guidelines ·
- Bibliographic Information ·
- Citations to this Journal ·
- Contact Information ·
- Editorial Board ·
- Editorial Workflow ·
- Free eTOC Alerts ·
- Publication Ethics ·
- Reviewers Acknowledgment ·
- Submit a Manuscript ·
- Subscription Information ·
- Table of Contents
Journal of Biomedicine and Biotechnology
Volume 2012 (2012), Article ID 546021, 5 pages
Secure Remote Health Monitoring with Unreliable Mobile Devices
Myongji University, Yongin, Gyeonggi-do 449-728, Republic of Korea
Received 17 May 2012; Accepted 28 May 2012
Academic Editor: Sabah Mohammed
Copyright © 2012 Minho Shin. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
As the nation’s healthcare information infrastructure continues to evolve, new technologies promise to provide readily accessible health information that can help people address personal and community health concerns. In particular, wearable and implantable medical sensors and portable computing devices present many opportunities for providing timely health information to health providers, public health professionals, and consumers. Concerns about privacy and information quality, however, may impede the development and deployment of these technologies for remote health monitoring. Patients may fail to apply sensors correctly, device can be stolen or compromised (exposing the medical data therein to a malicious party), low-cost sensors controlled by a capable attacker might generate falsified data, and sensor data sent to the server can be captured in the air by an eavesdropper; there are many opportunities for sensitive health data to be lost, forged, or exposed. In this paper, we design a framework for secure remote health-monitoring systems; we build a realistic risk model for sensor-data quality and propose a new health-monitoring architecture that is secure despite the weaknesses of common personal devices. For evaluation, we plan to implement a proof of concept for secure health monitoring.
The nation has an urgent need to build a national healthcare information infrastructure (NHII) that provides health information to all who need to make sound decisions about health . Readily accessible and reliable health information would greatly improve everyone's ability to address personal and community health concerns. Health emergencies also require prompt and authoritative information about the situation to be readily available to those involved. Fortunately, present information technology brings us the hope that significant improvements in the public' health and wellbeing are not only possible but close at hand.
Wearable and implantable medical sensors and portable computing devices present many opportunities for providing timely health information to health providers, public health professionals, and consumers . By supplying real-time health information, or extensive measurements collected continuously, a sensor-based health-monitoring system complements the current healthcare information infrastructure, which is based on relatively static, sparsely collected information in the patient's medical records. A remote health-monitoring system may help to reduce the cost of healthcare  and to simultaneously improve the quality of the healthcare; patients may spend less time in the hospital and yet have more detailed health data, measured by wearable sensors as they go about their daily activities; caregivers can more quickly react to the medical emergencies of elders; trainers can analyze a trainee's fitness level; consumers can maintain their own health and wellness.
Privacy and information quality, however, are two major concerns in the development and deployment of remote health-monitoring systems [4, 5]. To be viable, any such system must provide usable devices that respect patient privacy while also retaining data quality required for the medical purpose it serves. There are many opportunities for the data to become lost, damaged, forged, or exposed: patients may fail to apply sensors correctly, leading to medically incorrect readings; the patient's device may be misplaced, stolen, or compromised, causing the medical data stored in the device to be divulged ; the sensor data may travel across multiple devices and networks before it is presented to the medical team. The problem is especially challenging, given the difficulty of hardening low-cost sensors and the personal devices that collect, process, and forward the medical data, and given that all such devices will communicate over wireless networks.
When such a system is compromised, the consequences may be dire. Incorrect sensor data, whether it is inaccurate, manipulated, delayed, or originating from the wrong patient, can lead to incorrect diagnosis or inappropriate treatments. When the data is used for medical research or epidemiological studies, public health can be endangered. When the data is inappropriately disclosed, it may expose the patient's medical problems, and details of treatments underway. Insufficient data integrity may cause health professionals to mistrust the data and may make them reluctant to use devices that may, otherwise, be beneficial to patient health. Insufficient protection of patient privacy may reduce the patients' willingness to wear medical sensors, or even inspire them to cause the sensors to report incorrect data, again reducing the health benefit of these technologies.
The problem is difficult due to the lack of control over the situation at the patient's end. Correct application of sensors and proper configuration of the device depend on the patient's ability and diligence. Education helps, but people make mistakes and many fail to implement security practices . The problem becomes harder when the hardware or software components are integrated into a personal device such as a cellular phone, a PDA, or a smart watch. Such devices have limited security features and are vulnerable to unauthorized access; some security mechanisms (like TPM [8, 9]) may be too restrictive and difficult to use. The use of dedicated devices, however, would be costly, has limited flexibility, and may reduce patient participation.
In this paper, we will address these issues by designing a framework for secure remote health-monitoring systems. Given the time available (one year), we will focus most on the data-quality issues. Specifically, we want to (i) build a realistic risk model for sensor-data quality, by interacting with health professionals, (ii) develop protocols and mechanisms for data protection and quality assurance, and (iii) propose a new health-monitoring architecture that is secure despite the weaknesses of common personal devices. For evaluation, we will implement a proof of concept for secure health monitoring.
2. Risk Analysis
First, we define some terminology.
(i) Medical Sensor Data
Data generated by sensors that can directly describe some physiological condition of a person or can describe the context of the person or the situation, such as movement, location, temperature, or noise level.
(ii) Monitoring Software
A software component that performs health-monitoring tasks at the patient's end; it controls sensors, collects medical sensor data from sensors, processes the data, and reports the data to the server.
(iii) Monitoring Device
A portable device that can be connected to the Internet through a wireless connection and can communicate with wearable sensors through short-range wireless connection; the monitoring software runs within the monitoring device.
The person whose medical condition is monitored by the health-monitoring system, who wears the sensors and carries the monitoring device; the monitoring device may be owned by the patient and used for other nonmedical purposes.
The party who deploys the health-monitoring system and collects the medical sensor data of the patient, based on which it provides health services to the patient such as medical diagnosis , emergency response, or fitness training; examples include physicians, nursing homes, or personal trainers.
To design a secure health-monitoring system, we first need to understand what determines the quality of the medical sensor data and how we can quantify the degree of the data quality. Specifically, we want to identify factors that affect the data quality and then analyze to what extent they influence the data quality. Others have described overall security challenges in health-monitoring systems , and initial ideas for protecting health-data integrity , but an in-depth and realistic analysis of the problem is lacking in the literature.
As a preliminary analysis, we recently identified eleven factors that can affect the quality of medical sensor data  (see next section for detail). To ensure or evaluate the data quality of a health-monitoring system, one should take these factors into account. Without knowledge of physiology and practical concerns, however, it is difficult to quantify to what extent each factor will contribute to the data quality.
3. Quality Control Framework
In this section, we design a quality-control framework based on the risk analysis in the previous section. The framework is a set of processes that ensure, verify, and evaluate the data quality.
To design a quality-control framework, we first analyzed the health-monitoring system as a sequence of processes, assigned related factors to each process, and then identified possible methods for the quality control of individual factors. Figure 1 illustrates our analysis. Medical sensing begins with sensing the physiology of the patient (sense process). Each sensor generates sensor data at a certain rate and transmits them to the device through a wireless connection (transfer process). The monitoring device collects data from sensors, processes them as needed (collect process), and then forwards them to the provider (transfer process). Upon receiving the data from the device, the provider's server evaluates the validity of the data (verify process) and then presents the data to the provider. When it presents the data, the server also presents the level of the data quality to the provider (assess process). Figure 1 lists the factors that are related to each process. For each factor, the possible methods for quality control are shown. In the following, we discuss our analysis in more detail. (For brevity, we skip the factors that are self-explanatory.)
The accuracy of a sensor depends on its design and manufacturer (i.e., sensor profile), the time since the latest calibration, and the age of the sensor. The data quality depends on the accuracy expressed by the expected error bound.
The quality of sensor data also depends on the level of detail that a sensor can provide.
The data quality also depends on correct application of the sensor to the body; if the sensor is not correctly applied to the body, it generates incorrect sensor data. If the patient is responsible for the application, the quality of sensor application depends on the patient's ability and diligence. The patient's ability depends on the education, age, and prior experience. When a sensor is incorrectly applied, the data is likely to deviate from the range of values that are considered reasonable as a physiological value. We call this reasonableness of the medical data soundness. The soundness of data includes physiological soundness and contextual soundness; we explain these in more detail below where we explain the verification process.
It is often medically necessary to collect multiple sensor readings of different modalities, and a health professional can derive a medical condition from their combination. For the combination to be useful, the sensor readings should be temporally synchronized. If sensors cannot time-stamp each data, the device should do so, but it should also make sure that the sensor data is sampled at that moment (i.e., not replayed by an adversary). The data quality depends on the granularity of the synchronization.
(v) Information Loss by Aggregation
Communication is costly. To save the amount of information to be sent, the device can aggregate sensor readings before sending (e.g., reporting the average per minute). However, every aggregation loses some information in data, and the quality of data depends on the amount of information lost by the aggregation.
Most factors related to sense, collect, and transfer processes are syntactic (except sensor application); they depend little on the semantics of the medical data. For example, one can protect message integrity without knowing the meaning of the data contained in the message. However, medical data has rich semantics that can determine what data is sound as medical data. The verification process exploits the semantics of the medical sensor data to verify if the data is appropriate, useful, or acceptable for the purpose of health monitoring.
(i) Patient Authentication:
patient authentication verifies whether the sensors are monitoring the right person. Biometric data (e.g., fingerprint ) is simple and accurate but its permanence can raise a privacy issue . We can also compare the data with the patient's past data or the medical profile (e.g., disease or weakness) to verify the patient's identity. The data quality depends on the likelihood that we are monitoring the right person.
(ii) Physiological Soundness:
a physiological data cannot take arbitrary values. One can check if the value falls in a reasonable range (range check), if it is coherent with the known probability distribution (probability distribution), if its temporal change exhibits a reasonable behavior (autocorrelation), or if sensor values of different modalities accord with the known correlations between them. (Such an anomaly can also signify a medical problem of the patient, and the verification methods can also apply to the problem of anomaly detection. However, such “emergency detection” is outside the scope of this work).
(iii) Contextual Soundness:
like physiological soundness, we can verify the data quality by comparing the medical data with some context data such as body movement, location, or temperature. For example, the acceptable values for heart-rate or blood pressure are different when the patient is running or sleeping.
When quality verification fails, the quality of incoming data becomes uncertain. Even if all the verifications succeed, there are many opportunities for data to become incorrect (see Figure 1). To deal with the uncertainty, the providers need to know how much they can trust the data and what is causing the problem. The assessment process takes all the factors into account, judges the current level of the data quality, and presents that judgment to the provider.
Prior work on data integrity in health-monitoring systems focused on detecting packet loss , improving false positives using sensor correlation , or categorizing the data quality into four discrete states based on observed error and lack of data . Giani et al.  proposed a broad range of methods for data validation, but only basic concepts were proposed. Compared to prior work, our approach provides a generic framework for the quality control of a health-monitoring system.
DS theory has many uses; for example, it was recently used for evaluating the performance of intrusion detection systems (IDS) . While they simply combined the partial judgments that are provided by existing IDS schemes, our future work will actually define belief functions for each factor and also explore other possibilities for combining partial results, seeking methods that fit better to health-monitoring applications.
So that patients need not to carry a dedicated monitoring device, we want to leverage the mobile device they already carry—their cellphone. Mobile phones are increasingly powerful, effectively personal computing devices with substantial computation, storage, and networking capabilities. Furthermore, they are increasingly able to sense location (GPS), motion (accelerometer), light, proximity, temperature, sound (microphone), and video (camera). The use of existing devices has advantages in deployment cost and usability .
On the contrary, turning a personal device to a health-monitoring device also has challenges. First, personal devices are diverse in software platform and security mechanism. The developer must adapt to the wide variety of features (and varying degrees of security) on mobile platforms such as Windows Mobile, Mac OS X, and Symbian. Although some future platforms may have strong security support such as a TPM [8, 9], a TPM may not allow the patient to install monitoring software without going through a complicated platform-certification process.
To address these challenges and yet still leverage the patient's mobile phone as a platform, we design a novel architecture that decouples the monitoring component from the personal device. Suppose that the health provider distributes small health-monitoring units (HMUs) to patients and asks them to keep the unit plugged into the device through a common interface such as SD card, miniUSB, or SIM card. (Although not all current phones have expansion slots, and GSM phones only have one SIM-card interface, we imagine next-generation mobile phones that have a standard expansion slot of similar form factor and capability to these examples). The HMU can store secret keys and compute some cryptographic functions (as SIM card can do in today's GSM phones). As shown in Figure 2, the unit can authenticate sensors (authenticator) and verify the authenticity of sensor data forwarded by the monitoring software (auditor). When needed, it aggregates sensor data before sending to the provider (fusor). The HMU adds message authentication codes to messages sent to the provider, and, without HMU, the device cannot prove authenticity of the sensor data to the provider. The HMU makes the health-monitoring portable from device to device, easy to manage, and hard to compromise; there are many opportunities for adversaries to access the device through software attacks , while it requires a hardware attack to compromise the HMU .
5. Implementation Plan
To evaluate the potential for our approach in real applications, we plan to implement the framework using current mobile-phone and smart-card technology. For test platform, we will use G1 and Nexus One Android-based phones. For monitoring unit, we consider Giesecke and Devrient (G&D) smart card . The software running within the monitoring unit will be implemented as a Java applet for the JavaCard platform. Collected data will be sent to the central server via 3G network.
As an application, we plan to implement Sleep Actigraphy using accelerometer readings to measure the patient's sleep pattern. In addition to security analysis, we plan to evaluate the feasibility of the platform in terms of energy consumption and usability.
Although advances of information technology and mobile computing present many opportunities for providing timely health services, the use of unreliable devices for remote health monitoring opens vulnerabilities for privacy and information quality. In this paper, we provided risk analysis and present a framework for secure remote health-monitoring systems. We also designed a health monitoring architecture that leverages a special monitoring unit that plays the central role of the security by providing critical security services including authentication, audit, key management, and data fusion. In future, we plan to implement the framework and evaluate in a real setting.
This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology (2012-0172), and by 2011 Research Fund of Myongji University.
- D. E. Detmer, “Building the national health information infrastructure for personal health, health care services, public health, and research,” BMC Medical Informatics and Decision Making, vol. 3, article 1, 2003.
- A. D. Jurik and A. C. Weaver, “Remote medical monitoring,” Computer, vol. 41, no. 4, pp. 96–99, 2008.
- S. L. Dimmick, S. G. Burgiss, S. Robbins, D. Black, B. Jarnagin, and M. Anders, “Outcomes of an integrated telehealth network demonstration project,” Telemedicine Journal and E-Health, vol. 9, no. 1, pp. 13–23, 2003.
- V. Stanford, “Pervasive health care applications face tough security challenges,” IEEE Pervasive Computing, vol. 1, no. 2, pp. 8–12, 2002.
- J. Sriram, M. Shin, D. Kotz, A. Rajan, M. Sastry, and M. Yarvis, “Challenges in data quality assurance in pervasive health monitoring systems,” in Future of Trust in Computing. Lecture Notes in Computer Science, D. Gawrock, H. Reimer, A. R. Sadeghi, and C. Vishik, Eds., 2009.
- A. K. Ghosh and T. M. Swaminatha, “Software security and privacy risks in mobile e-commerce,” Communications of the ACM, vol. 44, no. 2, pp. 51–57, 2001.
- B. Schneier, “The psychology of security,” Communications of the ACM, vol. 50, no. 5, p. 128, 2007.
- Mobile Phone Work Group, Trusted Computing Group, https://www.trustedcomputinggroup.org/groups/mobile.
- TCG Mobile Trusted Module Specification, “Revision 1,” https://www.trustedcomputinggroup.org/specs/mobilephone/tcg-mobile-trustedmodule- 1.0.pdf.
- Y. Han, “Bioworks: a workflow system for automation of bioinformatics analysis processes,” International Journal of Bio-Science and Bio-Technology, vol. 3, no. 4, pp. 59–68, 2011.
- A. Giani, T. Roosta, and S. Sastry, “Integrity checker for wireless sensor networks in health care applications,” in Proceedings of the 2nd International Conference on Pervasive Computing Technologies for Healthcare, PervasiveHealth, pp. 135–138, February 2008.
- A. Baig, A. Bouridane, F. Kurugollu, and G. Qu, “Fingerprint—Iris fusion based identification system using a single hamming distance matcher,” International Journal of Bio-Science and Bio-Technology, vol. 1, no. 1, pp. 46–58, 2009.
- J. Pedraza, M. A. Patricio, A. de Asís, and J. M. Molina, “Privacy and legal requirements for developing biometric identification software in context-based applications,” International Journal of Bio-Science and Bio-Technology, vol. 2, no. 1, pp. 13–24, 2010.
- J. O'Donoghue, J. Herbert, R. Fensli, and S. Dineen, “Sensor validation within a pervasive medical environment,” in Proceedings of the 5th IEEE Conference on Sensors, pp. 972–975, October 2006.
- C. M. Chen, H. Agrawal, M. Cochinwala, and D. Rosenbluth, “Stream query processing for healthcare bio-sensor applications,” in Proceedings of the 20th International Conference on Data Engineering (ICDE '04), pp. 791–794, April 2004.
- C. Peter, E. Ebert, and H. Beikirch, “A wearable multi-sensor system for mobile acquisition of emotion-related physiological data,” in Proceedings of the 1st International Conference on Affective Computing and Intelligent Interaction (ACII '05), J. Tao, T. Tan, and R. W. Picard, Eds., vol. 3784 of Lecture Notes in Computer Science, pp. 691–698, Springer, 2005.
- C. Thomas and N. Balakrishnan, “Mathematical analysis of sensor fusion for intrusion detection systems,” in Proceedings of the 1st International Conference on Communication Systems and Networks and Workshops (COMSNETS '09), January 2009.
- W. Mann and S. Helal, “Smart phones for the elders: boosting the intelligence of smart homes,” in Proceedings of the AAAI Workshop Automation as Caregiver: The Role of Intelligent Technology in Elder Care, pp. 74–79, AAAI Press, 2002.
- C. Clavier, “Side channel analysis for reverse engineering (SCARE)—an improved attack against a secret A3/A8 GSM algorithm Cryptology ePrint Archive,” Report 2004/049, 2004.
- Giesecke and devrient gmbh, 2011, http://www.gi-de.com/.