130 likes | 236 Vues
This document presents a comprehensive overview of the security architecture proposed for MobiHealth, focusing on key aspects such as confidentiality, authentication, and patient anonymity. It outlines the security requirements addressed by the architecture, including data storage practices for sensor data, usage of SSL/TLS for secure communications, and robust patient identification methods. The proposed security measures aim to safeguard data transmitted through Body Area Networks (BAN), ensuring the privacy and integrity of personal health information while complying with industry standards.
E N D
BAN Security Services MobiHealth Plenary Session Santorini 2003/05/26-27
MobiHealth Security • MobiHealth security architecture • End-user security
MobiHealth Security • MobiHealth security architecture • End-user security
Security requirements addressed by the MobiHealth Security Architecture • Confidentiality • BAN devices (sensors/actuators) <-> MBU confidentiality • Provided by Bluetooth/(ZigBee) • Not foreseen for wired sensors • BAN external confidentiality • Confidentiality provided by SSL/TLS (e.g. HTTPS) • Back End System (Server) external confidentiality • Confidentiality provided by SSL/TLS (e.g. HTTPS) • External traffic characteristics confidentiality • Not foreseen • Can be provided partially by the SSL/TLS protocol
Security requirements addressed by the MobiHealth Security Architecture • Authentication • Sensor authentication to BAN • Provided by Bluetooth/(ZigBee) • Not foreseen for wired sensors • BAN authentication • MBU authentication to SH through user/password • MBU authentication to WSB through HTTP user/password proxy authentication • Back End System (Server) authentication to BAN • HTTPS (SSL/TLS) through a server certificate • Back End System (Server) authentication to End-User Application • HTTPS (SSL/TLS) through a server certificate • End-User Application authentication to Back End System • HTTP User/Password
Security requirements addressed by the MobiHealth Security Architecture • Data storage • Permanent local storage of sensor data • Secure storage in BANData Repository • Not foreseen in BAN, GPRS/UMTS Operator, etc. if not required • Temporary local storage of sensor data • Allowed secure temporary storage for buffering, out-of-coverage recovery, etc. • Keep log of sensor data • Not foreseen • To be provided by the BAN OS / Back-End System if required • Keep log of BAN external transmissions • Not foreseen • To be provided by the SSL/TLS communications module if required
Security requirements addressed by the MobiHealth Security Architecture • Anonymity • Patients anonymity • No use of patients identification but BAN identification • Patients identification could be sent encrypted • Identifiers could be used for patients identification • Time stamping • Time stamping • Not foreseen • Timestamps should be included in packets if required
MobiHealth PKI Server • https://hayek.upf.es/pub/MobiHealth • X.509 certificates creation • Restricted access: • User/Password access • Hospital technical personnel/manager in charge of MBU setup and personalisation
UPF Next Steps • Finishing & Delivering Deliverable 2.5 • Finishing Integration and Testing of MBU with HTTP Connect + HTTP Proxy authentication + HTTPS connection • Standardisation activities • Collaboration to Barcelona Trial • W-LAN tests • BAN security integration • Data Simulation • Safety/Availability study