Corpus ID: 18106381

An Evaluation Scenario for Adaptive Security in eHealth

  title={An Evaluation Scenario for Adaptive Security in eHealth},
  author={W. Leister and Mohamed Hamdi},
We present a scenario and storyline that are part of a framework to evaluate adaptive security in the Internet of Things, also denoted as the IoT. The successful deployment of the IoT depends on ensuring security and privacy, which need to adapt to the processing capabilities and resource use of the IoT. We develop a scenario for the assessment and validation of context-aware adaptive security solutions for the IoT in eHealth. We first present the properties to be fulfilled by a scenario to… Expand

Figures from this paper

Evaluating eHealth Scenarios for Adaptive Security in eHealth
We present a scenario and storyline that are part of a framework to evaluate adaptive security in the Internet of Things, also denoted as the IoT. The successful deployment of the IoT depends onExpand
Security Analysis of a Patient Monitoring System for the Internet of Things in eHealth
This paper analyses the important security issues that can put the eHealth system at risk and the specific goals and requirements, vulnerabilities, threats, and attacks are analysed and some possible security recommendaitons with direction for future work are discussed. Expand
An Evaluation Framework for Adaptive Security for the IoT in eHealth
The work presented here has been carried out in the project ASSET – Adaptive Security for Smart Internet of Things in eHealth (2012–2015) funded by the Research Council of Norway in the VERDIKTExpand
A Novel Authentication Framework Based on Biometric and Radio Fingerprinting for the IoT in eHealth
Patient monitoring outside the hospital environment is one case for Internet of Things (IoT) in healthcare. While remote patient monitoring may improve healthcare, patient authentication is aExpand
Secure and Connected Wearable Intelligence for Content Delivery at a Mass Event: A Case Study
The goal of this work is to build a comprehensive understanding around some of the user-centric security and trust aspects of the emerging wearable and close-to-body wireless systems operating in mass events and under heterogeneous conditions. Expand
Secure and Efficient Reactive Video Surveillance for Patient Monitoring
A symmetric key-based security framework for the reactive video surveillance of patients based on the inputs coming from data measured by a wireless body area network attached to the human body is proposed. Expand
Internet of Things: A Survey for the Individuals' E-Health Applications
Health Effectiveness, Empowerment, Safety, Privacy, and Peace of Mind are the most important criteria in e-health IoT applications for individuals; Cost Saving, round-the-clock Access, and Time-Saving are in the next levels of importance. Expand
Social, Private, and Trusted Wearable Technology under Cloud-Aided Intermittent Wireless Connectivity
The set of enablers developed here for wearable technology connectivity is aimed at enriching people’s everyday lives in a secure and usable way, in cases when communication to the cloud is not consistently available. Expand
Developing a security framework for robots
Currently there is a significant increase in the popularity of robots. This statement holds true for both consumer and professional robots. The market is shifting towards automation andExpand
Model for adaptable context-based biometric authentication for mobile devices
It becomes possible to take advantage of seamless biometric authentication on mobile devices due to increasing quality and quantity of built-in sensors, increasing processing power of the devices,Expand


Risk-based adaptive security for smart IoT in eHealth
A risk-based adaptive security framework for IoTs in eHealth that will estimate and predict risk damages and future benefits using game theory and context-awareness techniques is described. Expand
A testbed for adaptive security for IoT in eHealth
An estimation strategy of the energy consumption using the Holt-Winters prediction method has been developed and will be useful when studying the feasibility of the adaptive lightweight security solutions that will be part of the ASSET project. Expand
Towards metrics-driven adaptive security management in e-health IoT applications
This work analyzes security objectives of E-health IoT applications and their adaptive security decision-making needs, and proposes a high-level adaptive security management mechanism based on security metrics to cope with the challenges. Expand
Metrics-driven security objective decomposition for an e-health application with adaptive security management
A context-aware Markov game theoretic model for security metrics risk impact assessment is developed to measurably evaluate and validate the run-time adaptivity of IoT security solutions. Expand
Quality of Service, Adaptation, and Security Provisioning in Wireless Patient Monitoring Systems
A framework is proposed that will fill this QoS and security gap and provide a solution that allows medical personnel better access to data and more mobility to the patients and also addresses the QoS, adaptation and security concerns of handling this data. Expand
Security Attack Testing (SAT) - testing the security of information systems at design time
The Security Attack Testing (SAT) approach is presented, a novel scenario-based approach that tests the security of an information system at the design time that is illustrated with the aid of a real-life case study involving the development of a health and social care information system. Expand
A meta-model for usable secure requirements engineering
The IRIS (Integrating Requirements and Information Security) meta- model is presented, a conceptual model for usable secure requirements engineering and a practical application of the meta-model is described through a case study in the Critical Infrastructure domain. Expand
Exploiting Model Variability in ABS to Verify Distributed Algorithms
We show a way to evaluate functional properties of distributed algorithms by the example of the AODV algorithm in sensor networks, Creol and ABS models, and component testing. We present a new methodExpand
Scenarios, Stories, Use Cases: Through the Systems Development Life-Cycle
Extending the scenario method beyond interface design, this important book shows developers how to design more effective systems by soliciting, analyzing, and elaborating stories from end-users -Expand
Defining the ASSET scenarios
  • Norsk Regnesentral, NR Note DART/17/2012, Dec. 2012.
  • 2012