130 likes | 231 Views
BAN Security Services. MobiHealth Plenary Session Santorini 2003/05/26-27. MobiHealth Security. MobiHealth security architecture End-user security. MobiHealth architecture. MH security architecture proposal. MobiHealth security architecture. MobiHealth Security.
E N D
BAN Security Services MobiHealth Plenary Session Santorini 2003/05/26-27
MobiHealth Security • MobiHealth security architecture • End-user security
MobiHealth Security • MobiHealth security architecture • End-user security
Security requirements addressed by the MobiHealth Security Architecture • Confidentiality • BAN devices (sensors/actuators) <-> MBU confidentiality • Provided by Bluetooth/(ZigBee) • Not foreseen for wired sensors • BAN external confidentiality • Confidentiality provided by SSL/TLS (e.g. HTTPS) • Back End System (Server) external confidentiality • Confidentiality provided by SSL/TLS (e.g. HTTPS) • External traffic characteristics confidentiality • Not foreseen • Can be provided partially by the SSL/TLS protocol
Security requirements addressed by the MobiHealth Security Architecture • Authentication • Sensor authentication to BAN • Provided by Bluetooth/(ZigBee) • Not foreseen for wired sensors • BAN authentication • MBU authentication to SH through user/password • MBU authentication to WSB through HTTP user/password proxy authentication • Back End System (Server) authentication to BAN • HTTPS (SSL/TLS) through a server certificate • Back End System (Server) authentication to End-User Application • HTTPS (SSL/TLS) through a server certificate • End-User Application authentication to Back End System • HTTP User/Password
Security requirements addressed by the MobiHealth Security Architecture • Data storage • Permanent local storage of sensor data • Secure storage in BANData Repository • Not foreseen in BAN, GPRS/UMTS Operator, etc. if not required • Temporary local storage of sensor data • Allowed secure temporary storage for buffering, out-of-coverage recovery, etc. • Keep log of sensor data • Not foreseen • To be provided by the BAN OS / Back-End System if required • Keep log of BAN external transmissions • Not foreseen • To be provided by the SSL/TLS communications module if required
Security requirements addressed by the MobiHealth Security Architecture • Anonymity • Patients anonymity • No use of patients identification but BAN identification • Patients identification could be sent encrypted • Identifiers could be used for patients identification • Time stamping • Time stamping • Not foreseen • Timestamps should be included in packets if required
MobiHealth PKI Server • https://hayek.upf.es/pub/MobiHealth • X.509 certificates creation • Restricted access: • User/Password access • Hospital technical personnel/manager in charge of MBU setup and personalisation
UPF Next Steps • Finishing & Delivering Deliverable 2.5 • Finishing Integration and Testing of MBU with HTTP Connect + HTTP Proxy authentication + HTTPS connection • Standardisation activities • Collaboration to Barcelona Trial • W-LAN tests • BAN security integration • Data Simulation • Safety/Availability study