Rantos, K., Fysarakis, K., Manifavas, C. and Askoxylakis, I., 2018. Policy-Controlled Authenticated Access to LLN-Connected Healthcare Resources. IEEE Systems Journal, 12 (1), 92-102.
Full text available as:
|
PDF
s1-ln1942692195844769-1939656818Hwf114785746IdV-104347470719426921PDF_HI0001-2.pdf - Accepted Version Available under License Creative Commons Attribution Non-commercial No Derivatives. 4MB | |
Copyright to original material in this document is with the original owner(s). Access to this content through BURO is granted on condition that you use it only for research, scholarly or other non-commercial purposes. If you wish to use it for any other purposes, you must contact BU via BURO@bournemouth.ac.uk. Any third party copyright material in this document remains the property of its respective owner(s). BU grants no licence for further use of that third party material. |
DOI: 10.1109/JSYST.2015.2450313
Abstract
Ubiquitous devices comprising several resource-constrained nodes with sensors, actuators, and networking capabilities are becoming part of many solutions that seek to enhance user's environment smartness and quality of living, prominently including enhanced healthcare services. In such an environment, security issues are of primary concern as a potential resource misuse can severely impact user's privacy or even become life threatening. Access to these resources should be appropriately controlled to ensure that eHealth nodes are adequately protected and the services are available to authorized entities. The intrinsic resource limitations of these nodes, however, make satisfying these requirements a great challenge. This paper proposes and analyzes a service-oriented architecture that provides a policy-based, unified, cross-platform, and flexible access control mechanism, allowing authorized entities to consume services provided by eHealth nodes while protecting their valuable resources. The scheme is XACML driven, although modifications to the related standardized architecture are proposed to satisfy the requirements imposed by nodes that comprise low-power and lossy networks (LLNs). A proof-of-concept implementation is presented, along with the associated performance evaluation, confirming the feasibility of the proposed approach.
Item Type: | Article |
---|---|
ISSN: | 1932-8184 |
Additional Information: | (c) 2015 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. |
Uncontrolled Keywords: | Authentication; authorization; body sensor networks (BSNs); Devices Profile for Web Services (DPWS); eXtensible Access Control Markup Language (XACML), healthcare, policy-based access control (PBAC); security; Web services |
Group: | Faculty of Science & Technology |
ID Code: | 24614 |
Deposited By: | Symplectic RT2 |
Deposited On: | 31 Aug 2016 10:22 |
Last Modified: | 14 Mar 2022 13:58 |
Downloads
Downloads per month over past year
Repository Staff Only - |