Purpose Specification. It is important that the
collected data is used only for its purpose. If the data
is intended to be used for new purposes it should be
accepted by the user beforehand. If the user is unable
to make that decision, it should be clear who can
vouch for the decision (children or other next-of-kin).
Collection Limitation and Data Minimisation. The
stored data should be limited to a minimum. Exam-
ple: there is no need for storing fall detection data,
as long as the user hasn’t fallen. It is important to
inform the user of the amount of stored data and how
long time the data is stored.
Use Limitation. The collection of health data is very
personal information for the user, and it is important
that the integrity of the data is ensured, and that the
data in no situation is made available to other than
authorized users of the system.
Individual Participation and Control. Users should
be able to access their own stored data, and should be
able to control who else have access to these data.
Data Quality and Integrity. Only relevant data
should be stored and should be up-to-date. Old and
irrelevant data should be removed as soon as possible.
Security Safeguards and Controls. All means for
protecting the data should be taken, when collection,
analyzing, transmitting and storing the data.
Accountability and Oversight. The company or peo-
ple in charge of the health care system must be held
accountable for any breach of the security or privacy
issues of the system. The system uses many differ-
ent sensors, and it is important for each type of sensor
to tell the user exactly what is stored. The system is
used for detecting and analysing the environment the
user lives in, hence a certain amount of data will have
to be collected and stored for the system to be suffi-
cient. If compromised this system will reveal a great
amount of personal data about the user, and it is im-
portant that the user is aware of this, and that security
measures are launched and maintained.
6 CONCLUSION
In this paper we have considered a reference health
monitoring system for elderly people as a case study
to state the security and privacy risks one should be
aware of before implementing such kind of systems.
In particular, we have identified attack vectors and
groups of attackers, who could compromise the health
monitoring system. Moreover, we have raised some
privacy issues to address when people are monitored
in their own home. Due to the fact that personal data
is transmitted and stored on external servers, it should
be stated who can access the data and who can be held
accountable if data is lost or leaked.
Our major contribution has been the identification
of the burglar threat, which could be very prominent
if one healthcare system is used in large scale, be-
cause traffic analysis is not something a communica-
tion protocol can secure, the defence needs to be im-
plemented as a part of what is communicated, which
is easy to oversee by the developer.
The aim of the paper is to raise the levels of aware-
ness and understanding of the cyber risks related to
home monitoring systems. The hope is that the issues
identified in this case study will be regarded as alarm
bells for all the pervasive healthcare sector.
REFERENCES
Alka Ensurance (2013). Her er man mest udsat for indbrud!
(retrieved on http://www.alka.dk/).
Bellovin, S. M. (2015). Thinking Security - Stopping Next
Year’s Hackers. Addison-Wesley.
Choi, K., Kim, M., and Chae, K. (2013). Secure and
Lightweight Key Distribution with ZigBee Pro for
Ubiquitous Sensor Networks. IJDSN, 9(7).
Dasios, A., Gavalas, D., Pantziou, G., and Konstantopou-
los, C. (2015). Wireless sensor network deployment
for remote elderly care monitoring. In Proc. of PE-
TRA’15. ACM.
Erickson, J. (2008). Hacking: The Art of Exploitation. No
Starch Press.
Hadnagy, C. (2011). Social Engineering: The Art of Human
Hacking. Wiley Publishing, Inc.
Kotz, D., Avancha, S., and Baxi, A. (2009). A privacy
framework for mobile health and home-care systems.
In Proc. of SPIMACS’09. ACM.
Lahtiranta, J. and Kimppa, K. (2006). Elderly people and
emerging threats of the internet and new media. In
Proc. of I3E 2006. Springer.
Markle Foundation (2008). Common framework for net-
worked personal health information: Overview and
Principles. Connecting for Health.
Pantelopoulos, A. and Bourbakis, N. G. (2010). A survey on
wearable sensor-based systems for health monitoring
and prognosis. IEEE Transactions on Systems, Man,
and Cybernetics, Part C, 40(1):1–12.
Stelte, B. and Rodosek, G. (2013). Thwarting attacks on
zigbee - removal of the killerbee stinger. In Proc. of
CNSM’13.
Tsukiyama, T. (2015). In-home health monitoring system
for solitary elderly. In Proc. of EUSPN’15/ICTH’15.
Procedia Computer Science, Elsevier.
HEALTHINF 2017 - 10th International Conference on Health Informatics
388