Proposal / Submission Type

Peer Reviewed Paper

Location

Daytona Beach, Florida

Start Date

26-5-2016 9:00 AM

Abstract

As healthcare data are pushed online, consumers have raised big concerns on the breach of their personal information. Law and regulations have placed businesses and public organizations under obligations to take actions to prevent such data breaches. Various vulnerabilities have been identified in healthcare enterprise environments, in which the Wireless Body Area Networks (WBAN) remains to be a major vulnerability, which can be easily taken advantage of by determined adversaries. Thus, vulnerabilities of WBAN systems and the effective countermeasure mechanisms to secure WBAN are urgently needed. In this research, first, the architecture of WBAN system has been explored, and the vulnerabilities within the system have been identified and analyzed. After that, issues on existing federal regulations related to WBAN are discussed. Finally, scenarios are described where vulnerabilities, threats, and countermeasures are analyzed.

 
May 26th, 9:00 AM

WBAN Security Management in Healthcare Enterprise Environments

Daytona Beach, Florida

As healthcare data are pushed online, consumers have raised big concerns on the breach of their personal information. Law and regulations have placed businesses and public organizations under obligations to take actions to prevent such data breaches. Various vulnerabilities have been identified in healthcare enterprise environments, in which the Wireless Body Area Networks (WBAN) remains to be a major vulnerability, which can be easily taken advantage of by determined adversaries. Thus, vulnerabilities of WBAN systems and the effective countermeasure mechanisms to secure WBAN are urgently needed. In this research, first, the architecture of WBAN system has been explored, and the vulnerabilities within the system have been identified and analyzed. After that, issues on existing federal regulations related to WBAN are discussed. Finally, scenarios are described where vulnerabilities, threats, and countermeasures are analyzed.