Covert Communication in Wireless Sensor Networks for E-Health Applications

mhempel2's photo

Publication Type:

Book Chapter

Source:

Technological Breakthroughs in Modern Wireless Sensor Applications, IGI Global, p.352 - 371 (2015)

URL:

http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-8251-1http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-8251-1.ch014

Abstract:

<p>In this chapter, the authors introduce a threat in Wireless Sensor Network (WSN) E-Health applications that can be used for leaking patients' medical information, identity, personal data, and medical history. This threat is called covert communication, which establishes a secret path hidden within legitimate network traffic to transfer information. Based on the exploit used for this type of communication, covert channels have different categories and functionalities. The authors introduce various covert communication methods and their possible applications in transmitting e-health data secretly in WSNs. In addition, the authors discuss different methods and approaches to detect this type of communication in WSNs to prevent this form of malicious e-health information transfer.</p>