Publication Type:
Book ChapterSource:
Technological Breakthroughs in Modern Wireless Sensor Applications, IGI Global, p.352 - 371 (2015)URL:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-8251-1http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-8251-1.ch014Abstract:
<p>In this chapter, the authors introduce a threat in Wireless Sensor Network (WSN) E-Health applications that can be used for leaking patients' medical information, identity, personal data, and medical history. This threat is called covert communication, which establishes a secret path hidden within legitimate network traffic to transfer information. Based on the exploit used for this type of communication, covert channels have different categories and functionalities. The authors introduce various covert communication methods and their possible applications in transmitting e-health data secretly in WSNs. In addition, the authors discuss different methods and approaches to detect this type of communication in WSNs to prevent this form of malicious e-health information transfer.</p>
- Log in to post comments
- Google Scholar