23.03.2017 Views

wilamowski-b-m-irwin-j-d-industrial-communication-systems-2011

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

30-12 Industrial Communication Systems<br />

<strong>communication</strong> networks, providing environment and inhabitant monitoring and locating frequently<br />

lost objects. This system is also supported on Bluetooth <strong>communication</strong> technology. The following section<br />

presents some issues regarding the application of <strong>communication</strong>s in healthcare environments, as well as<br />

the corresponding challenges.<br />

30.6 Issues and Challenges<br />

Over the years, standard <strong>industrial</strong> <strong>communication</strong>s have been integrated in healthcare equipment<br />

for networking support. In consequence, medical and <strong>industrial</strong> <strong>communication</strong>s share a significant<br />

range of features and problems in areas like security, privacy, safety, reliability, and timeliness. Current<br />

endeavors in the standardization of different medical <strong>communication</strong>s are also expected to improve the<br />

interoperability of <strong>communication</strong> devices from different manufacturers.<br />

30.6.1 Security and Privacy<br />

Nowadays, security and privacy are two critical concerns, not only for the direct implications of their<br />

violation but also because their support, in many healthcare applications, is an open research area.<br />

Wireless <strong>communication</strong>s are becoming very popular among home networking applications given their<br />

low-cost installation, aesthetics, flexibility, and reconfiguration capabilities [46]. However, they are<br />

more exposed to security and privacy breaches than their wired counterparts.<br />

Bergstrom et al. [47] state that, to ensure security, a network must provide confidentiality, authentication,<br />

authorization, and integrity. Confidentiality is concerned with the possibility of third parties<br />

being able to read the transmitted messages in the network while authentication relates with<br />

the concern that somebody may masquerade as a legitimate operator of the system. The system’s<br />

integrity can be corrupted when an attacker modifies system data or commands. This can occur,<br />

when, for example, a malicious user is able to tamper with data by gaining access to the system<br />

using false or pirated authorizations. Another important aspect is privacy, not only from the trust<br />

perspective [48] but also from an ethical point of view [49], i.e., patients have human rights and civil<br />

liberties that must be respected. An example illustrating the multiple dimensions of privacy is the<br />

monitoring of elderly people where privacy can be interpreted in a perspective of maintaining personal<br />

data secure (inaccessible to third parties) or respecting the right to intimacy of elderly people.<br />

These perspectives should be taken into account in the development of legislation concerning the<br />

protection of privacy.<br />

30.6.2 Safety and Reliability<br />

The support of safety in healthcare environments is a domain often regarded as solely relying on security<br />

and the protection of privacy. However, it is dependent on a broader spectrum of scenarios: system misuse,<br />

software bugs, hardware malfunctions, interference on <strong>communication</strong>s, etc. If a user has the ability<br />

to perform a given set of actions (commands), among them commands that require human intervention<br />

for completion or continuous operation, he/she may utilize the system improperly and cause damage<br />

not only to the equipment but also to himself or someone nearby (e.g., patient). Another scenario arises<br />

from software bugs or hardware malfunctions. In this case, the system has no predictable behavior and<br />

can damage the medical equipment and injure its users. Since a lot of healthcare equipment use buses<br />

for communicating data, they may work on unpredictable states due to network malfunctions caused<br />

by electromagnetic interference (EMI) from nearby equipment [50]. In order to improve the reliability<br />

of wireless medical device networks (WMDN), Gehlot and Sloane [51] propose a WMDN verification<br />

and validation toolkit (V2T) that allows warranting safe and reliable WMDN operation. However, due<br />

to the broad range of component manufacturers, device models, and user configurations, the support of<br />

universally safe and reliable WMDN <strong>systems</strong> is still in an early stage of development.<br />

© <strong>2011</strong> by Taylor and Francis Group, LLC

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!