Role of D2D communications in mobile health applications: security threats and requirements

Muhammad Usman, Marwa Qaraqe, Muhammad Rizwan Asghar, Imran Shafique Ansari

Research output: Chapter in Book/Report/Conference proceedingChapter

Abstract

Monitoring physiological signals in real time has become popular among patients in recent years. Mobile health applications provide a platform to connect sensors with smartphones and transmit the sensors' readings to web platforms designed for practitioners and patients. Due to the life-critical nature of health data, it becomes imperative to establish an extremely reliable and 24/7 available connection to web platforms. In this regard, device-to-device (D2D) communication has the ability to establish communication links in different indoor and outdoor scenarios, including when the patient's phone is out of the coverage of any mobile network or has partial coverage. D2D is an emerging paradigm that enables different mobile health applications for varying use cases and scenarios. This chapter highlights the security challenges related to D2D communication in the field of mobile healthcare platforms. In particular, the focus is to identify different phases of D2D communication and to highlight the security requirements and threats associated within each phase. In the end, we identify various solutions to different security threats.
Original languageEnglish
Title of host publicationEngineering and Technology for Healthcare
EditorsMuhammad Ali Imran, Rami Ghannam, Qammer H. Abbasi
PublisherWiley
Chapter9
Pages169-186
Number of pages18
ISBN (Electronic)9781119644316
ISBN (Print)9781119644248
DOIs
Publication statusPublished - 8 Feb 2021

Publication series

NameEngineering and Technology for Healthcare

Keywords

  • 3GPP standardization procedures
  • D2D communications
  • mobile health applications
  • proximity services
  • security requirements
  • security threats

Fingerprint

Dive into the research topics of 'Role of D2D communications in mobile health applications: security threats and requirements'. Together they form a unique fingerprint.

Cite this