38 research outputs found

    Supporting Ambulance Crews Electronically through the Provision of ‘On-Demand’ Patient Health Information

    Get PDF
    The North East Ambulance Service (NEAS) does not have direct access to any information regarding patient health history, current medication, allergies, etc. that might assist an ambulance crew when they are dispatched to an emergency incident. Therefore, an ambulance crew responding to a call-out usually travels to the incident ‘information blind’ regarding the patient’s general health status. What makes the ambulance service in general, and the ambulance crew in particular, unique from other healthcare organizations is the spectrum of exposure to a diversity of health organizations (care homes, GPs, hospitals, etc.), and none-health organizations (police, social services, fire forces,etc.). This thesis describes an investigation into the feasibility of implementing a software Information Broker (IB) prototype, that has the ability to provide ‘on-demand’ electronic health information to ambulance crews while on scene, by accessing a set of autonomous databases containing patient records. This is to support the ambulance crew with reliable patient information in order to assist their decision-making process, therefore, reduce unnecessary patients’ conveyance to the Emergency Department (ED). The thesis also examines the sociotechnical issues surrounding health information transfer between and within the National Health Service (NHS) in the United Kingdom (UK) for patients with epilepsy (PWE), specifically in the North East region of England. A case study approach was employed as an overarching framework for the feasibility study of the IB prototype. This case study was centred upon studying the needs of people with epilepsy (PWE), as this group has been identified by NEAS as frequent users of the ambulance service. In many cases, if the ambulance crew are given adequate information to support their decision-making, they do not need to convey patients to a hospital ED unless necessary. Within the case study, a phenomenological approach was employed for the set of perspectives used for investigating the sociotechnical issues surrounding the IB. The three perspectives were the perceptions of NEAS operational and management staff, those of the JCUH staff and PWE/carers, and finally, the perceptions of the ambulance crew. The prototype IB technology has demonstrated the feasibility of using an information transfer broker to transfer information from autonomous organizations to the ambulance crew on scene. Overcoming technical challenges alone is not sufficient for this success. Stakeholders’ requirements, organization collaboration, compliance with national standards and targets, social and technical aspects, and so forth, are other issues that have been considered. Involvement of potential stakeholders in stages of any Health and Information Technology (HIT) development is an essential element to be included, as much as possible, to satisfy those requirements and needs of end-users. Improving the data availability to the ambulance crews on scene via an IB, means that they can perform better decision-making while on scene with a patient. The demonstration of the IB prototype has shown its potential for transferring patient health information from an autonomous database to ambulance crews. To increase opportunities of success, shared incentives and aims of the intra- and inter-organizational communication and collaboration should facilitate the implementation of HIT. Facilitating incremental improvements of systems and technologies may have an effect on the organization as a whole in terms of robustness of systems and technologies

    Security Threats to 5G Networks for Social Robots in Public Spaces: A Survey

    Get PDF
    This paper surveys security threats to 5G-enabled wireless access networks for social robots in public spaces (SRPS). The use of social robots (SR) in public areas requires specific Quality of Service (QoS) planning to meet its unique requirements. Its 5G threat landscape entails more than cybersecurity threats that most previous studies focus on. This study examines the 5G wireless RAN for SRPS from three perspectives: SR and wireless access points, the ad hoc network link between SR and user devices, and threats to SR and users’ communication equipment. The paper analyses the security threats to confidentiality, integrity, availability, authentication, authorisation, and privacy from the SRPS security objectives perspective. We begin with an overview of SRPS use cases and access network requirements, followed by 5G security standards, requirements, and the need for a more representative threat landscape for SRPS. The findings confirm that the RAN of SRPS is most vulnerable to physical, side-channel, intrusion, injection, manipulation, and natural and malicious threats. The paper presents existing mitigation to the identified attacks and recommends including physical level security (PLS) and post-quantum cryptography in the early design of SRPS. The insights from this survey will provide valuable risk assessment and management input to researchers, industrial practitioners, policymakers, and other stakeholders of SRPS.publishedVersio

    A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions

    Get PDF
    Security has become the primary concern in many telecommunications industries today as risks can have high consequences. Especially, as the core and enable technologies will be associated with 5G network, the confidential information will move at all layers in future wireless systems. Several incidents revealed that the hazard encountered by an infected wireless network, not only affects the security and privacy concerns, but also impedes the complex dynamics of the communications ecosystem. Consequently, the complexity and strength of security attacks have increased in the recent past making the detection or prevention of sabotage a global challenge. From the security and privacy perspectives, this paper presents a comprehensive detail on the core and enabling technologies, which are used to build the 5G security model; network softwarization security, PHY (Physical) layer security and 5G privacy concerns, among others. Additionally, the paper includes discussion on security monitoring and management of 5G networks. This paper also evaluates the related security measures and standards of core 5G technologies by resorting to different standardization bodies and provide a brief overview of 5G standardization security forces. Furthermore, the key projects of international significance, in line with the security concerns of 5G and beyond are also presented. Finally, a future directions and open challenges section has included to encourage future research.European CommissionNational Research Tomsk Polytechnic UniversityUpdate citation details during checkdate report - A

    Security in Internet of Things: networked smart objects.

    Get PDF
    Internet of Things (IoT) is an innovative paradigm approaching both industries and humans every-day life. It refers to the networked interconnection of every-day objects, which are equipped with ubiquitous intelligence. It not only aims at increasing the ubiquity of the Internet, but also at leading towards a highly distributed network of devices communicating with human beings as well as with other devices. Thanks to rapid advances in underlying technologies, IoT is opening valuable opportunities for a large number of novel applications, that promise to improve the quality of humans lives, facilitating the exchange of services. In this scenario, security represents a crucial aspect to be addressed, due to the high level of heterogeneity of the involved devices and to the sensibility of the managed information. Moreover, a system architecture should be established, before the IoT is fully operable in an efficient, scalable and interoperable manner. The main goal of this PhD thesis concerns the design and the implementation of a secure and distributed middleware platform tailored to IoT application domains. The effectiveness of the proposed solution is evaluated by means of a prototype and real case studies

    D7.5 FIRST consolidated project results

    Get PDF
    The FIRST project commenced in January 2017 and concluded in December 2022, including a 24-month suspension period due to the COVID-19 pandemic. Throughout the project, we successfully delivered seven technical reports, conducted three workshops on Key Enabling Technologies for Digital Factories in conjunction with CAiSE (in 2019, 2020, and 2022), produced a number of PhD theses, and published over 56 papers (and numbers of summitted journal papers). The purpose of this deliverable is to provide an updated account of the findings from our previous deliverables and publications. It involves compiling the original deliverables with necessary revisions to accurately reflect the final scientific outcomes of the project

    Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey

    Get PDF
    Healthcare applications are considered as promising fields for wireless sensor networks, where patients can be monitored using wireless medical sensor networks (WMSNs). Current WMSN healthcare research trends focus on patient reliable communication, patient mobility, and energy-efficient routing, as a few examples. However, deploying new technologies in healthcare applications without considering security makes patient privacy vulnerable. Moreover, the physiological data of an individual are highly sensitive. Therefore, security is a paramount requirement of healthcare applications, especially in the case of patient privacy, if the patient has an embarrassing disease. This paper discusses the security and privacy issues in healthcare application using WMSNs. We highlight some popular healthcare projects using wireless medical sensor networks, and discuss their security. Our aim is to instigate discussion on these critical issues since the success of healthcare application depends directly on patient security and privacy, for ethic as well as legal reasons. In addition, we discuss the issues with existing security mechanisms, and sketch out the important security requirements for such applications. In addition, the paper reviews existing schemes that have been recently proposed to provide security solutions in wireless healthcare scenarios. Finally, the paper ends up with a summary of open security research issues that need to be explored for future healthcare applications using WMSNs

    Trust based Privacy Policy Enforcement in Cloud Computing

    Get PDF
    Cloud computing offers opportunities for organizations to reduce IT costs by using the computation and storage of a remote provider. Despite the benefits offered by cloud computing paradigm, organizations are still wary of delegating their computation and storage to a cloud service provider due to trust concerns. The trust issues with the cloud can be addressed by a combination of regulatory frameworks and supporting technologies. Privacy Enhancing Technologies (PET) and remote attestation provide the technologies for addressing the trust concerns. PET provides proactive measures through cryptography and selective dissemination of data to the client. Remote attestation mechanisms provides reactive measures by enabling the client to remotely verify if a provider is compromised. The contributions of this work are three fold. This thesis explores the PET landscape by studying in detail the implications of using PET in cloud architectures. The practicality of remote attestation in Software as a Service (SaaS) and Infrastructure as a Service (IaaS) scenarios is also analyzed and improvements have been proposed to the state of the art. This thesis also propose a fresh look at trust relationships in cloud computing, where a single provider changes its configuration for each client based on the subjective and dynamic trust assessments of clients. We conclude by proposing a plan for expanding on the completed work
    corecore