DOI QR코드

DOI QR Code

Secure Authentication with Mobile Device for Ubiquitous RFID Healthcare System in Wireless Sensor Networks

  • Received : 2011.07.26
  • Accepted : 2011.09.01
  • Published : 2011.10.31

Abstract

As telecommunication technologies in telemedicine services are developed, the expeditious development of wireless and mobile networks has stimulated wide applications of mobile electronic healthcare systems. However, security is an essential system requirement since many patients have privacy concerns when it comes to releasing their personal information over the open wireless channels. Due to the invisible feature of mobile signals, hackers have easier access to hospital networks than wired network systems. This may result in several security incidents unless security protocols are well prepared. In this paper, we analyzed authentication and authorization procedures for healthcare system architecture to apply secure M-health systems in the hospital environment. From the analyses, we estimate optimal requirements as a countermeasure to its vulnerabilities.

Keywords

References

  1. Olla, P., Mobile health technology of the future: creation of an MHealth taxonomy based on proximity. International Journal of Healthcare Technology and Management (IJHTM), 2007.
  2. Debargh Acharya, et al, "Security in Pervasive Health Care Networks: Current R&D and Future Challenges", 11th International Conference on Mobile Data Management", pp.305-306, 2011.
  3. Azzedine Boukerche, et al, "A Secure Mobile Health System Using Trust-Based Multicast Scheme", IEEE J. On selected areas in communications, vol.27, no.4, pp.387-399, May 2009. https://doi.org/10.1109/JSAC.2009.090504
  4. Cheng-Ju Li et al., "Mobile healthcare service system using WID". IEEE, International Conference on Networking, Sensing and Control, pp. 1014-1019, Mar. 2004.
  5. I. Vajda and L. Buttyan, "Lightweight authentication protocols for low cost RFID tags," in Proc, 2nd Workshop on Security in Ubiquitous Computer, pp.76-82, 2003.
  6. Kim, J., and Sahama, T. "A Study on the Encryption Model for Numerical Data", International Journal of KIMICS, Vol.7, pp. 31-34, 2009.
  7. Stallings, W., Cryptography and Network Security (4th Edition). Prentice Hall., 2006.