DOI QR코드

DOI QR Code

Quantum cryptography-used Key Distribution Model Design of U-healthcare environment

양자 암호를 이용한 유헬스케어 환경의 키 분배 모델 설계

  • Jeong, Yoon-Su (Dept. of Information Communication & Engineeringe, Mokwon University) ;
  • Han, Kun-Hee (Dept. of Information Communication & Engineeringe, Baekseok University)
  • 정윤수 (목원대학교 정보통신공학과) ;
  • 한군희 (백석대학교 정보통신공학과)
  • Received : 2013.09.30
  • Accepted : 2013.11.20
  • Published : 2013.11.28

Abstract

As fusing IT and medical technique, the number of patients who adhere medical equipment inside of them is increasing. However there is a problem of for the third person to tap or modulate the patient's biometric data viciously. This paper suggests quantum encryption-based key distribution model to share key for the third person not to tap or modulate the patient's biometric data between patient and hospital staff. The proposed model uses one-time pad key that shares key sending random bits not direct sending message of quantum data. Also, it guarantees patient's anonymity because the biometric data of injected-device in the body doesn't be exposed unnecessarily.

IT 기술과 의료기술이 융합되면서 환자의 체내에 의료장비를 부착한 환자의 수가 증가하고 있다. 그러나 환자의 생체정보를 제 3자가 악의적으로 도청 및 변경하는 문제점이 발생하고 있다. 본 논문에서는 환자와 병원관계자 사이에서 환자의 생체정보를 제3자가 도청하거나 변조없이 키를 공유하도록 양자 암호 기반의 키 분배 모델을 제안한다. 제안 모델의 양자 정보는 메시지 직접전달보다는 임의의 비트들을 전달하여 키를 공유하는 one-time pad 키를 사용한다. 또한, 제안 모델은 체내삽입장치의 생체정보가 제3자에게 불필요하게 노출되지 않아 환자의 익명성을 보장받는다.

Keywords

References

  1. D. W. Kim, J. W. Han, and K. I. Chung, "Trend of Home Device Authentication/Authorization Technology", Weekly IT BRIEF, No. 1329, pp. 1-11, 2008.
  2. S.Y. Lee, K.B. Yim, K.J. Bae, Taeyoung Jeong, and Jong-Wook Han, "Counterplan of Ubiquitous Home Network Privacy based on Device Authentication and Authorization," Korea Institute of Information Security & Cryptology, Review of KIISC, 18(5), pp.125-131, 2008.
  3. T. Denning, Y. Matsuoka, and T. Kohno, "Neurosecurity: Security and Privacy for Neural Devices", Neurosurgical Focus, Vol. 27, Jul. 2009.
  4. D. Panescu, "Emergingg technologies: wireless communication systems for implantable medical devices", Engineering in Medicine and Biology Magazine, vol. 27, pp. 96-101, Mar.-Apr. 2008. https://doi.org/10.1109/EMB.2008.915488
  5. D. Halperin, T. S. Heydt-Benjamin, B. Ransford et al., "Pacemakers and implantable cardiac defibrillators: software radio attacks and zero-power defenses", in Proc. of SP'08, pp. 129-142, May. 2008.
  6. P. Inchingolo, S. Bergamasco, and M. Bon, "Medical data protection with a new generation of hardware authentication tokens", in Proc. of Mediterranean Conf. on Medical and Biological Engineering and Computing, pp. 12-15, Jun. 2001.
  7. K. B. Rasmussen, C. Castelluccia, T. S. Heydt-Benjamin, and S. Capkun, "Proxymity-based Access Control for Implantable Medical Devices", 16th ACM conference on Computer and communications security, pp. 411-419, Nov. 2009.
  8. Z. Omary, f. Mtenzi, B. Wu, C. O'Driscoll, "Accessing sensitive patient information in ubiquitous healthcare systems", 2010 International conference for internet Technology and Secured Transactions(ICITST), pp. 1-3, Nov. 2010.
  9. H. Y. Lee, G. H. Cho, and H. J. Yang, "quantum key distribution protocol",Korea Institute of Information Security & Cryptology, Vol. 12, No. 5, pp.1-7. Oct. 2002.
  10. H. Harney, C. Muckenhirn, "Group Key Management Protocol(GKMP) Specification", RFC 2093, July 1997..
  11. Z. H. Liu, Y. X. Lai, X. B.. Ren, S. P. Bu,"An Efficient LKH Tree Balancing Algorithm for Group Key Management", ICCECT 2012, pp. 1003-1005, Dec. 2012

Cited by

  1. Method for 3D Visualization of Sound Data vol.14, pp.7, 2016, https://doi.org/10.14400/JDC.2016.14.7.331