Jung-Tae Kim : SECURE AUTHENTICATION WITH MOBILE DEVICE FOR UBIQUITOUS RFID HEALTHCARE SYSTEM IN WIRELESS
نویسنده
چکیده
As telecommunication technologies in telemedicine services are developed, the expeditious development of wireless and mobile networks has stimulated wide applications of mobile electronic healthcare systems. However, security is an essential system requirement since many patients have privacy concerns when it comes to releasing their personal information over the open wireless channels. Due to the invisible feature of mobile signals, hackers have easier access to hospital networks than wired network systems. This may result in several security incidents unless security protocols are well prepared. In this paper, we analyzed authentication and authorization procedures for healthcare system architecture to apply secure Mhealth systems in the hospital environment. From the analyses, we estimate optimal requirements as a countermeasure to its vulnerabilities.
منابع مشابه
Authentication Process between RFID tag and Mobile Agent Under U-healthcare System
A variety of security and privacy threats to RFID authentication protocols with embedded healthcare system have been widely studied. The representative vulnerabilities include eavesdropping, replay attacks, denial of service attacks, tracking, and traceability. Considering this RFID security issues, we analyzed the security threats and open problems related to these matters. In ubiquitous syste...
متن کاملAnalyses of Characteristics of U-Healthcare System Based on Wireless Communication
The medical industries are integrated with information technology with mobile devices and wireless communication. The advent of mobile healthcare systems can benefit patients and hospitals, by not only providing better quality of patient care, but also by reducing administrative and medical costs for both patients and hospitals. Security issues present an interesting research topic in wireless ...
متن کاملRequirement of Authentication between RFID tag and Agent for Applying U-healthcare System
A variety of security and privacy threats to RFID authentication protocols have been widely studied, including eavesdropping, replay attacks, denial of service (DoS) attacks, tracking, and traceability. Considering this RFID security issues, we surveyed the security threats and open problems related to issues by means of information security and privacy. In ubiquitous sensor node, it is possibl...
متن کاملAttacks and Threats on the U-Healthcare Application with Mobile Agent
Wireless sensor network is widespread used in hospital environment with mobile device such as NFC, RFID tag and small sensor nodes. The use of a mobile agent in healthcare system under wireless network environment gives an opportunity to offer better services for patients and staffs such as doctors and nurses because of its mobility. But, optimized security protocols and schemes between sensor ...
متن کاملA Design and Analysis Ubiquitous Healthcare Monitoring System over Wireless Sensor Network
Radio Frequency Identification (RFID) and Wireless Sensor Network (WSN) had drawn a lot of attention as methods for realizing a ubiquitous society. RFID and WSN are two important wireless technologies that have a wide variety of applications and provide limitless future potentials. RFID facilitates detection and identification of objects that are not easily detectable or distinguishable by usin...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011