DOI QR코드

DOI QR Code

Analyses of Characteristics of U-Healthcare System Based on Wireless Communication

  • Kim, Jung Tae (Department of Electronic Engineering, Mokwon University)
  • Received : 2012.06.28
  • Accepted : 2012.08.17
  • Published : 2012.12.31

Abstract

The medical industries are integrated with information technology with mobile devices and wireless communication. The advent of mobile healthcare systems can benefit patients and hospitals, by not only providing better quality of patient care, but also by reducing administrative and medical costs for both patients and hospitals. Security issues present an interesting research topic in wireless and pervasive healthcare networks. As information technology is developed, many organizations such as government agencies, public institutions, and corporations have employed an information system to enhance the efficiency of their work processes. For the past few years, healthcare organizations throughout the world have been adopting health information systems (HIS) based on the wireless network infrastructure. As a part of the wireless network, a mobile agent has been employed at a large scale in hospitals due to its outstanding mobility. Several vulnerabilities and security requirements related to mobile devices should be considered in implementing mobile services in the hospital environment. Secure authentication and protocols with a mobile agent for applying ubiquitous sensor networks in a healthcare system environment is proposed and analyzed in this paper.

Keywords

References

  1. Y. J. Park and Y. B. Kim, "On the accuracy of RFID tag estimation functions," Journal of Information and Communication Convergence Engineering, vol. 10, no. 1, pp. 33-39, 2012. https://doi.org/10.6109/jicce.2012.10.1.033
  2. Y. Xiao, X. Shen, B. Sun, and L. Cai, "Security and privacy in RFID and applications in telemedicine," IEEE Communications Magazine, vol. 44, no. 4, pp. 64-72, 2006.
  3. L. Lhotska, P. Aubrecht, A. Valls, and K. Gibert, "Security recommendations for implementation in distributed healthcare systems," in Proceedings of the 42nd Annual IEEE International Carnahan Conference on Security Technology, Prague, Czech, pp. 76-83, 2008.
  4. R. K. Pateriya and S. Sharma, "The evolution of RFID security and privacy: a research survey," in Proceedings of the International Conference on Communication Systems and Network Technology, Katra, India, pp. 115-119, 2011.
  5. S. Moncrieff, S. Venkatesh, and G. West, "A framework for the design of privacy preserving pervasive healthcare," in Proceedings of the IEEE International Conference on Multimedia and Expo, New York: NY, pp. 1696-1699, 2009.
  6. J. Sun, Y. Fang, and X. Zhu, "Privacy and emergency response in ehealthcare leveraging wireless body sensor networks," IEEE Wireless Communications, vol. 17, no. 1, pp. 66-73, 2010.
  7. A. Boukerche and Y. Ren, "A secure mobile healthcare system using trust-based multicast scheme," IEEE Journal on Selected Areas in Communications, vol. 27, no. 4, pp. 387-399, 2009. https://doi.org/10.1109/JSAC.2009.090504
  8. M. Markovic, Z. Savic, and B. Kovacevic, "Secure mobile health systems: principles and solutions," in M-health: Emerging Mobile Health Systems, New York, NY: Springer, pp. 81-106, 2006.
  9. C. J. Su and B. J. Chen, "Ubiquitous community care using sensor network and mobile agent technology," in Proceedings of the 7th International Conference on Autonomic & Trusted Computing, Xian, China, pp. 99-104, 2010.
  10. Y. M. Huang, M. Y. Hsieh, H. C. Chao, S. H. Hung, and J. H. Park, "Pervasive, secure access to a hierarchical sensor-based healthcare monitoring architecture in wireless heterogeneous networks," IEEE Journal on Selected Areas in Communications, vol. 27, no. 4, pp. 400-411, 2009. https://doi.org/10.1109/JSAC.2009.090505
  11. W. Tounsi, J. Garcia-Alfaro, N. Cuppens-Boulahia, and F. Cuppens, "Securing the communications of home health care systems based on RFID sensor networks," in Proceedings of the 8th Annual Communication Networks and Services Research Conference, Montreal, Canada, pp. 284-291, 2010.
  12. W. Yao, C. H. Chu, and Z. Li, "The use of RFID in healthcare: Benefits and barriers," in Proceedings of the IEEE International Conference on RFID-Technology and Applications, Guangzhou, China, pp. 128-134, 2010.
  13. S. W. Wang, W. H. Chen, C. S. Ong, L. Liu, and Y. W. Chuang, "RFID application in hospitals: a case study on a demonstration RFID project in a Taiwan hospital," in Proceedings of the 39th Annual Hawaii International Conference on System Sciences, Kauai: HI, p. 184a, 2006.
  14. W. D. Yu, R. Gummadikayala, and S. Mudumbi, "A web-based wireless mobile system design of security and privacy framework for u-Healthcare," in Proceedings of the 10th International Conference on e-health Networking, Applications and Services, Singapore, pp. 96-101, 2008.
  15. D. Acharya, "Security in pervasive health care networks: current R&D and future challenges," in Proceedings of the 11th International Conference on Mobile Data Management, Kansas City: MO, pp. 305-306, 2010.
  16. H. Y. Chien, "Varying pseudonyms-based RFID authentication protocols with DOS attacks resistance," in Proceedings of the IEEE Asia-Pacific Services Computing Conference, Yilan, Taiwan, pp. 607-614, 2008.
  17. C. C. Hung and S. Y. Huang, "On the study of a ubiquitous healthcare network with security and QoS," in Proceedings of the IET International Conference on Frontier Computing: Theory, Technologies and Application, Taichung, Taiwan, pp. 139-144, 2010.
  18. Z. Li, H. Shen, and B. Alsaify, "Integrating RFID with wireless sensor networks for inhabitant, environment and health monitoring," in Proceedings of the 14th IEEE International Conference on Parallel and Distributed Systems, Melbourne, Australia, pp. 639-646, 2008.
  19. W. Yao, C. H. Chu, and Z. Li, "The use of RFID in healthcare: benefits and barriers," in Proceedings of the IEEE International Conference on RFID: Technology and Applications, Guangzhou, China, pp. 128-134, 2010.
  20. S. Kahn and V. Sheshadri, "Medical record privacy and security in a digital environment," IT Professional, vol. 10, no. 2, pp. 46-52, 2008.
  21. R. C. W. Phan, "Cryptanalysis of a new ultralightweight RFID authentication protocol—SASI," IEEE Transactions on Dependable and Secure Computing, vol. 6, no. 4, pp. 316-320, 2009. https://doi.org/10.1109/TDSC.2008.33
  22. L. Xiao, P. Lewis, and A. Gibb, "Developing a security protocol for a distributed decision support system in a healthcare environment," in Proceedings of the 30th ACM/IEEE International Conference on Software Engineering, Leipzig, Germany, pp. 673- 682, 2008.
  23. J. Misic, "Enforcing patient privacy in healthcare WSNs using ECC implemented on 802.15.4 beacon enabled clusters," in Proceedings of the 6th Annual IEEE International Conference on Pervasive Computing and Communications, Hong Kong, China, pp. 686-691, 2008.

Cited by

  1. Applying Clinical Judgment Rubric for Evaluation of Simulation Practice for Nursing Students : A Non-Randomized Controlled Trial vol.14, pp.2, 2018, https://doi.org/10.5392/ijoc.2018.14.2.035
  2. 엄지손가락의 관절 굽힘의 이상 측정 및 치료 vol.22, pp.10, 2012, https://doi.org/10.6109/jkiice.2018.22.10.1355
  3. Comparison of Step Counting Methods according to the Internal Material Molding Methods for the Module of a Smart Shoe vol.13, pp.1, 2012, https://doi.org/10.7236/ijibc.2021.13.1.90
  4. Comparison of Step Counting Methods according to the Internal Material Molding Methods for the Module of a Smart Shoe vol.13, pp.1, 2012, https://doi.org/10.7236/ijibc.2021.13.1.90