DOI QR코드

DOI QR Code

홈헬스 환경에서 생체정보전송의 안전성을 고려한 랜덤유효세션기반의 상호인증 프로토콜

Mutual Authentication Protocol based on the Random Divided Session for the Security of Medical Information in Home-Health

  • 임헌철 (인하대학교 컴퓨터정보공학과) ;
  • 박태현 (인하대학교 컴퓨터정보공학과) ;
  • 권구인 (인하대학교 컴퓨터정보공학과)
  • Lim, Heon-Cheol (Dept. of Computer Information and Science, Inha University) ;
  • Park, Tae-Hyun (Dept. of Computer Information and Science, Inha University) ;
  • Kwon, Gu-In (Dept. of Computer Information and Science, Inha University)
  • 투고 : 2012.09.03
  • 심사 : 2012.09.19
  • 발행 : 2012.10.31

초록

본 연구에서는 센서와 게이트웨이간의 응용레벨 전송 세션을 세분화하고 각 세션을 주기적으로 갱신하는 기법을 적용하여 모델화하였다. 또한 이 모델에서의 인증을 위한 전송오버헤드를 최소화하기 위해 생체정보의 측정주기에 따른 동적인 유효 세션기법을 적용하였고 비인가 게이트웨이가 유효세션 시간을 예측하지 못하도록 유효세션 시간을 랜덤화 하였다. 이 모델은 비인가 센서기기의 무결성 침해와 기밀성 침해를 차단하는 효과가 있다. 본 모델의 평가를 위해 TinyOS 2.1 환경에서 구현하여 실험하였다. 따라서 전송할 생체정보가 서로 다른 측정주기를 갖는 것을 통해 효율성을 제공하도록 하였다. 결과적으로 제안한 기법을 3가지 실험을 통해 유효성을 확인하였다.

In this paper, we design a mutual authentication protocol which divided sessions from an authenticated session are updated periodically. And in order to minimize the traffic overhead for session authentication, we also introduce dynamic session management according to sampling rate of medical sensor type. And randomize the divided session time. This model has the effect of blocking the integrity and confidentiality intrusion of rogue gateway. Moreover, efficiency is provided through medical data to be transmitted have different sampling rate. In order to evaluate this model, it was embodied and experimented in TinyOS 2.1 environment. The result, we got an overall validity from three types of experiment.

키워드

참고문헌

  1. C. S. Wang, Y. R. Tzeng, "A Wireless Networking Technologies Overview Over Ubiquitous Service Applications", Proc. of Networked Computing and Advanced Information Management, pp. 156-161, Sep. 2000.
  2. R. Sulaiman, D. Sharma, W. Ma, D. Tran, "A Security Architecture for e-Health Services", Proc. of International Conference on Advanced Communication Technology, pp. 999-1004, Feb. 2008.
  3. T. T. May, "Medical information security: the evolving challenge", 32nd Annual 1998 International Carnahan Conferenece on. of Security Technology, pp. 85-92, 2000.
  4. C. S. Jang, W. J. Han, "Security Requirement Analysis for WBAN environment", Fall 2008, KIMICS Integrated Conference, pp. 260-263. 2008.
  5. H. S Chen, M. J. Su, T. H. Tsai, S. S. Teng, H. W. Zhang, "U-Care for the elderly Implementation of a Comprehensive Living and Health Care Network", e-Health networking, Application and Services, pp. 187-190, June. 2007.
  6. C. W. Jeong, D. H. Kim, M. H. Kim, S. J. Joo, "A Dynamic Security Service using Access Control Model in Distributed Framewirk Support for u-Healthcare", Journal of Korean Society for Internet Information, Vol.8, No.6, pp. 29-42, 2007.
  7. J. E. Song, S. H. Kim, M. E. Jeong, K. I. Jeong, "Security Issues and Its Technology Trends in u-Healthcare", Electronics and Telecommunications Trends Vol.22, No.1, pp. 119-129, Feb. 2007.
  8. F. W. Xuan, D. M. Chui, L. W. Kei, "Novel system sampling multi vital signs for e-Home Healthcare", Proc. of 7th Int'l Conference on Information, Communications and Signal Processing, pp. 1-5, 2009.
  9. Y. Yao, J. Chong, W. Xingwei, "Enhancing RC4 algorithm for WLAN WEP protocol", Control and Decision Conference (CCDC) Chinese, pp. 3623-3627, 2010.
  10. A. Bogdanov, D. Khovratovich, and C. Rechberger, "Biclique Cryptanalysis of the Full AES", Proc. of Int'l Conference on Theory and Application of Cryptology and Information Security ASIACRYPT 2011, pp. 344-371, Dec. 2011.
  11. M. H. Kim, J. S. Kim, A. R. Kim, K. J. Chae, "New Security Technology Trends of Wireless Sensor Network", Korea Information Processing Society Review, Vol. 17, No. 1, pp. 139-147, 2008.
  12. K. Sohrabi, J. Gao, V. Ailawadhi, and G. J. Pottie, "Protocol for self-organization of a wireless sensor network", Personal Communications IEEE, Vol. 7, pp. 16-27, Oct. 2000. https://doi.org/10.1109/98.878532
  13. K. Fall, "A delay-tolerant network architecture for challenged internets", ACM SIGCOMM 2003, pp.27-34, Aug. 2003.
  14. S. J. Lee, and W. W. Su, "An adaptive and fault-tolerant gateway assignment in sensor networks", 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems, Vol. 6, No.5, PP.576-578, April 2004.
  15. M. Paksuniemi, H. Sorvoja, E. Alasaarela, and R. Myllyla, "Wireless sensor and data transmission needs and technologies for patient monitoring in the operating room and intensive care unit", Engineering in Medicine and Biology Society 2005 IEEE-EMBS 2005 27th Annual international Conference, pp. 5182-5185, Jan. 2006.
  16. Y. R. Lee, D. G. Park, E. "Role based access control of healthcare information system for Mobile environments", Journal of the Korea Society of Computer and Information, Vol. 10, No.5, pp. 119-132, July. 2005.
  17. J. W. Kim, H. "Implementation of a pervasive health care system for cardiac patient on mobile environment", Journal of the Korea Society of Computer and Information, Vol. 13, No.2, pp. 117-124, Sep. 2008.

피인용 문헌

  1. Lightweight Individual Encryption for Secure Multicast Dissemination over WSNs vol.18, pp.11, 2012, https://doi.org/10.9708/jksci.2013.18.11.115