Fig. 1. Vijayakumar et al.‘s Secure Communication Scheme [12]
Fig. 2. Normal Status Phase of Proposed Secure Communication Scheme
Fig. 3. Emergency Status Phase of Proposed Secure Communication Scheme
Table 1. Security Comparison
Table 2. Computational Cost Comparison
참고문헌
- H. Kim, E. K. Ryu & S. W. Lee. (2011). Security Considerations on Cognitive Radio based on Body Area Networks for u-Healthcare. Journal of Security Engineering, 10(1), 9-20.
- S. Y. Mun, Y. M. Yun, T. H. Han, S. E. Lee, H. J. Chang, S. Y. Song & H. C. Kim. (2017). Public Awareness of Digital Healthcare Services. Journal of Digital Convergence, 15(4), 621-629.
- J. E. Song, S. H. Kim, M. A. Chung & K. I, Chung. (2007). Security issues and its technology trends in u-Healthcare. Electronics and Telecommunications Trends, 22(1), 119-129.
- T. M. Song & S. H. Jang. (2011). u-Healthcare : Issue and Research Trends. Korea Institute for Health and Social Affairs, 119-129.
- C. B. Roh & J. B. Song. (2015). Hybrid Healch Care System Designs in a Wireless Network Environment, Journal of Digital Convergence, 13(3), 457-462. https://doi.org/10.14400/JDC.2015.13.8.457
- J. E. Yoon & C. J. Suh. (2018). Research Trend Analysis on Smart Healthcare by using Topic Modeling and Ego Network Analysis. Journal of Digital Convergence, 16(5), 981-993.
- L. Mark & F. John. (2011). Remote control of medical devices using instant messaging infrastructure. U.S. Patent CA2718696 A1, Dec. 8.
- S. B. Othman & A. Trad. H. (2014). Youssef, Security artchitecture for at-home medical care using wireless sensor network, Proc. of International conference on wireless communications and mobile computing conference 2014, 304-309.
- S. Han, S. Q. Li, C. H. Ju & W. Zhou. (2016). PPM-HDA:Privacy-preserving and multifuntional health data aggregation with fault tolerance, IEEE Transactions on Information Forensics and Security, 11(9), 1940-1955. https://doi.org/10.1109/TIFS.2015.2472369
- S. Syms & A. D. Kumar. (2016). Secured WBANs for pervasive m-healthcare social networks. Proc. of 10th International Conference on Intelligent Systems and Control.
- J. Liu, Z. Zhang & K. S. Kwak. (2014). Certificateless remote anonymous authentication schemes for wireless body area networks. IEEE Transactions on Parallel and Distributed Systems, 25(2), 332-342. https://doi.org/10.1109/TPDS.2013.145
- P. Vijayakumar, P. Pandiaraja, M. Kaaruppiah & L. J. Deborah. (2017). An efficient secure communication for healthcare system using wearable devices. Computers and Electrical Engineering, 63, 232-245. https://doi.org/10.1016/j.compeleceng.2017.04.014
- Wikipedia, Denial of service attack, https://ko.wikipedia.org/wiki/Denialofserviceattack.
- Wikipedia. Data integrity, https://ko.wikipedia.org/wiki/Dataintegrity.
- F. Wu, L. Xu, S. Kumari, X. Li, A. K. Das, M. K. Khan, M. Karuppiah & R. Baliyan. (2016). A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks. Security and Communication Networks, 9, 3527-2542. https://doi.org/10.1002/sec.1558