Browse > Article
http://dx.doi.org/10.9708/jksci/2012.17.10.079

Mutual Authentication Protocol based on the Random Divided Session for the Security of Medical Information in Home-Health  

Lim, Heon-Cheol (Dept. of Computer Information and Science, Inha University)
Park, Tae-Hyun (Dept. of Computer Information and Science, Inha University)
Kwon, Gu-In (Dept. of Computer Information and Science, Inha University)
Abstract
In this paper, we design a mutual authentication protocol which divided sessions from an authenticated session are updated periodically. And in order to minimize the traffic overhead for session authentication, we also introduce dynamic session management according to sampling rate of medical sensor type. And randomize the divided session time. This model has the effect of blocking the integrity and confidentiality intrusion of rogue gateway. Moreover, efficiency is provided through medical data to be transmitted have different sampling rate. In order to evaluate this model, it was embodied and experimented in TinyOS 2.1 environment. The result, we got an overall validity from three types of experiment.
Keywords
Home-Health; Medical Information; Security; Random Divided Session; Mutual Authentication;
Citations & Related Records
연도 인용수 순위
  • Reference
1 T. T. May, "Medical information security: the evolving challenge", 32nd Annual 1998 International Carnahan Conferenece on. of Security Technology, pp. 85-92, 2000.
2 C. S. Jang, W. J. Han, "Security Requirement Analysis for WBAN environment", Fall 2008, KIMICS Integrated Conference, pp. 260-263. 2008.
3 H. S Chen, M. J. Su, T. H. Tsai, S. S. Teng, H. W. Zhang, "U-Care for the elderly Implementation of a Comprehensive Living and Health Care Network", e-Health networking, Application and Services, pp. 187-190, June. 2007.
4 C. W. Jeong, D. H. Kim, M. H. Kim, S. J. Joo, "A Dynamic Security Service using Access Control Model in Distributed Framewirk Support for u-Healthcare", Journal of Korean Society for Internet Information, Vol.8, No.6, pp. 29-42, 2007.
5 J. E. Song, S. H. Kim, M. E. Jeong, K. I. Jeong, "Security Issues and Its Technology Trends in u-Healthcare", Electronics and Telecommunications Trends Vol.22, No.1, pp. 119-129, Feb. 2007.
6 F. W. Xuan, D. M. Chui, L. W. Kei, "Novel system sampling multi vital signs for e-Home Healthcare", Proc. of 7th Int'l Conference on Information, Communications and Signal Processing, pp. 1-5, 2009.
7 Y. Yao, J. Chong, W. Xingwei, "Enhancing RC4 algorithm for WLAN WEP protocol", Control and Decision Conference (CCDC) Chinese, pp. 3623-3627, 2010.
8 A. Bogdanov, D. Khovratovich, and C. Rechberger, "Biclique Cryptanalysis of the Full AES", Proc. of Int'l Conference on Theory and Application of Cryptology and Information Security ASIACRYPT 2011, pp. 344-371, Dec. 2011.
9 M. H. Kim, J. S. Kim, A. R. Kim, K. J. Chae, "New Security Technology Trends of Wireless Sensor Network", Korea Information Processing Society Review, Vol. 17, No. 1, pp. 139-147, 2008.
10 K. Sohrabi, J. Gao, V. Ailawadhi, and G. J. Pottie, "Protocol for self-organization of a wireless sensor network", Personal Communications IEEE, Vol. 7, pp. 16-27, Oct. 2000.   DOI   ScienceOn
11 K. Fall, "A delay-tolerant network architecture for challenged internets", ACM SIGCOMM 2003, pp.27-34, Aug. 2003.
12 S. J. Lee, and W. W. Su, "An adaptive and fault-tolerant gateway assignment in sensor networks", 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems, Vol. 6, No.5, PP.576-578, April 2004.
13 M. Paksuniemi, H. Sorvoja, E. Alasaarela, and R. Myllyla, "Wireless sensor and data transmission needs and technologies for patient monitoring in the operating room and intensive care unit", Engineering in Medicine and Biology Society 2005 IEEE-EMBS 2005 27th Annual international Conference, pp. 5182-5185, Jan. 2006.
14 Y. R. Lee, D. G. Park, E. "Role based access control of healthcare information system for Mobile environments", Journal of the Korea Society of Computer and Information, Vol. 10, No.5, pp. 119-132, July. 2005.
15 J. W. Kim, H. "Implementation of a pervasive health care system for cardiac patient on mobile environment", Journal of the Korea Society of Computer and Information, Vol. 13, No.2, pp. 117-124, Sep. 2008.
16 R. Sulaiman, D. Sharma, W. Ma, D. Tran, "A Security Architecture for e-Health Services", Proc. of International Conference on Advanced Communication Technology, pp. 999-1004, Feb. 2008.
17 C. S. Wang, Y. R. Tzeng, "A Wireless Networking Technologies Overview Over Ubiquitous Service Applications", Proc. of Networked Computing and Advanced Information Management, pp. 156-161, Sep. 2000.