Browse > Article
http://dx.doi.org/10.14400/JDPM.2014.12.1.573

Process of the Encryption key using a Physical Information in the U-Healthcare Service  

Song, Chung-Geon (Division of Information and Communication, Baekseok University)
Lee, Keun-Ho (Division of Information and Communication, Baekseok University)
Ryu, Gab-Sang (Department of Computer Science, Dongshin University)
Publication Information
Journal of Digital Convergence / v.12, no.1, 2014 , pp. 573-578 More about this Journal
Abstract
Recently as we enter into the world of an aging society, the U-Healthcare service is newly spotlighted. In order to secure this U-Healthcare, a development of security solution that is suitable for the U-Healthcare environment is required. But the U-Healthcare environment is difficult to apply the existing security solution with the lack of standards, a security solution with high completeness was not developed. At this point, in order to structure the safe U-Healthcare environment, a generating method of an encryption key using the body information that helps the effective key management and ensuring the confidentiality of the data is proposed.
Keywords
U-Healthcare; M2M; Encryption; Bio-key; Key management;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 JiEun Song, "Security Issues and Its Technology Trends in u-Healthcare", Electronics and Telecommunications Trends, Vol.22, No.1, February, 2007.
2 Bo-Soo Kim, U-Healthcare & Medical Information System of Status and Operative Challenges for Integrated Medical Information System, Digital Policy Journal, 2011.
3 David Boswarthick, "M2M Activities in ETSI", SCS Conference, July, 2009.
4 Sanggeun Yu, "Smart Mobile Services - M2M Technology and Its Standardization Trends", Electronics and Telecommunications Trends, Vol.26, No.2, April, 2011.
5 http://www.onem2m.org
6 ChungGeun Song, "Threat to Security of Remote-Controlling Medical Care Service and Countermeasure Under U-Healthcare Environment", 2nd ICCT, pp. 319-321, July, 2012.
7 Jeong YoonSu, Lee SangHo, "U-Healthcare Service Authentication Protocol based on RFID Technology" The Journal of Digital Policy & Management, Vol.10, No.2, March, 2012.
8 Chang YunSeok, Kim Bo Yeon, "A Wireless ECG Measurement System based on the Zigbee USN", Korea Information Processing Society Journal, Vol.18-C, No.3, June, 2011.
9 Gil Lee, Gopal Gupta, Lakshman Tamil, "A Scalable Wireless Body Area Network for Bio-Telemetry", Journal of Information Processing Systems, Vol.5, No.2, June, 2009.
10 Cory Cornelius, David Kots, "On Usable Authentication for Wireless Body Area Networks", Journal Title, Presented at HealthSec, August, 2010.
11 http://seed.kisa.or.kr
12 Byung-Seok Yu, Sung-Hyun Yun, "The Design and Implementation of Messenger Authentication Protocol to Prevent Smartphone Phishing", Journal of the Korea Convergence Society, Vol.1, No.1, pp. 9-14, 2010
13 Won-Jun Jang, Hyung-Woo Lee, "Biometric One-Time Password Generation Mechanism and its Application on SIP Authentication", Journal of the Korea Convergence Society, Vol.1, No.1, pp. 93-100, 2010
14 Seung-Soo Shin, Kun-Hee Han, "Design of the Mail Protocol with Perfect Forward Security", Journal of the Korea Convergence Society, Vol.2, No.2, pp. 13-19, 2011