Browse > Article
http://dx.doi.org/10.14400/JDC.2014.12.4.259

Authentication Protocol based on Credential for Implantable Medical Device  

Jeong, Yoon-Su (Dept. of Information Communication & Engineering, Mokwon University)
Publication Information
Journal of Digital Convergence / v.12, no.4, 2014 , pp. 259-264 More about this Journal
Abstract
Body insertion due to the recent development of sensor technology, the device is attached patients to receive medical services from anywhere, anytime environment is changing. Body insertion devices for the hospital, the patient's vital information attached personnel (doctors, nurses, pharmacists, etc.) to pass, however, when a problem occurs, a patient's information to a third party that can be exploited easily exposed. In this paper, we proposed signature authentication protocols mandate based on the patient's power of attorney from the center of the u-Healthcare services, hospital officials FormHelper third party disguised as a patient, the hospital patient information easily obtained from the officials to prevent. The proposed protocol, the patient's sensitive information to a third party, do not expose the patient's sensitive information to the random number generated by the u-Healthcare service centers and patients hash signature key to encrypt sensitive information of patients. From third parties to maintain synchronization between the patients and the hospital personnel in order to prevent patient information from being exploited illegally by the patient's vital information leakage can be prevented.
Keywords
IMD; Key Distribution; Protocol; RSA;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 R. Lu, Z. Cao and Y. Zhou(2004), "A simple efficient proxy-protected signature scheme based on factoring", Comp. Stand. Inter., withdrawn.
2 E. J. KO(2009), "Leading health care revolution smart sensors", LG Business Insight, pp. 37-44.
3 Y. S. Jeong, S. H. Lee(2012), "U-Healthcare user's privacy protection protocol with Implantable medical Device of State Information", THE JOURNAL OF KOREA INFORMATION AND COMMUNICATIONS SOCIETY (J-KICS), Vol. 37,
4 Y. S. Jeong(2012), "RFID-based Authentication Protocol for Implantable Medical Device", The Journal Of Digital Policy & Management, Vol. 10, No. 2, pp. 141-146.
5 Y. Zhou, Z. Cao, and R. Lu(2005), "Provably secure proxy-protected signature schemes based on factoring", Appl. Math. Comput. Vol. 164, No. 1, pp. 83-98.   DOI   ScienceOn
6 Y. S. Jeong and S. H. Lee(2012), "u-Healthcare Service Authentication Protocol based on RFID Technology", The Journal Of Digital Policy & Management, Vol. 10, No. 2, pp. 153-160.
7 K. K. Venkatasubramanian, A. Banerjee and S. K. S. Gupta(2010), "PSKA: Usable and Secure Key Agreement Scheme for Body Area Networks", Vol. 14, No. 1, pp. 60-68.   DOI   ScienceOn
8 M. Mambo, K. Usuda, and E. Okamoto(1996), "Proxy signatures for delegating signing operation", Proc. Third ACM Conf. on Computer and Communications Security. pp. 48-57.