Browse > Article
http://dx.doi.org/10.6109/jkiice.2011.15.1.099

Implementation of u-Healthcare Security System by applying High Speed PS-LFSR  

Kim, Nack-Hyun (동서대학교 유비쿼터스 IT학과)
Lee, Young-Dong (동서대학교 컴퓨터정보공학부)
Kim, Tae-Yong (동서대학교 컴퓨터정보공학부)
Jang, Won-Tae (동서대학교 컴퓨터정보공학부)
Lee, Hoon-Jae (동서대학교 컴퓨터정보공학부)
Abstract
The emerging of ubiquitous computing and healthcare technologies provides us a strong platform to build sustainable healthcare applications especially those that require real-time information related to personal healthcare regardless of place. We realize that system stability, reliability and data protection are also important requirements for u-healthcare services. Therefore, in this paper, we designed a u-healthcare system which can be attached to the patient's body to measure vital signals, enhanced with USN secure sensor module. Our proposed u-healthcare system is using wireless sensor modules embedded with NLM-128 algorithm. In addition, PS-LFSR technique is applied to the NLM-128 algorithm to enable faster and more efficient computation. We included some performance statistical results in term of CPU cycles spent on NLM-128 algorithm with and without the PS-LFSR optimization for performance evaluation.
Keywords
Ubiquitous Sensor Networks; Information security; Stream cipher; PS-LFSR;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Hoonjae Lee, and Sangjae Moon "Parallel stream cipher for secure high-speed communications," Signal Processing, pp. 259-265, 2002.
2 J. L. Massey, "Shift-Register Synthesis and BCH Decoding," IEEE Trans. Theo, vol 1. IT-15, no.1, pp. 122-127, 1969.
3 HoonJae Lee, SangMin Sung, and HyeongRag Kim, "NLM-128, An Improved LM-type Summation Generator with 2-bit memories," Proceedings of 4th International Conference on Computer Sciences and Convergence Information Technology (ICCIT), pp. 577-582, 2009.
4 A.biryuikov and A.Shamir, "Cryptanalytic Time/ Memory/Data Tradeoffs for Stream Ciphers," Advances in Cryptology, Proceedings of ASIACRYPT00, LNCS 1976, pp.1-13, 2000.
5 이신경, 이해동, 정교일, 최두호 "안전한 USN을 위한 정보보호기술 동향," 전자통신동향분석 제 23권, 제 4호, pp. 72-79, 2008.
6 T. Chang, B. Park, Y.H.kim, "An Efficient Inplementation of the D-Homomorphism for Generation of de Bruijin Sequences," IEEE Transactions on Infromation Theory, vol. 45, no. 4, pp. 1280-1283, 1999.   DOI   ScienceOn
7 Chipcon, Inc., "CC2420 Data Sheet," http://www.chipcon.com/files/CC2420_Data_Sheet_1_ 3.pdf
8 http://www.ieee802.org/15/pub/TG4.html
9 송지은, 김신효, 정명애, 정교일, "u-헬스케어 보안 이슈 및 기술 동향," 전자통신동향분석 제 22권, 제 1 호, pp. 119-129, 2007.