Browse > Article
http://dx.doi.org/10.6109/jkiice.2012.16.6.1223

Privacy and Security Model for RFID Healthcare System in Wireless Communication Network  

Kim, Jung-Tae (목원대학교)
Abstract
The use of a mobile agent in hospital environment offers an opportunity to deliver better services for patients and staffs. Furthermore, medical errors will be reduced because M-health system helps to verify the medical process. Optimized security protocols and mechanisms are employed for the high performance and security. Finally, a challenge in the near future will be converge the integration of Ubiquitous Sensor Network (USN) with security protocols for applying the hospital environment. We proposed secure authentication and protocol with Mobile Agent for ubiquitous sensor network under healthcare system surroundings.
Keywords
RFID; Ubiquitous Healthcare; Protocol; Network Security;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 Azzedine Boukerche, et al, "A Secure Mobile Health System Using Trust-Based Multicast Scheme", IEEE J. On selected areas in communications, v.27, n.4, may 2009, pp.387-399.   DOI   ScienceOn
2 J.H.Kim and Sahama, T. "A Study on the Encryption Model for Numerical Data,", International Journal of KIMICS , vol.7, pp.31-34. 2009.
3 Shinyoung Lim, "Security Issues on Wireless Body Area Network for Remote Healthcare Monitoring", 2010 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, pp.327-332, 2010.
4 Bong-Keun Rhee, etcs, "Privacy Model based on RBAC for U-Healthcare Service Environment", KIICE(Journal of The Korea Institute of Information and Communication Engineering), Vo.16, N.3, March 2012, pp.605-614   DOI   ScienceOn
5 Young-Jae Park, "On the Accuracy of RFID Tag Estimation Functions", JICCE(Journal of Information and Communication Convergency Engineering), V.10, N. 1, March 2012, pp.33-39   DOI
6 Jung-Hyun Oh, etcs, "A Secure Communication Protocol for Low-cost RFID System", Seventh International Conference on Computer and Information Technology, pp.949-954, 2007.
7 P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Estevez- Tapiador, and A. Ribagorda, "EMAP: A Efficient Mutual Authentication Protocol for Low-Cost RFID Tags," Proc. OTM Information Security Workshop (IS '06), pp. 352-361, 2006.
8 Ari Juels, "RFID Security and Privacy: A Research Survey", IEEE Journal of selected areas in communications, V.24, N.2, pp.381-394, February, 2006   DOI   ScienceOn
9 H.Y. Chien. "SASI: A New Ultra-weight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity", IEEE Transactions on Dependable and Secure Computing., vol.4, n.4, pp.337-340, Oct. 2007   DOI   ScienceOn
10 Feldhofer, etcs, "Strong authentication for RFID systems using the AES algorithm," Cryptographic hardware and embedded systems", CHES 2004, v.31, n.56, pp.357-370, 2004