Browse > Article
http://dx.doi.org/10.3745/KTCCS.2014.3.10.323

A Design of Secure Electronic Health Information Management Protocol in the Internet of Things Environment  

Park, Jeong Hyo (숭실대학교 컴퓨터통신학과)
Kim, Nak Hyun (숭실대학교 컴퓨터통신학과)
Jung, Yong Hoon (숭실대학교 컴퓨터학과)
Jun, Moon Seog (숭실대학교 컴퓨터학과)
Publication Information
KIPS Transactions on Computer and Communication Systems / v.3, no.10, 2014 , pp. 323-328 More about this Journal
Abstract
ZigBee based on the most vulnerable part of u-Healthcare system that uses the ZigBee communication is the wireless section. ZigBee communication sectors to identify vulnerabilities in this paper, we propose to compensate. ZigBee has been raised from the existing vulnerabilities organize and ZigBee also uses the 64bit address that uniquely identifies a vulnerability that was defined as exposure. And to prevent the exposure of a unique identifying address was used to address a temporary identification. ZigBee security services, the proposed system during the Network Key for encryption only use one mechanism of Residential Mode is used. Residential Mode on all nodes of the entire network because they use a common key, the key is stolen, your network's security system at a time are at risk of collapse. Therefore, in order to guard against these risks to the security policy Network Key updated periodically depending on the method used to. The proposed evaluation and comparative analysis of the system were exposed in the existing system can hide the address that uniquely identifies a public key Network Key also updated periodically, so that leaks can occur due to reduced risk.
Keywords
U-Healthcare; ZigBee; Wireless Communication Vulnerabilities; Unique Identification of a 64bit Address; Temporary Identification Address; Security Policy;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Tae-Min Song, Sang-Hyun Jang, "u-Healthcare: Issue and Research Trends", Health-welfare Policy Forum, The Korea Institute for Health and Social Affairs, pp.70-86, 2011.
2 Dae-youl Seo, Jin-chul Kim, Kyoung-Mok Kim, and Young-Hwan Oh, "Effective Parent-Child Key Establishment Algorithm used ZigBee Sensor Network", Journal of Telecommunication, THE INSTITUTE OF ELECTRONICS AND INFORMATION ENGINEERS, pp.35-45, 2006.
3 Ik-Seob Lee, Ki-Hyang Hong, Gang-Shin Lee, and Jae-Il Lee, "Preliminary Diagnosis Model for a New IT Service: Improving the Information Security of u-Services with Zigbee", PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, Egypt; World Academy of Science, Engineering and Technology, pp.155-158, 2007.
4 Moazzam Khan, Fereshteh Amini, and Vojislav B. Misic, "The Cost of Security: Performance of ZigBee Key Exchange Mechanism in an 802.15.4 Beacon Enabled Cluster", Mobile Adhoc and Sensor Systems(MASS), 2006 IEEE International Conference on, IEEE, pp.876-881, 2006.
5 Pavel Ocenasek, "Towards Security Issues in ZigBee Architecture", Human Interface, Part I, HCII 2009, LNCS 5617, pp.587-593, 2009.
6 ZigBee Alliance, "ZigBee-PRO Stack Profile: Platform restrictions for compliant platform testing and interoperability", 2008.
7 Byung-Mun Lee, Heon-Cheol Lim, and Un-Ku Kang, "Mutual Authentication Protocol based on the Effective Divided Session for the Secure Transmission of Medical Information in u-Health", Journal of Digital Contents Society, The Korea Contents Society, pp.142-151, 2011.