• Title/Summary/Keyword: Hospital Security

Search Result 290, Processing Time 0.027 seconds

Blockchain and Physically Unclonable Functions Based Mutual Authentication Protocol in Remote Surgery within Tactile Internet Environment

  • Hidar, Tarik;Abou el kalam, Anas;Benhadou, Siham;Kherchttou, Yassine
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.15-22
    • /
    • 2022
  • The Tactile Internet technology is considered as the evolution of the internet of things. It will enable real time applications in all fields like remote surgery. It requires extra low latency which must not exceed 1ms, high availability, reliability and strong security system. Since it appearance in 2014, tremendous efforts have been made to ensure authentication between sensors, actuators and servers to secure many applications such as remote surgery. This human to machine relationship is very critical due to its dependence of the human live, the communication between the surgeon who performs the remote surgery and the robot arms, as a tactile internet actor, should be fully and end to end protected during the surgery. Thus, a secure mutual user authentication framework has to be implemented in order to ensure security without influencing latency. The existing methods of authentication require server to stock and exchange data between the tactile internet entities, which does not only make the proposed systems vulnerables to the SPOF (Single Point of Failure), but also impact negatively on the latency time. To address these issues, we propose a lightweight authentication protocol for remote surgery in a Tactile Internet environment, which is composed of a decentralized blockchain and physically unclonable functions. Finally, performances evaluation illustrate that our proposed solution ensures security, latency and reliability.

SP Knot: A New Arthroscopic Sliding Flip Knot With A Lag Bight (SP 매듭: 지연 고리가 있는 새로운 관절경적 이동 플립 매듭)

  • Yoon Kang-Sup;Lee Ji-Ho;Kang Seung-Baik;Lee Jae-Hyup;Lee Myung-Chul;Jo Hyun-Chul
    • Clinics in Shoulder and Elbow
    • /
    • v.8 no.2
    • /
    • pp.127-130
    • /
    • 2005
  • We describe a secure and easy-to-tie knot with a lag bight, the SP knot. An optimal sliding knot is required to be a low-profile, easy to throw, slide well, and provide a good initial security. The SP knot easily slides and sets while avoiding premature locking during sliding. While maintaining tension on the post limb with a knot pusher, pulling the loop limb makes it to flip and distort post limb, resulting in creation of a snug knot on the exact location with desired tension. The SP knot has one knot configuration before pulling the loop limb, but it converts to two knots after pulling the loop limb, one half-hitch and one 'clove hitch', which could provide enough loop security before any additional half-hitches. The configuration of the completed SP knot is formed lying along the loop of the knot, rather than stacking up, which enables a very low profile. The SP knot has various characteristics of the optimal arthroscopic slip knot and may be a useful tool for successful arthroscopic surgery.

A Study on the Procedure, Method of Search and Seizure for HIS (Hospital Information System) (의료정보시스템의 압수수색 절차와 방법에 대한 연구)

  • Kim, Taehoon;Lee, Sangjin
    • Journal of Digital Forensics
    • /
    • v.12 no.3
    • /
    • pp.83-96
    • /
    • 2018
  • Electronic medical records in the hospital information system are the important evidence related to the crime and are subject to search and seizure. In the case of a large general hospital, it is possible to search for seizures through cooperation of the staff, but it is impossible in small hospitals. The investigation agency copies the database of electronic medical records and then selects relevant content. This approach has an issue of excessive search and seizure. In this paper, we propose field selection procedures and methods for electronic medical records while ensuring integrity, reproducibility, and chain of custody. Currently, it is necessary to study the procedures and methods of search and seizure of medical information system so that it can respond to next changing cloud hospital information system.

An Efficient Clustering algorithm for Target Tracking in WSNs (무선 센서 네트워크에서 클러스터링을 이용한 효율적인 측위)

  • Rhee, Chung-Sei;Kim, Jang-Hwan
    • Convergence Security Journal
    • /
    • v.16 no.5
    • /
    • pp.65-71
    • /
    • 2016
  • The use of Wireless Sensor Networks in many applications require not only efficient network design but also broad aspects of security, military and health care for hospital. Among many applications of WSNs, target tracking is an essential research area in WSNs. We need to track a target quickly as well as find the lost target in WSNs. In this paper, we propose an efficient target tracking method. We also propose an efficient clustering method and algorithm for target tracking.

Security Structure for Protection of Emergency Medical Information System (응급의료정보시스템의 보호를 위한 보안 구조)

  • Shin, Sang Yeol;Yang, Hwan Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.2
    • /
    • pp.59-65
    • /
    • 2012
  • Emergency medical information center performs role of medical direction about disease consult and pre-hospital emergency handling scheme work to people. Emergency medical information system plays a major role to be decreased mortality and disability of emergency patient by providing information of medical institution especially when emergency patient has appeared. But, various attacks as a hacking have been happened in Emergency medical information system recently. In this paper, we proposed security structure which can protect the system securely by detecting attacks from outside effectively. Intrusion detection was performed using rule based detection technique according to protocol for every packet to detect attack and intrusion was reported to control center if intrusion was detected also. Intrusion detection was performed again using decision tree for packet which intrusion detection was not done. We experimented effectiveness using attacks as TCP-SYN, UDP flooding and ICMP flooding for proposed security structure in this paper.

An Adaptive Threshold Determining Method in Senor Networks using Fuzzy Logic (통계적 여과기법에서 퍼지 규칙을 이용한 적응적 보안 경계 값 결정 방법)

  • Sun, Chung-Il;Cho, Tae-Ho
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.177-180
    • /
    • 2008
  • There are many application areas of sensor networks, such as surveillance, hospital monitoring, and home network. These are dependent on the secure operation of networks, and will have serious outcome if the networks is injured. An adversary can inject false data into the network through the compromising node. Ye et al. proposed a statistical en-route filtering scheme (SEF) to detect such false data during forwarding process. In this scheme, it is important that the choice of the threshold value since it trades off security and overhead. This paper presents an adaptive threshold value determining method in the SEF using fuzzy logic. The fuzzy logic determines a security distance value by considering the situation of the network. The Sensor network is divided into several areas by the security distance value, it can each area to uses the different threshold value. The fuzzy based threshold value can reduce the energy consumption in transmitting.

  • PDF

A Systematic Literature Review on Security Challenges In Image Encryption Algorithms for Medical Images

  • Almalki, Nora;Alsuwat, Hatim
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.75-82
    • /
    • 2022
  • Medical data is one of the data that must be kept in safe containers, far from intrusion, viewing and modification. With the technological developments in hospital systems and the use of cloud computing, it has become necessary to save, encrypt and even hide data from the eyes of attackers. Medical data includes medical images, whether they are x-ray images of patients or others, or even documents that have been saved in the image format. In this review, we review the latest research and the latest tools and algorithms that are used to protect, encrypt and hide these images, and discuss the most important challenges facing these areas.

The Priority Analysis on the Financing of Healthcare Institutions in Korea (의료기관 자본조달 우선순위 분석)

  • Lee, Woo-Chun;Ahn, Young-Chang
    • Korea Journal of Hospital Management
    • /
    • v.13 no.3
    • /
    • pp.1-16
    • /
    • 2008
  • According to Myers (1984) and Myers and Majluf(1984), there exists a financial hierarchy from internal to external financing, from long-tenn debt to equity, due to information costs. The purpose of this study is to assess the profit-making corporation of healthcare institutions. Data was collected from 130 hospital presidents and financial managers. We analysed the frequency and one way ANOVA by SPSS Windows 14.0K. The major findings of the study were as follows: We found that the priorities which a healthcare institutions financing were internal financial, other allowance, a credit loan, a security loan, and a lease through this study. The priorities which a healthcare institutions raised the capital differed as to the number of beds and revenues. The priorities were no difference from ownership, location and an annual business.

  • PDF

A Study on Turnover Intention of Hospital Workers (의료기관 종사자의 이직의도에 관한 연구)

  • Lee, Sun-Kyoung;Seong, Jeong-Min
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.2
    • /
    • pp.271-277
    • /
    • 2013
  • The purpose of this study is to find out factors that turnover intention among medical staffs of hospital. The study subjects were 179 medical staffs of hospital and the data were collected using by self-administered questionnaire. As the result of multiple regression analysis the age, education, career management and organizational commitment were statistically significant related with turnover intention. Especially, in order to reduce turnover intention that hospital is development of career management programs and organizational commitment for enhancing the security measures are necessary.

A Protection Profile for E-Document Issuing System (온라인증명서 발급시스템 보호프로파일에 관한 연구)

  • Lee, Hyun-Jung;Won, Dong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.6
    • /
    • pp.109-117
    • /
    • 2011
  • We can use document issuance services provided by a school, bank, hospital, company, etc. either by visiting those facilities or by simply visiting their Web sites. Services available through the Internet allow us to use the same services as we do by actually going to those facilities at home or office any time. As much as it saves us time and money, there also arises a problem of information being forged on the Internet or on a printed document. There has to be security functions to deal with the problem. This paper intends to think of the possible security threats and draw out the necessary security functions that an on-line document issuance system should have based on the CC v3.1, so that anyone can use it as reference when they evaluate or introduce the system.