DOI QR코드

DOI QR Code

Privacy and Security Model for RFID Healthcare System in Wireless Communication Network

무선센서네트워크 환경하에서 RFID 헬스 시스템을 위한 보안 모델

  • Received : 2012.06.01
  • Accepted : 2012.06.01
  • Published : 2012.06.30

Abstract

The use of a mobile agent in hospital environment offers an opportunity to deliver better services for patients and staffs. Furthermore, medical errors will be reduced because M-health system helps to verify the medical process. Optimized security protocols and mechanisms are employed for the high performance and security. Finally, a challenge in the near future will be converge the integration of Ubiquitous Sensor Network (USN) with security protocols for applying the hospital environment. We proposed secure authentication and protocol with Mobile Agent for ubiquitous sensor network under healthcare system surroundings.

무선 통신 환경 하에서 병원 등에서 모바일 에이전트의 사용은 환자, 병원의 의사 등의 관계자들에게 훨씬 더 좋은 서비스를 제공한다. 더군다나 이러한 의료 진단의 과정을 더욱더 효율적이며 안전하게 하기 위하여 모바일 환경하에서의 융복합 기술이 도입됨에 따라 의료의 기록 오류의 감소 및 편의성을 가져왔다. 다가오는 미래에는 더욱더 의료 환경하에서의 융복합 기술의 도입으로 활용도가 더욱더 높아질 것이다. 따라서 본 논문에서는 이러한 유비쿼터스 환경 하에서의 헬스캐어를 위한 보안 메카니즘을 제안하고 이러한 무선 환경 하에서 발생할 수 있는 보안적인 문제점을 분석하였다.

Keywords

References

  1. Ari Juels, "RFID Security and Privacy: A Research Survey", IEEE Journal of selected areas in communications, V.24, N.2, pp.381-394, February, 2006 https://doi.org/10.1109/JSAC.2005.861395
  2. H.Y. Chien. "SASI: A New Ultra-weight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity", IEEE Transactions on Dependable and Secure Computing., vol.4, n.4, pp.337-340, Oct. 2007 https://doi.org/10.1109/TDSC.2007.70226
  3. Feldhofer, etcs, "Strong authentication for RFID systems using the AES algorithm," Cryptographic hardware and embedded systems", CHES 2004, v.31, n.56, pp.357-370, 2004
  4. Azzedine Boukerche, et al, "A Secure Mobile Health System Using Trust-Based Multicast Scheme", IEEE J. On selected areas in communications, v.27, n.4, may 2009, pp.387-399. https://doi.org/10.1109/JSAC.2009.090504
  5. J.H.Kim and Sahama, T. "A Study on the Encryption Model for Numerical Data,", International Journal of KIMICS , vol.7, pp.31-34. 2009.
  6. Shinyoung Lim, "Security Issues on Wireless Body Area Network for Remote Healthcare Monitoring", 2010 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, pp.327-332, 2010.
  7. Bong-Keun Rhee, etcs, "Privacy Model based on RBAC for U-Healthcare Service Environment", KIICE(Journal of The Korea Institute of Information and Communication Engineering), Vo.16, N.3, March 2012, pp.605-614 https://doi.org/10.6109/jkiice.2012.16.3.605
  8. Young-Jae Park, "On the Accuracy of RFID Tag Estimation Functions", JICCE(Journal of Information and Communication Convergency Engineering), V.10, N. 1, March 2012, pp.33-39 https://doi.org/10.6109/jicce.2012.10.1.033
  9. Jung-Hyun Oh, etcs, "A Secure Communication Protocol for Low-cost RFID System", Seventh International Conference on Computer and Information Technology, pp.949-954, 2007.
  10. P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Estevez- Tapiador, and A. Ribagorda, "EMAP: A Efficient Mutual Authentication Protocol for Low-Cost RFID Tags," Proc. OTM Information Security Workshop (IS '06), pp. 352-361, 2006.

Cited by

  1. Design of Integrated Security Framework for Open Wireless Networking Architecture vol.17, pp.6, 2013, https://doi.org/10.6109/jkiice.2013.17.6.1348