Skip to main content

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 3))

Abstract

Telemedicine is the process by which electronic, visual and audio communications are used to support practitioners at remote sites with diagnosis and consultation procedures, such as remote clinical examinations and medical image transfers. Telemedicine is legally regulated by laws and constraints regarding the access of data contained in Personal Medical Files. These requirements are given by international entities such as IHE. They often specify the required functionalities to meet requirements of information exchange in the medical field. These functionalities are presented in this paper and outline some technical examples for their implementation in each level: authentication, communication, data storage, tracking and patient identification.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Abendroth, J., Seigneur, J.-M.: Deploying the trusted platform module (TPM) to increased fairness and trust in P2P file sharing servents. In: ISP 2006: Proceedings of the 5th WSEAS International Conference on Information Security and Privacy, pp. 202–207 (2006)

    Google Scholar 

  2. AuthenticationWorld.com: The business of authentication, http://www.authenticationworld.com/

  3. Bernecker, O.: Biometrics security: An end user perspective. Giesecke and Devrient GmbH, Germany. Information security technical report 11, 111–118 (2006)

    Article  Google Scholar 

  4. Čapkun, S., Buttyán, L., Hubaux, J.-P.: SECTOR: secure tracking of node encounters in multi-hop wireless networks. In: SASN 2003: Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, pp. 21–32 (2003)

    Google Scholar 

  5. Deng, J., Han, R., Mishra, S.: Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks. In: SECURECOMM 2005: Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, pp. 113–126 (2005)

    Google Scholar 

  6. Elmarzouqi, N., Garcia, E., Lapayre, J.-C., Humbert, P.: Use of ACCM Model for teledermatology implementation. In: DFMA 2007, 3rd int. Conference on Distributed Framework for Multimedia Applications, Paris, France, July 2007, pp. 84–89 (2007)

    Google Scholar 

  7. Ganeriwal, S., Srivastava, M.B.: Reputation-based framework for high integrity sensor networks. SASN, 66–77 (2004)

    Google Scholar 

  8. Garcia, E., Guyennet, H., Lapayre, J.-C., Moulin, T.: Adaptive Tele-application for Remote Neurology Diagnosis. International Journal of Telemedicine and e-Health 11(6), 692–701 (2005)

    Article  Google Scholar 

  9. Gouaux, F.: Ambient Intelligence and Pervasive Systems for the Monitoring of Citizens at Cardiac Risk: New Solutions from The EPI-MEDICS Project. Computers in Cardiology 29, 289–292 (2002)

    Google Scholar 

  10. Halperin, D., Heydt-Benjamin, T.S., Ransford, B., Clark, S.S., Defend, B., Morgan, W., Fu, K., Kohno, T., Maisel, W.H.: Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses. In: SP 2008: Proceedings of the 2008 IEEE Symposium on Security and Privacy, pp. 129–142 (2008)

    Google Scholar 

  11. Hu, Y., Perrig, A., Johnson, D.: Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks. In: INFOCOM (2003)

    Google Scholar 

  12. Hu, Y.-C., Perrig, A.: A Survey of Secure Wireless Ad Hoc Routing. IEEE Security and Privacy, 28–39 (2004)

    Google Scholar 

  13. Hu, Y.-C., Perrig, A., Johnson, D.B.: Wormhole attacks in wireless networks. IEEE Journal on Selected Areas in Communications, 370–380 (2006)

    Google Scholar 

  14. Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Networks, 293–315 (2003)

    Google Scholar 

  15. Karlof, C., Sastry, N., Wagner, D.: TinySec: a link layer security architecture for wireless sensor networks. SenSys, ACM, 162–175 (2004)

    Google Scholar 

  16. Lamport, L.: Password Authentication with Insecure Communication. Communications of the ACM 24(11) (November 1981)

    Google Scholar 

  17. Lampson, B., Abadi, M., Burrows, M., Wobber, E.: Authentication in Distributed Systems: Theory and Practice. ACM Transactions on Computer Systems 10(4), 265–310 (1992)

    Article  Google Scholar 

  18. Le Mer, P., Soler, L., Pavy, D., Bernard, A., Moreau, J., Mutter, D., Marescaux, J.: Argonaute 3D: A real-time cooperative medical planning software on DSL network. In: MMVR12, 12th Annual Medicine Meets Virtual Reality Conference, Newport Beach, California (January 2004)

    Google Scholar 

  19. MacDonald, J.A.: Authentication & key agreement for off-portal mobile applications. Information security technical report 13, 127–135 (2008)

    Article  Google Scholar 

  20. Mailhes, C., Castanié, F., Henrion, S., Lareng, L., Alonso, A.: The URSAFE telemedicine project: improving health care of the elderly. In: MIE, Saint Malo, France, European Federation for Medical Informatics (mai 2003)

    Google Scholar 

  21. Malan, D., Fulford-Jones, T., Welsh, M., Moulton, S.: CodeBlue: An Ad Hoc Sensor Network Infrastructure for Emergency Medical Care. In: International Workshop on Wearable and Implantable Body Sensor Networks (2004)

    Google Scholar 

  22. Marescaux, J., Leroy, J., Gagner, M., Rubino, F., Mutter, D., Vix, M., Butner, S.E., Smith, M.K.: Transatlantic Robot-Assisted Telesurgery. Nature 413, 379–380 (2001)

    Article  Google Scholar 

  23. Marescaux, J., Leroy, J., Rubino, F., Vix, M., Simone, M., Mutter, D.: Transcontinental Robot Assisted Remote Telesurgery: Feasibility and Potential Applications. Ann. Surg. 235, 487–492 (2002)

    Article  Google Scholar 

  24. Martins, D., Guyennet, H.: Etat de l’art - Securite dans les reseaux de capteurs sans fil. In: Conference SAR-SSI (2008)

    Google Scholar 

  25. Montagnat, J., et al.: A Secure Grid Medical Data Manager Interfaced to the gLite Middleware. Journal of Grid Computing 1(6), 45–59 (2008)

    Article  Google Scholar 

  26. Needham, R.M., Schroeder, M.D.: Using Encryption for Authentication in Large Networks of Computers. Xerox Palo Alto Research, Communications the ACM 21(12) (December 1978)

    Google Scholar 

  27. Newsome, J., Shi, E., Song, D., Perrig, A.: The Sybil attack in sensor networks: analysis & defenses. In: Third International Symposium on Information Processing in Sensor Networks, IPSN 2004, pp. 259–268 (2004)

    Google Scholar 

  28. Oleshchuk, V., Zadorozhny, V.: Trust-Aware Query Processing in Data Intensive Sensor Networks. In: SENSORCOMM 2007: Proceedings of the 2007 International Conference on Sensor Technologies and Applications, pp. 176–180 (2007)

    Google Scholar 

  29. (OTELO 2004) OTELO clinical and technical validation (2004). Reference D35_WP7_2004_10_1_A (2004)

    Google Scholar 

  30. Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: SPINS: Security Protocols for Sensor Networks. Wireless Networks, 521–534 (2002)

    Google Scholar 

  31. Pianykh, O.S.: Digital Imaging and Communications in Medicine (DICOM), 377 pages. Springer, Heidelberg (2008)

    Google Scholar 

  32. Piotrowski, K., Langendoerfer, P., Peter, S.: How public key cryptography influences wireless sensor node lifetime. In: SASN 2006: Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks, pp. 169–176 (2006)

    Google Scholar 

  33. Bolle, R.M., Connell, J.H., Ratha, N.K.: Biometric perils and patches. Pattern Recognition 35, 2727–2738 (2002)

    Article  MATH  Google Scholar 

  34. Stajano, F., Anderson, R.J.: The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks. In: Security Protocols Workshop, pp. 172–194 (1999)

    Google Scholar 

  35. Seitz, L., Pierson, J.-M., Brunie, L.: Encrypted storage of medical data on a grid. Journal of Methods of Information in Medicine, 198–202 (January 2005)

    Google Scholar 

  36. Yi, S., Naldurg, P., Kravets, R.: Security-aware ad hoc routing for wireless networks. In: MobiHoc 2001: Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing, pp. 299–302 (2001)

    Google Scholar 

  37. Schwiderski-Grosche, S.: Security: An end user perspective. Information Security Group, Royal Holloway, University of London, Egham, Surrey TW200EX, United Kingdom. Information securitytechnical report 11, 109–110 (2006)

    Article  Google Scholar 

  38. Tuyls, P., Goseling, J.: Capacity and Examples of Template-Protecting Biometric Authentication Systems. In: Maltoni, D., Jain, A.K. (eds.) BioAW 2004. LNCS, vol. 3087, pp. 158–170. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  39. Vieyres, P., Poisson, G., Courréges, F., Merigeaux et, O., Arbeille, P.: The TERESA project: from space research to ground tele-echography. Industrial robot: an international journal 30(1), 77–82 (2003)

    Article  Google Scholar 

  40. Jonathan, L., Worth, M.D., Theodore, A., Stern, M.D.: Benefits of an Outpatient Psychiatric TeleConsultation Unit: Results of a 1-Year Pilot. Primary Care Companion J. Clin. Psychiatry 5, 80–84 (2003)

    Article  Google Scholar 

  41. Zhang, Z., Zhang, R., Yao, J., Pu, G.: Medical data on demand with WebmiaEngineering. IEEE Medicine and Biology Magazine 24(3), 117–122 (2005)

    Article  Google Scholar 

  42. Zhu, H., Bao, F., Deng, R.H., Kim, K.: Computing of trust in wireless networks. In: Proceedings of 60th IEEE Vehicular Technology Conference, Los Angeles, California (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer Berlin Heidelberg

About this chapter

Cite this chapter

Aupet, J.B., Garcia, E., Guyennet, H., Lapayre, J.C., Martins, D. (2010). Security in Medical Telediagnosis. In: Tsihrintzis, G.A., Jain, L.C. (eds) Multimedia Services in Intelligent Environments. Smart Innovation, Systems and Technologies, vol 3. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13396-1_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-13396-1_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-13395-4

  • Online ISBN: 978-3-642-13396-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics