Abstract
Telemedicine is the process by which electronic, visual and audio communications are used to support practitioners at remote sites with diagnosis and consultation procedures, such as remote clinical examinations and medical image transfers. Telemedicine is legally regulated by laws and constraints regarding the access of data contained in Personal Medical Files. These requirements are given by international entities such as IHE. They often specify the required functionalities to meet requirements of information exchange in the medical field. These functionalities are presented in this paper and outline some technical examples for their implementation in each level: authentication, communication, data storage, tracking and patient identification.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Abendroth, J., Seigneur, J.-M.: Deploying the trusted platform module (TPM) to increased fairness and trust in P2P file sharing servents. In: ISP 2006: Proceedings of the 5th WSEAS International Conference on Information Security and Privacy, pp. 202–207 (2006)
AuthenticationWorld.com: The business of authentication, http://www.authenticationworld.com/
Bernecker, O.: Biometrics security: An end user perspective. Giesecke and Devrient GmbH, Germany. Information security technical report 11, 111–118 (2006)
Čapkun, S., Buttyán, L., Hubaux, J.-P.: SECTOR: secure tracking of node encounters in multi-hop wireless networks. In: SASN 2003: Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, pp. 21–32 (2003)
Deng, J., Han, R., Mishra, S.: Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks. In: SECURECOMM 2005: Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, pp. 113–126 (2005)
Elmarzouqi, N., Garcia, E., Lapayre, J.-C., Humbert, P.: Use of ACCM Model for teledermatology implementation. In: DFMA 2007, 3rd int. Conference on Distributed Framework for Multimedia Applications, Paris, France, July 2007, pp. 84–89 (2007)
Ganeriwal, S., Srivastava, M.B.: Reputation-based framework for high integrity sensor networks. SASN, 66–77 (2004)
Garcia, E., Guyennet, H., Lapayre, J.-C., Moulin, T.: Adaptive Tele-application for Remote Neurology Diagnosis. International Journal of Telemedicine and e-Health 11(6), 692–701 (2005)
Gouaux, F.: Ambient Intelligence and Pervasive Systems for the Monitoring of Citizens at Cardiac Risk: New Solutions from The EPI-MEDICS Project. Computers in Cardiology 29, 289–292 (2002)
Halperin, D., Heydt-Benjamin, T.S., Ransford, B., Clark, S.S., Defend, B., Morgan, W., Fu, K., Kohno, T., Maisel, W.H.: Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses. In: SP 2008: Proceedings of the 2008 IEEE Symposium on Security and Privacy, pp. 129–142 (2008)
Hu, Y., Perrig, A., Johnson, D.: Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks. In: INFOCOM (2003)
Hu, Y.-C., Perrig, A.: A Survey of Secure Wireless Ad Hoc Routing. IEEE Security and Privacy, 28–39 (2004)
Hu, Y.-C., Perrig, A., Johnson, D.B.: Wormhole attacks in wireless networks. IEEE Journal on Selected Areas in Communications, 370–380 (2006)
Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Networks, 293–315 (2003)
Karlof, C., Sastry, N., Wagner, D.: TinySec: a link layer security architecture for wireless sensor networks. SenSys, ACM, 162–175 (2004)
Lamport, L.: Password Authentication with Insecure Communication. Communications of the ACM 24(11) (November 1981)
Lampson, B., Abadi, M., Burrows, M., Wobber, E.: Authentication in Distributed Systems: Theory and Practice. ACM Transactions on Computer Systems 10(4), 265–310 (1992)
Le Mer, P., Soler, L., Pavy, D., Bernard, A., Moreau, J., Mutter, D., Marescaux, J.: Argonaute 3D: A real-time cooperative medical planning software on DSL network. In: MMVR12, 12th Annual Medicine Meets Virtual Reality Conference, Newport Beach, California (January 2004)
MacDonald, J.A.: Authentication & key agreement for off-portal mobile applications. Information security technical report 13, 127–135 (2008)
Mailhes, C., Castanié, F., Henrion, S., Lareng, L., Alonso, A.: The URSAFE telemedicine project: improving health care of the elderly. In: MIE, Saint Malo, France, European Federation for Medical Informatics (mai 2003)
Malan, D., Fulford-Jones, T., Welsh, M., Moulton, S.: CodeBlue: An Ad Hoc Sensor Network Infrastructure for Emergency Medical Care. In: International Workshop on Wearable and Implantable Body Sensor Networks (2004)
Marescaux, J., Leroy, J., Gagner, M., Rubino, F., Mutter, D., Vix, M., Butner, S.E., Smith, M.K.: Transatlantic Robot-Assisted Telesurgery. Nature 413, 379–380 (2001)
Marescaux, J., Leroy, J., Rubino, F., Vix, M., Simone, M., Mutter, D.: Transcontinental Robot Assisted Remote Telesurgery: Feasibility and Potential Applications. Ann. Surg. 235, 487–492 (2002)
Martins, D., Guyennet, H.: Etat de l’art - Securite dans les reseaux de capteurs sans fil. In: Conference SAR-SSI (2008)
Montagnat, J., et al.: A Secure Grid Medical Data Manager Interfaced to the gLite Middleware. Journal of Grid Computing 1(6), 45–59 (2008)
Needham, R.M., Schroeder, M.D.: Using Encryption for Authentication in Large Networks of Computers. Xerox Palo Alto Research, Communications the ACM 21(12) (December 1978)
Newsome, J., Shi, E., Song, D., Perrig, A.: The Sybil attack in sensor networks: analysis & defenses. In: Third International Symposium on Information Processing in Sensor Networks, IPSN 2004, pp. 259–268 (2004)
Oleshchuk, V., Zadorozhny, V.: Trust-Aware Query Processing in Data Intensive Sensor Networks. In: SENSORCOMM 2007: Proceedings of the 2007 International Conference on Sensor Technologies and Applications, pp. 176–180 (2007)
(OTELO 2004) OTELO clinical and technical validation (2004). Reference D35_WP7_2004_10_1_A (2004)
Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: SPINS: Security Protocols for Sensor Networks. Wireless Networks, 521–534 (2002)
Pianykh, O.S.: Digital Imaging and Communications in Medicine (DICOM), 377 pages. Springer, Heidelberg (2008)
Piotrowski, K., Langendoerfer, P., Peter, S.: How public key cryptography influences wireless sensor node lifetime. In: SASN 2006: Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks, pp. 169–176 (2006)
Bolle, R.M., Connell, J.H., Ratha, N.K.: Biometric perils and patches. Pattern Recognition 35, 2727–2738 (2002)
Stajano, F., Anderson, R.J.: The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks. In: Security Protocols Workshop, pp. 172–194 (1999)
Seitz, L., Pierson, J.-M., Brunie, L.: Encrypted storage of medical data on a grid. Journal of Methods of Information in Medicine, 198–202 (January 2005)
Yi, S., Naldurg, P., Kravets, R.: Security-aware ad hoc routing for wireless networks. In: MobiHoc 2001: Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing, pp. 299–302 (2001)
Schwiderski-Grosche, S.: Security: An end user perspective. Information Security Group, Royal Holloway, University of London, Egham, Surrey TW200EX, United Kingdom. Information securitytechnical report 11, 109–110 (2006)
Tuyls, P., Goseling, J.: Capacity and Examples of Template-Protecting Biometric Authentication Systems. In: Maltoni, D., Jain, A.K. (eds.) BioAW 2004. LNCS, vol. 3087, pp. 158–170. Springer, Heidelberg (2004)
Vieyres, P., Poisson, G., Courréges, F., Merigeaux et, O., Arbeille, P.: The TERESA project: from space research to ground tele-echography. Industrial robot: an international journal 30(1), 77–82 (2003)
Jonathan, L., Worth, M.D., Theodore, A., Stern, M.D.: Benefits of an Outpatient Psychiatric TeleConsultation Unit: Results of a 1-Year Pilot. Primary Care Companion J. Clin. Psychiatry 5, 80–84 (2003)
Zhang, Z., Zhang, R., Yao, J., Pu, G.: Medical data on demand with WebmiaEngineering. IEEE Medicine and Biology Magazine 24(3), 117–122 (2005)
Zhu, H., Bao, F., Deng, R.H., Kim, K.: Computing of trust in wireless networks. In: Proceedings of 60th IEEE Vehicular Technology Conference, Los Angeles, California (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer Berlin Heidelberg
About this chapter
Cite this chapter
Aupet, J.B., Garcia, E., Guyennet, H., Lapayre, J.C., Martins, D. (2010). Security in Medical Telediagnosis. In: Tsihrintzis, G.A., Jain, L.C. (eds) Multimedia Services in Intelligent Environments. Smart Innovation, Systems and Technologies, vol 3. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13396-1_9
Download citation
DOI: https://doi.org/10.1007/978-3-642-13396-1_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-13395-4
Online ISBN: 978-3-642-13396-1
eBook Packages: EngineeringEngineering (R0)