Abstract
As telecommunication technologies in telemedicine services are developed, the expeditious development of wireless and mobile networks has stimulated wide applications of mobile electronic healthcare systems. However, security is an essential system requirement since many patients have privacy concerns when it comes to releasing their personal information over the open wireless channels. Due to the invisible feature of mobile signals, hackers have easier access to hospital networks than wired network systems. This may result in several security incidents unless security protocols are well prepared. In this paper, we analyzed authentication for healthcare system architecture to apply secure mobile health systems in the hospital environment. From the analyses, we can estimate optimal requirements to implement topology of system and its vulnerabilities.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Vajda, I., Buttyan, L.: Lightweight Authentication Protocols for Low Cost RFID Tags. In: Proc. 2nd Workshop on Security in Ubiquitous Computer, pp. 76–82 (2007)
Acharya, D., et al.: Security in Pervasive Healthcare Networks: Current R&D and Future Challenges. In: 11th International Conference on Mobile Data Management, pp. 305–306 (2011)
Yao, W., Chu, C.-H., Li, Z.: The Use of RFID in Healthcare: Benefits and Barriers”. In: IEEE International Conference on RFID Technology and Applications, pp. 128–1342 (2010)
Boukerche, A., et al.: A Secure Mobile Health System Using Trust-Based Multicast Scheme. IEEE J. on Selected Areas in Communications 27(4), 387–399 (2009)
Li, C.-J., et al.: Mobile Healthcare Service System Using WID. In: IEEE, International Conference on Networking, Sensing and Control, pp. 1014–1019 (2004)
Mirkovic, J., et al.: A framework for the Development of Ubiquitous Patient Support Systems. In: 2012 6th International Conference on Pervasive Computing Technologies for Healthcare (PervasiveHealth) and Workshops, pp. 81–88 (2012)
Hung, C.-C., Huang, S.-Y.: On the Study of a Ubiquitous Healthcare Network with Security and QoS. In: IET 2010, pp. 139–144 (2010)
Kumar, P., et al.: A User Authentication for Healthcare Application Using Wireless Medical Sensor Networks. In: 2011 IEEE International Conference on High Performance Computing and Communications, pp. 647–652 (2011)
Yu, W.D., et al.: A Web-Based Wireless Mobile System Design of Security and Privacy Framework for u-Healthcare. In: 2008 10th IEEE Intl. Conf. on e-Health Networking, Applications and Service, pp. 96–101 (2008)
Kim, J., Sahama, T.: A Study on the Encryption Model for Numerical Data. Journal of Information and Communication Convergence Engineering (JICCE) 7(1), 31–34 (2009)
Kwon, S.-H., Park, D.-W.: Hacking and Security of Encrypted Access Points in Wireless Network. Journal of Information and Communication Convergence Engineering (JICCE) 10(2), 156–161 (2012)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, J.T. (2012). Enhanced Secure Authentication for Mobile RFID Healthcare System in Wireless Sensor Networks. In: Kim, Th., Ma, J., Fang, Wc., Zhang, Y., Cuzzocrea, A. (eds) Computer Applications for Database, Education, and Ubiquitous Computing. EL DTA 2012 2012. Communications in Computer and Information Science, vol 352. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35603-2_28
Download citation
DOI: https://doi.org/10.1007/978-3-642-35603-2_28
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35602-5
Online ISBN: 978-3-642-35603-2
eBook Packages: Computer ScienceComputer Science (R0)