Skip to main content

Enhanced Secure Authentication for Mobile RFID Healthcare System in Wireless Sensor Networks

  • Conference paper
Computer Applications for Database, Education, and Ubiquitous Computing (EL 2012, DTA 2012)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 352))

Abstract

As telecommunication technologies in telemedicine services are developed, the expeditious development of wireless and mobile networks has stimulated wide applications of mobile electronic healthcare systems. However, security is an essential system requirement since many patients have privacy concerns when it comes to releasing their personal information over the open wireless channels. Due to the invisible feature of mobile signals, hackers have easier access to hospital networks than wired network systems. This may result in several security incidents unless security protocols are well prepared. In this paper, we analyzed authentication for healthcare system architecture to apply secure mobile health systems in the hospital environment. From the analyses, we can estimate optimal requirements to implement topology of system and its vulnerabilities.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Vajda, I., Buttyan, L.: Lightweight Authentication Protocols for Low Cost RFID Tags. In: Proc. 2nd Workshop on Security in Ubiquitous Computer, pp. 76–82 (2007)

    Google Scholar 

  2. Acharya, D., et al.: Security in Pervasive Healthcare Networks: Current R&D and Future Challenges. In: 11th International Conference on Mobile Data Management, pp. 305–306 (2011)

    Google Scholar 

  3. Yao, W., Chu, C.-H., Li, Z.: The Use of RFID in Healthcare: Benefits and Barriers”. In: IEEE International Conference on RFID Technology and Applications, pp. 128–1342 (2010)

    Google Scholar 

  4. Boukerche, A., et al.: A Secure Mobile Health System Using Trust-Based Multicast Scheme. IEEE J. on Selected Areas in Communications 27(4), 387–399 (2009)

    Article  Google Scholar 

  5. Li, C.-J., et al.: Mobile Healthcare Service System Using WID. In: IEEE, International Conference on Networking, Sensing and Control, pp. 1014–1019 (2004)

    Google Scholar 

  6. Mirkovic, J., et al.: A framework for the Development of Ubiquitous Patient Support Systems. In: 2012 6th International Conference on Pervasive Computing Technologies for Healthcare (PervasiveHealth) and Workshops, pp. 81–88 (2012)

    Google Scholar 

  7. Hung, C.-C., Huang, S.-Y.: On the Study of a Ubiquitous Healthcare Network with Security and QoS. In: IET 2010, pp. 139–144 (2010)

    Google Scholar 

  8. Kumar, P., et al.: A User Authentication for Healthcare Application Using Wireless Medical Sensor Networks. In: 2011 IEEE International Conference on High Performance Computing and Communications, pp. 647–652 (2011)

    Google Scholar 

  9. Yu, W.D., et al.: A Web-Based Wireless Mobile System Design of Security and Privacy Framework for u-Healthcare. In: 2008 10th IEEE Intl. Conf. on e-Health Networking, Applications and Service, pp. 96–101 (2008)

    Google Scholar 

  10. Kim, J., Sahama, T.: A Study on the Encryption Model for Numerical Data. Journal of Information and Communication Convergence Engineering (JICCE) 7(1), 31–34 (2009)

    Google Scholar 

  11. Kwon, S.-H., Park, D.-W.: Hacking and Security of Encrypted Access Points in Wireless Network. Journal of Information and Communication Convergence Engineering (JICCE) 10(2), 156–161 (2012)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, J.T. (2012). Enhanced Secure Authentication for Mobile RFID Healthcare System in Wireless Sensor Networks. In: Kim, Th., Ma, J., Fang, Wc., Zhang, Y., Cuzzocrea, A. (eds) Computer Applications for Database, Education, and Ubiquitous Computing. EL DTA 2012 2012. Communications in Computer and Information Science, vol 352. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35603-2_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35603-2_28

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35602-5

  • Online ISBN: 978-3-642-35603-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics