Advertisement

VPN Certification Structure Design through Specific Biometric Data in Remote Health Monitoring System

  • Il-Kwon LimEmail author
  • Young-Hyuk Kim
  • Jae-Gwang Lee
  • Jae-Pil Lee
  • Jae-Kwang Lee
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 179)

Abstract

We design VPN environments so that we could be supplied the safe service when we establish remote health monitoring system through wire-wireless networks. At this moment, we use SSL and VPN in order that we could use various devices that are currently increasing very rapidly and at the same time, we also design the safe VPN with VPN authorized key values of physical informations which are acquired from remote health monitoring system. For the remote health monitoring system, we design MMI which applies the standard of HL7 and we design the VPN authorization structures by using specific physical informations from remote health monitoring system.

Keywords

Remote Health Monitoring System VPN Healthcare 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Jeong, M.-A.: IT convergence technology and convergence industries (April 2009)Google Scholar
  2. 2.
    Kim, J.-W.: Smart public health care services introduction plan. National Information Society Agency (NIA) (June 2011)Google Scholar
  3. 3.
    Ahn, M.E., Choi, G.H.: A Developmental Process of Telemedicine, e-Health & u-Health. J. Korean Med. Assoc. (December 2009)Google Scholar
  4. 4.
    Gui, L.Q.: 2-Factor Authentication System for mobile environment (February 2012)Google Scholar
  5. 5.
    Yoon, J., Kwon, T., Cheon, D., Lim, S.: IPSec VPNs vs. SSL VPNs (October 2003)Google Scholar
  6. 6.
    Park, Y., Lee, K., Lee, H., Lee, K., Rhee, K., Kim, S., Won, D.: Analysis for Performance Evaluation of IPSec and SSL (November 2005)Google Scholar
  7. 7.
    Ahn, W.H., Kim, H.: Attacking OpenSSL Shared Library Using Code Injection (August 2010)Google Scholar
  8. 8.
    Kang, S.-W., Lee, S.-H., Go, Y.-S.: Advent of the u-Health age. In: CEO Information, Samsung Economics Research Institute (SERI) (May 2007)Google Scholar
  9. 9.
    Park, C.Y., Lim, J.H., Park, S.J., Kim, S.H.: Technical Trend of U-Healthcare Standardization. Electronics and Telecommunications Trends 25(4), 48–59 (2010)Google Scholar
  10. 10.
    Lee, K.H.: Application of u-Health to Emergency Medical Service System. J. Korean Med. Assoc. (December 2009)Google Scholar
  11. 11.
    Jeon, P.: Virtual Private Network VPN. NeverStop Publisher (September 2011)Google Scholar
  12. 12.
    Choe, S.-B.: A Design on Security Protocol and LSNAT for SSL_VPN (2004)Google Scholar

Copyright information

© Springer Science+Business Media Dordrecht 2012

Authors and Affiliations

  • Il-Kwon Lim
    • 1
    Email author
  • Young-Hyuk Kim
    • 1
  • Jae-Gwang Lee
    • 1
  • Jae-Pil Lee
    • 1
  • Jae-Kwang Lee
    • 1
  1. 1.Department of Computer EngineeringHannam UniversityDaejeonKorea

Personalised recommendations