Online citations, reference lists, and bibliographies.
← Back to Search

An Authentication Scheme To Healthcare Security Under Wireless Sensor Networks

Tsung-Chih Hsiao, Yu-Ting Liao, Jen-Yan Huang, T. Chen, G. Horng
Published 2012 · Medicine, Computer Science

Cite This
Download PDF
Analyze on Scholarcy
Share
In recent years, Taiwan has been seeing an extension of the average life expectancy and a drop in overall fertility rate, initiating our country into an aged society. Due to this phenomenon, how to provide the elderly and patients with chronic diseases a suitable healthcare environment has become a critical issue presently. Therefore, we propose a new scheme that integrates healthcare services with wireless sensor technology in which sensor nodes are employed to measure patients’ vital signs. Data collected from these sensor nodes are then transmitted to mobile devices of the medical staff and system administrator, promptly enabling them to understand the patients’ condition in real time, which will significantly improve patients’ healthcare quality. As per the personal data protection act, patients’ vital signs can only be accessed by authorized medical staff. In order to protect patients’, the system administrator will verify the medical staff’s identity through the mobile device using a smart card and password mechanism. Accordingly, only the verified medical staff can obtain patients’ vital signs data such as their blood pressure, pulsation, and body temperature, etc.. Besides, the scheme includes a time-bounded characteristic that allows the verified staff access to data without having to have to re-authenticate and re-login into the system within a set period of time. Consequently, the time-bounded property also increases the work efficiency of the system administrator and user.
This paper references
10.1109/TWC.2008.080128
Two-factor user authentication in wireless sensor networks
M. Das (2009)
Contemporary Cryptology: The Science of Information Integrity
G. J. Simmons (1994)
Partnership for Solutions, Chronic Conditions: Making the Case for Ongoing Care
(2004)
10.1109/PERCOMW.2007.119
Two-Dimensional Bar-Code Decoding with Camera-Equipped Mobile Phones
T. Falas (2007)
10.1049/ip-e.1992.0053
Remote password authentication with smart cards
Cc (2004)
10.1109/MCOM.2002.1024422
A survey on sensor networks
I. Akyildiz (2002)
10.1109/GLOCOM.2007.190
An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks
Huei-Ru Tseng (2007)
10.1145/1029102.1029113
TinyPK: securing sensor networks with public key technology
Ronald J. Watro (2004)
10.1109/30.826377
A new remote user authentication scheme using smart cards
M. Hwang (2000)
10.1016/S0168-1699(99)00041-1
Future developments on devices for animal radiofrequency identification
M. Jansen (1999)
10.1109/WIMOB.2010.5645004
Improved two-factor user authentication in wireless sensor networks
B. Vaidya (2010)
10.1109/SUTC.2006.6
A dynamic user authentication scheme for wireless sensor networks
Kirk H. M. Wong (2006)
10.3390/s100302450
Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’
M. Khan (2010)
10.1080/00207169908804781
A remote password authentication scheme based on the digital signature method
M. Hwang (1999)
10.1145/1506270.1506277
A traffic load-aware energy efficient protocol for wireless sensor networks
I-Hui Li (2008)
10.1109/TENCON.1990.152647
Non-interactive password authentications without password tables
T. Hwang (1990)
A remote login authentication scheme based on the digital signature method
M. S. Hwang (1999)
10.1016/S0140-3664(99)00036-5
Cryptanalysis of a remote login authentication scheme
M. Hwang (1999)



This paper is referenced by
10.34117/bjdv6n9-744
Uma solução de autenticação forte para ambientes de saúde baseados em sensores
Felipe Jose Carbone (2014)
10.1007/s10916-014-0136-8
Three-Factor Anonymous Authentication and Key Agreement Scheme for Telecare Medicine Information Systems
Hamed Arshad (2014)
10.1108/ijpcc-07-2019-0057
An optimized security solution based on trust value for multithreaded wireless body area network communication
Sanchari Saha (2019)
10.1109/CAIS.2019.8769474
A New Remote User Authentication Scheme for E-Health-Care Applications Using Steganography
Manal Mohamed Alhejazi (2019)
10.1007/s00530-015-0476-3
An improved and anonymous two-factor authentication protocol for health-care applications with wireless medical sensor networks
F. Wu (2015)
10.1016/J.PROCS.2015.10.078
Secure Medical Data Transmission by Using ECC with Mutual Authentication in WSNs
S. Shankar (2015)
10.22667/JISIS.2014.02.31.047
A Secure ECC-based Electronic Medical Record System
Kun-Lin Tsai (2014)
10.1016/J.FUTURE.2019.06.020
Two-factor authentication in industrial Internet-of-Things: Attacks, evaluation and new construction
W. Li (2019)
10.1109/BigDataSecurity.2017.34
Breaking Two Remote User Authentication Systems for Mobile Devices
W. Li (2017)
10.1080/00207160.2014.955482
An ECC-based secure EMR transmission system with data leakage prevention scheme
K. L. Tsai (2016)
10.4304/jnw.9.5.1103-1113
A Review of Attacks and Security Protocols for Wireless Sensor Networks
F. Sun (2014)
개선된 RFID 기술을 이용한 u-헬스케어 서비스 인증 프로토콜
안해순 (2013)
10.4018/IJCCP.2016070101
Cloud Computing as the Useful Resource for Application of the Medical Information System for Quality Assurance Purposes
E. Kldiashvili (2016)
10.1109/TII.2018.2834351
Measuring Two-Factor Authentication Schemes for Real-Time Data Access in Industrial Wireless Sensor Networks
Ding Wang (2018)
10.1016/j.adhoc.2014.03.003
Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks
Ding Wang (2014)
10.4103/2153-3539.108542
Privacy and security of patient data in the pathology laboratory
IoanC Cucoranu (2013)
10.5573/IEEK.2013.50.10.107
Improved u-Healthcare Service Authentication Protocol based on RFID Technology
Hae-Soon Ahn (2013)
10.1109/CAIS.2019.8769474
A New Remote User Authentication Scheme for E-Health-Care Applications Using Steganography
Manal Mohamed Alhejazi (2019)
10.1007/s11265-017-1305-z
Breaking Three Remote user Authentication Systems for Mobile Devices
Wenting Li (2017)
Semantic Scholar Logo Some data provided by SemanticScholar