An Authentication Scheme to Healthcare Security under Wireless Sensor Networks

被引:0
|
作者
Tsung-Chih Hsiao
Yu-Ting Liao
Jen-Yan Huang
Tzer-Shyong Chen
Gwo-Boa Horng
机构
[1] National Chung Hsing University,Department of Computer Science and Engineering
[2] Southampton University,Department of Management
[3] Tunghai University,Department of Information Management
来源
Journal of Medical Systems | 2012年 / 36卷
关键词
Wireless sensor networks; Sensor node; User authentication; Smart card;
D O I
暂无
中图分类号
学科分类号
摘要
In recent years, Taiwan has been seeing an extension of the average life expectancy and a drop in overall fertility rate, initiating our country into an aged society. Due to this phenomenon, how to provide the elderly and patients with chronic diseases a suitable healthcare environment has become a critical issue presently. Therefore, we propose a new scheme that integrates healthcare services with wireless sensor technology in which sensor nodes are employed to measure patients’ vital signs. Data collected from these sensor nodes are then transmitted to mobile devices of the medical staff and system administrator, promptly enabling them to understand the patients’ condition in real time, which will significantly improve patients’ healthcare quality. As per the personal data protection act, patients’ vital signs can only be accessed by authorized medical staff. In order to protect patients’, the system administrator will verify the medical staff’s identity through the mobile device using a smart card and password mechanism. Accordingly, only the verified medical staff can obtain patients’ vital signs data such as their blood pressure, pulsation, and body temperature, etc.. Besides, the scheme includes a time-bounded characteristic that allows the verified staff access to data without having to have to re-authenticate and re-login into the system within a set period of time. Consequently, the time-bounded property also increases the work efficiency of the system administrator and user.
引用
收藏
页码:3649 / 3664
页数:15
相关论文
共 50 条
  • [31] An Efficient and Secure Authentication Scheme using Markov Chain for Wireless Sensor Networks
    Singh, Deepti
    Kumar, Bijendra
    Singh, Samayveer
    Chand, Satish
    PROCEEDINGS OF THE 2018 IEEE 8TH INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC 2018), 2018, : 33 - 38
  • [32] A Dynamic Identity User Authentication Scheme in Wireless Sensor Networks
    Hsieh, Wen-Bin
    Leu, Jenq-Shiou
    2013 9TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2013, : 1132 - 1137
  • [33] EASS: Encryption and Authentication Based Security Scheme to Prevent Power Exhausting Attacks in Wireless Sensor Networks
    Muthumanickam, K.
    Elango, S.
    Mahesh, P. C. Senthil
    Vijayalakshmi, P.
    AD HOC & SENSOR WIRELESS NETWORKS, 2019, 45 (3-4) : 253 - 273
  • [34] The Study on Wireless Sensor Networks Security Access Scheme
    Miao, Xiaofeng
    Fan, Panguo
    Mu, Dejun
    ADVANCED TECHNOLOGY IN TEACHING - PROCEEDINGS OF THE 2009 3RD INTERNATIONAL CONFERENCE ON TEACHING AND COMPUTATIONAL SCIENCE (WTCS 2009), VOL 2: EDUCATION, PSYCHOLOGY AND COMPUTER SCIENCE, 2012, 117 : 233 - 241
  • [35] Sensor Data Security Level Estimation Scheme for Wireless Sensor Networks
    Ramos, Alex
    Holanda Filho, Raimir
    SENSORS, 2015, 15 (01) : 2104 - 2136
  • [36] A secure three-factor authentication scheme for wireless sensor networks using ECC
    Kumar, Devender
    Singh, Harsh Kumar
    Ahlawat, Chhahat
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2020, 23 (04) : 879 - 900
  • [37] A dynamic password-based user authentication scheme for hierarchical wireless sensor networks
    Das, Ashok Kumar
    Sharma, Pranay
    Chatterjee, Santanu
    Sing, Jamuna Kanta
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (05) : 1646 - 1656
  • [38] A Secure Mutual Authentication Scheme with Perfect Forward-Secrecy for Wireless Sensor Networks
    Mansour, Mohamed M.
    Salem, Fatty M.
    Saad, Elsayed M.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ADVANCED INTELLIGENT SYSTEMS AND INFORMATICS 2018, 2019, 845 : 446 - 456
  • [39] A biometrics-based anonymous authentication and key agreement scheme for wireless sensor networks
    Fan, Qing
    Chen, Jianhua
    Xu, Feng
    Li, Li
    Luo, Min
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (16)
  • [40] Security Enhancement of Robust User Authentication Framework for Wireless Sensor Networks
    Jiang Qi
    Ma Zhuo
    Ma Jianfeng
    Li Guangsong
    CHINA COMMUNICATIONS, 2012, 9 (10) : 103 - 111