An Authentication Scheme to Healthcare Security under Wireless Sensor Networks

被引:0
|
作者
Tsung-Chih Hsiao
Yu-Ting Liao
Jen-Yan Huang
Tzer-Shyong Chen
Gwo-Boa Horng
机构
[1] National Chung Hsing University,Department of Computer Science and Engineering
[2] Southampton University,Department of Management
[3] Tunghai University,Department of Information Management
来源
关键词
Wireless sensor networks; Sensor node; User authentication; Smart card;
D O I
暂无
中图分类号
学科分类号
摘要
In recent years, Taiwan has been seeing an extension of the average life expectancy and a drop in overall fertility rate, initiating our country into an aged society. Due to this phenomenon, how to provide the elderly and patients with chronic diseases a suitable healthcare environment has become a critical issue presently. Therefore, we propose a new scheme that integrates healthcare services with wireless sensor technology in which sensor nodes are employed to measure patients’ vital signs. Data collected from these sensor nodes are then transmitted to mobile devices of the medical staff and system administrator, promptly enabling them to understand the patients’ condition in real time, which will significantly improve patients’ healthcare quality. As per the personal data protection act, patients’ vital signs can only be accessed by authorized medical staff. In order to protect patients’, the system administrator will verify the medical staff’s identity through the mobile device using a smart card and password mechanism. Accordingly, only the verified medical staff can obtain patients’ vital signs data such as their blood pressure, pulsation, and body temperature, etc.. Besides, the scheme includes a time-bounded characteristic that allows the verified staff access to data without having to have to re-authenticate and re-login into the system within a set period of time. Consequently, the time-bounded property also increases the work efficiency of the system administrator and user.
引用
收藏
页码:3649 / 3664
页数:15
相关论文
共 50 条
  • [1] An Authentication Scheme to Healthcare Security under Wireless Sensor Networks
    Hsiao, Tsung-Chih
    Liao, Yu-Ting
    Huang, Jen-Yan
    Chen, Tzer-Shyong
    Horng, Gwo-Boa
    JOURNAL OF MEDICAL SYSTEMS, 2012, 36 (06) : 3649 - 3664
  • [2] Security and authentication scheme for hierarchical wireless sensor networks
    School of Computer Science and Technology, Beijing Institute of Technology, Beijing 100081, China
    不详
    Dongnan Daxue Xuebao, 2008, SUPPL. 1 (243-248): : 243 - 248
  • [3] Secure user authentication scheme for wireless healthcare sensor networks
    Liu, Chia-Hui
    Chung, Yu-Fang
    COMPUTERS & ELECTRICAL ENGINEERING, 2017, 59 : 250 - 261
  • [4] Security enhancement of user authentication scheme for wireless sensor networks
    Lee, Yung-Cheng
    Hsieh, Yi-Chih
    You, Peng-Sheng
    Lee, Pei-Ju
    ICIC Express Letters, Part B: Applications, 2014, 5 (02): : 327 - 332
  • [5] Key renewal scheme with sensor authentication under clustered wireless sensor networks
    Lee, Saewoom
    Kim, Kiseon
    ELECTRONICS LETTERS, 2015, 51 (04) : 368 - 369
  • [6] A Security-Performance-Balanced User Authentication Scheme for Wireless Sensor Networks
    Yoo, Sang Guun
    Park, Keun Young
    Kim, Juho
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2012,
  • [7] Lightweight Authentication scheme for wireless sensor networks
    Huang, Chih-Hung
    Wu, Hsuan-Hsun
    Huang, Yu-Jung
    Lin, Wei-Cheng
    Pan, Chung-Long
    Chu, Shao-, I
    Chen, Po-Ying
    2012 IEEE GLOBAL HIGH TECH CONGRESS ON ELECTRONICS (GHTCE), 2012,
  • [8] An Authentication Scheme for Wireless Healthcare Monitoring Sensor Network
    El Zouka, Hesham A.
    2017 14TH INTERNATIONAL CONFERENCE ON SMART CITIES: IMPROVING QUALITY OF LIFE USING ICT & IOT (HONET-ICT), 2017, : 68 - 73
  • [9] An authentication scheme for clustered wireless sensor networks
    He, Li-Li
    Lou, Xiao-Chun
    Sensors and Transducers, 2013, 153 (06): : 166 - 170
  • [10] A Hierarchical Authentication Scheme in Wireless Sensor Networks
    Wu, Bing
    2014 IEEE 11TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SENSOR SYSTEMS (MASS), 2014, : 630 - 635