Literature DB >> 22399067

An authentication scheme to healthcare security under wireless sensor networks.

Tsung-Chih Hsiao1, Yu-Ting Liao, Jen-Yan Huang, Tzer-Shyong Chen, Gwo-Boa Horng.   

Abstract

In recent years, Taiwan has been seeing an extension of the average life expectancy and a drop in overall fertility rate, initiating our country into an aged society. Due to this phenomenon, how to provide the elderly and patients with chronic diseases a suitable healthcare environment has become a critical issue presently. Therefore, we propose a new scheme that integrates healthcare services with wireless sensor technology in which sensor nodes are employed to measure patients' vital signs. Data collected from these sensor nodes are then transmitted to mobile devices of the medical staff and system administrator, promptly enabling them to understand the patients' condition in real time, which will significantly improve patients' healthcare quality. As per the personal data protection act, patients' vital signs can only be accessed by authorized medical staff. In order to protect patients', the system administrator will verify the medical staff's identity through the mobile device using a smart card and password mechanism. Accordingly, only the verified medical staff can obtain patients' vital signs data such as their blood pressure, pulsation, and body temperature, etc.. Besides, the scheme includes a time-bounded characteristic that allows the verified staff access to data without having to have to re-authenticate and re-login into the system within a set period of time. Consequently, the time-bounded property also increases the work efficiency of the system administrator and user.

Entities:  

Mesh:

Year:  2012        PMID: 22399067     DOI: 10.1007/s10916-012-9839-x

Source DB:  PubMed          Journal:  J Med Syst        ISSN: 0148-5598            Impact factor:   4.460


  1 in total

1.  Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor networks'.

Authors:  Muhammad Khurram Khan; Khaled Alghathbar
Journal:  Sensors (Basel)       Date:  2010-03-23       Impact factor: 3.576

  1 in total
  3 in total

1.  Three-factor anonymous authentication and key agreement scheme for Telecare Medicine Information Systems.

Authors:  Hamed Arshad; Morteza Nikooghadam
Journal:  J Med Syst       Date:  2014-10-29       Impact factor: 4.460

2.  Privacy and security of patient data in the pathology laboratory.

Authors:  Ioan C Cucoranu; Anil V Parwani; Andrew J West; Gonzalo Romero-Lauro; Kevin Nauman; Alexis B Carter; Ulysses J Balis; Mark J Tuthill; Liron Pantanowitz
Journal:  J Pathol Inform       Date:  2013-03-14

3.  Applying Spring Security Framework with KeyCloak-Based OAuth2 to Protect Microservice Architecture APIs: A Case Study.

Authors:  Ayan Chatterjee; Andreas Prinz
Journal:  Sensors (Basel)       Date:  2022-02-22       Impact factor: 3.576

  3 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.