Literature DB >> 27640159

Analysis of Security Protocols for Mobile Healthcare.

Mohammad Wazid1, Sherali Zeadally2, Ashok Kumar Das3, Vanga Odelu4.   

Abstract

Mobile Healthcare (mHealth) continues to improve because of significant improvements and the decreasing costs of Information Communication Technologies (ICTs). mHealth is a medical and public health practice, which is supported by mobile devices (for example, smartphones) and, patient monitoring devices (for example, various types of wearable sensors, etc.). An mHealth system enables healthcare experts and professionals to have ubiquitous access to a patient's health data along with providing any ongoing medical treatment at any time, any place, and from any device. It also helps the patient requiring continuous medical monitoring to stay in touch with the appropriate medical staff and healthcare experts remotely. Thus, mHealth has become a major driving force in improving the health of citizens today. First, we discuss the security requirements, issues and threats to the mHealth system. We then present a taxonomy of recently proposed security protocols for mHealth system based on features supported and possible attacks, computation cost and communication cost. Our detailed taxonomy demonstrates the strength and weaknesses of recently proposed security protocols for the mHealth system. Finally, we identify some of the challenges in the area of security protocols for mHealth systems that still need to be addressed in the future to enable cost-effective, secure and robust mHealth systems.

Entities:  

Keywords:  Attack; Communication cost; Computation cost; Mobile device; Mobile healthcare; Protocol; Security; Threat

Mesh:

Year:  2016        PMID: 27640159     DOI: 10.1007/s10916-016-0596-0

Source DB:  PubMed          Journal:  J Med Syst        ISSN: 0148-5598            Impact factor:   4.460


  14 in total

1.  A Hash Based Remote User Authentication and Authenticated Key Agreement Scheme for the Integrated EPR Information System.

Authors:  Chun-Ta Li; Chi-Yao Weng; Cheng-Chi Lee; Chun-Cheng Wang
Journal:  J Med Syst       Date:  2015-09-09       Impact factor: 4.460

2.  A Secure User Anonymity and Authentication Scheme Using AVISPA for Telecare Medical Information Systems.

Authors:  Omid Mir; Theo van der Weide; Cheng-Chi Lee
Journal:  J Med Syst       Date:  2015-08-05       Impact factor: 4.460

3.  An Improvement of Robust and Efficient Biometrics Based Password Authentication Scheme for Telecare Medicine Information Systems Using Extended Chaotic Maps.

Authors:  Jongho Moon; Younsung Choi; Jiye Kim; Dongho Won
Journal:  J Med Syst       Date:  2016-01-07       Impact factor: 4.460

4.  An effective and secure key-management scheme for hierarchical access control in E-medicine system.

Authors:  Vanga Odelu; Ashok Kumar Das; Adrijit Goswami
Journal:  J Med Syst       Date:  2013-02-08       Impact factor: 4.460

5.  Security enhancement of a biometric based authentication scheme for telecare medicine information systems with nonce.

Authors:  Dheerendra Mishra; Sourav Mukhopadhyay; Saru Kumari; Muhammad Khurram Khan; Ankita Chaturvedi
Journal:  J Med Syst       Date:  2014-04-26       Impact factor: 4.460

Review 6.  Mobile healthcare applications: system design review, critical issues and challenges.

Authors:  Mirza Mansoor Baig; Hamid GholamHosseini; Martin J Connolly
Journal:  Australas Phys Eng Sci Med       Date:  2014-12-05       Impact factor: 1.430

7.  A secure user anonymity-preserving three-factor remote user authentication scheme for the telecare medicine information systems.

Authors:  Ashok Kumar Das
Journal:  J Med Syst       Date:  2015-02-13       Impact factor: 4.460

8.  Smart environment as a service: three factor cloud based user authentication for telecare medical information system.

Authors:  Zeeshan Siddiqui; Abdul Hanan Abdullah; Muhammad Khurram Khan; Abdullah S Alghamdi
Journal:  J Med Syst       Date:  2013-12-07       Impact factor: 4.460

Review 9.  How smartphones are changing the face of mobile and participatory healthcare: an overview, with example from eCAALYX.

Authors:  Maged N Kamel Boulos; Steve Wheeler; Carlos Tavares; Ray Jones
Journal:  Biomed Eng Online       Date:  2011-04-05       Impact factor: 2.819

Review 10.  Privacy and Security in Mobile Health (mHealth) Research.

Authors:  Shifali Arora; Jennifer Yttri; Wendy Nilse
Journal:  Alcohol Res       Date:  2014
View more
  4 in total

1.  A Robust and Efficient ECC-based Mutual Authentication and Session Key Generation Scheme for Healthcare Applications.

Authors:  Arezou Ostad-Sharif; Dariush Abbasinezhad-Mood; Morteza Nikooghadam
Journal:  J Med Syst       Date:  2018-12-01       Impact factor: 4.460

2.  A Mutual Authentication Framework for Wireless Medical Sensor Networks.

Authors:  Jangirala Srinivas; Dheerendra Mishra; Sourav Mukhopadhyay
Journal:  J Med Syst       Date:  2017-03-31       Impact factor: 4.460

3.  Authentication Schemes for Healthcare Applications Using Wireless Medical Sensor Networks: A Survey.

Authors:  Anwar Noureddine Bahache; Noureddine Chikouche; Fares Mezrag
Journal:  SN Comput Sci       Date:  2022-07-18

4.  Development of a Modular Research Platform to Create Medical Observational Studies for Mobile Devices.

Authors:  Martin Zens; Birgit Grotejohann; Adrian Tassoni; Fabian Duttenhoefer; Norbert P Südkamp; Philipp Niemeyer
Journal:  JMIR Res Protoc       Date:  2017-05-23
  4 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.