Open Access Open Access  Restricted Access Subscription or Fee Access

Providing Security to Medical Data

D. Sathya, S. Kokilavani, S. Krithika

Abstract


Wireless Medical Sensor Network (WMSN) is used in healthcare applications which have the collection of sensors connected to body or emergency care unit to monitor the patients’ vital signs. The privacy details of the patients have to be secured. Lot of techniques have been proposed to secure the health data. But there are some loop holes still exist for the attackers to hack the data. This is the major problem and to solve this issue some techniques have to be invented. In the proposed system we are comparing the four existing cryptosystems for its computation time. We choose the best one among them to encrypt the data.


Keywords


Security, Transmission of Data, Privacy

Full Text:

PDF

References


Malan D.J, Welsh M, Smith M.D, “A Public-Key Infrastructure for TinyOS Based on Elliptic Curve Cryptography” IEEE International Conference on Sensor and ad Hoc Communications and Networks, October 4–7, 2004.

Park C., Chou P.H., Bai Y., Matthews R., Hibbs A, “An Ultra-Wearable, Wireless, Low Power ECG Monitoring System”, Proceedings of IEEE BioCAS, November 2006.

Shnayder V, Chen B.R., Lorincz K, Fulford-Jones T.R, Welsh M, Sensor networks for medical care., Technical Report TR-08-05, USA, Apr- 2005.

] Pardeep Kumar and Hoon-Jae Lee, “Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey”, 12, 55-91; 2012.

Daojing He, Sammy Chan, Shaohua Tang, “A Novel and Lightweight System to Secure Wireless Medical Sensor Networks”, IEEE Journal Of Biomedical And Health Informatics, Vol. 18, No. 1, January 2014, 23-32.

G. Z. Yang, Body Sensor Networks. London: Springer- Verlag, pp. 4–13,2006.

S.D. Bao, Y.T. Zhang and L.F. Shen, “Physiological signal based entity authentication for body area sensor networks and mobile healthcare systems”, pp. 2455–2458, Proc. IEEE-EMBS 2005. 27th Ann. International Conference of the IEEE Engineering in Medicine and Biology Society, 2005.

William Stallings, “Cryptography and Network Security” fifth edition.

Mackowiak, P. A., Wasserman, S. S., and Levine, M. M. (1992), "A Critical Appraisal of 98.6 Degrees F, the Upper Limit of the Normal Body Temperature, and Other Legacies of Carl Reinhold August Wunderlichs," Journal of the American Medical Association, 268, 1578-1580, 1992.

Behrouz A Forouzan, “Cryptography and Network Security,” second edition.

Zhaoyang Zhang, Honggang Wang, Athanasios V. Vasilakos, and Hua Fang, “ECG-Cryptography and Authentication in Body Area Networks,” IEEE Transactions on Information Technology in Biomedicine, vol. 16, no. 6, november 2012.

Azzedine Boukerche, and Yonglin Ren, “A Secure Mobile Healthcare System using Trust-Based Multicast Scheme ,“ IEEE Journal on Selected Areas in Communications, vol. 27, no. 4, may 2009.

Shu-Di Bao,, Carmen C. Y. Poon, Yuan-Ting Zhang,Fellow , and Lian-Feng Shen, “Using the Timing Information of Heartbeats as an Entity Identifier to Secure Body Sensor Network, “IEEE Transactions on Information Technology in Biomedicine, vol. 12, no. 6, november 2008.

Y. M. Huang, M. Y. Hsieh, H. C. Chao, S. H. Hung, and J. H. Park,” Pervasive, Secure Access to a Hierarchical Sensor-Based Healthcare Monitoring Architecture in Wireless Heterogeneous Networks,” IEEE journal on selected areas in communications, vol. 27, no. 4, may 2009.

E.surya, C.Divya,” A Survey on Symmetric Key Encryption Algorithms, ”International Journal of Computer Science & Communication Networks, Vol 2(4), 475-477.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.