Security Mechanisms for Network Communications in Medical Mobile Computing Environment

博士 === 國立中興大學 === 資訊科學與工程學系所 === 100 === Due to modern medical advances and patient''s consciousness promotion, urban and countryside compete for the medical resources distribution that could cause the situation of medical material disequilibrium. With different situations and regi...

Full description

Bibliographic Details
Main Authors: Tsung-Chih Hsiao, 蕭宗志
Other Authors: 洪國寶
Format: Others
Language:en_US
Published: 2012
Online Access:http://ndltd.ncl.edu.tw/handle/31470918205003980243
Description
Summary:博士 === 國立中興大學 === 資訊科學與工程學系所 === 100 === Due to modern medical advances and patient''s consciousness promotion, urban and countryside compete for the medical resources distribution that could cause the situation of medical material disequilibrium. With different situations and regions that could derive from the dissimilar medical environment and resource allocation problems, those issues caused some areas lack of medical materials. Besides, that also results in patient’s treatment, such as medical treatment delays and resources distribution wastes. At present, except for hospitals and other dispensaries, people need not only to solve part of area’s medical insufficient problems, but to maintain considerably medical standards and demands. For example, while patients are in dangerous conditions which need medical handling and remote districts, resources distribution issue and facilities establishment faultiness could cause patients’ life-long injure and death. If people is given some medical recommendations or information in that moment, that could avoid unnecessary damages and death. A modern hospital owns the center of integrity medical record management. All of these medical records provided with law protection and patient privacy security. Therefore, for ensuring the relevance medical data could transmit safety on the Internet and guaranteeing those information’s privacy and integrity. It requires authentication to ensure these privacy information not to be obtained by illegal person. The information should be protected includes the patient’s treatment records and clinical diagnosis research, which related to patient’s privacy. Therefore, this paper is divided into three aspects to integrate medical operational environments, the application of wireless sensor network technology and security authentication, which combined with access control to integrate the whole medical environment. First, using authentication to not only integrate medical environment, but to resist different kinds of malicious attacks, such as Password-guessing attack, Replay attack, Stolen-verifier attack or Impersonation attack. Second, the scheme, which includes a time-bounded characteristic that allows the verified staff to access data without the needs to re-authenticate and re-login into the system within a set period of time. Consequently, the time-bounded property also increases the work efficiency of the system administrators and users. Finally, using hierarchical key management to solve the problems of key production in the organization and the issues of access control; simultaneously, it controlled resources and confidential files to proceed the effectively access control to avoid personal information accessing without unauthorized. Therefore, it provides good medical service quality and takes care of patient’s obligation to ensure the patient’s family and patient’s right. It will be worthy of topic for discussion to confer presently.