메뉴 건너뛰기




Volumn , Issue , 2010, Pages 327-332

Security issues on wireless body area network for remote healthcare monitoring

Author keywords

Remote health monitoring system; Risk assessment; Security threats; Sensor network; Wireless body area network

Indexed keywords

AUTOMATIC DATA COLLECTION; CORE COMPONENTS; DATA DELIVERY; HARDWARE MODULES; HEALTH MONITORING; HEALTH MONITORING SYSTEM; HEALTH PROFESSIONALS; HEALTHCARE MONITORING; HUMAN INTERACTIONS; PERSONAL HEALTH RECORD; REAL TIME; SECURITY AND PRIVACY; SECURITY ISSUES; SECURITY RISK ANALYSIS; SECURITY RISKS; SECURITY THREATS; SERVICE PROVIDER; TARGET SYSTEMS; WIRELESS BODY AREA NETWORK;

EID: 77958520842     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SUTC.2010.61     Document Type: Conference Paper
Times cited : (78)

References (40)
  • 2
    • 0034229951 scopus 로고    scopus 로고
    • Picoradio supports ad-hoc ultra-low power wireless networking
    • July
    • J. Rabaey, M. Ammer, J. Silva, D. Patel and S. Roundy, "Picoradio Supports Ad-Hoc Ultra-Low Power Wireless Networking," IEEE Computers, pp. 42-48, July 2000.
    • (2000) IEEE Computers , pp. 42-48
    • Rabaey, J.1    Ammer, M.2    Silva, J.3    Patel, D.4    Roundy, S.5
  • 3
    • 45149122763 scopus 로고    scopus 로고
    • July
    • American Heart Association, http://www.americanheart.org/presenter.jhtml? identifier=4591, July 2007.
    • (2007) American Heart Association
  • 6
    • 77958584144 scopus 로고    scopus 로고
    • Questex U.S. Technology Group
    • Questex U.S. Technology Group, http://www.sensorsmag.com, 2007.
    • (2007)
  • 12
    • 77958609646 scopus 로고    scopus 로고
    • IHE IT infrastructure technical framework: Cross-enterprise user authentication (XUA) integration profile
    • Integrating the Healthcare Enterprise (IHE), "IHE IT Infrastructure Technical Framework: Cross-Enterprise User Authentication (XUA) Integration Profile," White paper, 2006.
    • (2006) White paper, Integrating the Healthcare Enterprise (IHE)
  • 13
    • 77958578831 scopus 로고    scopus 로고
    • Healthcare and life sciences: Deployment guide - Setting up an xds affinity domain using ihii components
    • June
    • Karen Witting, "Healthcare and Life Sciences: Deployment Guide - Setting up an XDS Affinity Domain using IHII Components," IBM Healthcare and Life Science, June, 2006.
    • (2006) IBM Healthcare and Life Science
    • Witting, K.1
  • 14
    • 33645997737 scopus 로고    scopus 로고
    • Quality of privacy (qop) for the design of ubiquitous healthcare applications
    • Monica Tentori, et al.., "Quality of Privacy (QoP) for the Design of Ubiquitous Healthcare Applications," Journal of Universal Computer Science, Vol. 12, No. 3, pp.252-269, 2006.
    • (2006) Journal of Universal Computer Science , vol.12 , Issue.3 , pp. 252-269
    • Tentori, M.1
  • 16
    • 77958548244 scopus 로고    scopus 로고
    • Survey on location privacy in pervasive computing (in: Privacy, security and trust within the context of pervasive computing)
    • Andreas Görlach, Wesley W. Terpstra, Andreas Heinemann, "Survey on Location Privacy in Pervasive Computing (in: Privacy, Security and Trust within the Context of Pervasive Computing)," Proceedings on Euro mGov 2005, 2005.
    • (2005) Proceedings on Euro MGov 2005
    • Görlach, A.1    Terpstra, W.W.2    Heinemann, A.3
  • 17
    • 77958564609 scopus 로고    scopus 로고
    • A privacy preference model for pervasive computing
    • Karim Adam, et al.., "A Privacy Preference Model for Pervasive Computing," Proceedings on Euro mGov 2005, 2005.
    • (2005) Proceedings on Euro MGov 2005
    • Adam, K.1
  • 20
    • 2942524994 scopus 로고    scopus 로고
    • Location privacy in pervasive computing
    • Jan.-Mar.
    • Alastair R. Beresford and Frank Stajano, "Location Privacy in Pervasive Computing," Pervasive Computing, pp.46-55, Jan.- Mar., 2003.
    • (2003) Pervasive Computing , pp. 46-55
    • Beresford, A.R.1    Stajano, F.2
  • 21
    • 33845574135 scopus 로고    scopus 로고
    • Privacy-aware autonomous agents for pervasive healthcare
    • Nov.-Dec.
    • Monica Tentori, et al.., "Privacy-Aware Autonomous Agents for Pervasive Healthcare," IEEE Intelligent Systems, pp.55-62, Nov.-Dec., 2006.
    • (2006) IEEE Intelligent Systems , pp. 55-62
    • Tentori, M.1
  • 22
    • 34548155020 scopus 로고    scopus 로고
    • Security in pervasive computing: Current status and open issues
    • Nov.
    • Munirul Haque and Sheikh Iqbal Ahamed, "Security in Pervasive Computing: Current Status and Open Issues," International Journal of Network Security, Vol.3, No.3, pp.203- 214, Nov. 2006.
    • (2006) International Journal of Network Security , vol.3 , Issue.3 , pp. 203-214
    • Haque, M.1    Ahamed, S.I.2
  • 25
    • 33745337590 scopus 로고    scopus 로고
    • Defining obtrusiveness in home telehealth technologies: A conceptual framework
    • Jul-Aug
    • Brian K. Hensel, et al.., "Defining Obtrusiveness in Home Telehealth Technologies: A Conceptual Framework," Journal of American Medical Informatics Association, Vol.13, No.4, pp.428-431, Jul-Aug, 2006.
    • (2006) Journal of American Medical Informatics Association , vol.13 , Issue.4 , pp. 428-431
    • Hensel, B.K.1
  • 26
    • 77958586933 scopus 로고    scopus 로고
    • The five styles of sensory applications
    • G00138302, Mar.
    • Jeff Woods, "The Five Styles of Sensory Applications," Gartner Research, G00138302, Mar., 2006.
    • (2006) Gartner Research
    • Woods, J.1
  • 28
    • 67650358682 scopus 로고    scopus 로고
    • Extension of authentication and key agreement protocol (aka) for universial mobile telecommunication system (umts)
    • Ja'afer AL-Saraireh and Sufian Yousef, "Extension of Authentication and Key Agreement Protocol (AKA) for Universial Mobile Telecommunication System (UMTS)," International Journal of Theoretical and Applied Computer Sciences, Vol.1, No.1, pp.109-118, 2006.
    • (2006) International Journal of Theoretical and Applied Computer Sciences , vol.1 , Issue.1 , pp. 109-118
    • Al-Saraireh, J.1    Yousef, S.2
  • 36
    • 0035451783 scopus 로고    scopus 로고
    • Specification and analysis of n-way key recovery system by extended cryptographic timed petri net
    • Sep
    • Shinyoung Lim, Khjong Ho, Juneun Ah, Kangsoo Lee, Specification and Analysis of n-way Key Recovery System by Extended Cryptographic Timed Petri Net, The Journal of Systems and Software, Vol. 58, No. 2, pp.93 - pp.106, Sep 2001.
    • (2001) The Journal of Systems and Software , vol.58 , Issue.2 , pp. 93-106
    • Lim, S.1    Ho, K.2    Ah, J.3    Lee, K.4
  • 39
    • 33750699594 scopus 로고    scopus 로고
    • HIGHT: A new block cipher suitable for low-resource device
    • LNCS 4249
    • Deuko Hong, et al, "HIGHT: A New Block Cipher Suitable for Low-Resource Device," CHES'06, LNCS 4249, 2006.
    • (2006) CHES'06
    • Hong, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.