Secure the image-based simulated telesurgery system
نویسندگان
چکیده
Securing telemedicine services is essentially a critical and urgent topic. However, in many existing telemedicine systems security related issues are seldom seriously considered. In this paper, we introduce an image-based simulated system for kyphoplasty telesurgery, wherein special attentions are drawn to address the security problems. Among others, various security requirements of the system are formalised, and solutions to meet these requirements are presented. Consequently, we implement the system to work in a secure way. In fact, our methods can be applied to a class of similar telemedicine services. To implement this system, we take efficiency as our premier consideration. Keyword: Simulated System; Telemedicine; Telesurgery; Kyphoplasty; Digital Signature; Authentication, Hash Function; Image Hashing Function; Symmetric Cipher; Public-key Cryptosystem.
منابع مشابه
Effects of Latency on Telesurgery: An Experimental Study
The paper is concerned with determining the feasibility of performing telesurgery over long communication links. It describes an experimental testbed for telesurgery that is currently available in our laboratory. The tesbed is capable of supporting both wired and satellite connections as well as simulated network environments. The feasibility of performing telesurgery over a satellite link with...
متن کاملTowards 5G Enabled Tactile Robotic Telesurgery
Robotic telesurgery has a potential to provide extreme and urgent health care services and bring unprecedented opportunities to deliver highly specialized skills globally. It has a significant societal impact and is regarded as one of the appealing use cases of Tactile Internet and 5G applications. However, the performance of robotic telesurgery largely depends on the network performance in ter...
متن کاملSecure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines
Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...
متن کاملSEIMCHA: a new semantic image CAPTCHA using geometric transformations
As protection of web applications are getting more and more important every day, CAPTCHAs are facing booming attention both by users and designers. Nowadays, it is well accepted that using visual concepts enhance security and usability of CAPTCHAs. There exist few major different ideas for designing image CAPTCHAs. Some methods apply a set of modifications such as rotations to the original imag...
متن کاملAdaptive Information Coding for Secure and Reliable Telesurgery Communications
Telesurgical Robot Systems (TRS) have been the focus of research in academic, military and commercial domains for many years. Recently, a new communications protocol (ITP) based on UDP has been specified to allow interoperability of these surgical robots and surgical robot controllers. However, security and reliability of telesurgery communication are still unaddressed issues. Telesurgery can b...
متن کامل