An Advance Security Technique Challenges to Government in Wireless Sensor Network for Health
نویسندگان
چکیده
Changes in the Internet, World Wide Web technologies and services lead to new developments in the way of E-Government efforts to provide better services to citizens and businesses due to governments handles their internal operations. One of the revolutionary developments comes from adoption of wireless technologies in government related activities. E-Governance is an influential tool for bringing challenges to the government process in the developing world. Mainly, E-Governance operates at the cross roads between information and communication Technology (ICT) and Government Processes (GP). An effective EGovernance model is that systematically applied to a specific healthcare industry sector. As E-Governance is involved in global technology transfers data from the original project context into a different sociocultural environment. The Health Services to the public is a collaborative program between the clinical medical programs and the Department of Health Systems; Management & Policy at the Public Health System and Health Educational System are an interdisciplinary program that evaluates organization, delivery and reimbursement in health care to public. It is response to the Government access the information from all sectors and will give them valuable suggestions. The need to collect data about people’s physical, physiological, psychological, cognitive, and behavioral processes in spaces ranging from urban and rural area. In this paper we present the the recent availability of the technologies that enable this data collection, storing, retrieving and security system for the information through wireless sensor networks for healthcare. In this paper, we outline prototype systems spanning application domains from physiological and activity monitoring the urban and rural hospitals and behavioral works and emphasize ongoing treatment challenges to the patient day to day and that information will be available in centrally. Then any moments the higher authorities can able to verify.
منابع مشابه
Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System
Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...
متن کاملA novel key management scheme for heterogeneous sensor networks based on the position of nodes
Wireless sensor networks (WSNs) have many applications in the areas of commercial, military and environmental requirements. Regarding the deployment of low cost sensor nodes with restricted energy resources, these networks face a lot of security challenges. A basic approach for preparing a secure wireless communication in WSNs, is to propose an efficient cryptographic key management protocol be...
متن کاملEIDA: An Energy-Intrusion aware Data Aggregation Technique for Wireless Sensor Networks
Energy consumption is considered as a critical issue in wireless sensor networks (WSNs). Batteries of sensor nodes have limited power supply which in turn limits services and applications that can be supported by them. An efcient solution to improve energy consumption and even trafc in WSNs is Data Aggregation (DA) that can reduce the number of transmissions. Two main challenges for DA are: (i)...
متن کاملToward an energy efficient PKC-based key management system for wireless sensor networks
Due to wireless nature and hostile environment, providing of security is a critical and vital task in wireless sensor networks (WSNs). It is known that key management is an integral part of a secure network. Unfortunately, in most of the previous methods, security is compromised in favor of reducing energy consumption. Consequently, they lack perfect resilience and are not fit for applications ...
متن کاملEvaluation of an Intrusion Detection System for Routing Attacks in Wireless Self-organised Networks
Wireless Sensor Networks (WSNs) arebecoming increasingly popular, and very useful in militaryapplications and environmental monitoring. However,security is a major challenge for WSNs because they areusually setup in unprotected environments. Our goal in thisstudy is to simulate an Intrusion Detection System (IDS)that monitors the WSN and report intrusions accurately andeffectively. We have thus...
متن کاملClassification and Comparison of Methods for Discovering Coverage Loss Areas in Wireless Sensor Networks
In recent years, wireless sensor networks data is taken into consideration as an ideal source, in terms of speed, accuracy and cost, in order to study the Earth's surface. One of the most important challenges in this area, is the signaling network coverage and finding holes. In recent years, wireless sensor networks data is taken into consideration as an ideal source, in terms of speed, accurac...
متن کامل