TIMAR: an efficient key management scheme for ubiquitous health care environments

نویسندگان

  • Syed Muhammad Khaliq-ur-Rahman Raazi
  • Sungyoung Lee
  • Young-Koo Lee
چکیده

Wireless Sensor Networks (WSN) are worthy to use in ubiquitous healthcare environments. They provide comfort to patients and make patient monitoring systems more efficient. WSN, when applied in ubiquitous healthcare environments, have different characteristics and security requirements. Number of sensors is very small as compared to other WSN applications and all nodes are close to each other in the network. Possibility of human intervention in ubiquitous healthcare environments and randomness properties of biometric measurements, which are collected in ubiquitous healthcare environments, reduce the security requirements as compared to other WSN applications. Key Management Schemes, proposed for generic WSN, prove to be overly complex and inefficient for ubiquitous healthcare environments. In this paper, we present TIMAR, which is an efficient Key Management Scheme specifically designed for ubiquitous healthcare environments.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A novel key management scheme for heterogeneous sensor networks based on the position of nodes

Wireless sensor networks (WSNs) have many applications in the areas of commercial, military and environmental requirements. Regarding the deployment of low cost sensor nodes with restricted energy resources, these networks face a lot of security challenges. A basic approach for preparing a secure wireless communication in WSNs, is to propose an efficient cryptographic key management protocol be...

متن کامل

An efficient secure channel coding scheme based on polar codes

In this paper, we propose a new framework for joint encryption encoding scheme based on polar codes, namely efficient and secure joint secret key encryption channel coding scheme. The issue of using new coding structure, i.e. polar codes in Rao-Nam (RN) like schemes is addressed. Cryptanalysis methods show that the proposed scheme has an acceptable level of security with a relatively smaller ke...

متن کامل

RFID role in efficient management of healthcare systems: a system thinking perspective

Abstract Purpose of this paper: This paper presents an analysis toward understanding the business value components that a health care organization can drive by adopting RFID technology into its system. This researcher proposes a framework for evaluating the business value of RFID technology. To do so, emphasis is put on delivering business value through refining business processes and expandin...

متن کامل

An efficient symmetric polynomial-based key establishment protocol for wireless sensor networks

An essential requirement for providing secure services in wireless sensor networks is the ability to establish pairwise keys among sensors. Due to resource constraints on the sensors, the key establishment scheme should not create significant overhead. To date, several key establishment schemes have been proposed. Some of these have appropriate connectivity and resistance against key exposure, ...

متن کامل

An efficient certificateless signcryption scheme in the standard model

Certificateless public key cryptography (CL-PKC) is a useful method in order to solve the problems of traditional public key infrastructure (i.e., large amount of computation, storage and communication costs for managing certificates) and ID-based public key cryptography (i.e., key escrow problem), simultaneously. A signcryption scheme is an important primitive in cryptographic protocols which ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009