Attacks and Threats on the U-Healthcare Application with Mobile Agent

نویسنده

  • Jung Tae Kim
چکیده

Wireless sensor network is widespread used in hospital environment with mobile device such as NFC, RFID tag and small sensor nodes. The use of a mobile agent in healthcare system under wireless network environment gives an opportunity to offer better services for patients and staffs such as doctors and nurses because of its mobility. But, optimized security protocols and schemes between sensor and patient device are essential for high performance and security problem in U-healthcare system. But a lot of threats, attacks and vulnerability are induced because of limited resources such as small memory and low computation capability in wireless sensor network. The characteristics of U-healthcare systems are analyzed to solve security issues in this paper.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Authentication Process between RFID tag and Mobile Agent Under U-healthcare System

A variety of security and privacy threats to RFID authentication protocols with embedded healthcare system have been widely studied. The representative vulnerabilities include eavesdropping, replay attacks, denial of service attacks, tracking, and traceability. Considering this RFID security issues, we analyzed the security threats and open problems related to these matters. In ubiquitous syste...

متن کامل

Requirement of Authentication between RFID tag and Agent for Applying U-healthcare System

A variety of security and privacy threats to RFID authentication protocols have been widely studied, including eavesdropping, replay attacks, denial of service (DoS) attacks, tracking, and traceability. Considering this RFID security issues, we surveyed the security threats and open problems related to issues by means of information security and privacy. In ubiquitous sensor node, it is possibl...

متن کامل

HF-Blocker: Detection of Distributed Denial of Service Attacks Based On Botnets

Abstract—Today, botnets have become a serious threat to enterprise networks. By creation of network of bots, they launch several attacks, distributed denial of service attacks (DDoS) on networks is a sample of such attacks. Such attacks with the occupation of system resources, have proven to be an effective method of denying network services. Botnets that launch HTTP packet flood attacks agains...

متن کامل

Security Challenges in Fog Computing in Healthcare

Background and Aim: The Fog Computing is a highly virtualized platform that provides storage, computing and networking services between the Cloud data centers and end devices. Fog computing fits the characteristics of real-time health monitoring systems. In such systems, a large amount of data is acquired from a multitude of bio and environmental sensors. On the other hand, its distribution and...

متن کامل

Analysis of RFID Application for U-healthcare System in Internet of Things

In the past years, Internet of Things (IoT) has been focused and fused with wireless sensor node such as RFID, NFC tag and small sensor nodes, especially for hospital environment with mobile device. Due to the weakness characteristics of wireless signals, unauthorized person can access easier to hospital networks in wireless part than wired network systems. This may induced in several security ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014