Attacks and Threats on the U-Healthcare Application with Mobile Agent
نویسنده
چکیده
Wireless sensor network is widespread used in hospital environment with mobile device such as NFC, RFID tag and small sensor nodes. The use of a mobile agent in healthcare system under wireless network environment gives an opportunity to offer better services for patients and staffs such as doctors and nurses because of its mobility. But, optimized security protocols and schemes between sensor and patient device are essential for high performance and security problem in U-healthcare system. But a lot of threats, attacks and vulnerability are induced because of limited resources such as small memory and low computation capability in wireless sensor network. The characteristics of U-healthcare systems are analyzed to solve security issues in this paper.
منابع مشابه
Authentication Process between RFID tag and Mobile Agent Under U-healthcare System
A variety of security and privacy threats to RFID authentication protocols with embedded healthcare system have been widely studied. The representative vulnerabilities include eavesdropping, replay attacks, denial of service attacks, tracking, and traceability. Considering this RFID security issues, we analyzed the security threats and open problems related to these matters. In ubiquitous syste...
متن کاملRequirement of Authentication between RFID tag and Agent for Applying U-healthcare System
A variety of security and privacy threats to RFID authentication protocols have been widely studied, including eavesdropping, replay attacks, denial of service (DoS) attacks, tracking, and traceability. Considering this RFID security issues, we surveyed the security threats and open problems related to issues by means of information security and privacy. In ubiquitous sensor node, it is possibl...
متن کاملHF-Blocker: Detection of Distributed Denial of Service Attacks Based On Botnets
Abstract—Today, botnets have become a serious threat to enterprise networks. By creation of network of bots, they launch several attacks, distributed denial of service attacks (DDoS) on networks is a sample of such attacks. Such attacks with the occupation of system resources, have proven to be an effective method of denying network services. Botnets that launch HTTP packet flood attacks agains...
متن کاملSecurity Challenges in Fog Computing in Healthcare
Background and Aim: The Fog Computing is a highly virtualized platform that provides storage, computing and networking services between the Cloud data centers and end devices. Fog computing fits the characteristics of real-time health monitoring systems. In such systems, a large amount of data is acquired from a multitude of bio and environmental sensors. On the other hand, its distribution and...
متن کاملAnalysis of RFID Application for U-healthcare System in Internet of Things
In the past years, Internet of Things (IoT) has been focused and fused with wireless sensor node such as RFID, NFC tag and small sensor nodes, especially for hospital environment with mobile device. Due to the weakness characteristics of wireless signals, unauthorized person can access easier to hospital networks in wireless part than wired network systems. This may induced in several security ...
متن کامل