Summary: | 碩士 === 東海大學 === 電機工程學系 === 103 === Medical institutions or healthcare facilities apply the use of wireless sensor networks technology for health care services, but if the technology lacks comprehensive security architecture, it would not be able to get the users’ trust. In the meantime, it also reduces the quality of medical care services. However, in the wireless sensor network environment, in order to allow the patients ease in carrying the device, the system needs a miniature device for retrieving and transmitting physiological information; therefore, its computing capacity and storage space is extremely limited. In addition, the structure of wireless sensor network topology can be changed with the users’ movement. All these factors above make the security architecture and network security protocols of traditional network services and network security protocol unable to be applied to the wireless medical care system. The physiological data that have been collected by the use of wireless sensors are all involved in the patients’ personal privacy, because of the openness of the wireless sensor networks; therefore, the process of transmitting the patients’ information, the issues of how to protect the security and privacy of users’ information, how to prevent malicious networks’ attacks, and how to provide secure authentication between devices have become important issues for the use of wireless sensor networks in medical care. A secure authentication mechanism ensures that only legitimate users can log into the system, after the confirmation of users’ identification, and access the system’s resources. This article is aimed to address the use of wireless sensor networks for medical monitoring in the environment of medical institutions and health care facilities, with security and privacy protection for user authentication mechanisms and data transmission. These allow medical staff to have immediate access to the condition of the patients. This authentication mechanism uses a smart card and a user-password as dual authentication, ensuring that only legitimate medical staff can retrieve patients’ information. This scheme can resist common attacks. It also construct a cryptosystem based on bilinear pairing to provide a secure data transmission in order to prevent illegal invasion and eavesdropping.
|