A Security Framework for Location-Aware Healthcare Services over Wireless Sensor Networks
Date Issued
2005-07-31
Date
2005-07-31
Author(s)
DOI
932213E002124
Abstract
In this project, we are going to
investigate the key requirements of a security
framework for location-aware healthcare services over sensor networks, and attempt to
formulate a complete and practical design
based on the results of the investigation. To
the least extent, the resulting framework is
supposed to improve the availability of the
system, to preserve the privacy of the
subjects being cared, to assert timely
response, and to prevent the abuse of medical
resources. In addition, because of the
stringent constraints and certain
application-specific considerations incurred
by the particular combination of wireless
sensor networks and healthcare services, it is
required to explore new evaluation models
for the security analysis in this unique
situation. For example, the cross-location
continuity of authenticity, or the consistency
of sensed information emitted by an
authenticated moving subject, ought to be
taken into account as well. As a result, we
also plan to propose unconventional
evaluation models tailored for both
location-aware healthcare services and
wireless sensor networks.
In the first year of the project, we
develop a key management scheme for
wireless sensor network based on CRT
(Chinese Remainder Theorem). Compared
with existing schemes, the proposed scheme
has the following advantages. First, when
some node is revoked or compromised, the
key server can broadcast update messages to
all nodes without encryption. Each node can
derive an update seed from the message in
only one modulation operation and use this
seed to update group key and key spaces.
Second, compared to existing schemes, in
which key spaces cannot be changed, all key
spaces can be updated in our scheme. This
advantage makes the life time of key spaces
longer and node joining become much easier.
Moreover, the rekeying cost of this scheme is
also efficient in storage since the memory
requirement in every node is just O(λ), where
λ is a security parameter, and each key space
is secure before λ+1 nodes are compromised.
Subjects
Security
wireless sensor
networks
networks
location-aware computing
healthcare service
security evaluation model
Publisher
臺北市:國立臺灣大學電機工程學系暨研究所
Type
report
File(s)![Thumbnail Image]()
Loading...
Name
932213E002124.pdf
Size
127.09 KB
Format
Adobe PDF
Checksum
(MD5):bcd6d8e31a5e03533ceaac8ab7355123
