Skip to main content

Mobile Based HIGHT Encryption for Secure Biometric Information Transfer of USN Remote Patient Monitoring System

  • Conference paper
Computational Science and Its Applications - ICCSA 2011 (ICCSA 2011)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 6786))

Included in the following conference series:

Abstract

In the future, advanced countries have expected that will face serious social problems such as public health, medical, welfare. The increase of chronic disease caused by would lead to increase in medical costs, and also the national financial burden, under this circumstances, would be largely. Therefore, the field of u-healthcare attracts the world’s attention, and advanced countries are supporting this u-healthcare project through(with) medical law revision. u-RPMS(USN Remote Patient Monitoring System) which study in this paper has emerged a new technology in the field of u-healthcare. The medical system using USN is aiming to send the data, which collected through body-mounted sensors of inside and outside, to the outside system which is able to monitor and manage the user, but there could be occurred any problems such as the private information leaks, loss and falsification. Therefore, we proposed biometric information security model used HIGHT encryption in order to solve these security vulnerabilities.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Park, S.-H.: Strateges for U-Health. GRI (2009)

    Google Scholar 

  2. Lee, J.-W., Kim, S.-H., Kim, C.-B., Kim, K.-K.: A Comparative Study on the telehealth regulations between U.S.A, Australia and Japan for developing the Korean telehealth system. Korean Journal of Medicine and Law 18(1) (2010)

    Google Scholar 

  3. Kim, Y.-R.: Comprehensive Study on Social and Legal Issues of Internet Medical Information. Media Science Research 10(2) (June 2010)

    Google Scholar 

  4. Jung, K.-H., Park, J.-H., Kim, J.-W.: U-health of the market towards the ICT industry real-qualified War. DigiecoReports (2010)

    Google Scholar 

  5. Kang, M.-G., Kim, I.-K.: A Study on the Open STB based U-Health Services. KSII Journal 10(3) (2009)

    Google Scholar 

  6. Ok-Nam, K.: u-Healthcare is coming closer. HNFocus 26 (2009)

    Google Scholar 

  7. Park, S.-H.: Promotion Strategy of u-Health Business, Gyeongi Development Policies Research, 2009-32

    Google Scholar 

  8. TTAK.KO-10.0227: A method of transmitting PHY and Packet with an Interior of Human Body WBAN block base

    Google Scholar 

  9. TTAK.KO-10.0301: A structure of network physical stages of human communication network physical structure

    Google Scholar 

  10. Korea Internet Development Agency: HIGHT Block Encryption Algorithm Specification and Detailed Statement (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, YH., Lim, IK., Lee, JK. (2011). Mobile Based HIGHT Encryption for Secure Biometric Information Transfer of USN Remote Patient Monitoring System. In: Murgante, B., Gervasi, O., Iglesias, A., Taniar, D., Apduhan, B.O. (eds) Computational Science and Its Applications - ICCSA 2011. ICCSA 2011. Lecture Notes in Computer Science, vol 6786. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21934-4_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-21934-4_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-21933-7

  • Online ISBN: 978-3-642-21934-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics