ABSTRACT
This study examines the secure transition for robotic surgery session. Surgeon sends set of instructions as data. The data is encapsulated with surgeon secure signature to conform surgeon identity. At the same time, patient information sends to the surgeon as a secure row of frames to estimate patient situation dependent on the real medical reports. Elliptic Curve Diffie-Hellman is use as an asymmetric encryption method. Here the session between surgeon console and interactive robot arm was achieved and supported with four secret keys. Two private keys are chosen on each side and two public keys are calculated from these private keys. These results indicate that the level of the security was improved by use asymmetric encryption rather than symmetric encryption. And by contributed four secret keys the patient information must be safer.
- Nitsch, Verena, Farber, Berthold. 2013. A meta-analysis of the effects of haptic interfaces on task performance with teleoperation systems. IEEE. 6, 4 (2013), 387--398. Google ScholarDigital Library
- Chunguang, Huang and Hai, Cheng and Yu, Song and Qun, Ding. 2015. Permutation of Image Encryption System Based on Block Cipher and Stream Cipher Encryption Algorithm. Technical Report. Robot, Vision and Signal Processing (RVSP), 2015 Third International Conference on. IEEE. (2015), 163--166. Google ScholarDigital Library
- Rosen, Jacob and Hannaford, Blake and Satava, Richard M. 2011. Surgical robotics: systems applications and visions. Springer Science & Business Media. (2011). Google ScholarDigital Library
- Anvari, Mehran. 2007. Telesurgery: remote knowledge translation in clinical surgery. Springer. 31, 8 (2007), 1545--1550.Google Scholar
- Reavis, Kevin M and Renton, David R and Melvin, W Scott. 2007. Robotic telesurgery for achalasia. Doctoral Thesis. UMI Order Number: UMI Order No. GAX95-09398., University of Washington. Springer. 1, 1 (2007), 25--30.Google Scholar
- Field, Jayson B and Benoit, Michelle F and Dinh, Tri A and Diaz-Arrastia, Concepcion. 2007. Computer-enhanced robotic surgery in gynecologic oncology. Springer. 21, 2 (2007), 244--246.Google Scholar
- Tennekoon, Rajitha and Wijekoon, Janaka and Harahap, Erwin and Nishi, Hiroaki and Saito, Eiichi and Katsura, Seiichiro. 2014. Per hop data encryption protocol for transmission of motion control data over public networks. Advanced Motion Control (AMC), 2014 IEEE 13th International Workshop on. IEEE. (2014), 128--133.Google ScholarCross Ref
- Boho, Andras and Van Wallendael, Glenn and Dooms, Ann and De Cock, Jan and Braeckman, Geert and Schelkens, Peter and Preneel, Bart and Van de Walle, Rik. 2013. End-to-end security for video distribution: The combination of encryption, watermarking, and video adaptation. IEEE signal processing magazine. 30, 2 (2013), 97--107.Google Scholar
- Yang, Yanjiang and Wang, Zhenlan and Bao, Feng and Deng, Robert H. 2003. Secure the image-based simulated telesurgery system. Circuits and Systems, 2003. ISCAS'03. Proceedings of the 2003 International Symposium on. IEEE. 2, (2003), II-II.Google ScholarCross Ref
- Bouslimi, Dalel and Coatrieux, Gouenou and Cozic, Michel and Roux, Christian. 2012. A joint encryption/watermarking system for verifying the reliability of medical images. IEEE Transactions on Information Technology in Biomedicine. 16, 5 (2012), 891--899. Google ScholarDigital Library
- Ajili, Sondes and Hajjaji, Mohamed Ali and Bouallegue, Belgacem and Mtibaa, Abdellatif. 2014. Joint Watermarking\ Encryption image for safe transmission: Application on medical imaging. Computer & Information Technology (GSCIT), 2014 Global Summit on. IEEE. (2014), 1--6.Google ScholarCross Ref
- Lanfranco, Anthony R and Castellanos, Andres E and Desai, Jaydev P and Meyers, William C. 2004. Robotic surgery: a current perspective. Annals of surgery. Lippincott, Williams, and Wilkins. 239, 1 (2004), 14.Google Scholar
- Lopez, Julio and Dahab, Ricardo. 2000. An overview of elliptic curve cryptography. Citeseer. (2000).Google Scholar
Index Terms
- Secure Transition for Robotic Surgery With Elliptic Curve Diffie Hellman
Recommendations
Short Signatures from Diffie---Hellman: Realizing Almost Compact Public Key
In this paper, we present a new digital signature scheme based on the computational Diffie---Hellman (CDH) assumption in the standard model. The proposed signature scheme is not only asymptotically almost compact but also practical for concrete ...
Chosen-ciphertext secure identity-based encryption from computational bilinear Diffie-Hellman
Pairing'10: Proceedings of the 4th international conference on Pairing-based cryptographyWe extend a technique by Hanaoka and Kurosawa that provides efficient chosen-ciphertext secure public key encryption based on the Computational Diffie-Hellman assumption to the identity-based encryption setting. Our main result is an efficient chosen-...
Comments