skip to main content
10.1145/3191477.3199061acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicmreConference Proceedingsconference-collections
research-article

Secure Transition for Robotic Surgery With Elliptic Curve Diffie Hellman

Published:07 February 2018Publication History

ABSTRACT

This study examines the secure transition for robotic surgery session. Surgeon sends set of instructions as data. The data is encapsulated with surgeon secure signature to conform surgeon identity. At the same time, patient information sends to the surgeon as a secure row of frames to estimate patient situation dependent on the real medical reports. Elliptic Curve Diffie-Hellman is use as an asymmetric encryption method. Here the session between surgeon console and interactive robot arm was achieved and supported with four secret keys. Two private keys are chosen on each side and two public keys are calculated from these private keys. These results indicate that the level of the security was improved by use asymmetric encryption rather than symmetric encryption. And by contributed four secret keys the patient information must be safer.

References

  1. Nitsch, Verena, Farber, Berthold. 2013. A meta-analysis of the effects of haptic interfaces on task performance with teleoperation systems. IEEE. 6, 4 (2013), 387--398. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Chunguang, Huang and Hai, Cheng and Yu, Song and Qun, Ding. 2015. Permutation of Image Encryption System Based on Block Cipher and Stream Cipher Encryption Algorithm. Technical Report. Robot, Vision and Signal Processing (RVSP), 2015 Third International Conference on. IEEE. (2015), 163--166. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Rosen, Jacob and Hannaford, Blake and Satava, Richard M. 2011. Surgical robotics: systems applications and visions. Springer Science & Business Media. (2011). Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Anvari, Mehran. 2007. Telesurgery: remote knowledge translation in clinical surgery. Springer. 31, 8 (2007), 1545--1550.Google ScholarGoogle Scholar
  5. Reavis, Kevin M and Renton, David R and Melvin, W Scott. 2007. Robotic telesurgery for achalasia. Doctoral Thesis. UMI Order Number: UMI Order No. GAX95-09398., University of Washington. Springer. 1, 1 (2007), 25--30.Google ScholarGoogle Scholar
  6. Field, Jayson B and Benoit, Michelle F and Dinh, Tri A and Diaz-Arrastia, Concepcion. 2007. Computer-enhanced robotic surgery in gynecologic oncology. Springer. 21, 2 (2007), 244--246.Google ScholarGoogle Scholar
  7. Tennekoon, Rajitha and Wijekoon, Janaka and Harahap, Erwin and Nishi, Hiroaki and Saito, Eiichi and Katsura, Seiichiro. 2014. Per hop data encryption protocol for transmission of motion control data over public networks. Advanced Motion Control (AMC), 2014 IEEE 13th International Workshop on. IEEE. (2014), 128--133.Google ScholarGoogle ScholarCross RefCross Ref
  8. Boho, Andras and Van Wallendael, Glenn and Dooms, Ann and De Cock, Jan and Braeckman, Geert and Schelkens, Peter and Preneel, Bart and Van de Walle, Rik. 2013. End-to-end security for video distribution: The combination of encryption, watermarking, and video adaptation. IEEE signal processing magazine. 30, 2 (2013), 97--107.Google ScholarGoogle Scholar
  9. Yang, Yanjiang and Wang, Zhenlan and Bao, Feng and Deng, Robert H. 2003. Secure the image-based simulated telesurgery system. Circuits and Systems, 2003. ISCAS'03. Proceedings of the 2003 International Symposium on. IEEE. 2, (2003), II-II.Google ScholarGoogle ScholarCross RefCross Ref
  10. Bouslimi, Dalel and Coatrieux, Gouenou and Cozic, Michel and Roux, Christian. 2012. A joint encryption/watermarking system for verifying the reliability of medical images. IEEE Transactions on Information Technology in Biomedicine. 16, 5 (2012), 891--899. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Ajili, Sondes and Hajjaji, Mohamed Ali and Bouallegue, Belgacem and Mtibaa, Abdellatif. 2014. Joint Watermarking\ Encryption image for safe transmission: Application on medical imaging. Computer & Information Technology (GSCIT), 2014 Global Summit on. IEEE. (2014), 1--6.Google ScholarGoogle ScholarCross RefCross Ref
  12. Lanfranco, Anthony R and Castellanos, Andres E and Desai, Jaydev P and Meyers, William C. 2004. Robotic surgery: a current perspective. Annals of surgery. Lippincott, Williams, and Wilkins. 239, 1 (2004), 14.Google ScholarGoogle Scholar
  13. Lopez, Julio and Dahab, Ricardo. 2000. An overview of elliptic curve cryptography. Citeseer. (2000).Google ScholarGoogle Scholar

Index Terms

  1. Secure Transition for Robotic Surgery With Elliptic Curve Diffie Hellman

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICMRE 2018: Proceedings of the 2018 4th International Conference on Mechatronics and Robotics Engineering
      February 2018
      177 pages
      ISBN:9781450363655
      DOI:10.1145/3191477

      Copyright © 2018 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 7 February 2018

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited
    • Article Metrics

      • Downloads (Last 12 months)2
      • Downloads (Last 6 weeks)1

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader