SCHEME OF AUTHENTICATION OF HEALTH MONITORING SYSTEM BASED ON CREDIT CARD MECHANISM

Qiming Huang, Qilei Hao, Chao Guo, Shuang Li

2011

Abstract

Health monitoring systems are not just supported by local hospitals, but also supported by other province’s hospitals. How to share the patient’s health data by different hospitals? Similarly, a user first applies for a credit card with a bank whereby to buy goods at any merchant accepting credit cards. Merchants need not establish agreements with each other, but just need to have a trust relationship with one or a few banks that accept payments from credit-card users and pay merchants. After designing the logic hierarchical diagram of the health monitoring system, the credit card mechanism is applied to establish mutual authentication scheme with Identity-Based Cryptograph (IBC), which are used by clients in referral care between different hospitals of different provinces and between different hospitals of the same province. The authentication scheme ability has been analyzed to resist for Anti-counterfeit attacks, location privacy attacks and replay attacks.

References

  1. European Telecommunications Standards Institute (ETSI), 1993. GSM 2.09: Security aspects.
  2. Perkins C., 2002. IP mobility support for IPv4, RFC 3344.
  3. Jianhu He, Qingli Zhou, Hui Tian, 2008. IHE laboratory technical framework, Chinese Journal of Medical Instrumentation. 32(6):449452.
  4. Mathis. H, Jun 1956. Bilinear Transformations, Circuit Theory. 3, Issue:2
  5. Mao, W., 2004. An identity-based non-interactive authentication framework for computational grids. Hewlett-Packard Laboratories, Technical Report HPL-2004-96.
  6. Yanchao Zhang, Yuguang Fang, 2006 ARSA: An AttackResilient Security Architecture for Multihop WMNs, IEEE,
  7. Zhu, H., Lin, X., Lu, R., Ho, P.-H., & Shen, X, 2008. Slab: Secure localized authentication and billing scheme for wireless mesh networks. IEEE Transactions on Wireless Communications, 7(10), 3858-3868
  8. A. Shamir, 1984. Identity based cryptosystems and signature schemes, in Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag,
  9. ITU-T 1989. Authentication Framework, ITU-T Recommendations X.509, ITU, Geneva,
Download


Paper Citation


in Harvard Style

Huang Q., Hao Q., Guo C. and Li S. (2011). SCHEME OF AUTHENTICATION OF HEALTH MONITORING SYSTEM BASED ON CREDIT CARD MECHANISM . In Proceedings of the 13th International Conference on Enterprise Information Systems - Volume 3: ICEIS, ISBN 978-989-8425-55-3, pages 350-354. DOI: 10.5220/0003605103500354


in Bibtex Style

@conference{iceis11,
author={Qiming Huang and Qilei Hao and Chao Guo and Shuang Li},
title={SCHEME OF AUTHENTICATION OF HEALTH MONITORING SYSTEM BASED ON CREDIT CARD MECHANISM},
booktitle={Proceedings of the 13th International Conference on Enterprise Information Systems - Volume 3: ICEIS,},
year={2011},
pages={350-354},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003605103500354},
isbn={978-989-8425-55-3},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 13th International Conference on Enterprise Information Systems - Volume 3: ICEIS,
TI - SCHEME OF AUTHENTICATION OF HEALTH MONITORING SYSTEM BASED ON CREDIT CARD MECHANISM
SN - 978-989-8425-55-3
AU - Huang Q.
AU - Hao Q.
AU - Guo C.
AU - Li S.
PY - 2011
SP - 350
EP - 354
DO - 10.5220/0003605103500354