About this Journal Submit a Manuscript Table of Contents
Journal of Biomedicine and Biotechnology
Volume 2012 (2012), Article ID 546021, 5 pages
http://dx.doi.org/10.1155/2012/546021
Research Article

Secure Remote Health Monitoring with Unreliable Mobile Devices

Myongji University, Yongin, Gyeonggi-do 449-728, Republic of Korea

Received 17 May 2012; Accepted 28 May 2012

Academic Editor: Sabah Mohammed

Copyright © 2012 Minho Shin. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. D. E. Detmer, “Building the national health information infrastructure for personal health, health care services, public health, and research,” BMC Medical Informatics and Decision Making, vol. 3, article 1, 2003. View at Publisher · View at Google Scholar · View at Scopus
  2. A. D. Jurik and A. C. Weaver, “Remote medical monitoring,” Computer, vol. 41, no. 4, pp. 96–99, 2008.
  3. S. L. Dimmick, S. G. Burgiss, S. Robbins, D. Black, B. Jarnagin, and M. Anders, “Outcomes of an integrated telehealth network demonstration project,” Telemedicine Journal and E-Health, vol. 9, no. 1, pp. 13–23, 2003. View at Publisher · View at Google Scholar · View at Scopus
  4. V. Stanford, “Pervasive health care applications face tough security challenges,” IEEE Pervasive Computing, vol. 1, no. 2, pp. 8–12, 2002. View at Publisher · View at Google Scholar
  5. J. Sriram, M. Shin, D. Kotz, A. Rajan, M. Sastry, and M. Yarvis, “Challenges in data quality assurance in pervasive health monitoring systems,” in Future of Trust in Computing. Lecture Notes in Computer Science, D. Gawrock, H. Reimer, A. R. Sadeghi, and C. Vishik, Eds., 2009.
  6. A. K. Ghosh and T. M. Swaminatha, “Software security and privacy risks in mobile e-commerce,” Communications of the ACM, vol. 44, no. 2, pp. 51–57, 2001. View at Publisher · View at Google Scholar · View at Scopus
  7. B. Schneier, “The psychology of security,” Communications of the ACM, vol. 50, no. 5, p. 128, 2007. View at Publisher · View at Google Scholar · View at Scopus
  8. Mobile Phone Work Group, Trusted Computing Group, https://www.trustedcomputinggroup.org/groups/mobile.
  9. TCG Mobile Trusted Module Specification, “Revision 1,” https://www.trustedcomputinggroup.org/specs/mobilephone/tcg-mobile-trustedmodule- 1.0.pdf.
  10. Y. Han, “Bioworks: a workflow system for automation of bioinformatics analysis processes,” International Journal of Bio-Science and Bio-Technology, vol. 3, no. 4, pp. 59–68, 2011.
  11. A. Giani, T. Roosta, and S. Sastry, “Integrity checker for wireless sensor networks in health care applications,” in Proceedings of the 2nd International Conference on Pervasive Computing Technologies for Healthcare, PervasiveHealth, pp. 135–138, February 2008. View at Publisher · View at Google Scholar · View at Scopus
  12. A. Baig, A. Bouridane, F. Kurugollu, and G. Qu, “Fingerprint—Iris fusion based identification system using a single hamming distance matcher,” International Journal of Bio-Science and Bio-Technology, vol. 1, no. 1, pp. 46–58, 2009. View at Scopus
  13. J. Pedraza, M. A. Patricio, A. de Asís, and J. M. Molina, “Privacy and legal requirements for developing biometric identification software in context-based applications,” International Journal of Bio-Science and Bio-Technology, vol. 2, no. 1, pp. 13–24, 2010. View at Scopus
  14. J. O'Donoghue, J. Herbert, R. Fensli, and S. Dineen, “Sensor validation within a pervasive medical environment,” in Proceedings of the 5th IEEE Conference on Sensors, pp. 972–975, October 2006. View at Publisher · View at Google Scholar · View at Scopus
  15. C. M. Chen, H. Agrawal, M. Cochinwala, and D. Rosenbluth, “Stream query processing for healthcare bio-sensor applications,” in Proceedings of the 20th International Conference on Data Engineering (ICDE '04), pp. 791–794, April 2004. View at Scopus
  16. C. Peter, E. Ebert, and H. Beikirch, “A wearable multi-sensor system for mobile acquisition of emotion-related physiological data,” in Proceedings of the 1st International Conference on Affective Computing and Intelligent Interaction (ACII '05), J. Tao, T. Tan, and R. W. Picard, Eds., vol. 3784 of Lecture Notes in Computer Science, pp. 691–698, Springer, 2005.
  17. C. Thomas and N. Balakrishnan, “Mathematical analysis of sensor fusion for intrusion detection systems,” in Proceedings of the 1st International Conference on Communication Systems and Networks and Workshops (COMSNETS '09), January 2009. View at Publisher · View at Google Scholar · View at Scopus
  18. W. Mann and S. Helal, “Smart phones for the elders: boosting the intelligence of smart homes,” in Proceedings of the AAAI Workshop Automation as Caregiver: The Role of Intelligent Technology in Elder Care, pp. 74–79, AAAI Press, 2002.
  19. C. Clavier, “Side channel analysis for reverse engineering (SCARE)—an improved attack against a secret A3/A8 GSM algorithm Cryptology ePrint Archive,” Report 2004/049, 2004.
  20. Giesecke and devrient gmbh, 2011, http://www.gi-de.com/.