Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2014, Article ID 350876, 9 pages
http://dx.doi.org/10.1155/2014/350876
Research Article

Secure eHealth-Care Service on Self-Organizing Software Platform

School of Electronics Engineering, Kyungpook National University, Daegu 702-701, Republic of Korea

Received 8 April 2014; Accepted 30 May 2014; Published 17 July 2014

Academic Editor: Jong-Hyuk Park

Copyright © 2014 Im Y. Jung et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. F. Dressler, “A study of self-organization mechanisms in ad hoc and sensor networks,” Computer Communications, vol. 31, no. 13, pp. 3018–3029, 2008. View at Publisher · View at Google Scholar · View at Scopus
  2. Center of Self-Organizing Software-Platform, http://www.csosp.org/.
  3. S. Oh, “Using an adaptive search tree to predict user location,” Journal of Information Processing Systems, vol. 8, no. 3, pp. 437–444, 2012. View at Publisher · View at Google Scholar · View at Scopus
  4. H.-Y. Kang, S.-Y. Jeong, C.-S. Ahn, Y.-J. Park, and S.-J. Kang, “Self-organizing middleware platform based on overlay network for real-time transmission of mobile patients vital signal stream,” The Journal of Korea Information and Communications Society, vol. 38, no. 7, pp. 630–642, 2013. View at Google Scholar
  5. J. Ahn and R. Han, “An indoor augmented-reality evacuation system for the smartphone using personalized pedometry,” Human-Centric Computing and Information Sciences, vol. 2, article 18, 2012. View at Google Scholar
  6. A. K. Jain, A. Ross, and S. Prabhakar, “An introduction to biometric recognition,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 14, no. 1, pp. 4–20, 2004. View at Publisher · View at Google Scholar · View at Scopus
  7. S. Sonkamble, R. Thool, and B. Sonkamble, “Survey of biometric recognition systems and their applications,” Journal of Theoretical and Applied Information Technology, vol. 11, no. 1, pp. 45–51, 2010. View at Google Scholar · View at Scopus
  8. A. Chaudhary, K. Vatwani, T. Agrawal, and J. L. Raheja, “A vision-based method to find fingertips in a closed hand,” Journal of Information Processing Systems, vol. 8, no. 3, pp. 399–408, 2012. View at Publisher · View at Google Scholar · View at Scopus
  9. D. Mishra, S. Mukhopadhyay, S. Kumari, M. K. Khan, and A. Chaturvedi, “Security enhancement of a biometric based authentication scheme for telecare medicine information systems with nonce,” Journal of Medical Systems, vol. 38, no. 5, article 41, 2014. View at Publisher · View at Google Scholar
  10. C.-L. Tsai, C-J. Chen, and D.-J. Zhuang, “Trusted M-banking verification scheme based on a combination of OTP and biometrics,” Journal of Convergence, vol. 3, no. 3, pp. 23–30, 2012. View at Google Scholar
  11. S. Marcel, C. Cool, C. Atanasoaei et al., “MOBIO: mobile biometric face and speaker authentication,” in Proceedings of the Conference on Computer Vision and Pattern Recognition (CVPR '10), 2010.
  12. J. Rokita, A. Krzyzak, and C. Y. Suen, “Cell phones personal authentication systems using multimodal biometrics,” in Proceedings of the International Conference on Image Analysis and Recognition (ICIAR '08), pp. 1013–1022, 2008.
  13. S. Basak, M. I. Islam, and M. R. Amin, “A new approach to fingerprint detection using a combination of minutiae points and invariant moments parameters,” Journal of Information Processing Systems, vol. 8, no. 3, pp. 421–436, 2012. View at Publisher · View at Google Scholar · View at Scopus
  14. A. P. Pons and P. Polak, “Understanding user perspectives on biometric technology,” Communications of the ACM, vol. 51, no. 9, pp. 115–118, 2008. View at Publisher · View at Google Scholar · View at Scopus
  15. A. Chandra and T. Calderon, “Challenges and constraints to the diffusion of biometrics in information systems,” Communications of the ACM, vol. 48, no. 12, pp. 101–106, 2005. View at Publisher · View at Google Scholar · View at Scopus
  16. A. Sprokkereef and P. de Hert, “Ethical practice in the use of biometric indentifiers within the EU,” Law, Science & Policy, vol. 3, no. 2, pp. 177–201, 2007. View at Google Scholar · View at Scopus
  17. L. A. Jones, A. I. Antón, and J. B. Earp, “Towards understanding user perceptions of authentication technologies,” in Proceedings of the 6th ACM Workshop on Privacy in the Electronic Society (WPES '07), pp. 91–98, October 2007. View at Publisher · View at Google Scholar · View at Scopus
  18. S. Khan and P. Gurkas, “Identification using biometric technology: issues and attitudes,” in Proceedings of the IADIS International Conference ICT, Society and Human Beings, 2010.
  19. K. Poulsen, “DEA Data Thief Sentenced to 27 Months, Security Focus,” 2002, http://online.securityfocus.com/news/1847.
  20. E. Ball, D. W. Chadwick, and D. Mundy, “Patient privacy in electronic prescription transfer,” IEEE Security & Privacy, vol. 1, no. 2, pp. 77–80, 2003. View at Publisher · View at Google Scholar · View at Scopus
  21. J. L. Fernández-Alemán, I. C. Señor, P. Á. O. Lozoya, and A. Toval, “Security and privacy in electronic health records: a systematic literature review,” Journal of Biomedical Informatics, vol. 46, no. 3, pp. 541–562, 2013. View at Publisher · View at Google Scholar · View at Scopus
  22. R. Savola and I. Uusitalo, “Towards node-level security management in self-organizing mobile ad hoc networks,” in Proceedings of the Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services (AICT/ICIW '06), 2006.
  23. N. Oualha, M. Önen, and Y. Roudier, “A security protocol for self-organizing data storage,” Research Report RR-08-208, Institut Eurecom, 2008. View at Google Scholar
  24. A. B. Can and B. Bhargava, “SORT: a self-organizing trust model for peer-to-peer systems,” IEEE Transactions on Dependable and Secure Computing, vol. 10, no. 1, pp. 14–27, 2013. View at Publisher · View at Google Scholar · View at Scopus
  25. J. Couturier, D. Sola, G. Scarso Borioli, and C. Raiciu, “How can the internet of things help to overcome current healthcare challenges,” Digiworld Economic Journal, vol. 87, pp. 67–81, 2012. View at Google Scholar
  26. D. K. Lee, T. H. Kim, S. Y. Jeong, and S. J. Kang, “A three-tier middleware architecture supporting bidirectional location tracking of numerous mobile nodes under legacy WSN environment,” Journal of Systems Architecture, vol. 57, no. 8, pp. 735–748, 2011. View at Publisher · View at Google Scholar · View at Scopus
  27. A. Shikfa, “Security issues in opportunistic networks,” in Proceedings of the 2nd International Workshop on Mobile Opportunistic Networking (MobiOpp '10), pp. 215–216, Pisa, Italy, February 2010. View at Publisher · View at Google Scholar · View at Scopus
  28. J. Kee-Yin Ng, “Ubiquitous healthcare: healthcare systems and applications enabled by mobile and wireless technologies,” Journal of Convergence, vol. 3, no. 2, 2012. View at Google Scholar
  29. M. Fouzia and J. Subrun, “Push pull services offering SMS based m-banking system in context of Bangladesh,” International Arab Journal of e-Technology, vol. 1, no. 3, 2010. View at Google Scholar
  30. D. Lagutin, K. Visala, A. Zahemszky, T. Burbridge, and G. F. Marias, “Roles and security in a publish/subscribe network architecture,” in Proceedings of the 15th IEEE Symposium on Computers and Communications (ISCC '10), pp. 68–74, June 2010. View at Publisher · View at Google Scholar · View at Scopus
  31. T. S. Messerges, J. Cukier, T. A. M. Kevenaar, L. Puhl, R. Struik, and E. Callaway, “A security design for a general purpose, self-organizing, multihop ad hoc wireless network,” in Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '03), pp. 1–11, October 2003. View at Scopus
  32. S. Y. Jeong, H. G. Jo, and S. J. Kang, “Remote service discovery and binding architecture for soft real-time QoS in indoor location-based service,” Journal of Systems Architecture, 2014. View at Publisher · View at Google Scholar
  33. S. Silas, K. Ezra, and E. B. Rajsingh, “A novel fault tolerant service selection framework for pervasive computing,” Human-Centric Computing and Information Sciences, vol. 2, p. 5, 2012. View at Publisher · View at Google Scholar
  34. X. Zhou, Y. Ge, X. Chen, Y. Jing, and W. Sun, “A distributed cache based reliable service execution and recovery approach in MANETs,” Journal of Convergence, vol. 3, no. 1, pp. 5–12, 2012. View at Google Scholar
  35. V. Viswanathan and I. Krishnamurthi, “Finding relevant semantic association paths through user-specific intermediate entities,” Human-Centric Computing and Information Sciences, vol. 2, article 9, 2012. View at Publisher · View at Google Scholar
  36. D. Werth, A. Emrich, and A. Chapko, “An ecosystem for user-generated mobile services,” Journal of Convergence, vol. 3, no. 4, pp. 10–15, 2012. View at Google Scholar
  37. A. Khreishah, I. M. Khalil, P. Ostovari, and J. Wu, “Flow-based XOR network coding for lossy wireless networks,” IEEE Transactions on Wireless Communications, vol. 11, no. 6, pp. 2321–2329, 2012. View at Publisher · View at Google Scholar · View at Scopus
  38. J. Catone, “Bad Form: 61% Use Same Password for Everything,” January 2008.
  39. APWG, “Phishing Activity Trends Report,” 2013.
  40. Precise BioMatch Mobile, http://www.precisebiometrics.com.