Abstract | ||
---|---|---|
Remote monitoring is fundamental in eHealth and introducing mobile devices in the remote monitoring process can provide additional benefits to both patients and medical personnel. For mobile remote monitoring systems to be successful, however, the authentication process must be in place to prevent the misuse of the system. In this paper we analyse the use of timestamps in the authentication process, showing many advantages timestamps have over other authentication methods. The paper presents the design principles for timestamp based authentication protocols in remote monitoring systems and proposes a specific protocol to implement such a system. |
Year | DOI | Venue |
---|---|---|
2008 | 10.1109/PCTHEALTH.2008.4571031 | 2008 2ND INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING TECHNOLOGIES FOR HEALTHCARE |
Keywords | Field | DocType |
patient monitoring,mobile devices,protocols,ehealth,mobile computing,message authentication | Lightweight Extensible Authentication Protocol,Mobile computing,Authentication,Message authentication code,Remote patient monitoring,Computer security,Computer science,Computer network,Mobile device,Authentication protocol,Timestamp | Conference |
Citations | PageRank | References |
8 | 0.58 | 3 |
Authors | ||
5 |
Name | Order | Citations | PageRank |
---|---|---|---|
Kalid Elmufti | 1 | 30 | 3.78 |
Dasun Weerasinghe | 2 | 70 | 12.48 |
M Rajarajan | 3 | 14 | 1.81 |
Veselin Rakocevic | 4 | 199 | 28.20 |
Sanowar Khan | 5 | 14 | 1.81 |