(3.238.173.209) 您好!臺灣時間:2021/05/16 05:08
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

: 
twitterline
研究生:方翠鶯
研究生(外文):Fang, Tsui-Ying
論文名稱:可支援隨意網路醫療照護之安全認證機制
論文名稱(外文):Secure Authentication for Supporting Healthcare in Wireless Sensor Network
指導教授:陳澤雄 博士黃正炎 博士
口試委員:鄭富國 博士鐘玉芳 博士陳志賢 博士游原龍 博士
口試日期:2011-06-23
學位類別:碩士
校院名稱:東海大學
系所名稱:資訊管理學系
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2011
畢業學年度:99
語文別:中文
論文頁數:66
中文關鍵詞:無線感測網路感測節點使用者身份認證智慧卡行碼認證時綁
外文關鍵詞:Wireless Sensor NetworksSensor NodeUser AuthenticationSmart CardPasswordTime-Bounded
相關次數:
  • 被引用被引用:2
  • 點閱點閱:306
  • 評分評分:
  • 下載下載:37
  • 收藏至我的研究室書目清單書目收藏:2
近年來,由於人們的平均壽命延長並且生育率下降,導致我國逐漸步入高齡化社會。然而針對此現象,對於老年人與慢性病患者提供一個理想的醫療照護,是一個相當重要的議題。因此,在本論文中,提出一個結合無線感測網路與醫療環境,透過無線感測節點監控病患與擷取其生理資訊,並且傳送至醫護人員的行動裝置與管理者系統之中,可以加快醫護人員了解目前病人的狀況,用以提升醫療服務品質。而由於個人資料保護法的規定,為了確保病患的生理資訊只能提供給合法的醫療人員使用,所提方法將針對醫護人員的身份進行認證,以保護病患的隱私權。並利用智慧卡和通行碼的雙重認證方法,確保只有合法的醫護人員才可以擷取病患的體溫、心跳與血壓等資訊。另外,透過時綁的特性,讓醫護人員只能在限定的時間內,不須再經過重覆登錄與認證過程,即可擷取多次的生理訊號,進而提高使用者與系統管理者的執行效率。
In recent years, the average life expectancy of people is extended and total fertility rate is dropped, bring our country into an aged society. Due to this phenomenon, how to provide the aged people and the patients with chronic diseases a suitable environment of health care has become a critical issue currently. Therefore, we propose a new scheme that applies health care within wireless sensor networks in which sensor nodes can measure the vital signs of the aged people and the patients. The vital signs for blood pressure, pulsation, and body temperature measured by sensor nodes would be transmitted to mobile devices of medical staff and system administrator. Sensor node readings enable the medical staff to understand the conditions of the patients in real time which improves the quality of health care for the patients. According to the personal data protection act, the vital signs of the patients can only be accessed by the authorized medical staff. In order to protect the privacy of patients, the administrator will verify the identity of medical staff through the mobile device with smart card and password. Accordingly, only the verified medical staff can obtain the vital signs such as blood pressure, pulsation, and body temperature of the patients. Besides, the scheme includes a characteristic of time-bounded, and then the medical staffs can obtain the vital signs without re-authenticating and re-login into the system in a period of time. Consequently, the time-bounded property increases the work efficiency of the system administrator and user.
壹、 緒論 1
第一節 研究背景 1
第二節 研究目的 5
第三節 研究架構 7
貳、 無線感測網路 8
第一節 感測節點 11
第二節 無線網路通訊協定 13
第三節 感測節點應用 20
參、 相關研究 26
第一節 加密系統 26
第二節 使用者身份認證 30
第三節 使用者身份認證的相關文獻探討 32
第四節 智慧卡 40
肆、 研究方法 42
第一節 系統環境架構 42
第二節 使用者身份認證研究 45
伍、 研究分析 51
第一節 安全性分析 51
第二節 效能分析 55
第三節 電力分析 57
陸、 結論 62
參考文獻 63

1.網路引用
[1]中華民國內政部,http://www.moi.gov.tw/。
[2]內政部統計處,http://www.moi.gov.tw/stat/。
[3]中華民國統計資訊網,http://www.stat.gov.tw/mp.asp?mp=4。
[4]世界衛生組織:失智症成全球隱患,http://fh6338.pixnet.net/blog/post/33668792。
[5]法務部(2010),「個人資料保護法」,http://law.moj.gov.tw/LawClass/LawAll.aspx?PCode=I0050021。
[6]智慧化居住空間, http://web.iii.org.tw/news.itis/77/77_21.html.
[7]World Health Organization, http://www.who.int/en/.
[8]Smart Dust, http://robotics.eecs.berkeley.edu/~pister/SmartDust/.
[9]Fire Project, ”Fire Information and Rescue Equipment,” http://fire.me.berkeley.edu/,.
[10]Digital Sun, http://www.digitalsun.com/.
[11]Senera, http://www.senera.com/.
[12]CodeBlue:Wireless Sensor Networks for Medical Care, Division of Engineering and Applied Sciences, Harvard University, http://fiji.eecs.harvard.edu/CodeBlue.
2.中文期刊論文
[13]樓玉梅、趙偉慈、范瑟珍(2000),「影響人口結構變動因素之分析」,行政院經濟建設委員會人力規劃處研究報告,編號:(99)029.802。
[14]湯朝強(2009),無線遠距居家健康照護系統開發,碩士論文,南開科技大學福祉科技與服務管理系,南投。
[15]柯明發(2004),藍芽系統的干擾性能分析:具有適應性藍芽封包選擇,碩士論文,義守大學電子工程學系,高雄。
[16]黃煜展(2009),情境感知氣喘居家看護系統之研製,碩士論文,國立台北護理學院資訊管理研究所,台北。
[17]吳俊忠(2008),無線感測網路室內區域定位及監測系統之實作,碩士論文,逢甲大學通訊所,台中。
[18]黃明祥、林詠章(2009),資訊與網路安全概論,高立圖書出版有限公司。
[19]潘天佑(2011),資訊安全概論與實務,碁峯出版有限公司。
[20]林祝興、張明信(2009),資訊安全導論,旗標出版股份有限公司。
[21]吳信翰(2007),行動網路下之使用者認證機制研究,碩士論文,世新大學資訊管理學系,台北。
3.英文期刊論文
[22]Partnership for Solutions, Chronic Conditions: Making the Case for Ongoing Care, Johns Hopkins University, 2004.
[23]I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cyirci, “A Survey on Sensor Networks,” IEEE Communications Magazine, Vol. 40, No. 8, pp. 102 -114, 2002.
[24]M. B. Jansen and W. Eradus, “Future Developments on Devices for Animal Radio Frequency Identification,” Computer and Electronics in Agriculture, Vol. 24, No. 1-2, pp. 109-117, 1999.
[25]G. J. Simmons, Contemporary Cryptology: The Science of Information Integrity, IEEE, 1992.
[26]C. C. Chang and T. C. Wu, “Remote Password Authentication with Smart Cards,” IEEE Computers and Digital Techniques, Vol. 138, No. 3, pp. 165-168, 1991.
[27]T. Falas and H. Kashani, “Two-Dimensional Bar-Code Decoding with Camera-Equipped Mobile Phones,” Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, pp. 597-600, 2007.
[28]M. S. Hwang, “A Remote Login Authentication Scheme Based on the Digital Signature Method,” International Journal of Computer Mathematics, Vol. 70, No. 4, pp. 657-666, 1999.
[29]M. S. Hwang, “Cryptanalysis of a Remote Login Authentication Scheme,” Computer Communications, Vol. 22, No. 8, pp. 742-744, 1999.
[30]T. L. Hwang, Y. W. Chen, and C. S. Laih, “Non-interactive Password Authentications without Password Tables,” IEEE Region 10 Conference on Computer and Communication System, pp. 429-431, 1990.
[31]M. S. Hwang and L. H. Li, “A New Remote User Authentication Scheme Using Smart Cards,” IEEE Transactions on Consumer Electronics, Vol. 46, No. 1, pp. 28-30, 2000.
[32]K. H. M. Wong, Y. Zheng, J. Cao, and S. Wang, “A Dynamic User Authentication Scheme for Wireless Sensor Networks,” IEEE International Conference on Sensor Network Ubiquitous, and Trustworthy Computing, Vol. 1, pp. 318-327, 2006.
[33]H. R. Tseng, R. H. Jan, and W. Yang, “An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks,” IEEE on Global Telecommunications Conference, pp. 986-990, 2007.
[34]M. L. Das, “Two-Factor User Authentication in Wireless Sensor Networks,” IEEE Transactions on Wireless Communications, Vol. 8, No. 3, pp. 1086-1090, 2009.
[35]M. K. Khan, and K. Alghathbar, “Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’,” Sensors, Vol. 10, No. 3, pp. 2450-2459, 2010.
[36]B. Vaidya, D. Makrakis, and H. T. Mouftah, “Improved Two-Factor User Authentication in Wireless Sensor Networks,” IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications, pp. 600-606, 2010.
[37]R. Watro, D. Kong, S. Cuti, C. Gardiner, C. Lynn, and P. Kruus, “TinyPK: Securing Sensor Networks with Public Key Technology,” Proceding of the 2nd ACM Workshop Security of Ad Hoc Sensor Networks, pp. 59-64, 2004
[38]F. N. Wu, I. H. Li, and I. E. Liao, “A Traffic Load-Aware Energy Efficient Protocol for Wireless Sensor Networks,” Proceeding of the International Conference on Mobile Technology, Applications, and System, 2008.

QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top