Research Article
Timestamp Authentication Protocol for Remote Monitoring in eHealth
@INPROCEEDINGS{10.4108/ICST.PERVASIVEHEALTH2008.2542, author={Kalid Elmufti and Dasun Weerasinghe and M Rajarajan and Veselin Rakocevic and Sanowar Khan}, title={Timestamp Authentication Protocol for Remote Monitoring in eHealth}, proceedings={1st International ICST Workshop on Connectivity, Mobility and Patients' Comfort}, publisher={IEEE}, proceedings_a={CMPC}, year={2010}, month={5}, keywords={Authentication Biomedical engineering Data security Medical services Mobile handsets Network servers Personnel Protection Protocols Remote monitoring}, doi={10.4108/ICST.PERVASIVEHEALTH2008.2542} }
- Kalid Elmufti
Dasun Weerasinghe
M Rajarajan
Veselin Rakocevic
Sanowar Khan
Year: 2010
Timestamp Authentication Protocol for Remote Monitoring in eHealth
CMPC
IEEE
DOI: 10.4108/ICST.PERVASIVEHEALTH2008.2542
Abstract
Remote monitoring is fundamental in eHealth and introducing mobile devices in the remote monitoring process can provide additional benefits to both patients and medical personnel. For mobile remote monitoring systems to be successful, however, the authentication process must be in place to prevent the misuse of the system. In this paper we analyse the use of timestamps in the authentication process, showing many advantages timestamps have over other authentication methods. The paper presents the design principles for timestamp based authentication protocols in remote monitoring systems and proposes a specific protocol to implement such a system.
Copyright © 2008–2024 ICST