Skip to main content
Erschienen in: Journal of Computer Virology and Hacking Techniques 1/2018

28.12.2017 | Original Paper

Constructing a secure hacking-resistant IoT U-healthcare environment

verfasst von: Yeon-jin Park, Kuen-ho Lee

Erschienen in: Journal of Computer Virology and Hacking Techniques | Ausgabe 1/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

There has been an increasing demand of work that required high level of computing power in IoT or establishment of server in IoT environment due to development of computing power. Excessive diagnosis has recently been a significant issue in the field of medicine. Excessive diagnosis issue is expected to be significantly reduced if establishing the easily configurable IoT server, communication with medical devices, and communication among hospitals by transmitting medical results to users. With the advancement of hacking technology, many hackers are interested in medical information and medical infrastructure, and the Information Security Management System (ISMS) is expanding in Korea. A number of medical ISMS projects are discussed, based on ISO 27791 standards derived from ISO 27001 standards. Large hospitals in South Korea have a variety of platforms that misrepresent personal information, and various platforms deal with sensitive medical information, but small and medium-sized hospitals use platforms that are not considered legal considerations.In this paper, we intend to establish a legal information sharing platform, which is legally considered legally limited and is responsible for the safety of the medical information.In the IoT server with limited resources, light-weighted and user-friendly protocols are frequently utilized over those that derive traffic and consume much resource. Under these circumstances, this study is intended to suggest IoT network that medical devices are able to create ubiquitous environment for users by utilizing simple service discovery protocol as a protocol provided without imposing much burden on limited resources and highly secured extensible messaging and presence protocol.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Schrenker, R.A.: Software enginnering forfuture healthcare and clinical systems. Computer 39, 26–32 (2006)CrossRef Schrenker, R.A.: Software enginnering forfuture healthcare and clinical systems. Computer 39, 26–32 (2006)CrossRef
2.
Zurück zum Zitat Choi, E.J., Hwang, H.J.: Multiple user and service management architecture for medical gateway. Korean Soc. Internet Inf. 19, 315–319 (2009) Choi, E.J., Hwang, H.J.: Multiple user and service management architecture for medical gateway. Korean Soc. Internet Inf. 19, 315–319 (2009)
3.
Zurück zum Zitat Choi, E.J., Song, S.Y., Park, S.S.: Design of N-screen broadcast server for medical information system. Korean Soc. Internet Inf. 12(1), 131–132 (2011) Choi, E.J., Song, S.Y., Park, S.S.: Design of N-screen broadcast server for medical information system. Korean Soc. Internet Inf. 12(1), 131–132 (2011)
4.
Zurück zum Zitat supreme court 2008.7.10., 2008Do 3975 supreme court 2008.7.10., 2008Do 3975
5.
Zurück zum Zitat Won, S.J.: Redemption of unjust enrichment and compensation of damages in tort due to excessive medical treatments and excessive outpatient prescription. Korea Adm. Law Theory Pract. Assoc. Adm. Law J. 29, 165 (2011) Won, S.J.: Redemption of unjust enrichment and compensation of damages in tort due to excessive medical treatments and excessive outpatient prescription. Korea Adm. Law Theory Pract. Assoc. Adm. Law J. 29, 165 (2011)
6.
Zurück zum Zitat Jeun, Y.-J.: The medical information protection and major Issues. J. Korea Soc. Comput. Inf. 17(12), 251–258 (2012)CrossRef Jeun, Y.-J.: The medical information protection and major Issues. J. Korea Soc. Comput. Inf. 17(12), 251–258 (2012)CrossRef
7.
Zurück zum Zitat Choi, S.-C., Kim, J., Yun, J., Ahn, I.-Y.: A tutorial for energy efficient communication for XMPP-based internet of things. SmartCR 6(3), 471–479 (2013) Choi, S.-C., Kim, J., Yun, J., Ahn, I.-Y.: A tutorial for energy efficient communication for XMPP-based internet of things. SmartCR 6(3), 471–479 (2013)
8.
Zurück zum Zitat Pyoun, D.-K., Hao, L., Jung, H.-K.: Android mobile phone information push system based on the XMPP protocol. Korea Inst Inf Commun Eng 17(3), 561–566 (2013)CrossRef Pyoun, D.-K., Hao, L., Jung, H.-K.: Android mobile phone information push system based on the XMPP protocol. Korea Inst Inf Commun Eng 17(3), 561–566 (2013)CrossRef
9.
Zurück zum Zitat Ung, L.G., Tae, A.G., Yun, H.U., Hong, K.J., Jun, L.M.: Information processing application: extending jabber messaging system for effective collaboration. KIPS Trans. Part D 10(7), 1161–1170 (2003) Ung, L.G., Tae, A.G., Yun, H.U., Hong, K.J., Jun, L.M.: Information processing application: extending jabber messaging system for effective collaboration. KIPS Trans. Part D 10(7), 1161–1170 (2003)
10.
Zurück zum Zitat Kim, T., Kim, S., Chung, M., Lee, M.: Design and implementation of XMPP based collaboration messenger system for mobile officeworking environment. Korean Soc. Internet Inf. 3(2), 641–646 (2006) Kim, T., Kim, S., Chung, M., Lee, M.: Design and implementation of XMPP based collaboration messenger system for mobile officeworking environment. Korean Soc. Internet Inf. 3(2), 641–646 (2006)
11.
Zurück zum Zitat Lee, H.-C., Lee, T.-H., Kim, S.-H., Lee, M.: A jabber messenger client for the coslide collaborative system. Korea Inf. Sci. Soc. 34(2), 360–365 (2007) Lee, H.-C., Lee, T.-H., Kim, S.-H., Lee, M.: A jabber messenger client for the coslide collaborative system. Korea Inf. Sci. Soc. 34(2), 360–365 (2007)
12.
Zurück zum Zitat Kim, D.Y., La, H.J., Kim, S.D.: A framework for effectively managing heterogeneity of IoT devices. Korea Inf. Sci. Soc. 41(5), 353–366 (2014) Kim, D.Y., La, H.J., Kim, S.D.: A framework for effectively managing heterogeneity of IoT devices. Korea Inf. Sci. Soc. 41(5), 353–366 (2014)
13.
Zurück zum Zitat Cheon, J.S.: Problem in the civil law and the protection of medical information. Korean Law Assoc. 28(11), 159–180 (2007) Cheon, J.S.: Problem in the civil law and the protection of medical information. Korean Law Assoc. 28(11), 159–180 (2007)
14.
15.
Zurück zum Zitat Choi, H., Park, H., Lee, H.: A study on amplification DRDoS attacks and defenses. Korea Inst. Electron. Commun. Sci. 8(5), 29–437 (2015) Choi, H., Park, H., Lee, H.: A study on amplification DRDoS attacks and defenses. Korea Inst. Electron. Commun. Sci. 8(5), 29–437 (2015)
Metadaten
Titel
Constructing a secure hacking-resistant IoT U-healthcare environment
verfasst von
Yeon-jin Park
Kuen-ho Lee
Publikationsdatum
28.12.2017
Verlag
Springer Paris
Erschienen in
Journal of Computer Virology and Hacking Techniques / Ausgabe 1/2018
Elektronische ISSN: 2263-8733
DOI
https://doi.org/10.1007/s11416-017-0313-7

Weitere Artikel der Ausgabe 1/2018

Journal of Computer Virology and Hacking Techniques 1/2018 Zur Ausgabe