Security Algorithm for Wireless Patient Monitoring System  
  Authors : Priya S. Wagh; Anagha P. Khedkar

 

Hacking of Wireless network leading to insecure data is the main issue that needs to be attended. To achieve the goal of data security, there is need of the Security algorithm especially for medical applications using wireless communication. The proposed system includes Rivest Cipher 4 (RC4) security algorithms to ensure data security. Personal biomedical information can be relatively easy to be accessed due to the nature of wireless or internet based communication. Therefore there is a possibility of being abused and the personal information may be put to a bad use. Hence, it will be necessary to apply security technology through which only the server and end point user can read data correctly in the healthcare system. On the basis of a reliable scheme, the proposed work is to design and implement this novel system using ZigBee device for patient monitoring, which integrates temperature, pulse rate monitoring. The result of security algorithm implementation assures the secure network for master and slave communication.

 

Published In : IJCAT Journal Volume 1, Issue 5

Date of Publication : 30 June 2014

Pages : 162 - 169

Figures : 05

Tables : --

Publication Link : Security Algorithm for Wireless Patient Monitoring System

 

 

 

Priya S. Wagh : Department of Electronics &Telecommunications Engineering, Pune University, Nasik, Maharashtra, India

Anagha P. Khedkar : Department of Information Technology , Pune University, Nasik, Maharashtra, India

 

 

 

 

 

 

 

Rivest Cipher 4

Zigbee

It has been observed from the result that the security algorithms that were necessary to secure data transmission in a patient monitoring system. The security algorithms that work properly in an embedded system with limited computation capabilities and small memory unit. Implementation of security algorithm which secures the biomedical information for military medical services application also.

 

 

 

 

 

 

 

 

 

[1] K. Jeong, E-Y Jung, and D. K. Park, “Trend of wireless u-Health,” in 9th symposium on Communications and Information Technology 2009 (ISCIT 2009), Incheon, Korea, 2009, pp. 829–833.

[2] H. S. Ng, M. L. Sim, and C. M. Tan, “Security issues of wireless sensor networks in healthcare applications,” BT Technology Journal, vol. 24, no. 2, pp. 138–144, April 2006.Varshney and Sweta Sneha, “Wireless Patient Monitoring: Reliability and Power Management,” 2005 IEEE.

[3] P. Prasithsangaree, and P. Krishnamurthy, “Analysis of Energy Consumption of RC4 and AES Algorithms in Wireless LANs,” in IEEE Global Telecommunications Conf. (GLOBECOM ‘03), pp. 1445–1449.

[4] Knudsen, L., et al. "Analysis Method for Alleged RC4." Proceedings, ASIACRYPT '98, 1998.