scispace - formally typeset
Search or ask a question

Showing papers by "Muttukrishnan Rajarajan published in 2008"


Book ChapterDOI
08 Sep 2008
TL;DR: The requirements and the architecture for a secure mobile capsule, specially designed to protect the data that is already on the device, are analyzed.
Abstract: The rapid growth in mobile technology makes the delivery of healthcare data and services on mobile phones a reality However, the healthcare data is very sensitive and has to be protected against unauthorized access While most of the development work on security of mobile healthcare today focuses on the data encryption and secure authentication in remote servers, protection of data on the mobile device itself has gained very little attention This paper analyses the requirements and the architecture for a secure mobile capsule, specially designed to protect the data that is already on the device The capsule is a downloadable software agent with additional functionalities to enable secure external communication with healthcare service providers, network operators and other relevant communication parties

26 citations


Proceedings ArticleDOI
22 Jul 2008
TL;DR: The design principles for timestamp based authentication protocols in remote monitoring systems are presented and a specific protocol to implement such a system is proposed.
Abstract: Remote monitoring is fundamental in eHealth and introducing mobile devices in the remote monitoring process can provide additional benefits to both patients and medical personnel. For mobile remote monitoring systems to be successful, however, the authentication process must be in place to prevent the misuse of the system. In this paper we analyse the use of timestamps in the authentication process, showing many advantages timestamps have over other authentication methods. The paper presents the design principles for timestamp based authentication protocols in remote monitoring systems and proposes a specific protocol to implement such a system.

24 citations


Journal ArticleDOI
TL;DR: A system in which a Global System for Mobile (GSM) communication user can access and be authenticated to third party services with total anonymity as far as the Services Providers are concerned and where the GSM Network Operator provides a Single Sign-On service is proposed.
Abstract: This article proposes a system in which a Global System for Mobile (GSM) communication user can access and be authenticated to third party services with total anonymity as far as the Services Providers are concerned and where the GSM Network Operator provides a Single Sign-On service. Within the system, it is possible for a trusted authority to reveal the identity of the user if he or she is suspected of illegal activities. The system combines the GSM security features with the use of a digital signature to protect user privacy.

12 citations


Journal ArticleDOI
TL;DR: The proposed protocol protects the patient privacy with a secure anonymous authentication to healthcare services and medical record registries according to the European and the UK legislations, where the patient real identity is not disclosed with the distributed patient medical records.
Abstract: Objective: The objective of this study is to develop a solution to preserve security and privacy in a healthcare environment where health-sensitive information will be accessed by many parties and stored in various distributed databases. The solution should maintain anonymous medical records and it should be able to link anonymous medical information in distributed databases into a single patient medical record with the patient identity. Methods: In this paper we present a protocol that can be used to authenticate and authorize patients to healthcare services without providing the patient identification. Healthcare service can identify the patient using separate temporary identities in each identification session and medical records are linked to these temporary identities. Temporary identities can be used to enable record linkage and reverse track real patient identity in critical medical situations. Results: The proposed protocol provides main security and privacy services such as user anonymity, message privacy, message confidentiality, user authentication, user authorization and message replay attacks. The medical environment validates the patient at the healthcare service as a real and registered patient for the medical services. Using the proposed protocol, the patient anonymous medical records at different healthcare services can be linked into one single report and it is possible to securely reverse track anonymous patient into the real identity. Conclusion: The protocol protects the patient privacy with a secure anonymous authentication to healthcare services and medical record registries according to the European and the UK legislations, where the patient real identity is not disclosed with the distributed patient medical records.

8 citations


Proceedings ArticleDOI
22 Jul 2008
TL;DR: A protocol that will authenticate and authorize patients to healthcare services without providing the patientpsilas identification is presented, which protects patient psilas privacy with a secure anonymous authentication to Healthcare services, where the patient has access to a complete set of healthcare services.
Abstract: The Internet and mobile networks have penetrated the healthcare sector due to their increased functionality, low cost, high reliability and easy-to-use nature. However, in such healthcare environment the privacy and security of the transmitted information must be preserved. When dealing with health sensitive information at times it is vital to protect the patientpsilas identity and their health sensitive information from third parties. In this paper we present a protocol that will authenticate and authorize patients to healthcare services without providing the patientpsilas identification. The protocol protects patientpsilas privacy with a secure anonymous authentication to healthcare services, where the patient has access to a complete set of healthcare services.

5 citations


Journal ArticleDOI
TL;DR: In this article, a disposable capillary-based probe using optical fiber technology to create a compact and portable configuration has been designed for sensing lead ions, based around a glass capillary tube pretreated with a fluorophore with high sensitivity and selectivity towards lead ions.
Abstract: A disposable capillary-based probe using optical fiber technology to create a compact and portable configuration has been designed for sensing lead ions. It is based around a glass capillary tube pretreated with a fluorophore with high sensitivity and selectivity towards lead ions. The capillary tube makes use of capillary action to uptake the same sample volume for each single-shot measurement. The probe response to lead has been shown to be in the 20–150 $\mu {\hbox {M}}$ concentration range with a dynamic range of 20–80 $\mu {\hbox {M}}$ . A relative standard deviation of ${\sim {\hbox {6}}}\%$ was obtained from a series of results on different probes. This preliminary work is essentially a proof-of-principle for a probe design in which chemical indicators that cannot be immobilized onto a solid support can still be adapted for optical fiber sensing without any chemical modification. The disposable capillary probe provides a mechanical support and protection to the fluorophore without the use of membranes, thus avoiding problems with leaching. As far as the authors are aware, this is the first time that an optical fiber sensor using a fluorescent indicator for optical lead sensing in an organic solution has been produced.

2 citations


Proceedings ArticleDOI
01 Nov 2008
TL;DR: This paper presents a novel graph-theoretic methodology that uses Hamiltonian circuits to reduce the complexity of a high-order Markov model to a desired state budget and renders an accuracy that is comparable to the Markovmodel and better than existing reduced state models.
Abstract: Accurate simulation and analysis of wireless networks are inherently dependent on accurate models which are able to provide real-time channel characterization. High-order Markov chains are typically used to model errors and losses over wireless channels. However, complexity (i.e., the number of states) of a high-order Markov model increases exponentially with the memory-length of the underlying channel. In this paper, we present a novel graph-theoretic methodology that uses Hamiltonian circuits to reduce the complexity of a high-order Markov model to a desired state budget. Our trace-driven performance evaluations for real wireless local area network (WLAN) and wireless sensor network (WSN) channels demonstrate that the proposed Hamiltonian Model, while providing orders of magnitude reduction in complexity, renders an accuracy that is comparable to the Markov model and better than existing reduced state models.

2 citations


Proceedings ArticleDOI
13 Jul 2008
TL;DR: Finite element analysis based on the vector H-field formulation and incorporating the perturbation technique is used to optimize a surface plasmon resonance based fiber optic sensor for the detection of E coli as discussed by the authors.
Abstract: Finite element analysis based on the vector H-field formulation and incorporating the perturbation technique is used to optimize a surface plasmon resonance based fiber optic sensor for the detection of E coli.

01 Jan 2008
TL;DR: The proposed ep rotoco lp rotects the patient privacy with as ecure anonymous authentication to healthcare service sa nd medica lr ecord registrie sa ccording to the European an dt he UK legislations.
Abstract: Summary Objective: Th eo bjectiv eo ft hi ss tudy is to develo pa solution to preserv es ecurity an dp rivacy in ah ealthcare environment wher eh ealth-sensitive information will be accessed by man yp artie sa nd store di nv arious distribute dd atabases .T he solution shoul dm aintain anonymous medical records an di ts hould be able to lin ka nonymous medical information in distributed databases into as ingle patient medica lr ecord with the patient identity. Methods: In this paper we presen tap rotoco lt ha tc an be use dt oa uthenticate an da uthoriz ep atients to healthcare service sw ithout providin gt he patient identification. Healthcare service can identify the patient usin gs eparate temporary identities in each identification session an dm edica lr ecords are linke dt ot hese temporar yi dentities .T emporar yi dentities can be used to enable record linkage an dr everse track real patient identity in critica lm edica ls ituations. Results: The propose dp rotoco lp rovide sm ain security an dp rivacy service ss uch as use ra nonymity, message privacy ,m essage confidentiality, use ra uthentication, use ra uthorization an dm essage replay attacks. The medical environment validates the patient at the healthcare service as ar ea la nd registered patien tf or the medica ls ervices .U sing th ep ropose dp rotocol, the patien ta nonymous medical records at different healthcare services can be linked into on es ingle report an di t is possible to securely reverse trac ka nonymous patient into the real identity. Conclusion: Th ep rotoco lp rotects the patient privacy with as ecure anonymous authentication to healthcare service sa nd medica lr ecord registrie sa ccording to the European an dt he UK legislations, wher et he patient real identity is no td isclose dw it ht he distribute dp atient medica lr ecords.