By Topic

Secure Management of Medical Data in Wireless Environments

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Dimitris Vassis ; Dept. of Inf., Technol. Educ. Inst. of Athens, Athens, Greece ; Petros Belsis ; Christos Skourlas

Wireless devices are responsible for a new era in computing. New networking paradigms such as mobile computing, ad-hoc networks pervasive infrastructures, all offer new possibilities to the user, from experimental technologies lately some of the aforementioned examples tend to become part of ordinary life applications. The medical sector benefits substantially from the use of mobile devices, since monitoring becomes more efficient and flexible for both the patient as well as for the practitioner. This means that data may be accessible from anywhere, enabling ubiquitous access to information. There are though certain requirements mainly associated with the strict security framework that rules the processing and transmission of medical data. The sensitive nature of medical information forces the implementation of medical wireless systems to be compliant with a number of security related requirements and also to be able to interact with other similar systems (interoperability) as well as to deal with bandwidth and hardware resource constraints that characterize the wireless topology. In this paper we present an architecture that attempts to deal with these issues, moreover, in order to prove the validity of our approach we have also evaluated the performance of our platform through simulation in different operating scenarios.

Published in:

Informatics (PCI), 2012 16th Panhellenic Conference on

Date of Conference:

5-7 Oct. 2012