Development of a portable authentication module for security enhancement in tele-health applications

With the modern lifestyle becoming more and more complex and competitive in many aspects, people started to concern more about the privacy. And the confidentiality of medical data is one of the top concerns due to their sensitive nature. However, with challenges coming from high demand for both usab...

Full description

Saved in:
Bibliographic Details
Main Author: Zin, Ye Htike
Other Authors: School of Computer Engineering
Format: Final Year Project
Language:English
Published: 2014
Subjects:
Online Access:http://hdl.handle.net/10356/58946
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
Description
Summary:With the modern lifestyle becoming more and more complex and competitive in many aspects, people started to concern more about the privacy. And the confidentiality of medical data is one of the top concerns due to their sensitive nature. However, with challenges coming from high demand for both usability and practicality, the privacy and confidentiality of medical data still remain as a formidable challenge. The objective of this project was to develop encryption modules for improving the security of the tele-health applications. This project focused on the development of encryption modules for MICAz-based and Android-Arduino-based sensor networks. For MICAz-based sensor networks, a hardware-based encryption module was developed and integrated into existing program for security improvement. For Android-Arduino-based sensor networks, a demo sensor network was developed together with a crypto library for Arduino and crypto class for the Android. The performances of the implemented security solutions were tested based on the time required for the process and the memory footprint. This report covers about the process of designing, developing and implementing the encryption modules as well as the various wireless security issues and hardware limitations which were taken into consideration. Further works can be done on data integrity verification and secure key distribution using public key cryptography to provide better security in tele-health applications.