System and methods for efficient authentication of medical wireless self-organizing network nodes

An ad hoc network, wireless network technology, applied in transmission systems, wireless communication, digital transmission systems, etc., can solve the problems of symmetric key cryptography limited to scalability and security management, complex key management, etc., to optimize usability and sturdy effect

Active Publication Date: 2007-06-06
KONINKLIJKE PHILIPS ELECTRONICS NV
View PDF0 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, symmetric-key cryptography is limited to scalability and secure management
Key management is very complex, for example when updating the key in one of the nodes or adding a new node, the rest of the nodes must also be updated to share the key with the new node

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and methods for efficient authentication of medical wireless self-organizing network nodes
  • System and methods for efficient authentication of medical wireless self-organizing network nodes
  • System and methods for efficient authentication of medical wireless self-organizing network nodes

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] Referring to FIG. 1, each short-range ad hoc wireless network 10 includes mobile nodes (A, B, . . . , Z) owned by a single management entity, such as a hospital, business, factory, etc. Typically, each ad hoc network 10 comprises ten to twenty ad hoc nodes (A, B, . . . , Z) supported by a free network infrastructure connected by wireless one-hop links. Preferably, the mobile nodes (A, B, . . . , Z) comprise physiological monitoring devices, controlled medication management devices, PDA-like devices, embedded computing systems, or similar devices with moderate computing capabilities. Preferably, many independent short-range ad hoc networks 10 are randomly dispersed in a very limited area of ​​use. The wireless coverage area of ​​each ad hoc network 10 is up to 40 meters, such an extension often exceeds the application area. For example, a network may include nodes for individual physiological monitors, medication management devices, computer-based patient IDs, attending...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A medical ad hoc wireless network (10) is deployed in a healthcare facility around an individual patient, comprising wireless nodes (A, B, . . . , Z). Prior to deployment, each node (A, B, . . . , Z) is pre-initialized with public key certificates (22) and provides trust and symmetric key distribution services (32). Nodes (B) joining the ad hoc network (10) authenticate and register a random self-selected node (A) by using the authenticated public key (20). Such a node (A) becomes the trust portal (TPA) of the node (B). Node (B) dynamically registers a new self-selected TP node when its old TP node leaves the ad hoc network (10). The network (10) supports symmetric key authentication between nodes registered to the same TP node. Furthermore, it supports symmetric key authentication between nodes registered to different TP nodes.

Description

technical field [0001] The present invention relates to security in network systems and methods. It finds particular application in conjunction with medical ad hoc networking systems and will be described with specific references thereto. However, it should be understood that the invention also finds application in connection with other short range network systems and the like. Background technique [0002] Typically, ad hoc networks are deployed in hospitals and medical facilities for medical patient care and monitoring. Typically, medical mobile ad hoc networks are built around a single patient or a small group of patients. In the medical mobile ad hoc network, medical equipment peer-to-peer communication. Each device provides a set of medical services and requires access to a set of medical services on other devices. Clinicians may also have access to such devices, eg, by using a PDA to initiate an injection drive to administer morphine to a patient. [0003] It is n...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/56H04L12/28
CPCH04W84/18H04L2209/80H04L9/083H04L67/12H04L63/0435H04L63/0869H04L2209/88H04W12/06H04L63/0823H04W12/00H04L9/3263H04L63/062H04W12/04H04L63/104H04L9/0822H04W12/041H04W12/0431H04W12/069
Inventor H·巴尔杜斯D·桑切斯桑切斯
Owner KONINKLIJKE PHILIPS ELECTRONICS NV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products