Abstract

Remote monitoring is fundamental in eHealth and introducing mobile devices in the remote monitoring process can provide additional benefits to both patients and medical personnel. For mobile remote monitoring systems to be successful, however, the authentication process must be in place to prevent the misuse of the system. In this paper we analyse the use of timestamps in the authentication process, showing many advantages timestamps have over other authentication methods. The paper presents the design principles for timestamp based authentication protocols in remote monitoring systems and proposes a specific protocol to implement such a system.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call