2018
DOI: 10.3233/thc-171140
|View full text |Cite
|
Sign up to set email alerts
|

Securing electronic medical record in Near Field Communication using Advanced Encryption Standard (AES)

Abstract: Doctors usually require patients' medical records before medical examinations. Nevertheless, obtaining such records may take time. Hence, Near Field Communication (NFC) could be used to store and send medical records between doctors and patients. Another issue is that there could be a threat such as, Man In The Middle Attack and eavesdropping, thus, a security method is required to secure the data. Furthermore, the information regarding the key and initialisation vector in NFC cannot be sent using one data pac… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2019
2019
2025
2025

Publication Types

Select...
7
1

Relationship

2
6

Authors

Journals

citations
Cited by 17 publications
(9 citation statements)
references
References 15 publications
0
9
0
Order By: Relevance
“…Medical images also have very specific security requirements that must be considered when transmitted [93,152]. A variety of approaches have been examined for supporting secure exchange of medical record data across systems, including cryptographic approaches [153], use of secure keys [154,155], multi-factorial authentication [156], and use of blockchain techniques [62,68,[157][158][159][160].…”
Section: Computer Security and Confidentialitymentioning
confidence: 99%
See 1 more Smart Citation
“…Medical images also have very specific security requirements that must be considered when transmitted [93,152]. A variety of approaches have been examined for supporting secure exchange of medical record data across systems, including cryptographic approaches [153], use of secure keys [154,155], multi-factorial authentication [156], and use of blockchain techniques [62,68,[157][158][159][160].…”
Section: Computer Security and Confidentialitymentioning
confidence: 99%
“…HIEs can leverage a range of technical approaches to ensure confidentiality. These approaches can include the use of authentication keys [154,155], cryptography, and privacy preserving algorithms [137,153]. Contemporary techniques, such as blockchain, also show promise in supporting confidentiality without impacting usability of PHI across HIE [157,159].…”
Section: Computer Security and Confidentialitymentioning
confidence: 99%
“…As an example, antibiotic susceptibility testing may be performed with various technical methods providing different sensitivities, error margins, and interpretation guidelines of breakpoints e the ontology term allows the specific description of the method in a machine- Besides the clear requirements for structure and interoperability of data, also data security and protection, and the versioning of datasets are important. Sensitive healthcare data should only be transferred if anonymized or encoded and simultaneously encrypted [80,81]. For this, specific data security standards and scripts are necessary [82e84].…”
Section: A First Step: Data Structure and Interoperabilitymentioning
confidence: 99%
“…The development of NFC-based medical record that will be conducted covers all media recording activities as well as qualified in the implementation of such activities. The preferred approach in solving this problem is a system approach with high levels of security [21], accuracy, and reliability. Through this approach can be realized eligible system in the implementation of medical records.…”
Section: Near Field Communicationmentioning
confidence: 99%