End-to-end Encryption for SMS Messages in the Health Care Domain

被引:0
|
作者
Hassinen, Marko [1 ]
Laitinen, Pertti [1 ]
机构
[1] Univ Kuopio, Dept Comp Sci, FIN-70211 Kuopio, Finland
关键词
SMS messages; communication; privacy; confidentiality; mobile phone; information systems;
D O I
暂无
中图分类号
R19 [保健组织与事业(卫生事业管理)];
学科分类号
摘要
The health care domain has a high level of expectation on security and privacy of patient information. The security, privacy, and confidentiality, issues are consistent all over the domain. Technical development and increasing use of mobile phones has led us to a situation in which SMS messages are used in the electronic interactions between health care professionals and patients. We will show that it is possible to send, receive and store text messages securely with a mobile phone with no additional hardware required. More importantly we will show that it is possible to obtain a reliable user authentication in systems using text message communication. Programming language Java is used for realization of our goals. This paper describes the general application structure, while details for the technical implementation and encryption methods are described in the referenced articles. We also propose some crucial areas where the implementation of encrypted SMS can solve previous lack of security.
引用
收藏
页码:316 / 321
页数:6
相关论文
共 50 条
  • [1] SafeSMS - End-to-end encryption for SMS messages
    Hassinen, M
    ConTEL 2005: Proceedings of the 8th International Conference on Telecommunications, Vols 1 and 2, 2005, : 359 - 365
  • [2] An Encryption Protocol for End-to-end Secure Transmission of SMS
    Thomas, Minta
    Panchami, V
    2015 INTERNATIONAL CONFERENCED ON CIRCUITS, POWER AND COMPUTING TECHNOLOGIES (ICCPCT-2015), 2015,
  • [3] Evaluating In-Workflow Messages for Improving Mental Models of End-to-End Encryption
    Akgul, Omer
    Bai, Wei
    Das, Shruti
    Mazurek, Michelle L.
    PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, 2021, : 447 - 464
  • [4] SMSSec: An end-to-end protocol for secure SMS
    Lo, Johnny Li-Chang
    Bishop, Judith
    Eloff, J. H. P.
    COMPUTERS & SECURITY, 2008, 27 (5-6) : 154 - 167
  • [5] Research on end-to-end encryption of TETRA
    Beijing FORICH Software Technology Co. Ltd., Network Security Division, Beijing 100083, China
    不详
    J. China Univ. Post Telecom., 2006, 2 (70-73):
  • [6] Research on End-to-End Encryption of TETRA
    ZHANG Zhi-hui 1
    2.Information Security Center
    The Journal of China Universities of Posts and Telecommunications, 2006, (02) : 70 - 73
  • [7] SDNS ARCHITECTURE AND END-TO-END ENCRYPTION
    NELSON, R
    HEIMANN, J
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 435 : 356 - 366
  • [8] A European right to end-to-end encryption?
    Shurson, Jessica
    COMPUTER LAW & SECURITY REVIEW, 2024, 55
  • [9] Anonymous Traceback for End-to-End Encryption
    Kenney, Erin
    Tang, Qiang
    Wu, Chase
    COMPUTER SECURITY - ESORICS 2022, PT II, 2022, 13555 : 42 - 62
  • [10] End-to-end solution for mail or electronic messages
    Field, M
    Uemoto, K
    INTERNATIONAL CONFERENCE ON MAIL TECHNOLOGY - TOMORROW'S WORLD: BUSINESS OPPORTUNITIES AND SOLUTIONS IN A GLOBAL MARKET, 1999, 1999 (05): : 3 - 10