Seminar Topics & Project Ideas On Computer Science Electronics Electrical Mechanical Engineering Civil MBA Medicine Nursing Science Physics Mathematics Chemistry ppt pdf doc presentation downloads and Abstract

Full Version: System Initialization
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
[attachment=73134]



System Initialization
 In the first step randomly select two large safe prime numbers p and q then compute the public modulus n which is a product of two prime’s p and q.
 In the second step choose a pair of integers e and d which satisfying the properties i.e. product of e and d modulus Euler’s totient function strictly equal to one. Euler’s totient function is (p-1)(q-1).
 Here public key is the combination of public modulus n and e, the private key is d value.
 For every Patient Area Network the secret key is set which is calculated using public one way hash function h() such as SHA-1.
User registration and proxy key generation
 The user who wants to access the patient health information in the medical server should register their details.
 After registration the unique proxy key is generated for the user by the medical server.
 The proxy key named v which is calculated using warrant, public modulus n and integer d.
 At last the proxy key is verified using the product of v to the power e and warrant modulo n which is strictly equal to 1.Finally the proxy key returns to the user.
Transmission of Patient Health Information to Network Server
 The patient health information like body temperature, blood pressure, blood glucose level, heart beat rate are collected by sensors.
 Due to low power each time the sensor nodes transmits the patient health data to the network server.
 When the medical data sent from sensor to controller the unique hash key is generated with the patient health information.
 The hash key is generated using SHA-1 public one way hash function.
 For each and every transmission the hash key gets updated.
 When the medical server receives the patient health data, it stores the patient medical data with the original hash key.
Controller Authentication

 In this module, during each and every transmission of patient health information from biosensors security techniques are provided .
 When data transfer from biosensor it reach the controller.
 It request the controller in order to send the data to the medical server.
 If the controller accepts the request then the data sent to the medical server.
 The same process is repeated when the user want to access the data in the medical server.
Retrieval of Patient Health Information from Network Server
 The user retrieves the medical data of the patient from the medical server.
 During registration, the user received the proxy key from the medical server. Using the proxy key he/she can able to login into the system.
 The user is authenticated u
 Comparison takes place between the proxy key which is stored in the network server during registration and current proxy key. If it equals the required Patient medical data is displayed by the network server.