University of Oulu

Network security for augmented reality application in health care sector

Saved in:
Author: Puvaneswaran, Amirthan1
Organizations: 1University of Oulu, Faculty of Information Technology and Electrical Engineering, Communications Engineering
Format: ebook
Version: published version
Access: open
Online Access: PDF Full Text (PDF, 4.2 MB)
Pages: 61
Persistent link: http://urn.fi/URN:NBN:fi:oulu-201908152766
Language: English
Published: Oulu : A. Puvaneswaran, 2019
Publish Date: 2019-08-20
Thesis type: Master's thesis
Tutor: Liyanage, Lakmal
Namal, Suneth
Reviewer: Liyanage, Lakmal
Description:

Abstract

The recent advances in mobile devices and wireless communication sector transformed Mobile Augmented Reality (MAR) from science fiction to a reality. Incorporating this MAR technology in health care sector elevates the quality of diagnosis and treatment for the patients. However, due to the highly sensitive nature of the data being circulated in this process, it is also highly vulnerable to the security threats. In the thesis, an architecture is proposed for a MAR health care application based on Multi-access Edge Computing (MEC). This includes key features such as displaying augmented view of patient information on the mobile device, augmenting the X-ray or scan image on top of the patient’s actual body parts to assist the doctor, and enabling the doctor to interact with an expert and get real time consultancy. Based on the proposed architecture, all the possible network security threats are analyzed. Furthermore, a secure key management scheme is proposed for registration and authentication phases to establish a secure end-to-end communication between the participating entities in the system. The security features of the proposed scheme are formally verified by using Automated Validation of Internet Security Protocols and Applications (AIVSPA) tool, Moreover, an informal verification is provided to discuss the protection against other possible attacks. It has justified that the proposed scheme is able to provide the required level of security for the system.

see all

Subjects:
Copyright information: © Amirthan Puvaneswaran, 2019. This publication is copyrighted. You may download, display and print it for your own personal use. Commercial use is prohibited.