RSS-Feed abonnieren
DOI: 10.3414/ME10-01-0002
Wireless LAN Security Management with Location Detection Capability in Hospitals
Publikationsverlauf
received:12. Januar 2011
accepted:15. Februar 2011
Publikationsdatum:
20. Januar 2018 (online)
Summary
Objectives: In medical institutions, unauthorized access points and terminals obstruct the stable operation of a large-scale wireless local area network (LAN) system. By establishing a real-time monitoring method to detect such unauthorized wireless devices, we can improve the efficiency of security management.
Methods: We detected unauthorized wireless devices by using a centralized wireless LAN system and a location detection system at 370 access points at the University of Tokyo Hospital. By storing the detected radio signal strength and location information in a database, we evaluated the risk level from the detection history. We also evaluated the location detection performance in our hospital ward using Wi-Fi tags.
Results: The presence of electric waves outside the hospital and those emitted from portable game machines with wireless communication capability was confirmed from the detection result. The location detection performance showed an error margin of approximately 4 m in detection accuracy and approximately 5% in false detection. Therefore, it was effective to consider the radio signal strength as both an index of likelihood at the detection location and an index for the level of risk.
Conclusions: We determined the location of wireless devices with high accuracy by filtering the detection results on the basis of radio signal strength and detection history. Results of this study showed that it would be effective to use the developed location database containing radio signal strength and detection history for security management of wireless LAN systems and more general-purpose location detection applications.
-
References
- 1 Chen Y, Chiu H, Tsai M, Chang H, Chong C. Development of a personal digital assistant-based wireless application in clinical practice. Computer Methods Programs Biomed 2007; 85 (02) 181-184.
- 2 Hauser ES, Demner-Fushman D, Jacobs LJ, Humphrey MS, Ford G, Thoma RG. Using wireless handheld computers to seek information at the point of care: an evaluation by clinicians. J Am Med Inform Assoc 2007; 14 (06) 807-815.
- 3 Triantafyllidis A, Koutkias V, Chouvarda I, Maglaveras N. An open and reconfigurable wireless sensor network for pervasive health monitoring. Methods Inf Med 2008; 47 (03) 229-334.
- 4 Struzik ZR, Yoshiuchi K, Sone M, Ishikawa T, Kikuchi H, Kumano H. et al. “Mobile Nurse” Platform for Ubiquitous Medicine. Methods Inf Med 2007; 46 (02) 130-134.
- 5 Ministry of Health, Labor and Welfare (Japan) Guidelines for the Security Management of Health Information Systems. Available at http://www.mhlw.go.jp/shingi/2010/02/s0202-4.html Unofficial English translation is available at http://rylab.hcc.h.u-tokyo.ac.jp/guidelines.html
- 6 Samani R. When networks collide. Information Security Technical Report 2007; 12 (02) 98-110.
- 7 Wan Z, Deng HR, Bao F, Ananda LA. Access control protocols with two-layer architecture for wireless networks. Computer Networks 2007; 51 (03) 655-670.
- 8 Solms B, Marais E. From secure wired networks to secure wireless networks? what are the extra risks?. Computers & Security 2004; 23 (08) 633-637.
- 9 Furnell S, Ghita B. Usability pitfalls in wireless LAN security. Network Security 2006; 2006 (03) 4-8.
- 10 Katos V, Adams C. Modelling corporate wireless security and privacy. J Strategic Inform Systems 2005; 14 (03) 307-321.
- 11 Badra M, Urien P, Hajjeh I. Flexible and fast security solution for wireless LAN. Pervasive Mob Comput 2007; 3 (01) 1-14.
- 12 Mahanti A, Williamson C, Arlitt M. Remote analysis of a distributed WLAN using passive wireless-side measurement. Performance Evaluation 2007; 64 (9-12) 909-932.
- 13 Sobh ST. Wired and wireless intrusion detection system: Classifications, good characteristics and state-of-the-art. Computer Standards & Interfaces 2006; 28 (06) 670-694.
- 14 Potter B. Rogue access points? threat to enterprise security. Network Security 2003; 2003 (04) 4-5.
- 15 Liao I, Kao K. Enhancing the accuracy of WLAN-based location determination systems using predicted orientation information. Inf Sci 2008; 178 (04) 1049-1068.
- 16 Kao K, Liao I, Li Y. Detecting rogue access points using client-side bottleneck bandwidth analysis. Computers & Security 2009; 28 (3-4) 144-152.
- 17 Curtis WD, Pino JE, Bailey MJ, Shih IE, Waterman J, Vinterbo AS. et al. SMART-an integrated wireless system for monitoring unattended patients. J Am Med Inform Assoc 2008; 15 (01) 44-53.