Methods Inf Med 2012; 51(03): 221-228
DOI: 10.3414/ME10-01-0002
Original Articles
Schattauer GmbH

Wireless LAN Security Management with Location Detection Capability in Hospitals

K. Tanaka
1   Department of Planning, Information and Management, The University of Tokyo Hospital, Tokyo, Japan
,
H. Atarashi
1   Department of Planning, Information and Management, The University of Tokyo Hospital, Tokyo, Japan
,
I. Yamaguchi
1   Department of Planning, Information and Management, The University of Tokyo Hospital, Tokyo, Japan
,
H. Watanabe
1   Department of Planning, Information and Management, The University of Tokyo Hospital, Tokyo, Japan
,
R. Yamamoto
2   Interfaculty Initiative in Information Studies, The University of Tokyo, Tokyo, Japan
,
K. Ohe
3   Graduate School of Medicine and Faculty of Medicine, The University of Tokyo, Tokyo, Japan
› Author Affiliations
Further Information

Publication History

received:12 January 2011

accepted:15 February 2011

Publication Date:
20 January 2018 (online)

Summary

Objectives: In medical institutions, unauthorized access points and terminals obstruct the stable operation of a large-scale wireless local area network (LAN) system. By establishing a real-time monitoring method to detect such unauthorized wireless devices, we can improve the efficiency of security management.

Methods: We detected unauthorized wireless devices by using a centralized wireless LAN system and a location detection system at 370 access points at the University of Tokyo Hospital. By storing the detected radio signal strength and location information in a database, we evaluated the risk level from the detection history. We also evaluated the location detection performance in our hospital ward using Wi-Fi tags.

Results: The presence of electric waves outside the hospital and those emitted from portable game machines with wireless communication capability was confirmed from the detection result. The location detection performance showed an error margin of approximately 4 m in detection accuracy and approximately 5% in false detection. Therefore, it was effective to consider the radio signal strength as both an index of likelihood at the detection location and an index for the level of risk.

Conclusions: We determined the location of wireless devices with high accuracy by filtering the detection results on the basis of radio signal strength and detection history. Results of this study showed that it would be effective to use the developed location database containing radio signal strength and detection history for security management of wireless LAN systems and more general-purpose location detection applications.

 
  • References

  • 1 Chen Y, Chiu H, Tsai M, Chang H, Chong C. Development of a personal digital assistant-based wireless application in clinical practice. Computer Methods Programs Biomed 2007; 85 (02) 181-184.
  • 2 Hauser ES, Demner-Fushman D, Jacobs LJ, Humphrey MS, Ford G, Thoma RG. Using wireless handheld computers to seek information at the point of care: an evaluation by clinicians. J Am Med Inform Assoc 2007; 14 (06) 807-815.
  • 3 Triantafyllidis A, Koutkias V, Chouvarda I, Maglaveras N. An open and reconfigurable wireless sensor network for pervasive health monitoring. Methods Inf Med 2008; 47 (03) 229-334.
  • 4 Struzik ZR, Yoshiuchi K, Sone M, Ishikawa T, Kikuchi H, Kumano H. et al. “Mobile Nurse” Platform for Ubiquitous Medicine. Methods Inf Med 2007; 46 (02) 130-134.
  • 5 Ministry of Health, Labor and Welfare (Japan) Guidelines for the Security Management of Health Information Systems. Available at http://www.mhlw.go.jp/shingi/2010/02/s0202-4.html Unofficial English translation is available at http://rylab.hcc.h.u-tokyo.ac.jp/guidelines.html
  • 6 Samani R. When networks collide. Information Security Technical Report 2007; 12 (02) 98-110.
  • 7 Wan Z, Deng HR, Bao F, Ananda LA. Access control protocols with two-layer architecture for wireless networks. Computer Networks 2007; 51 (03) 655-670.
  • 8 Solms B, Marais E. From secure wired networks to secure wireless networks? what are the extra risks?. Computers & Security 2004; 23 (08) 633-637.
  • 9 Furnell S, Ghita B. Usability pitfalls in wireless LAN security. Network Security 2006; 2006 (03) 4-8.
  • 10 Katos V, Adams C. Modelling corporate wireless security and privacy. J Strategic Inform Systems 2005; 14 (03) 307-321.
  • 11 Badra M, Urien P, Hajjeh I. Flexible and fast security solution for wireless LAN. Pervasive Mob Comput 2007; 3 (01) 1-14.
  • 12 Mahanti A, Williamson C, Arlitt M. Remote analysis of a distributed WLAN using passive wireless-side measurement. Performance Evaluation 2007; 64 (9-12) 909-932.
  • 13 Sobh ST. Wired and wireless intrusion detection system: Classifications, good characteristics and state-of-the-art. Computer Standards & Interfaces 2006; 28 (06) 670-694.
  • 14 Potter B. Rogue access points? threat to enterprise security. Network Security 2003; 2003 (04) 4-5.
  • 15 Liao I, Kao K. Enhancing the accuracy of WLAN-based location determination systems using predicted orientation information. Inf Sci 2008; 178 (04) 1049-1068.
  • 16 Kao K, Liao I, Li Y. Detecting rogue access points using client-side bottleneck bandwidth analysis. Computers & Security 2009; 28 (3-4) 144-152.
  • 17 Curtis WD, Pino JE, Bailey MJ, Shih IE, Waterman J, Vinterbo AS. et al. SMART-an integrated wireless system for monitoring unattended patients. J Am Med Inform Assoc 2008; 15 (01) 44-53.