Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 6/2015

01.11.2015

An efficient privacy-preserving authentication scheme with adaptive key evolution in remote health monitoring system

verfasst von: Haomiao Yang, Hyunsung Kim, Kambombo Mtonga

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 6/2015

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The remote health monitoring system enables a doctor to diagnose and monitor health problems anywhere for a patient. However, since the patient health information is very sensitive and the Internet is unsecure and prone to many attacks, data can be easily compromised by adversaries. Worse, the mobile phone is also easy to be compromised. Clearly, these issues have brought different privacy and security requirements in wireless healthcare. To address these challenging issues, in this paper, we propose an efficient privacy-preserving authentication scheme with adaptive key evolution, which can prevent illegal access to the patient’s vital signs. Furthermore, we model the leakage process of the key information to set proper key renewal interval, which can adaptively control the key evolution to balance the trade-off between the communication efficiency and security level. The security analysis demonstrates that our scheme can achieve authenticated key agreement, perfect and strong key insulation, privacy preservation, and other important security goals, e.g. authenticity, integrity and freshness of transmitted messages. The performance evaluation shows that our scheme is computationally efficient for the typical mobile phone with limited resources, and it has low communication overhead.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Massey T, Marfia G, Stoelting A, Tomasi R, Spirito MA, Sarrafzadeh M, Pau G (2011) Leveraging social system networks in ubiquitous high-data-rate health systems. IEEE Trans Inf Technol Biomed 15(3):491–498CrossRef Massey T, Marfia G, Stoelting A, Tomasi R, Spirito MA, Sarrafzadeh M, Pau G (2011) Leveraging social system networks in ubiquitous high-data-rate health systems. IEEE Trans Inf Technol Biomed 15(3):491–498CrossRef
2.
Zurück zum Zitat Yan H, Huo H, Xu Y, Gidlund M (2010) Wireless sensor network based E-health system implementation and experimental results. IEEE Trans Consum Electron 56(4):2288–2295CrossRef Yan H, Huo H, Xu Y, Gidlund M (2010) Wireless sensor network based E-health system implementation and experimental results. IEEE Trans Consum Electron 56(4):2288–2295CrossRef
3.
Zurück zum Zitat Patel M, Wang J (2010) Applications, challenges, and prospective in emerging body area networking technologies. IEEE Wirel Commun 17(1):80–88CrossRef Patel M, Wang J (2010) Applications, challenges, and prospective in emerging body area networking technologies. IEEE Wirel Commun 17(1):80–88CrossRef
4.
Zurück zum Zitat Almenares F, Arias P, Marin A, Diaz-Sanchez D, Sanchez R (2013) Overhead of using secure wireless communications in mobile computing. IEEE Trans Consum Electron 59(2):335–342CrossRef Almenares F, Arias P, Marin A, Diaz-Sanchez D, Sanchez R (2013) Overhead of using secure wireless communications in mobile computing. IEEE Trans Consum Electron 59(2):335–342CrossRef
5.
Zurück zum Zitat Lim S, Tae H, Choi Y, Lakshman T (2010) Security issues on wireless body area network for remote healthcare monitoring. Proc. IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, Newport Beach, USA, pp. 327–332, June 2010 Lim S, Tae H, Choi Y, Lakshman T (2010) Security issues on wireless body area network for remote healthcare monitoring. Proc. IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, Newport Beach, USA, pp. 327–332, June 2010
6.
Zurück zum Zitat Al Ameen M, Liu J, Kwak K (2012) Security and privacy issues in wireless sensor networks for healthcare applications. J Med Syst 36(1):93–101CrossRef Al Ameen M, Liu J, Kwak K (2012) Security and privacy issues in wireless sensor networks for healthcare applications. J Med Syst 36(1):93–101CrossRef
7.
Zurück zum Zitat Mabo P, Victor F, Bazin P, Ahres S, Babuty D, Da Costa A, Daubert JC (2012) A randomized trial of long-term remote monitoring of pacemaker recipients. Eur Heart J 33(9):1105–1111CrossRef Mabo P, Victor F, Bazin P, Ahres S, Babuty D, Da Costa A, Daubert JC (2012) A randomized trial of long-term remote monitoring of pacemaker recipients. Eur Heart J 33(9):1105–1111CrossRef
8.
Zurück zum Zitat Venkatasubramanian KK, Banerjee A, Gupta SKS (2008) EKG-based key agreement in Body Sensor Networks. Proc. IEEE INFOCOM Workshop, Phoenix, USA, pp. 13–18, April 2008 Venkatasubramanian KK, Banerjee A, Gupta SKS (2008) EKG-based key agreement in Body Sensor Networks. Proc. IEEE INFOCOM Workshop, Phoenix, USA, pp. 13–18, April 2008
9.
Zurück zum Zitat Li M, Yu S, Lou W, Ren K (2010) Group device pairing based secure sensor association and key management for body area networks. Proc. IEEE INFOCOM Workshop, San Diego, USA, pp. 1–9, March 2010 Li M, Yu S, Lou W, Ren K (2010) Group device pairing based secure sensor association and key management for body area networks. Proc. IEEE INFOCOM Workshop, San Diego, USA, pp. 1–9, March 2010
10.
Zurück zum Zitat Shen J, Moh S, Chung IY (2010) Comment: “Eenhanced novel access control protocol over wireless sensor networks”. IEEE Trans Consum Electron 56(3):2019–2021CrossRef Shen J, Moh S, Chung IY (2010) Comment: “Eenhanced novel access control protocol over wireless sensor networks”. IEEE Trans Consum Electron 56(3):2019–2021CrossRef
11.
Zurück zum Zitat Tan C, Wang H, Zhong S, Li Q (2009) IBE-lite: A lightweight identity-based cryptography for body sensor networks. IEEE Trans Inf Technol Biomed 13(6):926–932CrossRef Tan C, Wang H, Zhong S, Li Q (2009) IBE-lite: A lightweight identity-based cryptography for body sensor networks. IEEE Trans Inf Technol Biomed 13(6):926–932CrossRef
12.
Zurück zum Zitat Liang X, Lu R, Chen L, Lin X, Shen X (2011) PEC: A privacy-preserving emergency call scheme for mobile healthcare social networks. J Commun Netw 13(2):102–112CrossRef Liang X, Lu R, Chen L, Lin X, Shen X (2011) PEC: A privacy-preserving emergency call scheme for mobile healthcare social networks. J Commun Netw 13(2):102–112CrossRef
13.
Zurück zum Zitat He D, Chen C, Chan S, Bu J, Vasilakos AV (2012) A distributed trust evaluation model and its application scenarios to medical sensor networks. IEEE Trans Inf Technol Biomed 16(6):1164–1175CrossRef He D, Chen C, Chan S, Bu J, Vasilakos AV (2012) A distributed trust evaluation model and its application scenarios to medical sensor networks. IEEE Trans Inf Technol Biomed 16(6):1164–1175CrossRef
14.
Zurück zum Zitat He D, Chen C, Chan S, Bu J, Zhang P (2013) Secure and lightweight network admission and transmission protocol for body sensor networks. IEEE J Biomed Health Inform 17(3):664–674CrossRef He D, Chen C, Chan S, Bu J, Zhang P (2013) Secure and lightweight network admission and transmission protocol for body sensor networks. IEEE J Biomed Health Inform 17(3):664–674CrossRef
15.
Zurück zum Zitat Shi L, Li M, Yu S, Yuan J (2012) Bana: body area network authentication exploiting channel characteristics. Proc. ACM conference on Security and Privacy in Wireless and Mobile Networks, Tucson, USA, pp. 27–38, April 2012 Shi L, Li M, Yu S, Yuan J (2012) Bana: body area network authentication exploiting channel characteristics. Proc. ACM conference on Security and Privacy in Wireless and Mobile Networks, Tucson, USA, pp. 27–38, April 2012
16.
Zurück zum Zitat Li M, Lou W, Ren K (2010) Data security and privacy in wireless body area networks. IEEE Wirel Commun 17(1):51–58CrossRef Li M, Lou W, Ren K (2010) Data security and privacy in wireless body area networks. IEEE Wirel Commun 17(1):51–58CrossRef
17.
Zurück zum Zitat Ali ST, Sivaraman V, Ostry D (2012) Authentication of lossy data in body-sensor networks for healthcare monitoring. Proc. IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, Seoul, Korea, pp. 470–478, June 2012 Ali ST, Sivaraman V, Ostry D (2012) Authentication of lossy data in body-sensor networks for healthcare monitoring. Proc. IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, Seoul, Korea, pp. 470–478, June 2012
18.
Zurück zum Zitat Li H, Lu R, Zhou L, Yang B, Shen X (2014) An efficient merkle tree based authentication scheme for smart grid. IEEE Syst J 8(2):655–663 Li H, Lu R, Zhou L, Yang B, Shen X (2014) An efficient merkle tree based authentication scheme for smart grid. IEEE Syst J 8(2):655–663
19.
Zurück zum Zitat Boneh D, Franklin M (2011) Identity-based encryption from the Weil pairing. Proc. CRYPTO 2001, Santa Barbara, USA, pp. 213–229, January 2011 Boneh D, Franklin M (2011) Identity-based encryption from the Weil pairing. Proc. CRYPTO 2001, Santa Barbara, USA, pp. 213–229, January 2011
20.
Zurück zum Zitat Smart NP (2002) Identity-based authenticated key agreement protocol based on Weil pairing. Electron Lett 38(13):630–632CrossRefMATH Smart NP (2002) Identity-based authenticated key agreement protocol based on Weil pairing. Electron Lett 38(13):630–632CrossRefMATH
21.
Zurück zum Zitat Dodis Y, Katz J, Xu S, Yung M (2002) Key-insulated public key cryptosystems. Proc. EUROCRYPT 2002, Amsterdam, Netherlands, pp. 65–82, April 2002 Dodis Y, Katz J, Xu S, Yung M (2002) Key-insulated public key cryptosystems. Proc. EUROCRYPT 2002, Amsterdam, Netherlands, pp. 65–82, April 2002
22.
Zurück zum Zitat Canetti R, Halevi S, Katz J (2003) A forward-secure public-key encryption scheme. Proc. EUROCRYPT 2003, Warsaw, Poland, pp. 255–271, May 2003 Canetti R, Halevi S, Katz J (2003) A forward-secure public-key encryption scheme. Proc. EUROCRYPT 2003, Warsaw, Poland, pp. 255–271, May 2003
23.
Zurück zum Zitat Li H, Liang X, Lu R, Lin X, Shen X (2012) EDR: An efficient demand response scheme for achieving forward secrecy in smart grid, 2012 I.E. Global Telecommunications Conference (IEEE GLOBECOM 2012) 929–934 Li H, Liang X, Lu R, Lin X, Shen X (2012) EDR: An efficient demand response scheme for achieving forward secrecy in smart grid, 2012 I.E. Global Telecommunications Conference (IEEE GLOBECOM 2012) 929–934
24.
Zurück zum Zitat Li H, Lin X, Yang H, Liang X, Lu R, Shen X (2013) EPPDR: An efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid. IEEE Trans Parallel Distrib Syst doi:10.1109/TPDS.2013.124 Li H, Lin X, Yang H, Liang X, Lu R, Shen X (2013) EPPDR: An efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid. IEEE Trans Parallel Distrib Syst doi:10.​1109/​TPDS.​2013.​124
25.
Zurück zum Zitat Chen L, Cheng Z, Smart NP (2007) Identity-based key agreement protocols from pairings. Int J Inf Secur 6(4):213–241CrossRef Chen L, Cheng Z, Smart NP (2007) Identity-based key agreement protocols from pairings. Int J Inf Secur 6(4):213–241CrossRef
26.
Zurück zum Zitat Lee E, Lee HS, Park CM (2009) Efficient and generalized pairing computation on abelian varieties. IEEE Trans Inf Theory 55(4):1793–1803CrossRef Lee E, Lee HS, Park CM (2009) Efficient and generalized pairing computation on abelian varieties. IEEE Trans Inf Theory 55(4):1793–1803CrossRef
27.
Zurück zum Zitat Yang Y, Li H, Wen M, Luo H, Lu R (2014) Achieving ranked range query in smart grid auction market. Proceedings of ICC, Sydney, Australia, 2014, to appear Yang Y, Li H, Wen M, Luo H, Lu R (2014) Achieving ranked range query in smart grid auction market. Proceedings of ICC, Sydney, Australia, 2014, to appear
28.
Zurück zum Zitat Liu D, Li H, Yang Y, Yang H (2014) Achieving multi-authority access control with efficient attribute revocation in smart grid. Proceedings of ICC, Sydney, Australia, 2014, to appear Liu D, Li H, Yang Y, Yang H (2014) Achieving multi-authority access control with efficient attribute revocation in smart grid. Proceedings of ICC, Sydney, Australia, 2014, to appear
Metadaten
Titel
An efficient privacy-preserving authentication scheme with adaptive key evolution in remote health monitoring system
verfasst von
Haomiao Yang
Hyunsung Kim
Kambombo Mtonga
Publikationsdatum
01.11.2015
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 6/2015
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-014-0299-6

Weitere Artikel der Ausgabe 6/2015

Peer-to-Peer Networking and Applications 6/2015 Zur Ausgabe