Skip to main content
Erschienen in: Health and Technology 2/2019

30.08.2018 | Original Paper

Real-time-based E-health systems: design and implementation of a lightweight key management protocol for securing sensitive information of patients

verfasst von: Salman Iqbal, Miss Laiha Mat Kiah, A. A. Zaidan, B. B. Zaidan, O. S. Albahri, A. S. Albahri, M. A. Alsalem

Erschienen in: Health and Technology | Ausgabe 2/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Group-based systems, such as e-health systems, have been introduced since the last few decades. E-health systems can be used anytime and anywhere for patient monitoring. Wireless networks are continuously used to monitor patients’ conditions and recovery progress. The confidentiality, integrity and authenticity of patients’ health records are important to secure in such applications. Efficient key management and distribution are required to secure e-health applications in a wireless mobile environment. However, existing key management protocols cannot route e-health applications securely due to the resource-constrained architecture of the wireless mobile environment. A novel and enhanced key management scheme which aims to identify the challenges related to the security and privacy issues of patients’ sensitive information through a strong encryption management is proposed in this study. The proposed model also aims to provide a well-organised and lightweight key management mechanism. This system requires few computations of keys and offers a null rekeying mechanism to ensure forward and backward secrecies. As a result, a secure and privacy-preserving key management scheme for e-health systems, which is known as the healthcare key management (HCKM) framework and aims to decrypt the ciphertext of the same plain text with different keys, is acquired. HCKM minimises the rekeying overhead of group members and the overhead expressed in terms of the number of exchanged messages whilst achieving a sufficiently high security level. The proposed protocol also can operate on dynamic scenarios with a large number (thousands) of nodes and exhibits an excellent performance under the assumption of low rate of evictions.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Alanizi HO, Mat Kiah ML, Zaidan AA, Zaidan BB, Alam GM. Secure Topology for Electronic Medical Record Transmissions. International Journal of Pharmacology (IJP). 2010;6(6):954–8.CrossRef Alanizi HO, Mat Kiah ML, Zaidan AA, Zaidan BB, Alam GM. Secure Topology for Electronic Medical Record Transmissions. International Journal of Pharmacology (IJP). 2010;6(6):954–8.CrossRef
2.
Zurück zum Zitat Salem Y, Abomhara M, Khalifa OO, Zaidan AA, Zaidan BB. A Review on Multimedia Communications Cryptography. Res J Inf Technol. 2011;3(3):146–52. Salem Y, Abomhara M, Khalifa OO, Zaidan AA, Zaidan BB. A Review on Multimedia Communications Cryptography. Res J Inf Technol. 2011;3(3):146–52.
3.
Zurück zum Zitat Al-bakri SH, Mat Kiah ML, Zaidan AA, Zaidan BB, Alam GM. Securing peer-to-peer mobile communications using public key cryptography: New security strategy. International Journal of Physical Sciences (IJPS). 2011;6(4):930–8. Al-bakri SH, Mat Kiah ML, Zaidan AA, Zaidan BB, Alam GM. Securing peer-to-peer mobile communications using public key cryptography: New security strategy. International Journal of Physical Sciences (IJPS). 2011;6(4):930–8.
4.
Zurück zum Zitat Medani A, Gani A, Zakaria O, Zaidan AA, Zaidan BB. Review of Mobile SMS Security Issues and Techniques Towards the Solution. Scientific Research and Essays (SRE). 2011;6(6):1147–65. Medani A, Gani A, Zakaria O, Zaidan AA, Zaidan BB. Review of Mobile SMS Security Issues and Techniques Towards the Solution. Scientific Research and Essays (SRE). 2011;6(6):1147–65.
5.
Zurück zum Zitat Naji AW, Zaidan BB, Zaidan AA, Hameed SA. Security Improvement of Credit Card Online Purchasing System. Scientific Research and Essays (SRE). 2011;6(16):3357–70.CrossRef Naji AW, Zaidan BB, Zaidan AA, Hameed SA. Security Improvement of Credit Card Online Purchasing System. Scientific Research and Essays (SRE). 2011;6(16):3357–70.CrossRef
6.
Zurück zum Zitat Watari MA, Zaidan AA, Zaidan BB. Securing m-Government Transmission Based on Symmetric and Asymmetric Algorithms: A Review. Asian Journal of Scientific Research (AJSR). 2013;6(4):632–49.CrossRef Watari MA, Zaidan AA, Zaidan BB. Securing m-Government Transmission Based on Symmetric and Asymmetric Algorithms: A Review. Asian Journal of Scientific Research (AJSR). 2013;6(4):632–49.CrossRef
7.
Zurück zum Zitat Canetti, R., et al. Multicast security: A taxonomy and some efficient constructions. In INFOCOM'99. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE. 1999. IEEE. Canetti, R., et al. Multicast security: A taxonomy and some efficient constructions. In INFOCOM'99. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE. 1999. IEEE.
9.
Zurück zum Zitat Albahri OS, et al. Systematic Review of Real-time Remote Health Monitoring System in Triage and Priority-Based Sensor Technology: Taxonomy, Open Challenges, Motivation and Recommendations. J Med Syst. 2018;42(5):80.CrossRef Albahri OS, et al. Systematic Review of Real-time Remote Health Monitoring System in Triage and Priority-Based Sensor Technology: Taxonomy, Open Challenges, Motivation and Recommendations. J Med Syst. 2018;42(5):80.CrossRef
10.
Zurück zum Zitat Albahri AS, Zaidan AA, Albahri OS, Zaidan BB, Alsalem MA. Real-Time Fault-Tolerant mHealth System: Comprehensive Review of Healthcare Services, Opens Issues, Challenges and Methodological Aspects. J Med Syst. 2018;42(8):137.CrossRef Albahri AS, Zaidan AA, Albahri OS, Zaidan BB, Alsalem MA. Real-Time Fault-Tolerant mHealth System: Comprehensive Review of Healthcare Services, Opens Issues, Challenges and Methodological Aspects. J Med Syst. 2018;42(8):137.CrossRef
11.
Zurück zum Zitat A. A. Zaidan et al. A review on smartphone skin cancer diagnosis apps in evaluation and benchmarking: coherent taxonomy, open issues and recommendation pathway solution. Health and Technology, pp. 1–16, 2018. A. A. Zaidan et al. A review on smartphone skin cancer diagnosis apps in evaluation and benchmarking: coherent taxonomy, open issues and recommendation pathway solution. Health and Technology, pp. 1–16, 2018.
12.
Zurück zum Zitat Alsalem MA, Zaidan AA, Zaidan BB, Hashim M, Madhloom HT, Azeez ND, et al. A review of the automated detection and classification of acute leukaemia: coherent taxonomy, datasets, validation and performance measurements, motivation, open challenges and recommendations. Comput Methods Prog Biomed. 2018;158:93–112. Alsalem MA, Zaidan AA, Zaidan BB, Hashim M, Madhloom HT, Azeez ND, et al. A review of the automated detection and classification of acute leukaemia: coherent taxonomy, datasets, validation and performance measurements, motivation, open challenges and recommendations. Comput Methods Prog Biomed. 2018;158:93–112.
13.
Zurück zum Zitat Salman OH, Zaidan AA, Zaidan BB, Kalid N, Hashim M. Novel methodology for triage and prioritizing using ‘big data’ patients with chronic heart diseases through telemedicine environmental. Int J Inf Technol Decis Mak. 2017;16(5):1211–45.CrossRef Salman OH, Zaidan AA, Zaidan BB, Kalid N, Hashim M. Novel methodology for triage and prioritizing using ‘big data’ patients with chronic heart diseases through telemedicine environmental. Int J Inf Technol Decis Mak. 2017;16(5):1211–45.CrossRef
14.
Zurück zum Zitat Kalid N, Zaidan AA, Zaidan BB, Salman OH, Hashim M, Muzammil H. Based Real Time Remote Health Monitoring Systems: A Review on Patients Prioritization and Related ‘Big Data’ Using Body Sensors information and Communication Technology. J Med Syst. 2018;42(2):69.CrossRef Kalid N, Zaidan AA, Zaidan BB, Salman OH, Hashim M, Muzammil H. Based Real Time Remote Health Monitoring Systems: A Review on Patients Prioritization and Related ‘Big Data’ Using Body Sensors information and Communication Technology. J Med Syst. 2018;42(2):69.CrossRef
15.
Zurück zum Zitat Hussain M, Al-Haiqi A, Zaidan A, Zaidan B, Kiah MLM, Anuar NB, et al. The landscape of research on smartphone medical apps: coherent taxonomy, motivations, open challenges and recommendations. Comput Methods Prog Biomed. 2015;122(3):393–408. Hussain M, Al-Haiqi A, Zaidan A, Zaidan B, Kiah MLM, Anuar NB, et al. The landscape of research on smartphone medical apps: coherent taxonomy, motivations, open challenges and recommendations. Comput Methods Prog Biomed. 2015;122(3):393–408.
16.
Zurück zum Zitat Kalid N, et al. Based on Real Time Remote Health Monitoring Systems: A New Approach for Prioritization ‘Large Scales Data’ Patients with Chronic Heart Diseases Using Body Sensors and Communication Technology. J Med Syst. 2018;42(4):69.CrossRef Kalid N, et al. Based on Real Time Remote Health Monitoring Systems: A New Approach for Prioritization ‘Large Scales Data’ Patients with Chronic Heart Diseases Using Body Sensors and Communication Technology. J Med Syst. 2018;42(4):69.CrossRef
17.
Zurück zum Zitat Abdulnabi M, Al-Haiqi A, Kiah MLM, Zaidan AA, Zaidan BB, Hussain M. A distributed framework for health information exchange using smartphone technologies. J Biomed Inform. 2017;69:230–50.CrossRef Abdulnabi M, Al-Haiqi A, Kiah MLM, Zaidan AA, Zaidan BB, Hussain M. A distributed framework for health information exchange using smartphone technologies. J Biomed Inform. 2017;69:230–50.CrossRef
18.
Zurück zum Zitat Kiah, M.L.M. and K.M. Martin. Host mobility protocol for secure group communication in wireless mobile environments. in Future Generation Communication and Networking (FGCN 2007). 2007. IEEE. Kiah, M.L.M. and K.M. Martin. Host mobility protocol for secure group communication in wireless mobile environments. in Future Generation Communication and Networking (FGCN 2007). 2007. IEEE.
19.
Zurück zum Zitat Zaidan BB, Haiqi A, Zaidan AA, Abdulnabi M, Mat Kiah ML, Muzamel H. A security framework for nationwide health information exchange based on telehealth strategy. J Med Syst. 2015;39(5):1–19.CrossRef Zaidan BB, Haiqi A, Zaidan AA, Abdulnabi M, Mat Kiah ML, Muzamel H. A security framework for nationwide health information exchange based on telehealth strategy. J Med Syst. 2015;39(5):1–19.CrossRef
20.
Zurück zum Zitat Alanazi HO, Zaidan AA, Zaidan BB, Mat Kiah ML, Al-Bakri SH. Meeting the security requirements of electronic medical records in the ERA of high-speed computing. J Med Syst. 2015;39(1):1–14.CrossRef Alanazi HO, Zaidan AA, Zaidan BB, Mat Kiah ML, Al-Bakri SH. Meeting the security requirements of electronic medical records in the ERA of high-speed computing. J Med Syst. 2015;39(1):1–14.CrossRef
21.
Zurück zum Zitat Alanazi HO, Alam GM, Zaidan BB, Zaidan AA. Securing electronic medical records transmissions over unsecured communications: An overview for better medical governance. Journal of Medicinal Plants Research. 2010;4(19):2059–74.CrossRef Alanazi HO, Alam GM, Zaidan BB, Zaidan AA. Securing electronic medical records transmissions over unsecured communications: An overview for better medical governance. Journal of Medicinal Plants Research. 2010;4(19):2059–74.CrossRef
22.
Zurück zum Zitat Zhang C, DeCleene B, Kurose J, Towsley D. Comparison of inter-area rekeying algorithms for secure wireless group communications. Perform Eval. 2002;49(1):1–20.CrossRefMATH Zhang C, DeCleene B, Kurose J, Towsley D. Comparison of inter-area rekeying algorithms for secure wireless group communications. Perform Eval. 2002;49(1):1–20.CrossRefMATH
23.
Zurück zum Zitat Kiah MLM, Haiqi A, Zaidan BB, Zaidan AA. Open source EMR software: profiling, insights and hands-on analysis. Comput Methods Prog Biomed. 2014;117(2):360–82.CrossRef Kiah MLM, Haiqi A, Zaidan BB, Zaidan AA. Open source EMR software: profiling, insights and hands-on analysis. Comput Methods Prog Biomed. 2014;117(2):360–82.CrossRef
24.
Zurück zum Zitat Zaidan AA, Zaidan BB, Al-Haiqi A, Kiah MLM, Hussain M. Evaluation and Selection of Open-Source EMR Software Packages Based on Integrated AHP and TOPSIS. J Biomed Inform, Elsevier. 2015;53:390–404.CrossRef Zaidan AA, Zaidan BB, Al-Haiqi A, Kiah MLM, Hussain M. Evaluation and Selection of Open-Source EMR Software Packages Based on Integrated AHP and TOPSIS. J Biomed Inform, Elsevier. 2015;53:390–404.CrossRef
25.
Zurück zum Zitat Nabi MSA, Mat Kiah ML, Zaidan BB, Zaidan AA, Alam GM. Suitability of SOAP protocol in securing transmissions of EMR database. Int J Pharmacol. 2010;6(6):959–64.CrossRef Nabi MSA, Mat Kiah ML, Zaidan BB, Zaidan AA, Alam GM. Suitability of SOAP protocol in securing transmissions of EMR database. Int J Pharmacol. 2010;6(6):959–64.CrossRef
26.
Zurück zum Zitat Zaidan AA, Zaidan B, Hussain M, Haiqi A, Kiah MM, Abdulnabi M. Multi-criteria analysis for OS-EMR software selection problem: a comparative study. Decis Support Syst. 2015;78:15–27.CrossRef Zaidan AA, Zaidan B, Hussain M, Haiqi A, Kiah MM, Abdulnabi M. Multi-criteria analysis for OS-EMR software selection problem: a comparative study. Decis Support Syst. 2015;78:15–27.CrossRef
27.
Zurück zum Zitat Hussain M, Zaidan AA, Zidan BB, Iqbal S, Ahmed MM, Albahri OS, et al. Conceptual framework for the security of mobile health applications on android platform. Telematics Inform. 2018;35(5):1335–54. Hussain M, Zaidan AA, Zidan BB, Iqbal S, Ahmed MM, Albahri OS, et al. Conceptual framework for the security of mobile health applications on android platform. Telematics Inform. 2018;35(5):1335–54.
28.
Zurück zum Zitat Zaidan AA, Zaidan BB, Al-Haiqi A, Kiah MLM, Hussain M, Abdulnabi M. Evaluation and selection of open-source EMR software packages based on integrated AHP and TOPSIS. J Biomed Inform. 2015;53:390–404.CrossRef Zaidan AA, Zaidan BB, Al-Haiqi A, Kiah MLM, Hussain M, Abdulnabi M. Evaluation and selection of open-source EMR software packages based on integrated AHP and TOPSIS. J Biomed Inform. 2015;53:390–404.CrossRef
29.
Zurück zum Zitat Mat Kiah ML, Nabi MS, Zaidan BB, Zaidan AA. An enhanced security solution for electronic medical records based on AES hybrid technique with SOAP/XML and SHA-1. J Med Syst. 2013;37(5):1–16. Mat Kiah ML, Nabi MS, Zaidan BB, Zaidan AA. An enhanced security solution for electronic medical records based on AES hybrid technique with SOAP/XML and SHA-1. J Med Syst. 2013;37(5):1–16.
30.
Zurück zum Zitat Zaidan BB, Zaidan AA, Mwafak H. New Comprehensive Study to Assess Comparatively the QKD, XKMS, KDM in the PKI encryption algorithms. International Journal on Computer Science and Engineering (IJCSE), Published by: Engg Journals Publications. ISSN: 0975–3397. 2009;1(3):264–9. India. (Computer Science Directory) Zaidan BB, Zaidan AA, Mwafak H. New Comprehensive Study to Assess Comparatively the QKD, XKMS, KDM in the PKI encryption algorithms. International Journal on Computer Science and Engineering (IJCSE), Published by: Engg Journals Publications. ISSN: 0975–3397. 2009;1(3):264–9. India. (Computer Science Directory)
31.
Zurück zum Zitat Alanazi HO, Zaidan BB, Zaidan AA, Jalab HA, Shabbir M, Al-Nabhani Y. New Comparative Study Between DES, 3DES and AES within Nine Factors. Journal of Computing (JOC). 2010;2(3, ISSN: 2151–9617):152–7. New York Alanazi HO, Zaidan BB, Zaidan AA, Jalab HA, Shabbir M, Al-Nabhani Y. New Comparative Study Between DES, 3DES and AES within Nine Factors. Journal of Computing (JOC). 2010;2(3, ISSN: 2151–9617):152–7. New York
32.
Zurück zum Zitat Hussain M, Ahmed A-H, Zaidan AA, Zaidan BB, Kiah M, Iqbal S, et al. A security framework for mHealth apps on Android platform. Computers & Security. 2018;45:191–217. Hussain M, Ahmed A-H, Zaidan AA, Zaidan BB, Kiah M, Iqbal S, et al. A security framework for mHealth apps on Android platform. Computers & Security. 2018;45:191–217.
33.
Zurück zum Zitat Zaidan BB, Zaidan AA, Mat Kiah ML. Impact of data privacy and confidentiality on developing telemedicine applications: A review participates opinion and expert concerns. Int J Pharm. 2011;7(3):382–7.CrossRef Zaidan BB, Zaidan AA, Mat Kiah ML. Impact of data privacy and confidentiality on developing telemedicine applications: A review participates opinion and expert concerns. Int J Pharm. 2011;7(3):382–7.CrossRef
34.
Zurück zum Zitat Mat Kiah M. L., S. H. Al-Bakri, A.A.Zaidan, B. B. Zaidan and M. Hussain, design and develop a video conferencing framework for real-time telemedicine applications using secure group-based communication architecture, J Med Syst; (2014c), 38(10):1–13. Mat Kiah M. L., S. H. Al-Bakri, A.A.Zaidan, B. B. Zaidan and M. Hussain, design and develop a video conferencing framework for real-time telemedicine applications using secure group-based communication architecture, J Med Syst; (2014c), 38(10):1–13.
35.
Zurück zum Zitat Albahri OS, Zaidan AA, Zaidan BB, Hashim M, Albahri AS, Alsalem MA. Real-Time Remote Health-Monitoring Systems in a Medical Centre: A Review of the Provision of Healthcare Services-based Body Sensor Information, Open Challenges and Methodological Aspects. J Med Syst. 2018;42(10):139. Albahri OS, Zaidan AA, Zaidan BB, Hashim M, Albahri AS, Alsalem MA. Real-Time Remote Health-Monitoring Systems in a Medical Centre: A Review of the Provision of Healthcare Services-based Body Sensor Information, Open Challenges and Methodological Aspects. J Med Syst. 2018;42(10):139.
36.
Zurück zum Zitat Gharout, S., et al. Key management with host mobility in dynamic groups. In Proceedings of the 3rd international conference on Security of information and networks. 2010. ACM. Gharout, S., et al. Key management with host mobility in dynamic groups. In Proceedings of the 3rd international conference on Security of information and networks. 2010. ACM.
37.
Zurück zum Zitat Mat Kiah ML, Zaidan BB, Zaidan AA, Nabi M, Ibraheem R. MIRASS: Medical informatics research activity support system using information mashup network. J Med Syst. 2014a;38(4):1–37. Mat Kiah ML, Zaidan BB, Zaidan AA, Nabi M, Ibraheem R. MIRASS: Medical informatics research activity support system using information mashup network. J Med Syst. 2014a;38(4):1–37.
38.
Zurück zum Zitat Zaidan AA, et al. Challenges, alternatives, and paths to sustainability: better public health promotion using social networking pages as key tools. J Med Syst. 2015;39(2):1–14.CrossRef Zaidan AA, et al. Challenges, alternatives, and paths to sustainability: better public health promotion using social networking pages as key tools. J Med Syst. 2015;39(2):1–14.CrossRef
39.
Zurück zum Zitat Zaidan AA, Zaidan BB, Qahtan MY, Albahri OS, Albahri AS, Alaa M, et al. A survey on communication components for IoT-based technologies in smart homes. Telecommun Syst. 2018;69:1–25. Zaidan AA, Zaidan BB, Qahtan MY, Albahri OS, Albahri AS, Alaa M, et al. A survey on communication components for IoT-based technologies in smart homes. Telecommun Syst. 2018;69:1–25.
40.
Zurück zum Zitat Mapoka, T.T., Group key management protocols for secure mobile multicast communication: a comprehensive survey. International Journal of Computer Applications, 2013; 84(12). Mapoka, T.T., Group key management protocols for secure mobile multicast communication: a comprehensive survey. International Journal of Computer Applications, 2013; 84(12).
41.
Zurück zum Zitat Zhou J, Cao Z, Dong X, Xiong N, Vasilakos AV. 4S: a secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks. Inf Sci. 2015;314:255–76.CrossRef Zhou J, Cao Z, Dong X, Xiong N, Vasilakos AV. 4S: a secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks. Inf Sci. 2015;314:255–76.CrossRef
42.
Zurück zum Zitat Abdmeziem, M.R. and D. Tandjaoui. A cooperative end to end key management scheme for e-health applications in the context of internet of things. In International Conference on Ad-Hoc Networks and Wireless. 2014. Springer Abdmeziem, M.R. and D. Tandjaoui. A cooperative end to end key management scheme for e-health applications in the context of internet of things. In International Conference on Ad-Hoc Networks and Wireless. 2014. Springer
43.
Zurück zum Zitat Chakravorty, R. A programmable service architecture for mobile medical care. In Pervasive Computing and Communications Workshops, 2006. PerCom Workshops 2006. Fourth Annual IEEE International Conference on. 2006. IEEE. Chakravorty, R. A programmable service architecture for mobile medical care. In Pervasive Computing and Communications Workshops, 2006. PerCom Workshops 2006. Fourth Annual IEEE International Conference on. 2006. IEEE.
44.
Zurück zum Zitat Abdmeziem MR, Tandjaoui D. An end-to-end secure key management protocol for e-health applications. Comput Electr Eng. 2015;44:184–97.CrossRef Abdmeziem MR, Tandjaoui D. An end-to-end secure key management protocol for e-health applications. Comput Electr Eng. 2015;44:184–97.CrossRef
45.
Zurück zum Zitat Canelo, F., et al. Performance evaluation of an enhanced cryptography solution for m-Health applications in cooperative environments. In Global Communications Conference (GLOBECOM), 2013 IEEE. 2013. IEEE. Canelo, F., et al. Performance evaluation of an enhanced cryptography solution for m-Health applications in cooperative environments. In Global Communications Conference (GLOBECOM), 2013 IEEE. 2013. IEEE.
46.
Zurück zum Zitat Shanmugam, M., et al. Enabling secure mobile access for electronic health care applications. In Pervasive Health Conference and Workshops, 2006. 2006. IEEE. Shanmugam, M., et al. Enabling secure mobile access for electronic health care applications. In Pervasive Health Conference and Workshops, 2006. 2006. IEEE.
47.
Zurück zum Zitat Gharout S, et al. Adaptive group key management protocol for wireless communications. J UCS. 2012;18(6):874–98. Gharout S, et al. Adaptive group key management protocol for wireless communications. J UCS. 2012;18(6):874–98.
48.
Zurück zum Zitat Amir Y, Yongdae Kim, Nita-Rotaru C, Schultz JL, Stanton J, Tsudik G. Secure group communication using robust contributory key agreement. IEEE Transactions on Parallel and Distributed Systems. 2004;15(5):468–80.CrossRef Amir Y, Yongdae Kim, Nita-Rotaru C, Schultz JL, Stanton J, Tsudik G. Secure group communication using robust contributory key agreement. IEEE Transactions on Parallel and Distributed Systems. 2004;15(5):468–80.CrossRef
49.
Zurück zum Zitat Sun Y, Trappe W, Liu KR. A scalable multicast key management scheme for heterogeneous wireless networks. IEEE/ACM Transactions on Networking (TON). 2004;12(4):653–66.CrossRef Sun Y, Trappe W, Liu KR. A scalable multicast key management scheme for heterogeneous wireless networks. IEEE/ACM Transactions on Networking (TON). 2004;12(4):653–66.CrossRef
50.
Zurück zum Zitat Kellil, M., A. Olivereau, and C. Janneteau, Rekeying in secure mobile multicast communications. 2004, Google Patents. Kellil, M., A. Olivereau, and C. Janneteau, Rekeying in secure mobile multicast communications. 2004, Google Patents.
51.
Zurück zum Zitat Park, M.-H., Y.-H. Park, and S.-W. Seo. A cell-based decentralized key management scheme for secure multicast in mobile cellular networks. In Vehicular Technology Conference (VTC 2010-Spring), 2010 IEEE 71st. 2010. IEEE. Park, M.-H., Y.-H. Park, and S.-W. Seo. A cell-based decentralized key management scheme for secure multicast in mobile cellular networks. In Vehicular Technology Conference (VTC 2010-Spring), 2010 IEEE 71st. 2010. IEEE.
52.
Zurück zum Zitat DeCleene, B., et al. Secure group communications for wireless networks. In Military Communications Conference, 2001. MILCOM 2001. Communications for Network-Centric Operations: Creating the Information Force. IEEE. 2001. IEEE. DeCleene, B., et al. Secure group communications for wireless networks. In Military Communications Conference, 2001. MILCOM 2001. Communications for Network-Centric Operations: Creating the Information Force. IEEE. 2001. IEEE.
53.
Zurück zum Zitat Hernandez-Serrano, J., J. Pegueroles, and M. Soriano. GKM over large MANET. In Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing and First ACIS International Workshop on Self-Assembling Wireless Network. 2005. IEEE. Hernandez-Serrano, J., J. Pegueroles, and M. Soriano. GKM over large MANET. In Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing and First ACIS International Workshop on Self-Assembling Wireless Network. 2005. IEEE.
54.
Zurück zum Zitat Cao J, Liao L, Wang G. Scalable key management for secure multicast communication in the mobile environment. Pervasive and Mobile Computing. 2006;2(2):187–203.CrossRef Cao J, Liao L, Wang G. Scalable key management for secure multicast communication in the mobile environment. Pervasive and Mobile Computing. 2006;2(2):187–203.CrossRef
55.
Zurück zum Zitat Park M-H, Park YH, Jeong HY, Seo SW. Key management for multiple multicast groups in wireless networks. IEEE Trans Mob Comput. 2013;12(9):1712–23.CrossRef Park M-H, Park YH, Jeong HY, Seo SW. Key management for multiple multicast groups in wireless networks. IEEE Trans Mob Comput. 2013;12(9):1712–23.CrossRef
56.
Zurück zum Zitat Mapoka TT, Shepherd SJ, Abd-Alhameed RA. A new multiple service key management scheme for secure wireless mobile multicast. IEEE Trans Mob Comput. 2015;14(8):1545–59.CrossRef Mapoka TT, Shepherd SJ, Abd-Alhameed RA. A new multiple service key management scheme for secure wireless mobile multicast. IEEE Trans Mob Comput. 2015;14(8):1545–59.CrossRef
57.
Zurück zum Zitat Mittra, S. Iolus: A framework for scalable secure multicasting. In ACM SIGCOMM Computer Communication Review. 1997. ACM. Mittra, S. Iolus: A framework for scalable secure multicasting. In ACM SIGCOMM Computer Communication Review. 1997. ACM.
59.
Zurück zum Zitat Quisquater J-J, Couvreur C. Fast decipherment algorithm for RSA public-key cryptosystem. Electron Lett. 1982;21(18):905–7.CrossRef Quisquater J-J, Couvreur C. Fast decipherment algorithm for RSA public-key cryptosystem. Electron Lett. 1982;21(18):905–7.CrossRef
60.
Zurück zum Zitat Ding, C., D. Pei, and A. Salomaa, Chinese remainder theorem: applications in computing, coding, cryptography. 1996: World Scientific. Ding, C., D. Pei, and A. Salomaa, Chinese remainder theorem: applications in computing, coding, cryptography. 1996: World Scientific.
61.
Zurück zum Zitat Zheng, X., C.-T. Huang, and M. Matthews. Chinese remainder theorem based group key management. In Proceedings of the 45th annual southeast regional conference. 2007. ACM. Zheng, X., C.-T. Huang, and M. Matthews. Chinese remainder theorem based group key management. In Proceedings of the 45th annual southeast regional conference. 2007. ACM.
63.
Zurück zum Zitat Sun Y, Liu K. Hierarchical group access control for secure multicast communications. IEEE/ACM Transactions on Networking (TON). 2007;15(6):1514–26.CrossRef Sun Y, Liu K. Hierarchical group access control for secure multicast communications. IEEE/ACM Transactions on Networking (TON). 2007;15(6):1514–26.CrossRef
65.
Zurück zum Zitat Burrows, M., M. Abadi, and R.M. Needham. A logic of authentication. In Proceedings of the Royal Society of London A: Mathematical, Physical and Engineering Sciences. 1989. The Royal Society. Burrows, M., M. Abadi, and R.M. Needham. A logic of authentication. In Proceedings of the Royal Society of London A: Mathematical, Physical and Engineering Sciences. 1989. The Royal Society.
Metadaten
Titel
Real-time-based E-health systems: design and implementation of a lightweight key management protocol for securing sensitive information of patients
verfasst von
Salman Iqbal
Miss Laiha Mat Kiah
A. A. Zaidan
B. B. Zaidan
O. S. Albahri
A. S. Albahri
M. A. Alsalem
Publikationsdatum
30.08.2018
Verlag
Springer Berlin Heidelberg
Erschienen in
Health and Technology / Ausgabe 2/2019
Print ISSN: 2190-7188
Elektronische ISSN: 2190-7196
DOI
https://doi.org/10.1007/s12553-018-0252-4

Weitere Artikel der Ausgabe 2/2019

Health and Technology 2/2019 Zur Ausgabe