Abstract
Recent Advances in Wireless Body Area Networks (WBANs) offer unprecedented opportunities and challenges to the development of pervasive electronic healthcare (E-Healthcare) monitoring system. In E-Healthcare system, the processed data are patients’ sensitive health data that are directly related to individuals’ privacy. For this reason, privacy concern is of great importance for E-Healthcare system. Current existing systems for E-Healthcare services, however, have not yet provided sufficient privacy protection for patients. In order to offer adequate security and privacy, in this paper, we propose a privacy-enhanced scheme for patients’ physical condition monitoring, which achieves dual effects: (1) providing unlinkability of health records and individual identity, and (2) supporting anonymous authentication and authorized data access. We also conduct a simulation experiment to evaluate the performance of the proposed scheme. The experimental results demonstrate that the proposed scheme achieves better performance in terms of computational complexity, communication overheads and querying efficiency compared with previous results.
Similar content being viewed by others
References
Patel, M., and Wang, J., Applications, challenges, and prospective in emerging body area networking technologies. IEEE Wirel. Commun. 17:80–88, 2010.
Milenkovic, A., Otto, C., and Jovanov, E., Wireless sensor networks for personal health monitoring: Issues and an implementation. Comput. Commun. 29:2521–2533, 2006.
Chen, M., Gonzalez, S., Vasilakos, A., Cao, H., and Leung, V. C. M., Body area networks: A survey. ACM/Springer Mob. Netw. Appl. 16:171–193, 2011. doi:10.1007/s11036-010-0260-8.
Sun, J., Fang, Y., and Zhu, X., Privacy and emergency response in e-healthcare leveraging wireless body sensor networks. IEEE Wirel. Commun. 17:66–73, 2010.
Health Insurance Portability and Accountability Act of 1996, 104th U.S. Congress, 1996.
Tan, C. C., Wang, H., and Zhong, S., IBE-Lite: A lightweight identity-based cryptography for body sensor networks. IEEE Trans. Inf. Technol. Biomed. 13:926–932, 2009.
Shamir, A., Identity-based cryptosystems and signature schemes. In: Advances in Cryptology Proceedings of CRYPTO 84. Springer, pp. 47–53, 1984.
Boneh, D., and Franklin, M., Identity-based encryption from the weil pairing. In: Proc. of the 21st Annu. Int. Cryptol. Conf. on Adv. in Cryptol. Springer Berlin, pp. 213–229, 2001.
Zhang, Y., Liu, W., Lou, W., and Fang, Y., Location-based compromise-tolerant security mechanisms for wireless sensor networks. IEEE J. Sel. Areas Commun. 24:247–260, 2006.
Chaum, D. L., Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24:84–90, 1981.
Schechter, S., Parnell, T., and Hartemink, A., Anonymous authentication of membership in dynamic groups. In: Financial Cryptography 3rd Int. Conf. Springer Berlin, pp. 184–195, 1999.
Nguyen, L., and Safavi-Naini, R., Dynamic k-times anonymous authentication. In: Appl. Cryptogr. and Netw. Secur. 3rd Int. Conf. Springer, New York, pp. 318–333, 2005.
Chaum, D. L., and Van Heyst, E., Group signatures. In: EUROCRYPT ’91 Proc. of the 10th Annu. Int. Conf. on Theory and Appl. of Cryptogr. Tech. Vol. 547, pp. 257–265, 1991.
Rivest, R. L., Shamir, A., and Tauman, Y., How to leak a secret. In: Adv. in Cryptol. SIACRYPT 2001. Berlin: Springer, pp. 552–565, 2001.
Koblitz, N., Elliptic curve cryptosystems. Math. Comput. 48:203–209, 1987.
Camtepe, S. A., and Yener, B., Key distribution mechanisms for wireless sensor networks: A survey. Technical Report TR–05–07, Rensselaer Polytechnic Institute, 2005.
Shi, E., and Perrig, A., Designing secure sensor networks. IEEE Wirel. Commun Mag. 11:38–43, 2004.
Raazi, S. M. K.-U.-R., Lee, H., Lee, S., and Lee, Y.-K., BARI+: A biometric based distributed key management approach for wireless body area networks. Sensors.10 4:3911–3933, 2010.
Wander, A. S., Gura, N., Eberle, H., Gupta, V., and Shantz, S. C., Energy analysis of public-key cryptography for wireless sensor networks. percom. In: Third IEEE Int. Conf. on Pervasive Comput. and Commun. (PERCOM’05). pp.324–328, 2005.
Gaubatz, G., Kaps, J., Erdin, and Sunar, B., State of the art in ultra-low power public key cryptography for wireless sensor networks, percomw. In: Third IEEE Int. Conf. on Pervasive Comput. and Commun. Workshops (PERCOMW’05). pp. 146–150, 2005.
Liu, A., and Ning, P., TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks. In: Proc. of the 7th Int. Conf. on Inf. Proc. in Sensor Netw. (IPSN 2008). pp. 245–256, 2008.
Acknowledgements
This work was supported by the IT R&D program of MKE/KEIT [KI002113, Development of Security Technology for Car-Healthcare].
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Huang, C., Lee, H. & Lee, D.H. A Privacy-Strengthened Scheme for E-Healthcare Monitoring System. J Med Syst 36, 2959–2971 (2012). https://doi.org/10.1007/s10916-011-9774-2
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10916-011-9774-2