Skip to main content
Erschienen in: Mobile Networks and Applications 6/2011

01.12.2011

A Secure Handshake Scheme with Symptoms-Matching for mHealthcare Social Network

verfasst von: Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin Shen

Erschienen in: Mobile Networks and Applications | Ausgabe 6/2011

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In our aging society, mHealthcare social network (MHSN) built upon wireless body sensor network (WBSN) and mobile communications provides a promising platform for the seniors who have the same symptom to exchange their experiences, give mutual support and inspiration to each other, and help forwarding their health information wirelessly to a related eHealth center. However, there exist many challenging security issues in MHSN such as how to securely identify a senior who has the same symptom, how to prevent others who don’t have the symptom from knowing someone’s symptom? In this paper, to tackle these challenging security issues, we propose a secure same-symptom-based handshake (SSH) scheme. Specifically, in the proposed SSH scheme, each patient is granted with a pseudo-ID and its private key corresponding to his symptom. When two patients meet, only if they have the same symptom, they can use their private keys to make mutual authentication. With the provable security technique, we demonstrate the proposed SSH is secure in the MHSN scenarios. Moreover, we also discuss a promising application – social-based patient health information (PHI) collaborative reporting in MHSN, and conduct extensive simulations to evaluate its efficiency in terms of PHI delivery ratio and reporting delay.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Weitere Produktempfehlungen anzeigen
Fußnoten
1
Note that if the patent user U i have more than one kind of symptoms, he can obtain all corresponding private keys. In our current work, we consider each patient only has one kind of symptom.
 
Literatur
1.
Zurück zum Zitat Lu R, Lin X, Liang X, Shen X (2010) Secure handshake with symptoms-matching: the essential to the success of mhealthcare social network. In: Proc. BodyNets 2010, Corfu Island, Greece Lu R, Lin X, Liang X, Shen X (2010) Secure handshake with symptoms-matching: the essential to the success of mhealthcare social network. In: Proc. BodyNets 2010, Corfu Island, Greece
2.
Zurück zum Zitat Appari A, Johnson ME, Anthony DL (2009) HIPAA compliance in home health: a neo-institutional theoretic perspective. In: SPIMACS ’09, pp 13–20 Appari A, Johnson ME, Anthony DL (2009) HIPAA compliance in home health: a neo-institutional theoretic perspective. In: SPIMACS ’09, pp 13–20
3.
Zurück zum Zitat Chen M, Gonzalez S, Zhang Q, Li M, Leung V (2010) A 2g-rfid based e-healthcare system. IEEE Wirel Commun Mag 17(1):37–43CrossRef Chen M, Gonzalez S, Zhang Q, Li M, Leung V (2010) A 2g-rfid based e-healthcare system. IEEE Wirel Commun Mag 17(1):37–43CrossRef
4.
Zurück zum Zitat Wang H, Peng D, Wang W, Sharif H, Chen HH, Khoynezhad A (2010) Resource-aware secure ECG healthcare monitoring through body sensor networks. IEEE Wirel Commun Mag 17(1):12–19CrossRef Wang H, Peng D, Wang W, Sharif H, Chen HH, Khoynezhad A (2010) Resource-aware secure ECG healthcare monitoring through body sensor networks. IEEE Wirel Commun Mag 17(1):12–19CrossRef
5.
Zurück zum Zitat Li M, Lou W, Ren K (2010) Data security and privacy in wireless body area networks. IEEE Wirel Commun Mag 17(1):51–58CrossRef Li M, Lou W, Ren K (2010) Data security and privacy in wireless body area networks. IEEE Wirel Commun Mag 17(1):51–58CrossRef
6.
Zurück zum Zitat Sun J, Fang Y, Zhu X (2010) Privacy and emergency response in e-healthcare leveraging wireless body sensor networks. IEEE Wirel Commun Mag 17(1):66–73CrossRef Sun J, Fang Y, Zhu X (2010) Privacy and emergency response in e-healthcare leveraging wireless body sensor networks. IEEE Wirel Commun Mag 17(1):66–73CrossRef
7.
Zurück zum Zitat Cheng H, Zhuang W (2010) Bluetooth-enabled in-home patient monitoring system: early detection of Alzheimer’s disease. IEEE Wirel Commun Mag 17(1):74–79CrossRef Cheng H, Zhuang W (2010) Bluetooth-enabled in-home patient monitoring system: early detection of Alzheimer’s disease. IEEE Wirel Commun Mag 17(1):74–79CrossRef
8.
Zurück zum Zitat Misic J, Misic V (2010) Bridge performance in a multitier wireless network for healthcare monitoring. IEEE Wirel Commun Mag 17(1):90–95CrossRef Misic J, Misic V (2010) Bridge performance in a multitier wireless network for healthcare monitoring. IEEE Wirel Commun Mag 17(1):90–95CrossRef
10.
Zurück zum Zitat Kotz D, Avancha S, Baxi A (2009) A privacy framework for mobile health and home-care systems. In: SPIMACS ’09, Chicago, Illinois, USA, pp 1–12 Kotz D, Avancha S, Baxi A (2009) A privacy framework for mobile health and home-care systems. In: SPIMACS ’09, Chicago, Illinois, USA, pp 1–12
11.
Zurück zum Zitat Liang X, Lu R, Lin X, Shen X (2010) Patient self-controllable access policy on PHI in ehealthcare systems. In: AHIC 2010, Kitchener, Ontario, Canada Liang X, Lu R, Lin X, Shen X (2010) Patient self-controllable access policy on PHI in ehealthcare systems. In: AHIC 2010, Kitchener, Ontario, Canada
12.
Zurück zum Zitat Lin X, Lu R, Shen X, Nemoto Y, Kato N (2009) SAGE: a strong privacy-preserving scheme against global eavesdropping for ehealth systems. IEEE J Sel Areas Commun 27:365–378CrossRef Lin X, Lu R, Shen X, Nemoto Y, Kato N (2009) SAGE: a strong privacy-preserving scheme against global eavesdropping for ehealth systems. IEEE J Sel Areas Commun 27:365–378CrossRef
15.
Zurück zum Zitat Izabachene M, Pointcheval D (2008) New anonymity notions for identity-based encryption. In: SCN ’08. LNCS 5229, pp 375–391 Izabachene M, Pointcheval D (2008) New anonymity notions for identity-based encryption. In: SCN ’08. LNCS 5229, pp 375–391
16.
Zurück zum Zitat Bellare M, Rogaway P (1993) Random oracles are practical: a paradigm for designing efficient protocols. In: CCS ’93, pp 62–73 Bellare M, Rogaway P (1993) Random oracles are practical: a paradigm for designing efficient protocols. In: CCS ’93, pp 62–73
17.
Zurück zum Zitat Pietilainen AK, Diot C (2009) Social pocket switched networks. In: INFOCOM’09, Rio de Janeiro, Brazil, pp 403–404 Pietilainen AK, Diot C (2009) Social pocket switched networks. In: INFOCOM’09, Rio de Janeiro, Brazil, pp 403–404
18.
Zurück zum Zitat Balfanz D, Durfee G, Shankar N, Smetters D, Staddon J, Wong H (2003) Secret handshake from pairing-based key agreements. In: IEEE S&P ’03, pp 180–196 Balfanz D, Durfee G, Shankar N, Smetters D, Staddon J, Wong H (2003) Secret handshake from pairing-based key agreements. In: IEEE S&P ’03, pp 180–196
19.
Zurück zum Zitat Su R (2009) On the security of a novel and efficient unlinkable secret handshakes scheme. IEEE Commun Lett 13(9):712–713CrossRef Su R (2009) On the security of a novel and efficient unlinkable secret handshakes scheme. IEEE Commun Lett 13(9):712–713CrossRef
20.
Zurück zum Zitat Zhou L, Susilo W, Mu Y (2006) Three-move secret handshakes. In: ISPEC 2006. LNCS 3903, pp 332–342 Zhou L, Susilo W, Mu Y (2006) Three-move secret handshakes. In: ISPEC 2006. LNCS 3903, pp 332–342
21.
Zurück zum Zitat Lu R, Lin X, Zhu H, Shen X, Preiss BR (2010) Pi: A practical incentive protocol for delay tolerant networks. IEEE Trans Wirel Commun 9(4):1483–1493CrossRef Lu R, Lin X, Zhu H, Shen X, Preiss BR (2010) Pi: A practical incentive protocol for delay tolerant networks. IEEE Trans Wirel Commun 9(4):1483–1493CrossRef
Metadaten
Titel
A Secure Handshake Scheme with Symptoms-Matching for mHealthcare Social Network
verfasst von
Rongxing Lu
Xiaodong Lin
Xiaohui Liang
Xuemin Shen
Publikationsdatum
01.12.2011
Verlag
Springer US
Erschienen in
Mobile Networks and Applications / Ausgabe 6/2011
Print ISSN: 1383-469X
Elektronische ISSN: 1572-8153
DOI
https://doi.org/10.1007/s11036-010-0274-2

Weitere Artikel der Ausgabe 6/2011

Mobile Networks and Applications 6/2011 Zur Ausgabe

Neuer Inhalt