Skip to main content
Erschienen in: Mobile Networks and Applications 3/2014

01.06.2014

RCare: Extending Secure Health Care to Rural Area Using VANETs

verfasst von: Mrinmoy Barua, Xiaohui Liang, Rongxing Lu, Xuemin (Sheman) Shen

Erschienen in: Mobile Networks and Applications | Ausgabe 3/2014

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this paper, we propose a delay-tolerant secure long-term health care scheme, RCare, for collecting patient’s sensitive personal health information (PHI). Specifically, to minimize the overall health care cost, RCare provides network connectivity to rural areas using conventional transportation vehicles (e.g., cars, buses) as relay nodes. These vehicles are expected to store, carry, and forward the PHI to the health-service-provider located mostly at the city area following an opportunistic routing. RCare improves network performance by providing incentive to the cooperative vehicles, and encompasses identity based cryptography to ensure security and privacy of the PHI during the routing period by using short digital signature and pseudo-identity. Network fairness and resistance to different possible attacks are also ensured by RCare. Extensive security and performance analyses demonstrate that RCare is able to achieve desired security requirements with effectiveness in terms of high delivery ratio with acceptable communication delay.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Weitere Produktempfehlungen anzeigen
Literatur
2.
Zurück zum Zitat Barua M, Alam MS, Liang X, Shen X (2011) Secure and quality of service assurance scheduling scheme for wban with application to ehealth. Wireless communications and networking conference (WCNC), 2011 IEEE, pp 1–5. Cancun, Quintana-Roo, Mexico Barua M, Alam MS, Liang X, Shen X (2011) Secure and quality of service assurance scheduling scheme for wban with application to ehealth. Wireless communications and networking conference (WCNC), 2011 IEEE, pp 1–5. Cancun, Quintana-Roo, Mexico
3.
Zurück zum Zitat Barua M, Liang X, Lu R, Shen X (2011) ESPAC: enabling security and patient-centric access control for ehealth in cloud computing. Int J Secur Netw 6(2/3):67–76CrossRef Barua M, Liang X, Lu R, Shen X (2011) ESPAC: enabling security and patient-centric access control for ehealth in cloud computing. Int J Secur Netw 6(2/3):67–76CrossRef
4.
Zurück zum Zitat Boneh D, Franklin MK (2001) Identity-based encryption from the weil pairing. In: CRYPTO ’01: proceedings of the 21st annual international cryptology conference on advances in cryptology. Springer-Verlag, London, pp 213–229 Boneh D, Franklin MK (2001) Identity-based encryption from the weil pairing. In: CRYPTO ’01: proceedings of the 21st annual international cryptology conference on advances in cryptology. Springer-Verlag, London, pp 213–229
5.
Zurück zum Zitat Ding Q, Li X, Jiang M, Zhou X (2010) Reputation-based trust model in vehicular ad hoc networks. In: International conference on wireless communications and signal processing (WCSP), pp 1–6 Ding Q, Li X, Jiang M, Zhou X (2010) Reputation-based trust model in vehicular ad hoc networks. In: International conference on wireless communications and signal processing (WCSP), pp 1–6
6.
Zurück zum Zitat Doorenbos A, Kundu A, Eaton L, Demiris G, Haozous E, Towle C, Buchwald D (2011) Enhancing access to cancer education for rural healthcare providers via telehealth. J Cancer Educ 26:682–686CrossRef Doorenbos A, Kundu A, Eaton L, Demiris G, Haozous E, Towle C, Buchwald D (2011) Enhancing access to cancer education for rural healthcare providers via telehealth. J Cancer Educ 26:682–686CrossRef
7.
Zurück zum Zitat Elmufti K, Weerasinghe D, Rajarajan M, Rakocevic V, Khan S (2008) Timestamp authentication protocol for remote monitoring in ehealth. In: International conference on pervasive computing technologies for healthcare (PervasiveHealth), pp 73–76 Elmufti K, Weerasinghe D, Rajarajan M, Rakocevic V, Khan S (2008) Timestamp authentication protocol for remote monitoring in ehealth. In: International conference on pervasive computing technologies for healthcare (PervasiveHealth), pp 73–76
8.
Zurück zum Zitat Jiang D, Delgrossi L (2008) IEEE 802.11p: towards an international standard for wireless access in vehicular environments. In: IEEE vehicular technology conference, pp 2036–2040 Jiang D, Delgrossi L (2008) IEEE 802.11p: towards an international standard for wireless access in vehicular environments. In: IEEE vehicular technology conference, pp 2036–2040
10.
Zurück zum Zitat Liang X, Li X, Shen Q, Lu R, Lin X, Shen X, Zhuang W (2012) Exploiting prediction to enable secure and reliable routing in wireless body area networks. In: INFOCOM, 2012 proceedings IEEE, pp 388–396 Liang X, Li X, Shen Q, Lu R, Lin X, Shen X, Zhuang W (2012) Exploiting prediction to enable secure and reliable routing in wireless body area networks. In: INFOCOM, 2012 proceedings IEEE, pp 388–396
11.
Zurück zum Zitat Lin X, Lu R, Shen X, Nemoto Y, Kato N (2009) Sage: a strong privacy-preserving scheme against global eavesdropping for ehealth systems. IEEE J Sel Areas Commun 27(4):365–378CrossRef Lin X, Lu R, Shen X, Nemoto Y, Kato N (2009) Sage: a strong privacy-preserving scheme against global eavesdropping for ehealth systems. IEEE J Sel Areas Commun 27(4):365–378CrossRef
12.
Zurück zum Zitat Lu R, Lin X, Zhu H, Shen X, Preiss B (2010) Pi: a practical incentive protocol for delay tolerant networks. IEEE Trans Wireless Commun 9(4):1483–1493CrossRef Lu R, Lin X, Zhu H, Shen X, Preiss B (2010) Pi: a practical incentive protocol for delay tolerant networks. IEEE Trans Wireless Commun 9(4):1483–1493CrossRef
13.
Zurück zum Zitat Lu R, Lin X, Zhu H, Zhang C, Ho PH, Shen X (2008) A novel fair incentive protocol for mobile ad hoc networks. In: IEEE wireless communications and networking conference (WCNC), pp 3237–3242 Lu R, Lin X, Zhu H, Zhang C, Ho PH, Shen X (2008) A novel fair incentive protocol for mobile ad hoc networks. In: IEEE wireless communications and networking conference (WCNC), pp 3237–3242
14.
Zurück zum Zitat Mahmoud ME, Shen X (2011) Esip: secure incentive protocol with limited use of public-key cryptography for multihop wireless networks. IEEE Trans Mobile Comput 10(7):997–1010CrossRef Mahmoud ME, Shen X (2011) Esip: secure incentive protocol with limited use of public-key cryptography for multihop wireless networks. IEEE Trans Mobile Comput 10(7):997–1010CrossRef
15.
Zurück zum Zitat Masi M, Pugliese R, Tiezzi F (2011) A standard-driven communication protocol for disconnected clinics in rural areas. In: IEEE international conference on e-Health networking applications and services (Healthcom), pp 304–311 Masi M, Pugliese R, Tiezzi F (2011) A standard-driven communication protocol for disconnected clinics in rural areas. In: IEEE international conference on e-Health networking applications and services (Healthcom), pp 304–311
16.
Zurück zum Zitat Niyato D, Hossain E, Camorlinga S (2009) Remote patient monitoring service using heterogeneous wireless access networks: architecture and optimization. IEEE J Sel Areas Commun 27(4):412–423CrossRef Niyato D, Hossain E, Camorlinga S (2009) Remote patient monitoring service using heterogeneous wireless access networks: architecture and optimization. IEEE J Sel Areas Commun 27(4):412–423CrossRef
17.
Zurück zum Zitat Ramachandran A, Zhou Z, Huang D (2007) Computing cryptographic algorithms in portable and embedded devices. In: IEEE international conference on portable information devices, PORTABLE07, pp 1–7 Ramachandran A, Zhou Z, Huang D (2007) Computing cryptographic algorithms in portable and embedded devices. In: IEEE international conference on portable information devices, PORTABLE07, pp 1–7
18.
Zurück zum Zitat Shevade U, Song HH, Qiu L, Zhang Y (2008) Incentive-aware routing in dtns. In: IEEE international conference on network protocols (ICNP), pp 238–247 Shevade U, Song HH, Qiu L, Zhang Y (2008) Incentive-aware routing in dtns. In: IEEE international conference on network protocols (ICNP), pp 238–247
20.
Zurück zum Zitat Zhang L, Wu Q, Qin B, Domingo-Ferrer J (2011) Appa: aggregate privacy-preserving authentication in vehicular ad hoc networks. In: Lai X, Zhou J, Li H (eds) Information security, lecture notes in computer science, vol 7001. Springer, Berlin/Heidelberg, pp 293–308 Zhang L, Wu Q, Qin B, Domingo-Ferrer J (2011) Appa: aggregate privacy-preserving authentication in vehicular ad hoc networks. In: Lai X, Zhou J, Li H (eds) Information security, lecture notes in computer science, vol 7001. Springer, Berlin/Heidelberg, pp 293–308
21.
Zurück zum Zitat Zhu H, Lin X, Lu R, Fan Y, Shen X (2009) Smart: a secure multilayer credit-based incentive scheme for delay-tolerant networks. IEEE Trans Vehic Technol 58(8):4628–4639CrossRef Zhu H, Lin X, Lu R, Fan Y, Shen X (2009) Smart: a secure multilayer credit-based incentive scheme for delay-tolerant networks. IEEE Trans Vehic Technol 58(8):4628–4639CrossRef
22.
Zurück zum Zitat Zhu R, Yang G, Wong D (2005) An efficient identity-based key exchange protocol with kgs forward secrecy for low-power devices. Internet Netw Econ 3828:500–509CrossRef Zhu R, Yang G, Wong D (2005) An efficient identity-based key exchange protocol with kgs forward secrecy for low-power devices. Internet Netw Econ 3828:500–509CrossRef
Metadaten
Titel
RCare: Extending Secure Health Care to Rural Area Using VANETs
verfasst von
Mrinmoy Barua
Xiaohui Liang
Rongxing Lu
Xuemin (Sheman) Shen
Publikationsdatum
01.06.2014
Verlag
Springer US
Erschienen in
Mobile Networks and Applications / Ausgabe 3/2014
Print ISSN: 1383-469X
Elektronische ISSN: 1572-8153
DOI
https://doi.org/10.1007/s11036-013-0446-y

Weitere Artikel der Ausgabe 3/2014

Mobile Networks and Applications 3/2014 Zur Ausgabe

Neuer Inhalt