Skip to main content
Erschienen in: Journal of Medical Systems 5/2013

01.10.2013 | Original Paper

An Enhanced Mobile-Healthcare Emergency System Based on Extended Chaotic Maps

verfasst von: Cheng-Chi Lee, Che-Wei Hsu, Yan-Ming Lai, Athanasios Vasilakos

Erschienen in: Journal of Medical Systems | Ausgabe 5/2013

Einloggen, um Zugang zu erhalten

Abstract

Mobile Healthcare (m-Healthcare) systems, namely smartphone applications of pervasive computing that utilize wireless body sensor networks (BSNs), have recently been proposed to provide smartphone users with health monitoring services and received great attentions. An m-Healthcare system with flaws, however, may leak out the smartphone user’s personal information and cause security, privacy preservation, or user anonymity problems. In 2012, Lu et al. proposed a secure and privacy-preserving opportunistic computing (SPOC) framework for mobile-Healthcare emergency. The brilliant SPOC framework can opportunistically gather resources on the smartphone such as computing power and energy to process the computing-intensive personal health information (PHI) in case of an m-Healthcare emergency with minimal privacy disclosure. To balance between the hazard of PHI privacy disclosure and the necessity of PHI processing and transmission in m-Healthcare emergency, in their SPOC framework, Lu et al. introduced an efficient user-centric privacy access control system which they built on the basis of an attribute-based access control mechanism and a new privacy-preserving scalar product computation (PPSPC) technique. However, we found out that Lu et al.’s protocol still has some secure flaws such as user anonymity and mutual authentication. To fix those problems and further enhance the computation efficiency of Lu et al.’s protocol, in this article, the authors will present an improved mobile-Healthcare emergency system based on extended chaotic maps. The new system is capable of not only providing flawless user anonymity and mutual authentication but also reducing the computation cost.
Literatur
1.
Zurück zum Zitat Amirbekyan, A., and Estivill-Castro, V., A new efficient privacy-preserving scalar product protocol. In Proc. of AusDM'07. pp. 209–214, 2007. Amirbekyan, A., and Estivill-Castro, V., A new efficient privacy-preserving scalar product protocol. In Proc. of AusDM'07. pp. 209–214, 2007.
2.
Zurück zum Zitat Avvenuti, M., Corsini, P., Masci, P., and Vecchio, A. Opportunistic computing for wireless sensor networks. In IEEE Proc. of MASS'07. pp. 1–6, 2007. Avvenuti, M., Corsini, P., Masci, P., and Vecchio, A. Opportunistic computing for wireless sensor networks. In IEEE Proc. of MASS'07. pp. 1–6, 2007.
3.
Zurück zum Zitat Bergamo, P., D’Arco, P., De Santis, A., and Kocarev, L., Security of public-key cryptosystems based on Chebyshev polynomials. IEEE Trans. Circ. Syst-I 52(7):1382–1393, 2005.CrossRef Bergamo, P., D’Arco, P., De Santis, A., and Kocarev, L., Security of public-key cryptosystems based on Chebyshev polynomials. IEEE Trans. Circ. Syst-I 52(7):1382–1393, 2005.CrossRef
4.
Zurück zum Zitat D. Boneh and M. K. Franklin, Identity-based encryption from the weil pairing, in Proc. of CRYPTO’01, pp. 213–229, 2001. D. Boneh and M. K. Franklin, Identity-based encryption from the weil pairing, in Proc. of CRYPTO’01, pp. 213–229, 2001.
5.
6.
Zurück zum Zitat Chen, J. T., Boreli, R., and Sivaraman, V., Improving the efficiency of anonymous routing for MANETs. Comput. Commun. 35(5):619–627, 2012.CrossRef Chen, J. T., Boreli, R., and Sivaraman, V., Improving the efficiency of anonymous routing for MANETs. Comput. Commun. 35(5):619–627, 2012.CrossRef
7.
Zurück zum Zitat Conti, M., Giordano, S., May, M., and Passarella, A., From opportunistic networks to opportunistic computing. IEEE Commun. Mag. 48(9):126–139, 2010.CrossRef Conti, M., Giordano, S., May, M., and Passarella, A., From opportunistic networks to opportunistic computing. IEEE Commun. Mag. 48(9):126–139, 2010.CrossRef
8.
Zurück zum Zitat Conti, M., and Kumar, M., Opportunities in opportunistic computing. IEEE Comput. 43(1):42–50, 2010.CrossRef Conti, M., and Kumar, M., Opportunities in opportunistic computing. IEEE Comput. 43(1):42–50, 2010.CrossRef
9.
Zurück zum Zitat W. Du and M. Atallah, Privacy-preserving cooperative statistical analysis, in Proc. of ACSAC'01, pp. 102–111, 2001. W. Du and M. Atallah, Privacy-preserving cooperative statistical analysis, in Proc. of ACSAC'01, pp. 102–111, 2001.
10.
Zurück zum Zitat Han, S., and Chang, E., Chaotic map based key agreement with/out clock synchronization. Chaos, Solitons Fractals 39(3):1283–1289, 2009.MathSciNetCrossRefMATH Han, S., and Chang, E., Chaotic map based key agreement with/out clock synchronization. Chaos, Solitons Fractals 39(3):1283–1289, 2009.MathSciNetCrossRefMATH
11.
Zurück zum Zitat He, D., Chen, Y., and Chen, J., Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol. Nonlinear Dyn 69(3):1149–1157, 2012.MathSciNetCrossRefMATH He, D., Chen, Y., and Chen, J., Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol. Nonlinear Dyn 69(3):1149–1157, 2012.MathSciNetCrossRefMATH
12.
Zurück zum Zitat Huang, J. L., Yeh, L. Y., and Chien, H. Y., ABAKA: An anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks. IEEE Trans. Veh. Technol. 60(1):248–262, 2011.CrossRef Huang, J. L., Yeh, L. Y., and Chien, H. Y., ABAKA: An anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks. IEEE Trans. Veh. Technol. 60(1):248–262, 2011.CrossRef
13.
Zurück zum Zitat Lee, C. C., Chen, C. L., Wu, C. Y., and Huang, S. Y., An extended chaotic maps-based key agreement protocol with user anonymity. Nonlinear Dyn. 69(1–2):79–87, 2012.MathSciNetCrossRefMATH Lee, C. C., Chen, C. L., Wu, C. Y., and Huang, S. Y., An extended chaotic maps-based key agreement protocol with user anonymity. Nonlinear Dyn. 69(1–2):79–87, 2012.MathSciNetCrossRefMATH
14.
Zurück zum Zitat Lee, C. C., and Hsu, C. W., A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps. Nonlinear Dyn. 71(1–2):201–211, 2013.MathSciNetCrossRef Lee, C. C., and Hsu, C. W., A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps. Nonlinear Dyn. 71(1–2):201–211, 2013.MathSciNetCrossRef
16.
Zurück zum Zitat Li, M., Lou, W., and Ren, K., Data security and privacy in wireless body area networks. IEEE Wirel. Commun. 17(1):51–58, 2010.CrossRef Li, M., Lou, W., and Ren, K., Data security and privacy in wireless body area networks. IEEE Wirel. Commun. 17(1):51–58, 2010.CrossRef
17.
Zurück zum Zitat Lin, X., Lu, R., Shen, X., Nemoto, Y., and Kato, N., Sage: A strong privacy-preserving scheme against global eavesdropping for Ehealth systems. IEEE J. Select. Areas Commun. 27(4):365–378, 2009.CrossRef Lin, X., Lu, R., Shen, X., Nemoto, Y., and Kato, N., Sage: A strong privacy-preserving scheme against global eavesdropping for Ehealth systems. IEEE J. Select. Areas Commun. 27(4):365–378, 2009.CrossRef
18.
Zurück zum Zitat Lin, X., Sun, X., Ho, P., and Shen, X., Gsis: A secure and privacy preserving protocol for vehicular communications. IEEE Trans. Veh. Technol. 56(6):3442–3456, 2007.CrossRef Lin, X., Sun, X., Ho, P., and Shen, X., Gsis: A secure and privacy preserving protocol for vehicular communications. IEEE Trans. Veh. Technol. 56(6):3442–3456, 2007.CrossRef
19.
Zurück zum Zitat Li, M., Yu, S., Zheng, Y., Ren, K., and Lou, W., Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans. Parallel Distrib. Syst. 24(1):131–143, 2013.CrossRef Li, M., Yu, S., Zheng, Y., Ren, K., and Lou, W., Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans. Parallel Distrib. Syst. 24(1):131–143, 2013.CrossRef
20.
Zurück zum Zitat Lu, H., Lane, N. D., Eisenman, S. B., and Campbell, A. T., Bubble-sensing: Binding sensing tasks to the physical world. Pervasive Mob. Comput. 6(1):58–71, 2010.CrossRef Lu, H., Lane, N. D., Eisenman, S. B., and Campbell, A. T., Bubble-sensing: Binding sensing tasks to the physical world. Pervasive Mob. Comput. 6(1):58–71, 2010.CrossRef
21.
Zurück zum Zitat Lu, R., Lin, X., Liang, X., and Shen, X., A secure handshake scheme with symptoms-matching for Mhealthcare social network. Mob. Netw. Appl. 16(6):683–694, 2011.CrossRef Lu, R., Lin, X., Liang, X., and Shen, X., A secure handshake scheme with symptoms-matching for Mhealthcare social network. Mob. Netw. Appl. 16(6):683–694, 2011.CrossRef
22.
Zurück zum Zitat R. Lu, X. Lin, X. Liang, and X. Shen, Secure handshake with symptoms-matching: the essential to the success of Mhealthcare social network, in Proc. BodyNets'10, pp. 8–15, 2010. R. Lu, X. Lin, X. Liang, and X. Shen, Secure handshake with symptoms-matching: the essential to the success of Mhealthcare social network, in Proc. BodyNets'10, pp. 8–15, 2010.
23.
Zurück zum Zitat Lu, R., Lin, X., Luan, H., Liang, X., and Shen, X., Pseudonym changing at social spots: An effective strategy for location privacy in VANETs. IEEE Trans. Veh. Technol. 61(1):86–96, 2012.CrossRef Lu, R., Lin, X., Luan, H., Liang, X., and Shen, X., Pseudonym changing at social spots: An effective strategy for location privacy in VANETs. IEEE Trans. Veh. Technol. 61(1):86–96, 2012.CrossRef
24.
Zurück zum Zitat Lu, R., Lin, X., and Shen, X., SPOC: A secure and privacy-preserving opportunistic computing framework for mobile-healthcare emergency. IEEE Trans. Parallel Distrib. Syst. 24(3):614–624, 2012.CrossRef Lu, R., Lin, X., and Shen, X., SPOC: A secure and privacy-preserving opportunistic computing framework for mobile-healthcare emergency. IEEE Trans. Parallel Distrib. Syst. 24(3):614–624, 2012.CrossRef
25.
Zurück zum Zitat Lu, R., Lin, X., Zhu, H., and Shen, X., An intelligent secure and privacy-preserving parking scheme through vehicular communications. IEEE Trans. Veh. Technol. 59(6):2772–2785, 2010.CrossRef Lu, R., Lin, X., Zhu, H., and Shen, X., An intelligent secure and privacy-preserving parking scheme through vehicular communications. IEEE Trans. Veh. Technol. 59(6):2772–2785, 2010.CrossRef
26.
Zurück zum Zitat J. C. Mason and D. C. Handscomb, Chebyshev polynomials Chapman & Hall/CRC Press, New York NY 10017, USA, 2003. J. C. Mason and D. C. Handscomb, Chebyshev polynomials Chapman & Hall/CRC Press, New York NY 10017, USA, 2003.
27.
Zurück zum Zitat Miyaji, A., Nakabayashi, M., and Takano, S., New explicit conditions of elliptic curve traces for FR-reduction. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. E84-A(5):1234–1243, 2001. Miyaji, A., Nakabayashi, M., and Takano, S., New explicit conditions of elliptic curve traces for FR-reduction. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. E84-A(5):1234–1243, 2001.
28.
Zurück zum Zitat A. Passarella, M. Conti, E. Borgia, and M. Kumar, Performance evaluation of service execution in opportunistic computing, in Proc. of ACM MSWIM'10, pp. 291–298, 2010. A. Passarella, M. Conti, E. Borgia, and M. Kumar, Performance evaluation of service execution in opportunistic computing, in Proc. of ACM MSWIM'10, pp. 291–298, 2010.
29.
Zurück zum Zitat Ren, Y., Pazzi, R. W. N., and Boukerche, A., Monitoring patients via a secure and mobile healthcare system. IEEE Wirel. Commun. 17(1):59–65, 2010.CrossRef Ren, Y., Pazzi, R. W. N., and Boukerche, A., Monitoring patients via a secure and mobile healthcare system. IEEE Wirel. Commun. 17(1):59–65, 2010.CrossRef
30.
Zurück zum Zitat Sun, J., and Fang, Y., Cross-domain data sharing in distributed electronic health record systems. IEEE Trans. Parallel Distrib. Syst. 21(6):754–764, 2010.MathSciNetCrossRef Sun, J., and Fang, Y., Cross-domain data sharing in distributed electronic health record systems. IEEE Trans. Parallel Distrib. Syst. 21(6):754–764, 2010.MathSciNetCrossRef
31.
Zurück zum Zitat Toninelli, A., Montanari, R., and Corradi, A., Enabling secure service discovery in mobile healthcare enterprise networks. IEEE Wirel. Commun. 16(3):24–32, 2009.CrossRef Toninelli, A., Montanari, R., and Corradi, A., Enabling secure service discovery in mobile healthcare enterprise networks. IEEE Wirel. Commun. 16(3):24–32, 2009.CrossRef
32.
Zurück zum Zitat J. Vaidya and C. Clifton, Privacy preserving association rule mining in vertically partitioned data, in Proc. of ACM KDD'02, pp. 639–644, 2002. J. Vaidya and C. Clifton, Privacy preserving association rule mining in vertically partitioned data, in Proc. of ACM KDD'02, pp. 639–644, 2002.
34.
Zurück zum Zitat Yoon, E. J., Efficiency and security problems of anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 17(7):2735–2740, 2012.MathSciNetCrossRefMATH Yoon, E. J., Efficiency and security problems of anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 17(7):2735–2740, 2012.MathSciNetCrossRefMATH
35.
Zurück zum Zitat Yuce, M. R., Ng, S. W. P., Myo, N. L., Khan, J. Y., and Liu, W., Wireless body sensor network using medical implant band. J. Med. Syst. 31(6):467–474, 2007.CrossRef Yuce, M. R., Ng, S. W. P., Myo, N. L., Khan, J. Y., and Liu, W., Wireless body sensor network using medical implant band. J. Med. Syst. 31(6):467–474, 2007.CrossRef
36.
Zurück zum Zitat Zhang, L., Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos, Solitons Fractals 37(3):669–674, 2008.MathSciNetCrossRefMATH Zhang, L., Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos, Solitons Fractals 37(3):669–674, 2008.MathSciNetCrossRefMATH
Metadaten
Titel
An Enhanced Mobile-Healthcare Emergency System Based on Extended Chaotic Maps
verfasst von
Cheng-Chi Lee
Che-Wei Hsu
Yan-Ming Lai
Athanasios Vasilakos
Publikationsdatum
01.10.2013
Verlag
Springer US
Erschienen in
Journal of Medical Systems / Ausgabe 5/2013
Print ISSN: 0148-5598
Elektronische ISSN: 1573-689X
DOI
https://doi.org/10.1007/s10916-013-9973-0

Weitere Artikel der Ausgabe 5/2013

Journal of Medical Systems 5/2013 Zur Ausgabe