Skip to main content
Top
Published in: Journal of Medical Systems 5/2013

01-10-2013 | Original Paper

An Enhanced Mobile-Healthcare Emergency System Based on Extended Chaotic Maps

Authors: Cheng-Chi Lee, Che-Wei Hsu, Yan-Ming Lai, Athanasios Vasilakos

Published in: Journal of Medical Systems | Issue 5/2013

Login to get access

Abstract

Mobile Healthcare (m-Healthcare) systems, namely smartphone applications of pervasive computing that utilize wireless body sensor networks (BSNs), have recently been proposed to provide smartphone users with health monitoring services and received great attentions. An m-Healthcare system with flaws, however, may leak out the smartphone user’s personal information and cause security, privacy preservation, or user anonymity problems. In 2012, Lu et al. proposed a secure and privacy-preserving opportunistic computing (SPOC) framework for mobile-Healthcare emergency. The brilliant SPOC framework can opportunistically gather resources on the smartphone such as computing power and energy to process the computing-intensive personal health information (PHI) in case of an m-Healthcare emergency with minimal privacy disclosure. To balance between the hazard of PHI privacy disclosure and the necessity of PHI processing and transmission in m-Healthcare emergency, in their SPOC framework, Lu et al. introduced an efficient user-centric privacy access control system which they built on the basis of an attribute-based access control mechanism and a new privacy-preserving scalar product computation (PPSPC) technique. However, we found out that Lu et al.’s protocol still has some secure flaws such as user anonymity and mutual authentication. To fix those problems and further enhance the computation efficiency of Lu et al.’s protocol, in this article, the authors will present an improved mobile-Healthcare emergency system based on extended chaotic maps. The new system is capable of not only providing flawless user anonymity and mutual authentication but also reducing the computation cost.
Literature
1.
go back to reference Amirbekyan, A., and Estivill-Castro, V., A new efficient privacy-preserving scalar product protocol. In Proc. of AusDM'07. pp. 209–214, 2007. Amirbekyan, A., and Estivill-Castro, V., A new efficient privacy-preserving scalar product protocol. In Proc. of AusDM'07. pp. 209–214, 2007.
2.
go back to reference Avvenuti, M., Corsini, P., Masci, P., and Vecchio, A. Opportunistic computing for wireless sensor networks. In IEEE Proc. of MASS'07. pp. 1–6, 2007. Avvenuti, M., Corsini, P., Masci, P., and Vecchio, A. Opportunistic computing for wireless sensor networks. In IEEE Proc. of MASS'07. pp. 1–6, 2007.
3.
go back to reference Bergamo, P., D’Arco, P., De Santis, A., and Kocarev, L., Security of public-key cryptosystems based on Chebyshev polynomials. IEEE Trans. Circ. Syst-I 52(7):1382–1393, 2005.CrossRef Bergamo, P., D’Arco, P., De Santis, A., and Kocarev, L., Security of public-key cryptosystems based on Chebyshev polynomials. IEEE Trans. Circ. Syst-I 52(7):1382–1393, 2005.CrossRef
4.
go back to reference D. Boneh and M. K. Franklin, Identity-based encryption from the weil pairing, in Proc. of CRYPTO’01, pp. 213–229, 2001. D. Boneh and M. K. Franklin, Identity-based encryption from the weil pairing, in Proc. of CRYPTO’01, pp. 213–229, 2001.
6.
go back to reference Chen, J. T., Boreli, R., and Sivaraman, V., Improving the efficiency of anonymous routing for MANETs. Comput. Commun. 35(5):619–627, 2012.CrossRef Chen, J. T., Boreli, R., and Sivaraman, V., Improving the efficiency of anonymous routing for MANETs. Comput. Commun. 35(5):619–627, 2012.CrossRef
7.
go back to reference Conti, M., Giordano, S., May, M., and Passarella, A., From opportunistic networks to opportunistic computing. IEEE Commun. Mag. 48(9):126–139, 2010.CrossRef Conti, M., Giordano, S., May, M., and Passarella, A., From opportunistic networks to opportunistic computing. IEEE Commun. Mag. 48(9):126–139, 2010.CrossRef
8.
go back to reference Conti, M., and Kumar, M., Opportunities in opportunistic computing. IEEE Comput. 43(1):42–50, 2010.CrossRef Conti, M., and Kumar, M., Opportunities in opportunistic computing. IEEE Comput. 43(1):42–50, 2010.CrossRef
9.
go back to reference W. Du and M. Atallah, Privacy-preserving cooperative statistical analysis, in Proc. of ACSAC'01, pp. 102–111, 2001. W. Du and M. Atallah, Privacy-preserving cooperative statistical analysis, in Proc. of ACSAC'01, pp. 102–111, 2001.
10.
go back to reference Han, S., and Chang, E., Chaotic map based key agreement with/out clock synchronization. Chaos, Solitons Fractals 39(3):1283–1289, 2009.MathSciNetCrossRefMATH Han, S., and Chang, E., Chaotic map based key agreement with/out clock synchronization. Chaos, Solitons Fractals 39(3):1283–1289, 2009.MathSciNetCrossRefMATH
11.
go back to reference He, D., Chen, Y., and Chen, J., Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol. Nonlinear Dyn 69(3):1149–1157, 2012.MathSciNetCrossRefMATH He, D., Chen, Y., and Chen, J., Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol. Nonlinear Dyn 69(3):1149–1157, 2012.MathSciNetCrossRefMATH
12.
go back to reference Huang, J. L., Yeh, L. Y., and Chien, H. Y., ABAKA: An anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks. IEEE Trans. Veh. Technol. 60(1):248–262, 2011.CrossRef Huang, J. L., Yeh, L. Y., and Chien, H. Y., ABAKA: An anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks. IEEE Trans. Veh. Technol. 60(1):248–262, 2011.CrossRef
13.
go back to reference Lee, C. C., Chen, C. L., Wu, C. Y., and Huang, S. Y., An extended chaotic maps-based key agreement protocol with user anonymity. Nonlinear Dyn. 69(1–2):79–87, 2012.MathSciNetCrossRefMATH Lee, C. C., Chen, C. L., Wu, C. Y., and Huang, S. Y., An extended chaotic maps-based key agreement protocol with user anonymity. Nonlinear Dyn. 69(1–2):79–87, 2012.MathSciNetCrossRefMATH
14.
go back to reference Lee, C. C., and Hsu, C. W., A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps. Nonlinear Dyn. 71(1–2):201–211, 2013.MathSciNetCrossRef Lee, C. C., and Hsu, C. W., A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps. Nonlinear Dyn. 71(1–2):201–211, 2013.MathSciNetCrossRef
16.
go back to reference Li, M., Lou, W., and Ren, K., Data security and privacy in wireless body area networks. IEEE Wirel. Commun. 17(1):51–58, 2010.CrossRef Li, M., Lou, W., and Ren, K., Data security and privacy in wireless body area networks. IEEE Wirel. Commun. 17(1):51–58, 2010.CrossRef
17.
go back to reference Lin, X., Lu, R., Shen, X., Nemoto, Y., and Kato, N., Sage: A strong privacy-preserving scheme against global eavesdropping for Ehealth systems. IEEE J. Select. Areas Commun. 27(4):365–378, 2009.CrossRef Lin, X., Lu, R., Shen, X., Nemoto, Y., and Kato, N., Sage: A strong privacy-preserving scheme against global eavesdropping for Ehealth systems. IEEE J. Select. Areas Commun. 27(4):365–378, 2009.CrossRef
18.
go back to reference Lin, X., Sun, X., Ho, P., and Shen, X., Gsis: A secure and privacy preserving protocol for vehicular communications. IEEE Trans. Veh. Technol. 56(6):3442–3456, 2007.CrossRef Lin, X., Sun, X., Ho, P., and Shen, X., Gsis: A secure and privacy preserving protocol for vehicular communications. IEEE Trans. Veh. Technol. 56(6):3442–3456, 2007.CrossRef
19.
go back to reference Li, M., Yu, S., Zheng, Y., Ren, K., and Lou, W., Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans. Parallel Distrib. Syst. 24(1):131–143, 2013.CrossRef Li, M., Yu, S., Zheng, Y., Ren, K., and Lou, W., Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans. Parallel Distrib. Syst. 24(1):131–143, 2013.CrossRef
20.
go back to reference Lu, H., Lane, N. D., Eisenman, S. B., and Campbell, A. T., Bubble-sensing: Binding sensing tasks to the physical world. Pervasive Mob. Comput. 6(1):58–71, 2010.CrossRef Lu, H., Lane, N. D., Eisenman, S. B., and Campbell, A. T., Bubble-sensing: Binding sensing tasks to the physical world. Pervasive Mob. Comput. 6(1):58–71, 2010.CrossRef
21.
go back to reference Lu, R., Lin, X., Liang, X., and Shen, X., A secure handshake scheme with symptoms-matching for Mhealthcare social network. Mob. Netw. Appl. 16(6):683–694, 2011.CrossRef Lu, R., Lin, X., Liang, X., and Shen, X., A secure handshake scheme with symptoms-matching for Mhealthcare social network. Mob. Netw. Appl. 16(6):683–694, 2011.CrossRef
22.
go back to reference R. Lu, X. Lin, X. Liang, and X. Shen, Secure handshake with symptoms-matching: the essential to the success of Mhealthcare social network, in Proc. BodyNets'10, pp. 8–15, 2010. R. Lu, X. Lin, X. Liang, and X. Shen, Secure handshake with symptoms-matching: the essential to the success of Mhealthcare social network, in Proc. BodyNets'10, pp. 8–15, 2010.
23.
go back to reference Lu, R., Lin, X., Luan, H., Liang, X., and Shen, X., Pseudonym changing at social spots: An effective strategy for location privacy in VANETs. IEEE Trans. Veh. Technol. 61(1):86–96, 2012.CrossRef Lu, R., Lin, X., Luan, H., Liang, X., and Shen, X., Pseudonym changing at social spots: An effective strategy for location privacy in VANETs. IEEE Trans. Veh. Technol. 61(1):86–96, 2012.CrossRef
24.
go back to reference Lu, R., Lin, X., and Shen, X., SPOC: A secure and privacy-preserving opportunistic computing framework for mobile-healthcare emergency. IEEE Trans. Parallel Distrib. Syst. 24(3):614–624, 2012.CrossRef Lu, R., Lin, X., and Shen, X., SPOC: A secure and privacy-preserving opportunistic computing framework for mobile-healthcare emergency. IEEE Trans. Parallel Distrib. Syst. 24(3):614–624, 2012.CrossRef
25.
go back to reference Lu, R., Lin, X., Zhu, H., and Shen, X., An intelligent secure and privacy-preserving parking scheme through vehicular communications. IEEE Trans. Veh. Technol. 59(6):2772–2785, 2010.CrossRef Lu, R., Lin, X., Zhu, H., and Shen, X., An intelligent secure and privacy-preserving parking scheme through vehicular communications. IEEE Trans. Veh. Technol. 59(6):2772–2785, 2010.CrossRef
26.
go back to reference J. C. Mason and D. C. Handscomb, Chebyshev polynomials Chapman & Hall/CRC Press, New York NY 10017, USA, 2003. J. C. Mason and D. C. Handscomb, Chebyshev polynomials Chapman & Hall/CRC Press, New York NY 10017, USA, 2003.
27.
go back to reference Miyaji, A., Nakabayashi, M., and Takano, S., New explicit conditions of elliptic curve traces for FR-reduction. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. E84-A(5):1234–1243, 2001. Miyaji, A., Nakabayashi, M., and Takano, S., New explicit conditions of elliptic curve traces for FR-reduction. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. E84-A(5):1234–1243, 2001.
28.
go back to reference A. Passarella, M. Conti, E. Borgia, and M. Kumar, Performance evaluation of service execution in opportunistic computing, in Proc. of ACM MSWIM'10, pp. 291–298, 2010. A. Passarella, M. Conti, E. Borgia, and M. Kumar, Performance evaluation of service execution in opportunistic computing, in Proc. of ACM MSWIM'10, pp. 291–298, 2010.
29.
go back to reference Ren, Y., Pazzi, R. W. N., and Boukerche, A., Monitoring patients via a secure and mobile healthcare system. IEEE Wirel. Commun. 17(1):59–65, 2010.CrossRef Ren, Y., Pazzi, R. W. N., and Boukerche, A., Monitoring patients via a secure and mobile healthcare system. IEEE Wirel. Commun. 17(1):59–65, 2010.CrossRef
30.
go back to reference Sun, J., and Fang, Y., Cross-domain data sharing in distributed electronic health record systems. IEEE Trans. Parallel Distrib. Syst. 21(6):754–764, 2010.MathSciNetCrossRef Sun, J., and Fang, Y., Cross-domain data sharing in distributed electronic health record systems. IEEE Trans. Parallel Distrib. Syst. 21(6):754–764, 2010.MathSciNetCrossRef
31.
go back to reference Toninelli, A., Montanari, R., and Corradi, A., Enabling secure service discovery in mobile healthcare enterprise networks. IEEE Wirel. Commun. 16(3):24–32, 2009.CrossRef Toninelli, A., Montanari, R., and Corradi, A., Enabling secure service discovery in mobile healthcare enterprise networks. IEEE Wirel. Commun. 16(3):24–32, 2009.CrossRef
32.
go back to reference J. Vaidya and C. Clifton, Privacy preserving association rule mining in vertically partitioned data, in Proc. of ACM KDD'02, pp. 639–644, 2002. J. Vaidya and C. Clifton, Privacy preserving association rule mining in vertically partitioned data, in Proc. of ACM KDD'02, pp. 639–644, 2002.
34.
go back to reference Yoon, E. J., Efficiency and security problems of anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 17(7):2735–2740, 2012.MathSciNetCrossRefMATH Yoon, E. J., Efficiency and security problems of anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 17(7):2735–2740, 2012.MathSciNetCrossRefMATH
35.
go back to reference Yuce, M. R., Ng, S. W. P., Myo, N. L., Khan, J. Y., and Liu, W., Wireless body sensor network using medical implant band. J. Med. Syst. 31(6):467–474, 2007.CrossRef Yuce, M. R., Ng, S. W. P., Myo, N. L., Khan, J. Y., and Liu, W., Wireless body sensor network using medical implant band. J. Med. Syst. 31(6):467–474, 2007.CrossRef
36.
go back to reference Zhang, L., Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos, Solitons Fractals 37(3):669–674, 2008.MathSciNetCrossRefMATH Zhang, L., Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos, Solitons Fractals 37(3):669–674, 2008.MathSciNetCrossRefMATH
Metadata
Title
An Enhanced Mobile-Healthcare Emergency System Based on Extended Chaotic Maps
Authors
Cheng-Chi Lee
Che-Wei Hsu
Yan-Ming Lai
Athanasios Vasilakos
Publication date
01-10-2013
Publisher
Springer US
Published in
Journal of Medical Systems / Issue 5/2013
Print ISSN: 0148-5598
Electronic ISSN: 1573-689X
DOI
https://doi.org/10.1007/s10916-013-9973-0

Other articles of this Issue 5/2013

Journal of Medical Systems 5/2013 Go to the issue