Skip to main content
Top
Published in: Journal of Medical Systems 5/2016

01-05-2016 | Mobile Systems

A Secure Cloud-Assisted Wireless Body Area Network in Mobile Emergency Medical Care System

Authors: Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng

Published in: Journal of Medical Systems | Issue 5/2016

Login to get access

Abstract

Recent advances in medical treatment and emergency applications, the need of integrating wireless body area network (WBAN) with cloud computing can be motivated by providing useful and real time information about patients’ health state to the doctors and emergency staffs. WBAN is a set of body sensors carried by the patient to collect and transmit numerous health items to medical clouds via wireless and public communication channels. Therefore, a cloud-assisted WBAN facilitates response in case of emergency which can save patients’ lives. Since the patient’s data is sensitive and private, it is important to provide strong security and protection on the patient’s medical data over public and insecure communication channels. In this paper, we address the challenge of participant authentication in mobile emergency medical care systems for patients supervision and propose a secure cloud-assisted architecture for accessing and monitoring health items collected by WBAN. For ensuring a high level of security and providing a mutual authentication property, chaotic maps based authentication and key agreement mechanisms are designed according to the concept of Diffie-Hellman key exchange, which depends on the CMBDLP and CMBDHP problems. Security and performance analyses show how the proposed system guaranteed the patient privacy and the system confidentiality of sensitive medical data while preserving the low computation property in medical treatment and remote medical monitoring.
Literature
1.
go back to reference Ali, A., and Khan, F.A., Key agreement schemes in wireless body area networks: taxonomy and state-of-the-art. J. Med. Syst. 39:115, 2015.PubMedCrossRef Ali, A., and Khan, F.A., Key agreement schemes in wireless body area networks: taxonomy and state-of-the-art. J. Med. Syst. 39:115, 2015.PubMedCrossRef
2.
go back to reference Bergamo, P., Arco, P., Santis, A., Kocarev, L., Security of public-key cryptosystems based on Chebyshev polynomials. IEEE Transactions on Circuits and Systems I 52(7):1382–1393, 2005.CrossRef Bergamo, P., Arco, P., Santis, A., Kocarev, L., Security of public-key cryptosystems based on Chebyshev polynomials. IEEE Transactions on Circuits and Systems I 52(7):1382–1393, 2005.CrossRef
3.
go back to reference Canetti, R., and Krawczyk, H., Analysis of key-exchange protocols and their use for building secure channels. Lect. Notes Comput. Sci. 2045:453–474, 2001.CrossRef Canetti, R., and Krawczyk, H., Analysis of key-exchange protocols and their use for building secure channels. Lect. Notes Comput. Sci. 2045:453–474, 2001.CrossRef
4.
go back to reference Chen, C.L., Yang, T.T., Shih, T.F., A secure medical data exchange protocol based on cloud environments. J. Med. Syst. 38:112, 2014.PubMedCrossRef Chen, C.L., Yang, T.T., Shih, T.F., A secure medical data exchange protocol based on cloud environments. J. Med. Syst. 38:112, 2014.PubMedCrossRef
5.
go back to reference Fortino, G., Guerrieri, A., Giannantonio, R., Bellifemine, F.: SPINE2: developing BSN applications on heterogeneous sensor nodes. In: Proceedings of IEEE Symposium on Industrial Embedded Systems (SIES 2009), pp. 8–10. Special Session on Wireless Health, Lausanne (2009) Fortino, G., Guerrieri, A., Giannantonio, R., Bellifemine, F.: SPINE2: developing BSN applications on heterogeneous sensor nodes. In: Proceedings of IEEE Symposium on Industrial Embedded Systems (SIES 2009), pp. 8–10. Special Session on Wireless Health, Lausanne (2009)
6.
go back to reference Fortino, G., Pathan, M., DiFatta, G.: BodyCloud: integration of cloud computing and body sensor networks. In: Proceedings of IEEE 4th International Conference on Cloud Computing Technology and Science (CloudCom 2012), pp. 3–6, Taipei (2012) Fortino, G., Pathan, M., DiFatta, G.: BodyCloud: integration of cloud computing and body sensor networks. In: Proceedings of IEEE 4th International Conference on Cloud Computing Technology and Science (CloudCom 2012), pp. 3–6, Taipei (2012)
7.
go back to reference Fortino, G., and Pathan, M., Integration of Cloud computing and body sensor networks. Futur. Gener. Comput. Syst. 35:57–61, 2014.CrossRef Fortino, G., and Pathan, M., Integration of Cloud computing and body sensor networks. Futur. Gener. Comput. Syst. 35:57–61, 2014.CrossRef
8.
go back to reference Guo, P., Wang, J., Li, B., Lee, S., A variable threshold-value authentication architecture for wireless mesh networks. J. Internet Technol. 15(6):929–936, 2014. Guo, P., Wang, J., Li, B., Lee, S., A variable threshold-value authentication architecture for wireless mesh networks. J. Internet Technol. 15(6):929–936, 2014.
9.
go back to reference Habetha, J.: The myheart project - fighting cardiovascular diseases by prevention and early diagnosis. In: Proceedings of 28th IEEE Annual International Conference on Engineering in Medicine and Biology Society (EMBS 2006), pp. 6746–6749, New York (2006) Habetha, J.: The myheart project - fighting cardiovascular diseases by prevention and early diagnosis. In: Proceedings of 28th IEEE Annual International Conference on Engineering in Medicine and Biology Society (EMBS 2006), pp. 6746–6749, New York (2006)
11.
go back to reference He, D., Kumar, N., Chilamkurti, N., A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Inf. Sci. 321:263–277, 2015.CrossRef He, D., Kumar, N., Chilamkurti, N., A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Inf. Sci. 321:263–277, 2015.CrossRef
12.
go back to reference He, D., and Zeadally, S., Authentication protocol for ambient assisted living system. IEEE Commun. Mag. 35(1):71–77, 2015.CrossRef He, D., and Zeadally, S., Authentication protocol for ambient assisted living system. IEEE Commun. Mag. 35(1):71–77, 2015.CrossRef
13.
go back to reference He, D., Kumar, N., Chen, J., Robust anonymous authentication protocol for healthcare applications using wireless medical sensor networks. Multimedia Systems 21(1):49–60, 2015.CrossRef He, D., Kumar, N., Chen, J., Robust anonymous authentication protocol for healthcare applications using wireless medical sensor networks. Multimedia Systems 21(1):49–60, 2015.CrossRef
14.
go back to reference He, D., and Wang, D., Robust biometrics-based authentication scheme for multi-server environment. IEEE Syst. J. 9(3):816–823, 2015.CrossRef He, D., and Wang, D., Robust biometrics-based authentication scheme for multi-server environment. IEEE Syst. J. 9(3):816–823, 2015.CrossRef
15.
go back to reference Jabbari, A., and Bagherzadeh, J., A revised key agreement protocol based on chaotic maps. Nonlinear Dyn. 78(1):669–680, 2014.CrossRef Jabbari, A., and Bagherzadeh, J., A revised key agreement protocol based on chaotic maps. Nonlinear Dyn. 78(1):669–680, 2014.CrossRef
16.
go back to reference Jiang, Q., Ma, J., Ma, Z., Li, G., A privacy enhanced authentication scheme for telecare medical information systems. J. Med. Syst. 37:9897, 2013.PubMedCrossRef Jiang, Q., Ma, J., Ma, Z., Li, G., A privacy enhanced authentication scheme for telecare medical information systems. J. Med. Syst. 37:9897, 2013.PubMedCrossRef
17.
go back to reference Khan, F.A., Ali, A., Abbas, H., Haldar, N.A.H., A cloud-based healthcare framework for security and patients’ data privacy using wireless body area networks. Procedia Comput. Sci. 34:511–517, 2014.CrossRef Khan, F.A., Ali, A., Abbas, H., Haldar, N.A.H., A cloud-based healthcare framework for security and patients’ data privacy using wireless body area networks. Procedia Comput. Sci. 34:511–517, 2014.CrossRef
18.
go back to reference Li, C.T., Lee, C.C., Weng, C.Y., An extended chaotic maps based user authentication and privacy preserving scheme against DoS attacks in pervasive and ubiquitous computing environments. Nonlinear Dyn. 74(4): 1133–1143, 2013.CrossRef Li, C.T., Lee, C.C., Weng, C.Y., An extended chaotic maps based user authentication and privacy preserving scheme against DoS attacks in pervasive and ubiquitous computing environments. Nonlinear Dyn. 74(4): 1133–1143, 2013.CrossRef
19.
go back to reference Li, C.T., Lee, C.C., Weng, C.Y., A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems. J. Med. Syst. 38(9):1–11, 2014.CrossRef Li, C.T., Lee, C.C., Weng, C.Y., A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems. J. Med. Syst. 38(9):1–11, 2014.CrossRef
20.
go back to reference Li, C.T., Lee, C.W., Shen, J.J., An extended chaotic maps based keyword search scheme over encrypted data resist outside and inside keyword guessing attacks in cloud storage services. Nonlinear Dyn. 80(3):1601–1611, 2015.CrossRef Li, C.T., Lee, C.W., Shen, J.J., An extended chaotic maps based keyword search scheme over encrypted data resist outside and inside keyword guessing attacks in cloud storage services. Nonlinear Dyn. 80(3):1601–1611, 2015.CrossRef
21.
go back to reference Li, C.T., Lee, C.C., Weng, C.Y., A dynamic identity-based user authentication scheme for remote login systems. Security and Communication Networks 8(18):3372–3382, 2015.CrossRef Li, C.T., Lee, C.C., Weng, C.Y., A dynamic identity-based user authentication scheme for remote login systems. Security and Communication Networks 8(18):3372–3382, 2015.CrossRef
22.
go back to reference Li, C.T., Lee, C.C., Weng, C.Y., Fan, C.I., A secure dynamic identity based authentication protocol with smart cards for multi-server architecture. J. Inf. Sci. Eng. 31(6):1975–1992, 2015. Li, C.T., Lee, C.C., Weng, C.Y., Fan, C.I., A secure dynamic identity based authentication protocol with smart cards for multi-server architecture. J. Inf. Sci. Eng. 31(6):1975–1992, 2015.
23.
go back to reference Li, C.T., Weng, C.Y., Lee, C.C., A secure RFID tag authentication protocol with privacy preserving in telecare medicine information systems. J. Med. Syst. 39(8):1–8, 2015.CrossRef Li, C.T., Weng, C.Y., Lee, C.C., A secure RFID tag authentication protocol with privacy preserving in telecare medicine information systems. J. Med. Syst. 39(8):1–8, 2015.CrossRef
24.
go back to reference Li, C.T., Weng, C.Y., Lee, C.C., Wang, C.C., A hash based remote user authentication and authenticated key agreement scheme for the integrated EPR information system. J. Med. Syst. 39(11):1–11, 2015.CrossRef Li, C.T., Weng, C.Y., Lee, C.C., Wang, C.C., A hash based remote user authentication and authenticated key agreement scheme for the integrated EPR information system. J. Med. Syst. 39(11):1–11, 2015.CrossRef
25.
go back to reference Li, C.T., Lee, C.C., Wang, C.C., Yang, T.H., Chen, S.J., Design flaws in a secure medical data exchange protocol based on cloud environments. Lect. Notes Comput. Sci. 9532, 2015. Li, C.T., Lee, C.C., Wang, C.C., Yang, T.H., Chen, S.J., Design flaws in a secure medical data exchange protocol based on cloud environments. Lect. Notes Comput. Sci. 9532, 2015.
26.
go back to reference Li, C. T., Lee, C. C., Weng, C. Y., A chaotic maps based key agreement and user anonymity protocol without using smart cards and symmetric key en/decryptions. J. Internet Technol., 2015. article in press. Li, C. T., Lee, C. C., Weng, C. Y., A chaotic maps based key agreement and user anonymity protocol without using smart cards and symmetric key en/decryptions. J. Internet Technol., 2015. article in press.
27.
go back to reference Liu, J., Zhang, Z., Chen, X., Kwak, K., Certificateless remote anonymous authentication schemes for wireless body sensor networks. IEEE Transactions on Parallel and Distributed Systems 25(2):332–342, 2014.CrossRef Liu, J., Zhang, Z., Chen, X., Kwak, K., Certificateless remote anonymous authentication schemes for wireless body sensor networks. IEEE Transactions on Parallel and Distributed Systems 25(2):332–342, 2014.CrossRef
28.
go back to reference Lounis, A., Hadjidj, A., Bouabdallah, A., Challal, Y., Healing on the cloud: Secure cloud architecture for medical wireless sensor networks. Futur. Gener. Comput. Syst., 2015. article in press. Lounis, A., Hadjidj, A., Bouabdallah, A., Challal, Y., Healing on the cloud: Secure cloud architecture for medical wireless sensor networks. Futur. Gener. Comput. Syst., 2015. article in press.
29.
go back to reference Mana, M., Feham, M., Bensaber, B.A., Trust key management scheme for wireless body area networks. Int. J. Netw. Security 12(2):75–83, 2011. Mana, M., Feham, M., Bensaber, B.A., Trust key management scheme for wireless body area networks. Int. J. Netw. Security 12(2):75–83, 2011.
30.
go back to reference Muhammad, K.R.R.S., Lee, H., Lee, S., Lee, Y.K., BARI+: a biometric based distributed key management approach for wireless body area networks. Sensors 10(4):3911–3933, 2010.PubMedPubMedCentralCrossRef Muhammad, K.R.R.S., Lee, H., Lee, S., Lee, Y.K., BARI+: a biometric based distributed key management approach for wireless body area networks. Sensors 10(4):3911–3933, 2010.PubMedPubMedCentralCrossRef
31.
go back to reference Nadeem, A., Hussain, M.A., Owais, O., Salam, A., Iqbal, S., Ahsan, K., Application specific study, analysis and classification of body area wireless sensor network applications. Comput. Netw. 83:363–380, 2015.CrossRef Nadeem, A., Hussain, M.A., Owais, O., Salam, A., Iqbal, S., Ahsan, K., Application specific study, analysis and classification of body area wireless sensor network applications. Comput. Netw. 83:363–380, 2015.CrossRef
32.
go back to reference Pacelli, M., Loriga, G., Taccini, N., Paradiso, R.: Sensing fabrics for monitoring physiological and biomechanical variables: E-textile solutions. In: 3rd IEEE/EMBS International Summer School on Medical Devices and Biosensors, pp. 1–4, Cambridge (2006) Pacelli, M., Loriga, G., Taccini, N., Paradiso, R.: Sensing fabrics for monitoring physiological and biomechanical variables: E-textile solutions. In: 3rd IEEE/EMBS International Summer School on Medical Devices and Biosensors, pp. 1–4, Cambridge (2006)
33.
go back to reference Ren, Y., Pazzi, R.W.N., Boukerche, A., Monitoring patients via a secure and mobile healthcare system. IEEE Wirel. Commun. 17(1):59–65, 2010.CrossRef Ren, Y., Pazzi, R.W.N., Boukerche, A., Monitoring patients via a secure and mobile healthcare system. IEEE Wirel. Commun. 17(1):59–65, 2010.CrossRef
34.
go back to reference Ren, Y., Shen, J., Wang, J., Han, J., Lee, S., Mutual verifiable provable data auditing in public cloud storage. J. Internet Technol. 16(2):317–324, 2015. Ren, Y., Shen, J., Wang, J., Han, J., Lee, S., Mutual verifiable provable data auditing in public cloud storage. J. Internet Technol. 16(2):317–324, 2015.
36.
37.
go back to reference Shen, J., Moh, S., Chung, I.: A novel key management protocol in body area networks. In: Proceedings of the Seventh International Conference on Networking and Services (ICNS 2011), pp. 246–251, Venice (2011) Shen, J., Moh, S., Chung, I.: A novel key management protocol in body area networks. In: Proceedings of the Seventh International Conference on Networking and Services (ICNS 2011), pp. 246–251, Venice (2011)
38.
go back to reference Shen, J., Tan, H., Wang, J., Lee, S., A novel routing protocol providing good transmission reliability in underwater sensor networks. J. Internet Technol. 16(1):171–178, 2015. Shen, J., Tan, H., Wang, J., Lee, S., A novel routing protocol providing good transmission reliability in underwater sensor networks. J. Internet Technol. 16(1):171–178, 2015.
39.
go back to reference Subashini, S., and Kavitha, V., A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1):1–11, 2011.CrossRef Subashini, S., and Kavitha, V., A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1):1–11, 2011.CrossRef
40.
go back to reference Wang, C., and Zhang, Y., New authentication scheme for wireless body area networks using the bilinear pairing. J. Med. Syst. 39:136, 2015.PubMedCrossRef Wang, C., and Zhang, Y., New authentication scheme for wireless body area networks using the bilinear pairing. J. Med. Syst. 39:136, 2015.PubMedCrossRef
41.
go back to reference Wu, Z.Y., Lee, Y.C., Lai, F., Lee, H.C., Chung, Y., A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1529–1535, 2012.PubMedCrossRef Wu, Z.Y., Lee, Y.C., Lai, F., Lee, H.C., Chung, Y., A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1529–1535, 2012.PubMedCrossRef
42.
go back to reference Xia, Z., Wang, X., Sun, X., Wang, Q., A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems 27(2):340–352, 2016.CrossRef Xia, Z., Wang, X., Sun, X., Wang, Q., A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems 27(2):340–352, 2016.CrossRef
43.
go back to reference Xie, Q., Zhao, J., Yu, X., Chaotic maps-based three-party password-authenticated key agreement scheme. Nonlinear Dyn. 74(4):1021–1027, 2013.CrossRef Xie, Q., Zhao, J., Yu, X., Chaotic maps-based three-party password-authenticated key agreement scheme. Nonlinear Dyn. 74(4):1021–1027, 2013.CrossRef
44.
go back to reference Zhang, L., Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos, Solitons & Fractals 37(3):669–674, 2008.CrossRef Zhang, L., Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos, Solitons & Fractals 37(3):669–674, 2008.CrossRef
45.
go back to reference Zhao, Z., An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem. J. Med. Syst. 38(2):1–7, 2014.CrossRef Zhao, Z., An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem. J. Med. Syst. 38(2):1–7, 2014.CrossRef
46.
go back to reference Zhou, J., Cao, Z., Dong, X.: BDK: secure and efficient biometric based deterministic key agreement in wireless body area networks. In: Proceedings of 8th International Conference on Body Area Networks (BodyNets 2013), Boston (2013) Zhou, J., Cao, Z., Dong, X.: BDK: secure and efficient biometric based deterministic key agreement in wireless body area networks. In: Proceedings of 8th International Conference on Body Area Networks (BodyNets 2013), Boston (2013)
47.
go back to reference Zhou, J., Cao, Z., Dong, X., Xiong, N., Vasilakos, A.V., 4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks. Inf. Sci. 314: 255–276, 2015.CrossRef Zhou, J., Cao, Z., Dong, X., Xiong, N., Vasilakos, A.V., 4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks. Inf. Sci. 314: 255–276, 2015.CrossRef
48.
go back to reference Zissis, D., and Lekkas, D., Addressing cloud computing security issues. Futur. Gener. Comput. Syst. 28(3): 583–592, 2012.CrossRef Zissis, D., and Lekkas, D., Addressing cloud computing security issues. Futur. Gener. Comput. Syst. 28(3): 583–592, 2012.CrossRef
Metadata
Title
A Secure Cloud-Assisted Wireless Body Area Network in Mobile Emergency Medical Care System
Authors
Chun-Ta Li
Cheng-Chi Lee
Chi-Yao Weng
Publication date
01-05-2016
Publisher
Springer US
Published in
Journal of Medical Systems / Issue 5/2016
Print ISSN: 0148-5598
Electronic ISSN: 1573-689X
DOI
https://doi.org/10.1007/s10916-016-0474-9

Other articles of this Issue 5/2016

Journal of Medical Systems 5/2016 Go to the issue