Online citations, reference lists, and bibliographies.
Please confirm you are human
(Sign Up for free to never see this)
← Back to Search

A Secure Cloud-Assisted Wireless Body Area Network In Mobile Emergency Medical Care System

C. Li, C. Lee, Chi-Yao Weng
Published 2016 · Medicine, Computer Science

Save to my Library
Download PDF
Analyze on Scholarcy
Share
Recent advances in medical treatment and emergency applications, the need of integrating wireless body area network (WBAN) with cloud computing can be motivated by providing useful and real time information about patients’ health state to the doctors and emergency staffs. WBAN is a set of body sensors carried by the patient to collect and transmit numerous health items to medical clouds via wireless and public communication channels. Therefore, a cloud-assisted WBAN facilitates response in case of emergency which can save patients’ lives. Since the patient’s data is sensitive and private, it is important to provide strong security and protection on the patient’s medical data over public and insecure communication channels. In this paper, we address the challenge of participant authentication in mobile emergency medical care systems for patients supervision and propose a secure cloud-assisted architecture for accessing and monitoring health items collected by WBAN. For ensuring a high level of security and providing a mutual authentication property, chaotic maps based authentication and key agreement mechanisms are designed according to the concept of Diffie-Hellman key exchange, which depends on the CMBDLP and CMBDHP problems. Security and performance analyses show how the proposed system guaranteed the patient privacy and the system confidentiality of sensitive medical data while preserving the low computation property in medical treatment and remote medical monitoring.
This paper references
10.3390/s110201383
A Study of IEEE 802.15.4 Security Framework for Wireless Body Area Networks
S. Saleem (2011)
10.6138/JIT.2017.18.5.20150609
A Chaotic Maps Based Key Agreement and User Anonymity Protocol without Using Smart Cards and Symmetric Key En/Decryptions
C. Li (2015)
10.1016/j.jnca.2010.07.006
A survey on security issues in service delivery models of cloud computing
S. Subashini (2011)
10.1007/s10916-014-0040-2
A Stationary Wavelet Transform Based Approach to Registration of Planning CT and Setup Cone beam-CT Images in Radiotherapy
Jun-min Deng (2014)
New Authentication Scheme for Wireless Body Area Networks Using the Bilinear Pairing
张岩梅 (2015)
Keyed-hashing for message authentication
Rfc 2104-Hmac
10.1007/s10916-014-0013-5
An Efficient Anonymous Authentication Scheme for Wireless Body Area Networks Using Elliptic Curve Cryptosystem
Zhenguo Zhao (2014)
10.1007/s10916-012-9897-0
A Privacy Enhanced Authentication Scheme for Telecare Medical Information Systems
Qi Jiang (2012)
10.1109/MCOM.2015.7010518
Authentication protocol for an ambient assisted living system
D. He (2015)
10.1109/TPDS.2013.145
Certificateless Remote Anonymous Authentication Schemes for WirelessBody Area Networks
J. Liu (2014)
10.1007/s10916-014-0077-2
A Secure Chaotic Maps and Smart Cards Based Password Authentication and Key Agreement Scheme with User Anonymity for Telecare Medicine Information Systems
C. Li (2014)
Robust anonymous authentication protocol for healthcare applications using wireless medical sensor networks.Multimedia Systems
D. He (2015)
A Study of IEEE 802.15.4 Security Framework for Wireless Body Area Network
샤나즈 (2011)
10.1016/j.future.2014.02.001
Integration of Cloud computing and body sensor networks
G. Fortino (2014)
and symmetric key en/decryptions
(2015)
10.1109/ISSMDBS.2006.360082
Sensing Fabrics for Monitoring Physiological and Biomechanical Variables: E-textile solutions
M. Pacelli (2006)
10.1007/s10916-014-0112-3
A Secure Medical Data Exchange Protocol Based on Cloud Environment
C. Chen (2014)
A novel key management protocol in body area networks
J. Shen (2011)
10.1007/3-540-44987-6_28
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
R. Canetti (2001)
10.1109/TCSI.2005.851701
Security of public-key cryptosystems based on Chebyshev polynomials
P. Bergamo (2005)
10.6688/JISE.2015.31.6.9
A Secure Dynamic Identity Based Authentication Protocol with Smart Cards for Multi-Server Architecture
C. Li (2015)
10.1002/sec.1264
A dynamic identity-based user authentication scheme for remote login systems
C. Li (2015)
10.1007/S11071-014-1467-1
A revised key agreement protocol based on chaotic maps
A. Jabbari (2014)
10.1109/JSYST.2014.2301517
Robust Biometrics-Based Authentication Scheme for Multiserver Environment
D. He (2015)
10.1016/j.ins.2015.02.010
A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks
D. He (2015)
10.1016/j.future.2010.12.006
Addressing cloud computing security issues
Dimitrios Zissis (2012)
10.1007/s10916-015-0322-3
A Hash Based Remote User Authentication and Authenticated Key Agreement Scheme for the Integrated EPR Information System
Chun-Ta Li (2015)
10.1007/978-3-319-27161-3_39
Design Flaws in a Secure Medical Data Exchange Protocol Based on Cloud Environments
C. Li (2015)
A chaotic maps based key agreement and user anonymity protocol without using smart cards J Med Syst (2016) 40: 117 Page 15 of 15 117 and symmetric key en/decryptions
C. T. Li (2015)
10.1016/j.comnet.2015.03.002
Application specific study, analysis and classification of body area wireless sensor network applications
A. Nadeem (2015)
10.6633/IJNS.201103.12(2).02
Trust Key Management Scheme for Wireless Body Area Networks
M. Mana (2011)
10.1109/TPDS.2015.2401003
A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data
Zhihua Xia (2016)
10.1016/j.ins.2014.09.003
4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks
J. Zhou (2015)
10.1007/S11071-013-1029-Y
An extended chaotic maps based user authentication and privacy preserving scheme against DoS attacks in pervasive and ubiquitous computing environments
C. Li (2013)
10.6138/JIT.2014.15.6.05
A Variable Threshold-Value Authentication Architecture for Wireless Mesh Networks
P. Guo (2014)
10.1109/IEMBS.2006.260937
The myheart project - Fighting cardiovascular diseases by prevention and early diagnosis
J. Habetha (2006)
10.6138/JIT.2015.16.2.20140918
Mutual Verifiable Provable Data Auditing in Public Cloud Storage
Yongjun Ren (2015)
10.1007/s00530-013-0346-9
Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks
D. He (2013)
10.1007/s10916-010-9614-9
A Secure Authentication Scheme for Telecare Medicine Information Systems
Z. Wu (2010)
10.6138/JIT.2014.16.1.20131203E
A Novel Routing Protocol Providing Good Transmission Reliability in Underwater Sensor Networks
Jian Shen (2015)
10.4108/ICST.BODYNETS.2013.253731
BDK: Secure and Efficient Biometric based Deterministic Key Agreement in Wireless Body Area Networks
J. Zhou (2013)
secure and efficient biometric based deterministic key agreement in wireless body area networks
J. Zhou (2013)
10.1016/j.future.2015.01.009
Healing on the cloud: Secure cloud architecture for medical wireless sensor networks
A. Lounis (2016)
10.1109/MWC.2010.5416351
Monitoring patients via a secure and mobile healthcare system
Y. Ren (2010)
10.1007/S11071-015-1965-9
An extended chaotic maps-based keyword search scheme over encrypted data resist outside and inside keyword guessing attacks in cloud storage services
C. Li (2015)
10.1016/j.procs.2014.07.058
A Cloud-based Healthcare Framework for Security and Patients' Data Privacy Using Wireless Body Area Networks
F. Khan (2014)
10.1007/s10916-015-0265-8
A Secure User Anonymity and Authentication Scheme Using AVISPA for Telecare Medical Information Systems
Omid Mir (2015)
10.1007/s10916-015-0260-0
A Secure RFID Tag Authentication Protocol with Privacy Preserving in Telecare Medicine Information System
C. Li (2015)
10.1109/SIES.2009.5196205
SPINE2: developing BSN applications on heterogeneous sensor nodes
G. Fortino (2009)
10.1007/S11071-013-1020-7
Chaotic maps-based three-party password-authenticated key agreement scheme
Qi Xie (2013)
10.3390/s100403911
BARI+: A Biometric Based Distributed Key Management Approach for Wireless Body Area Networks
S. K. Raazi (2010)
10.1109/CloudCom.2012.6427537
BodyCloud: Integration of Cloud Computing and body sensor networks
G. Fortino (2012)
N.A.H., A cloud-based healthcare framework for security and patients’ data privacy using wireless body area networks
F. A. Khan (2014)
10.1007/s10916-015-0272-9
Key Agreement Schemes in Wireless Body Area Networks: Taxonomy and State-of-the-Art
Aftab Ali (2015)
10.1016/J.CHAOS.2006.09.047
Cryptanalysis of the public key encryption based on multiple chaotic systems
L. Zhang (2008)
10.17487/RFC2104
HMAC: Keyed-Hashing for Message Authentication
H. Krawczyk (1997)



This paper is referenced by
10.1109/ACCESS.2020.3014510
Multi-Replica and Multi-Cloud Data Public Audit Scheme Based on Blockchain
Xiaodong Yang (2020)
10.1002/sat.1385
An enhanced dynamic authentication scheme for mobile satellite communication systems
Yulei Chen (2020)
10.1109/COMSNETS.2017.7945393
SecPMS: An efficient and secure communication protocol for continuous patient monitoring system using body sensors
Tanmoy Maitra (2017)
10.1109/TDSC.2018.2828306
Cloud Centric Authentication for Wearable Healthcare Monitoring System
J. Srinivas (2020)
10.1016/j.tele.2017.12.020
Privacy management of patient physiological parameters
I. Masood (2018)
10.1109/JSEN.2017.2725906
Transmission-Rate-Adaption Assisted Energy-Efficient Resource Allocation With QoS Support in WBANs
Bin Liu (2017)
10.1155/2020/8818704
Provably Secure Crossdomain Multifactor Authentication Protocol for Wearable Health Monitoring Systems
Hui Zhang (2020)
10.1155/2018/5978636
Security and Privacy in the Medical Internet of Things: A Review
Wencheng Sun (2018)
10.1109/EAIT.2018.8470409
WBAN Security: study and implementation of a biological key based framework
K. Karmakar (2018)
10.1155/2018/4028196
Identity-Based Fast Authentication Scheme for Smart Mobile Devices in Body Area Networks
Chen Wang (2018)
10.4018/978-1-5225-9574-8.ch013
IoT-Based Smart and Secure Health Monitoring System
P. Verma (2020)
10.1111/ijn.12619
Nurses' satisfaction with use of a personal digital assistants with a mobile nursing information system in China
L. Shen (2018)
10.3390/app10103540
Special Issue on Body Area Networks
A. Pereira (2020)
10.3837/tiis.2016.03.018
Security and Efficiency Enhancement of Robust ID Based Mutual Authentication and Key Agreement Scheme Preserving User Anonymity in Mobile Networks
Chun-Ta Li (2016)
10.1016/j.compeleceng.2017.03.016
Efficient end-to-end authentication protocol for wearable health monitoring systems
Qi Jiang (2017)
10.1007/978-981-10-4154-9_28
On the Security of a Privacy Authentication Scheme Based on Cloud for Medical Environment
C. Li (2017)
A Security and Efficient Data Aggregation Scheme for Cloud-Assisted Wireless Body Area Network
H. Liu (2019)
Computer Information System Construction Based on Information System Security Level and Structure Model
L. Gao (2016)
10.1002/DAC.3974
Design of a lightweight and anonymous authenticated key agreement protocol for wireless body area networks
Arezou Ostad-Sharif (2019)
10.1002/cpe.5734
Cloud‐assisted elliptic curve password authenticated key exchange protocol for wearable healthcare monitoring system
Zhihui Wang (2020)
10.14569/IJACSA.2019.0100110
Blockchain: Securing Internet of Medical Things (IoMT)
Nimra Dilawar (2019)
10.1155/2018/2143897
Towards Smart Healthcare: Patient Data Privacy and Security in Sensor-Cloud Infrastructure
I. Masood (2018)
10.1007/s11277-020-07304-3
SEEMAKA: Secured Energy-Efficient Mutual Authentication and Key Agreement Scheme for Wireless Body Area Networks
Bhawna Narwal (2020)
10.1109/ISVLSI49217.2020.00-17
Secure-iGLU: A Secure Device for Noninvasive Glucose Measurement and Automatic Insulin Delivery in IoMT Framework
A. Joshi (2020)
10.35940/ijitee.l2545.119119
An IoT-Based Body Area Network in Medical Care System : Related Challenges and Issues
Shaik Jhani Bhasha (2019)
10.1007/s10916-016-0584-4
Health Monitoring and Management for Manufacturing Workers in Adverse Working Conditions
Xiaoya Xu (2016)
10.1007/978-3-030-22277-2_8
Preventing Security and Privacy Attacks in WBANs
Avani Vyas (2020)
10.1155/2018/1378583
Privacy-Preserving Data Aggregation Protocol for Fog Computing-Assisted Vehicle-to-Infrastructure Scenario
Yanan Chen (2018)
10.3390/s17071482
An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System
C. Li (2017)
10.18178/jacn.2018.6.1.245
An Improved Group Key Agreement Scheme with Privacy Preserving Based on Chaotic Maps
Chun-Ta Li (2018)
10.1007/s00500-017-2504-z
A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps
C. Li (2018)
10.1109/ACCESS.2020.3031484
An Improved Lightweight Authentication Protocol for Wireless Body Area Networks
B. Alzahrani (2020)
See more
Semantic Scholar Logo Some data provided by SemanticScholar