Mobile Networks and Applications

, Volume 16, Issue 6, pp 683–694 | Cite as

A Secure Handshake Scheme with Symptoms-Matching for mHealthcare Social Network

  • Rongxing Lu
  • Xiaodong Lin
  • Xiaohui Liang
  • Xuemin Shen


In our aging society, mHealthcare social network (MHSN) built upon wireless body sensor network (WBSN) and mobile communications provides a promising platform for the seniors who have the same symptom to exchange their experiences, give mutual support and inspiration to each other, and help forwarding their health information wirelessly to a related eHealth center. However, there exist many challenging security issues in MHSN such as how to securely identify a senior who has the same symptom, how to prevent others who don’t have the symptom from knowing someone’s symptom? In this paper, to tackle these challenging security issues, we propose a secure same-symptom-based handshake (SSH) scheme. Specifically, in the proposed SSH scheme, each patient is granted with a pseudo-ID and its private key corresponding to his symptom. When two patients meet, only if they have the same symptom, they can use their private keys to make mutual authentication. With the provable security technique, we demonstrate the proposed SSH is secure in the MHSN scenarios. Moreover, we also discuss a promising application – social-based patient health information (PHI) collaborative reporting in MHSN, and conduct extensive simulations to evaluate its efficiency in terms of PHI delivery ratio and reporting delay.


mobile healthcare social network secure handshake with symptoms-matching social-based PHI collaborative reporting 


  1. 1.
    Lu R, Lin X, Liang X, Shen X (2010) Secure handshake with symptoms-matching: the essential to the success of mhealthcare social network. In: Proc. BodyNets 2010, Corfu Island, GreeceGoogle Scholar
  2. 2.
    Appari A, Johnson ME, Anthony DL (2009) HIPAA compliance in home health: a neo-institutional theoretic perspective. In: SPIMACS ’09, pp 13–20Google Scholar
  3. 3.
    Chen M, Gonzalez S, Zhang Q, Li M, Leung V (2010) A 2g-rfid based e-healthcare system. IEEE Wirel Commun Mag 17(1):37–43CrossRefGoogle Scholar
  4. 4.
    Wang H, Peng D, Wang W, Sharif H, Chen HH, Khoynezhad A (2010) Resource-aware secure ECG healthcare monitoring through body sensor networks. IEEE Wirel Commun Mag 17(1):12–19CrossRefGoogle Scholar
  5. 5.
    Li M, Lou W, Ren K (2010) Data security and privacy in wireless body area networks. IEEE Wirel Commun Mag 17(1):51–58CrossRefGoogle Scholar
  6. 6.
    Sun J, Fang Y, Zhu X (2010) Privacy and emergency response in e-healthcare leveraging wireless body sensor networks. IEEE Wirel Commun Mag 17(1):66–73CrossRefGoogle Scholar
  7. 7.
    Cheng H, Zhuang W (2010) Bluetooth-enabled in-home patient monitoring system: early detection of Alzheimer’s disease. IEEE Wirel Commun Mag 17(1):74–79CrossRefGoogle Scholar
  8. 8.
    Misic J, Misic V (2010) Bridge performance in a multitier wireless network for healthcare monitoring. IEEE Wirel Commun Mag 17(1):90–95CrossRefGoogle Scholar
  9. 9.
    Chen M, Gonzalez S, Vasilakos A, Cao H, Leung V (2010) Body area networks: a survey. ACM/Springer Mob Netw Appl (MONET) 17(1):37–43. doi: 10.1007/s11036-010-0260-8 Google Scholar
  10. 10.
    Kotz D, Avancha S, Baxi A (2009) A privacy framework for mobile health and home-care systems. In: SPIMACS ’09, Chicago, Illinois, USA, pp 1–12Google Scholar
  11. 11.
    Liang X, Lu R, Lin X, Shen X (2010) Patient self-controllable access policy on PHI in ehealthcare systems. In: AHIC 2010, Kitchener, Ontario, CanadaGoogle Scholar
  12. 12.
    Lin X, Lu R, Shen X, Nemoto Y, Kato N (2009) SAGE: a strong privacy-preserving scheme against global eavesdropping for ehealth systems. IEEE J Sel Areas Commun 27:365–378CrossRefGoogle Scholar
  13. 13.
    Boneh D, Franklin M (2003) Identity-based encryption from the weil pairing. SIAM J Comput 32(3):586–615MathSciNetMATHCrossRefGoogle Scholar
  14. 14.
    Shoup V (2002) OAEP reconsidered. J Cryptol 15(4):223–249MathSciNetMATHCrossRefGoogle Scholar
  15. 15.
    Izabachene M, Pointcheval D (2008) New anonymity notions for identity-based encryption. In: SCN ’08. LNCS 5229, pp 375–391Google Scholar
  16. 16.
    Bellare M, Rogaway P (1993) Random oracles are practical: a paradigm for designing efficient protocols. In: CCS ’93, pp 62–73Google Scholar
  17. 17.
    Pietilainen AK, Diot C (2009) Social pocket switched networks. In: INFOCOM’09, Rio de Janeiro, Brazil, pp 403–404Google Scholar
  18. 18.
    Balfanz D, Durfee G, Shankar N, Smetters D, Staddon J, Wong H (2003) Secret handshake from pairing-based key agreements. In: IEEE S&P ’03, pp 180–196Google Scholar
  19. 19.
    Su R (2009) On the security of a novel and efficient unlinkable secret handshakes scheme. IEEE Commun Lett 13(9):712–713CrossRefGoogle Scholar
  20. 20.
    Zhou L, Susilo W, Mu Y (2006) Three-move secret handshakes. In: ISPEC 2006. LNCS 3903, pp 332–342Google Scholar
  21. 21.
    Lu R, Lin X, Zhu H, Shen X, Preiss BR (2010) Pi: A practical incentive protocol for delay tolerant networks. IEEE Trans Wirel Commun 9(4):1483–1493CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC 2010

Authors and Affiliations

  • Rongxing Lu
    • 1
  • Xiaodong Lin
    • 2
  • Xiaohui Liang
    • 1
  • Xuemin Shen
    • 1
  1. 1.Department of Electrical and Computer EngineeringUniversity of WaterlooWaterlooCanada
  2. 2.Faculty of Business and Information TechnologyUniversity of Ontario Institute of TechnologyOntarioCanada

Personalised recommendations