Skip to main content

Advertisement

Log in

An efficient privacy-preserving authentication scheme with adaptive key evolution in remote health monitoring system

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

The remote health monitoring system enables a doctor to diagnose and monitor health problems anywhere for a patient. However, since the patient health information is very sensitive and the Internet is unsecure and prone to many attacks, data can be easily compromised by adversaries. Worse, the mobile phone is also easy to be compromised. Clearly, these issues have brought different privacy and security requirements in wireless healthcare. To address these challenging issues, in this paper, we propose an efficient privacy-preserving authentication scheme with adaptive key evolution, which can prevent illegal access to the patient’s vital signs. Furthermore, we model the leakage process of the key information to set proper key renewal interval, which can adaptively control the key evolution to balance the trade-off between the communication efficiency and security level. The security analysis demonstrates that our scheme can achieve authenticated key agreement, perfect and strong key insulation, privacy preservation, and other important security goals, e.g. authenticity, integrity and freshness of transmitted messages. The performance evaluation shows that our scheme is computationally efficient for the typical mobile phone with limited resources, and it has low communication overhead.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Massey T, Marfia G, Stoelting A, Tomasi R, Spirito MA, Sarrafzadeh M, Pau G (2011) Leveraging social system networks in ubiquitous high-data-rate health systems. IEEE Trans Inf Technol Biomed 15(3):491–498

    Article  Google Scholar 

  2. Yan H, Huo H, Xu Y, Gidlund M (2010) Wireless sensor network based E-health system implementation and experimental results. IEEE Trans Consum Electron 56(4):2288–2295

    Article  Google Scholar 

  3. Patel M, Wang J (2010) Applications, challenges, and prospective in emerging body area networking technologies. IEEE Wirel Commun 17(1):80–88

    Article  Google Scholar 

  4. Almenares F, Arias P, Marin A, Diaz-Sanchez D, Sanchez R (2013) Overhead of using secure wireless communications in mobile computing. IEEE Trans Consum Electron 59(2):335–342

    Article  Google Scholar 

  5. Lim S, Tae H, Choi Y, Lakshman T (2010) Security issues on wireless body area network for remote healthcare monitoring. Proc. IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, Newport Beach, USA, pp. 327–332, June 2010

  6. Al Ameen M, Liu J, Kwak K (2012) Security and privacy issues in wireless sensor networks for healthcare applications. J Med Syst 36(1):93–101

    Article  Google Scholar 

  7. Mabo P, Victor F, Bazin P, Ahres S, Babuty D, Da Costa A, Daubert JC (2012) A randomized trial of long-term remote monitoring of pacemaker recipients. Eur Heart J 33(9):1105–1111

    Article  Google Scholar 

  8. Venkatasubramanian KK, Banerjee A, Gupta SKS (2008) EKG-based key agreement in Body Sensor Networks. Proc. IEEE INFOCOM Workshop, Phoenix, USA, pp. 13–18, April 2008

  9. Li M, Yu S, Lou W, Ren K (2010) Group device pairing based secure sensor association and key management for body area networks. Proc. IEEE INFOCOM Workshop, San Diego, USA, pp. 1–9, March 2010

  10. Shen J, Moh S, Chung IY (2010) Comment: “Eenhanced novel access control protocol over wireless sensor networks”. IEEE Trans Consum Electron 56(3):2019–2021

    Article  Google Scholar 

  11. Tan C, Wang H, Zhong S, Li Q (2009) IBE-lite: A lightweight identity-based cryptography for body sensor networks. IEEE Trans Inf Technol Biomed 13(6):926–932

    Article  Google Scholar 

  12. Liang X, Lu R, Chen L, Lin X, Shen X (2011) PEC: A privacy-preserving emergency call scheme for mobile healthcare social networks. J Commun Netw 13(2):102–112

    Article  Google Scholar 

  13. He D, Chen C, Chan S, Bu J, Vasilakos AV (2012) A distributed trust evaluation model and its application scenarios to medical sensor networks. IEEE Trans Inf Technol Biomed 16(6):1164–1175

    Article  Google Scholar 

  14. He D, Chen C, Chan S, Bu J, Zhang P (2013) Secure and lightweight network admission and transmission protocol for body sensor networks. IEEE J Biomed Health Inform 17(3):664–674

    Article  Google Scholar 

  15. Shi L, Li M, Yu S, Yuan J (2012) Bana: body area network authentication exploiting channel characteristics. Proc. ACM conference on Security and Privacy in Wireless and Mobile Networks, Tucson, USA, pp. 27–38, April 2012

  16. Li M, Lou W, Ren K (2010) Data security and privacy in wireless body area networks. IEEE Wirel Commun 17(1):51–58

    Article  Google Scholar 

  17. Ali ST, Sivaraman V, Ostry D (2012) Authentication of lossy data in body-sensor networks for healthcare monitoring. Proc. IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, Seoul, Korea, pp. 470–478, June 2012

  18. Li H, Lu R, Zhou L, Yang B, Shen X (2014) An efficient merkle tree based authentication scheme for smart grid. IEEE Syst J 8(2):655–663

  19. Boneh D, Franklin M (2011) Identity-based encryption from the Weil pairing. Proc. CRYPTO 2001, Santa Barbara, USA, pp. 213–229, January 2011

  20. Smart NP (2002) Identity-based authenticated key agreement protocol based on Weil pairing. Electron Lett 38(13):630–632

    Article  MATH  Google Scholar 

  21. Dodis Y, Katz J, Xu S, Yung M (2002) Key-insulated public key cryptosystems. Proc. EUROCRYPT 2002, Amsterdam, Netherlands, pp. 65–82, April 2002

  22. Canetti R, Halevi S, Katz J (2003) A forward-secure public-key encryption scheme. Proc. EUROCRYPT 2003, Warsaw, Poland, pp. 255–271, May 2003

  23. Li H, Liang X, Lu R, Lin X, Shen X (2012) EDR: An efficient demand response scheme for achieving forward secrecy in smart grid, 2012 I.E. Global Telecommunications Conference (IEEE GLOBECOM 2012) 929–934

  24. Li H, Lin X, Yang H, Liang X, Lu R, Shen X (2013) EPPDR: An efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid. IEEE Trans Parallel Distrib Syst doi:10.1109/TPDS.2013.124

  25. Chen L, Cheng Z, Smart NP (2007) Identity-based key agreement protocols from pairings. Int J Inf Secur 6(4):213–241

    Article  Google Scholar 

  26. Lee E, Lee HS, Park CM (2009) Efficient and generalized pairing computation on abelian varieties. IEEE Trans Inf Theory 55(4):1793–1803

    Article  Google Scholar 

  27. Yang Y, Li H, Wen M, Luo H, Lu R (2014) Achieving ranked range query in smart grid auction market. Proceedings of ICC, Sydney, Australia, 2014, to appear

  28. Liu D, Li H, Yang Y, Yang H (2014) Achieving multi-authority access control with efficient attribute revocation in smart grid. Proceedings of ICC, Sydney, Australia, 2014, to appear

Download references

Acknowledgments

Authors would like to thank Daojing He and Xiaofen Wang for comments on an earlier draft related to this paper. Also, authors would like to thank the student, Dianhua Tang, for his collaboration in performing the performance evaluation.

This work is supported by the Korea-China Young Scientist Exchange Program, the National Natural Science Foundation of China under Grants U1233108, U1333127 and 61103207, the Fundamental Research Funds for Chinese Central Universities under Grant ZYGX2011J059, the International Science and Technology Cooperation and Exchange Program of Sichuan Province under Grant 2014HH0029, the Huawei Company Innovation Research Program under contract IRP-2012-04-03, and the National Research Foundation of Korea under Grant NRF-2010-0021575.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Haomiao Yang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yang, H., Kim, H. & Mtonga, K. An efficient privacy-preserving authentication scheme with adaptive key evolution in remote health monitoring system. Peer-to-Peer Netw. Appl. 8, 1059–1069 (2015). https://doi.org/10.1007/s12083-014-0299-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-014-0299-6

Keywords

Navigation