Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

A secure Internet of Things medical information sharing and emergency notification system based on nonrepudiation mechanism

Published: 07 May 2021 Publication History

Abstract

As the network technologies have rapidly developed in recent years, many Internet of Things (IoT) based services and applications have walked into our daily lives; one of these is the medical information system. In the early days, medical information was recorded and stored in article form. It contains a patient identity background, past medical history, and records of medical payment. With the development of medical technology, medical information is now stored and transmitted electronically. Medical information may be a person's most private information, but due to network operation errors or hacking attacks, there has been a crisis of large‐scale leakage of these personal privacy data in the past. In any cases, how to protect this medical information and ensure the privacy of patients has become a topic worthy of research. Therefore, many kinds of literature discussed how to improve medical information systems. In addition, how to effectively treat patients when accidents happen is also a topic worthy of research. Therefore, combined with IoT technologies and medical devices, it has been opened a whole new future for medical information system. This study focuses on security and privacy issues to design a security scheme for healthcare environments when a person encountered physical emergency. Mobile devices and cloud computing are combined into the proposed platform. The proposed scheme can defend against impersonation attack, man‐in‐middle attack, and replay attack. The modal logic is used to verify the proposed scheme. By using digital signature and SVO logic mechanism, the proposed scheme is proven with nonrepudiation.

Graphical Abstract

The architecture of the information extension in case of emergency.

References

[1]
Yang Y, Zheng X, Guo W, Liu X, Chang V. Privacy‐preserving smart IoT‐based healthcare big data storage and self‐adaptive access control system. Inf Sci. 2019;479:567‐592.
[2]
Dong C, He G, Liu X, Yang Y, Guo W. A multi‐layer hardware trojan protection framework for IoT chips. IEEE Access. 2019;7:23628‐23639.
[3]
Dong C, Ye Y, Liu X, Yang Y, Guo W. The sensitivity design of piezoresistive acceleration sensor in industrial IoT. IEEE Access. 2019;7:16952‐16963.
[4]
Yang Y, Zheng X, Guo W, Liu X, Chang V. Privacy‐preserving fusion of IoT and big data for e‐health. Future Generat Comput Syst. 2018;86:1437‐1455.
[5]
Yang Y, Zheng X, Tang C. Lightweight distributed secure data management system for health internet of things. J Netw Comput Appl. 2017;89:26‐37.
[6]
Simon H, Hirsh D, Rogers A, Massey R, DeGuaman M. Pediatric emergency department overcrowding: electronic medical record for identification of frequent, lower acuity visitors. can we effectively identify patients for enhanced resource utilization? J Emerg Med. 2009;36(3):311‐316.
[7]
Glowniak JV. Medical resources on the internet. Ann Internal Med. 1995;123(2):123‐131.
[8]
Kianmehr N, Mofidi M, Saidi H, HajiBeigi M, Rezai M. What are patients concerns about medical errors in an emergency department? Sultan Qaboos Univ Med J. 2012;12(1):86‐92.
[9]
Lester H, Tritter JQ. Medical error: a discussion of the medical construction of error and suggestions for reforms of medical education to decrease error. Med Educ. 2001;35(9):855‐861.
[10]
Wei J, Hu X, Liu W. An improved authentication scheme for telecare medicine information systems. J Med Syst. 2012;36(6):3597‐3604.
[11]
Wu ZY, Lee YC, Lai F, Lee HC, Chung Y. A secure authentication scheme for telecare medicine information systems. J Med Syst. 2010;36(3):1529‐1535.
[12]
He DH, Chen JH, Zhang R. A more secure authentication scheme for telecare medicine information systems. J Med Syst. 2012;36(3):1989‐1995.
[13]
Zhu Z. An efficient authentication scheme for telecare medicine information systems. J Med Syst. 2012;36(6):3833‐3838.
[14]
Chen CL, Yang TT, Shih TF. A secure medical data exchange protocol based on cloud environment. J Med Syst. 2014;38(9):1‐12.
[15]
Bin MFT. Cryptanalysis and security enhancement of Zhu's authentication scheme for telecare medicine information system. Sec Commun Netw. 2014;8(2):149‐158.
[16]
Yang TT, Chen CL, Chakraborty G. Medical information sharing system based on non‐repudiation mechanism. Paper presented at: Proceedings of the 2015 International Conference on Innovation, Communication and Engineering; 2015, Vol 1816:1‐4; China.
[17]
Michel B, Jyanthi H, Evangelos K. Detecting impersonation attacks in future wireless and mobile networks. Paper presented at: Proceedings of the 1st International Conference on Secure Mobile Ad‐Hoc Networks and Sensors; 2005:20‐–22.
[20]
Zhou J, Gollmann D, An efficient non‐repudiation protocol. Paper presented at: Proceedings of the 1997 IEEE Computer Security Foundations Workshop (CSFW' 10); 1997:126‐132.
[21]
Poslad S. Ubiquitous computing smart devices: smart environments and smart interaction. Sirirajmedj Com. 2009;67(10):642‐644.
[22]
Meadows CA. Formal verification of cryptographic protocols: a survey. Paper presented at: Proceedings of the 4th International Conference on the Theory and Applications of Cryptology: Advances in Cryptology the (ASIACRYPT'94); 1994, Vol 917:133–150; Wollongong, Australia, LNCS.
[23]
Burrows M, Abadi M, Needham R. A logic of authentication. ACM Trans Comput Syst. 1990;8(1):18‐36.
[24]
Gong L, Needham R, Yahalom R, Reasoning about belief in cryptographic protocols. Paper presented at: Proceedings of the IEEE Symposium on Security and Privacy; 1990:234‐248.
[25]
Abadi M, Tuttle MR, A semantics for a logic of authentication. Paper presented at: Proceedings of the 10th Annual ACM Symposium on Principlea of Distributed Computing; 1991:201‐216.
[26]
van Oorschot PC, Extending cryptographic logics of cryptographic logic of belief of key agreement protocols. Paper presented at: Proceedings of the 1st ACM Conference on Computers and Communication Security; 1993:232‐243.
[27]
Syverson P, van Oorschor PC. On unifying some cryptographic protocol logics. Paper presented at: Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy; 1994:14‐28.
[28]
Zhou J, Gollmann D, A fair non‐repudiation protocol. Paper presented at: Proceedings of the IEEE Symposium on Security and Privacy; 1996:55‐61; Los Alamitos, CA.
[29]
Diffie W, Hellman M. New directions in cryptography. IEEE Trans Inf Theory. 1996;22(6):644‐654.
[30]
Boneh D, Franklin M. Identity‐based encryption from the weil pairing. Adv Crypt Crypto. 2001;2139:213‐229.
[31]
Wu ZY, Lee YC, Lai F, Lee HC, Chung YA. Secure authentication scheme for telecare medicine information systems. J Med Syst. 2012;36(3):1529‐1535.
[32]
Jiang Q, Ma J, Ma Z, Li G. A privacy enhanced authentication scheme for telecare medical information systems. J Med Syst. 2013;37(1):9897. https://doi.org/10.1007/s10916-012-9897-0.
[33]
Tan Z. A user anonymity preserving three‐factor authentication scheme for telecare medicine information systems. J Med Syst. 2014;38(3):1‐9.
[34]
Lu Y, Li H, Peng H, Yang Y. An enhanced biometric‐based authentication scheme for telecare medicine information systems using elliptic curve cryptosystem. J Med Syst. 2015;39(3):1‐8.

Cited By

View all
  • (2023)Architecture, Technologies, and Applications of Location-Based ServicesMobile Information Systems10.1155/2023/97965352023Online publication date: 1-Jan-2023

Index Terms

  1. A secure Internet of Things medical information sharing and emergency notification system based on nonrepudiation mechanism
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Information & Contributors

          Information

          Published In

          cover image Transactions on Emerging Telecommunications Technologies
          Transactions on Emerging Telecommunications Technologies  Volume 32, Issue 5
          May 2021
          405 pages
          ISSN:2161-3915
          EISSN:2161-3915
          DOI:10.1002/ett.v32.5
          Issue’s Table of Contents

          Publisher

          John Wiley & Sons, Inc.

          United States

          Publication History

          Published: 07 May 2021

          Qualifiers

          • Research-article

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • Downloads (Last 12 months)0
          • Downloads (Last 6 weeks)0
          Reflects downloads up to 03 Oct 2024

          Other Metrics

          Citations

          Cited By

          View all
          • (2023)Architecture, Technologies, and Applications of Location-Based ServicesMobile Information Systems10.1155/2023/97965352023Online publication date: 1-Jan-2023

          View Options

          View options

          Get Access

          Login options

          Media

          Figures

          Other

          Tables

          Share

          Share

          Share this Publication link

          Share on social media