Patients' Data Management System Protected by Identity-Based Authentication and Key Exchange

被引:4
|
作者
Rivero-Garcia, Alexandra [1 ]
Santos-Gonzalez, Ivan [1 ]
Hernandez-Goya, Candelaria [1 ]
Caballero-Gil, Pino [1 ]
Yung, Moti [2 ]
机构
[1] Univ La Laguna, Dept Comp Engn & Syst, E-38206 Tenerife, Spain
[2] Snapchat & Columbia Univ, Dept Comp Sci, New York, NY 10027 USA
关键词
identity-based cryptosystem; identity-based authentication and key exchange; mHealth; keyed-hash message authentication code; Android; NFC; PROTOCOL;
D O I
10.3390/s17040733
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
A secure and distributed framework for the management of patients' information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC) wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth) scheme for managing patients' data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed.
引用
收藏
页数:16
相关论文
共 50 条
  • [1] Identity-Based SIP Authentication and Key Agreement
    Wu ShaoBo
    Li ChengShu
    EMERGING COMPUTATION AND INFORMATION TECHNOLOGIES FOR EDUCATION, 2012, 146 : 765 - +
  • [2] Zero-Knowledge and Identity-Based Authentication and Key Exchange for Internet of Things
    Simsek, Irfan
    Rathgeb, Erwin P.
    2019 IEEE 5TH WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2019, : 283 - 288
  • [3] Threshold and identity-based key management and authentication for wireless ad hoc networks
    Deng, HM
    Mukherjee, A
    Agrawal, DP
    ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, PROCEEDINGS, 2004, : 107 - 111
  • [4] Smart Home Security: A Distributed Identity-based Security Protocol for Authentication and Key Exchange
    Rathore, M. Mazhar
    Bentafat, Elmahdi
    Bakiras, Spiridon
    2019 28TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN), 2019,
  • [5] An Identity-Based Key-Exchange Protocol
    ZHANG Ya-juan
    Wuhan University Journal of Natural Sciences, 2005, (01) : 235 - 238
  • [6] AN IDENTITY-BASED KEY-EXCHANGE PROTOCOL
    GUNTHER, CG
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 434 : 29 - 37
  • [7] Implementation and Testing of an Identity-based Authentication System
    Zhao, Guifen
    Hu, Xiangyi
    Li, Ying
    Du, Liping
    Zhao, Guifen
    2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL IV, 2009, : 424 - 427
  • [8] Enhanced Zero-Knowledge and Identity-Based Authentication with integrated Key Exchange for Internet of Things
    Simsek, Irfan
    2022 IEEE 8TH WORLD FORUM ON INTERNET OF THINGS, WF-IOT, 2022,
  • [9] Identity-Based Identity-Concealed Authenticated Key Exchange
    Lian, Huanhuan
    Pan, Tianyu
    Wang, Huige
    Zhao, Yunlei
    COMPUTER SECURITY - ESORICS 2021, PT II, 2021, 12973 : 651 - 675
  • [10] On the design of provably secure identity-based authentication and key exchange protocol for heterogeneous wireless access
    Jiang, J
    He, C
    Jiang, LG
    NETWORKING AND MOBILE COMPUTING, PROCEEDINGS, 2005, 3619 : 972 - 981