Patients' Data Management System Protected by Identity-Based Authentication and Key Exchange

被引:4
|
作者
Rivero-Garcia, Alexandra [1 ]
Santos-Gonzalez, Ivan [1 ]
Hernandez-Goya, Candelaria [1 ]
Caballero-Gil, Pino [1 ]
Yung, Moti [2 ]
机构
[1] Univ La Laguna, Dept Comp Engn & Syst, E-38206 Tenerife, Spain
[2] Snapchat & Columbia Univ, Dept Comp Sci, New York, NY 10027 USA
关键词
identity-based cryptosystem; identity-based authentication and key exchange; mHealth; keyed-hash message authentication code; Android; NFC; PROTOCOL;
D O I
10.3390/s17040733
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
A secure and distributed framework for the management of patients' information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC) wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth) scheme for managing patients' data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed.
引用
收藏
页数:16
相关论文
共 50 条
  • [31] Provably Secure Identity-based Group Key Exchange Protocol
    Cao Chunjie
    Ma Jianfeng
    SangJae Moon
    CHINA COMMUNICATIONS, 2007, 4 (04) : 11 - 22
  • [32] Private Key Management in Hierarchical Identity-Based Encryption
    Liu, Zhongren
    Xu, Li
    Chen, Zhide
    Guo, Fuchun
    SITIS 2007: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SIGNAL IMAGE TECHNOLOGIES & INTERNET BASED SYSTEMS, 2008, : 206 - 212
  • [33] Converting PKI-Based Authenticated Key Exchange to Identity-Based
    Suzuki, Koutarou
    Yoneyama, Kazuki
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2014, 2014, 8813 : 159 - 174
  • [34] An Identity-Based Authenticated Key Exchange Protocol Resilient to Continuous Key Leakage
    Wu, Jui-Di
    Tseng, Yuh-Min
    Huang, Sen-Shan
    IEEE SYSTEMS JOURNAL, 2019, 13 (04): : 3968 - 3979
  • [35] Identity-based mutual device authentication schemes for PLC system
    Heo, Joon
    Hong, Choong Seon
    Choi, Moon Seok
    Ju, Seong Ho
    Lim, Yong Hoon
    IEEE ISPLC: 2008 IEEE INTERNATIONAL SYMPOSIUM ON POWER LINE COMMUNICATIONS AND ITS APPLICATIONS, 2008, : 47 - +
  • [36] A V2V Identity Authentication and Key Agreement Scheme Based on Identity-Based Cryptograph
    Li, Qiang
    FUTURE INTERNET, 2023, 15 (01):
  • [37] Identity-Based Authentication in VANETs: A Review
    Manasrah, Ahmed
    Yaseen, Qussai
    Al-Aqrabi, Hussain
    Liu, Lu
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2025,
  • [38] AN IDENTITY-BASED PERSONAL LOCATION SYSTEM WITH PROTECTED PRIVACY IN IOT
    Hu, Chunye
    Zhang, Jie
    Wen, Qiaoyan
    2011 4TH IEEE INTERNATIONAL CONFERENCE ON BROADBAND NETWORK AND MULTIMEDIA TECHNOLOGY (4TH IEEE IC-BNMT2011), 2011, : 192 - 195
  • [39] Identity-based authentication protocol for grid
    Li Hongwei
    JournalofSystemsEngineeringandElectronics, 2008, (04) : 860 - 865
  • [40] Identity-based deniable authentication protocol
    Shi, Y
    Li, J
    ELECTRONICS LETTERS, 2005, 41 (05) : 241 - 242