Patients' Data Management System Protected by Identity-Based Authentication and Key Exchange

被引:4
|
作者
Rivero-Garcia, Alexandra [1 ]
Santos-Gonzalez, Ivan [1 ]
Hernandez-Goya, Candelaria [1 ]
Caballero-Gil, Pino [1 ]
Yung, Moti [2 ]
机构
[1] Univ La Laguna, Dept Comp Engn & Syst, E-38206 Tenerife, Spain
[2] Snapchat & Columbia Univ, Dept Comp Sci, New York, NY 10027 USA
关键词
identity-based cryptosystem; identity-based authentication and key exchange; mHealth; keyed-hash message authentication code; Android; NFC; PROTOCOL;
D O I
10.3390/s17040733
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
A secure and distributed framework for the management of patients' information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC) wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth) scheme for managing patients' data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed.
引用
收藏
页数:16
相关论文
共 50 条
  • [41] Identity-based authentication protocol for grid
    Li Hongwei
    Sun Shixin
    Yang Haomiao
    JOURNAL OF SYSTEMS ENGINEERING AND ELECTRONICS, 2008, 19 (04) : 860 - COVER3
  • [42] Identity-Based Authentication for Cloud Computing
    Li, Hongwei
    Dai, Yuanshun
    Tian, Ling
    Yang, Haomiao
    CLOUD COMPUTING, PROCEEDINGS, 2009, 5931 : 157 - 166
  • [43] Identity-based authentication key agreement protocol for horizontal federated learning environment
    Ren J.
    Li M.
    Du Y.
    Yin L.
    Beijing Hangkong Hangtian Daxue Xuebao/Journal of Beijing University of Aeronautics and Astronautics, 2023, 49 (02): : 397 - 405
  • [44] Identity-based Public Key Keyword Searchable Encryption Scheme with Denial Authentication
    Cao Suzhen
    Ding Binbin
    Ding Xiaohui
    Dou Fengge
    Wang Caifen
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2022, 44 (03) : 1086 - 1092
  • [45] A Two-Party Identity-Based Key Agreement Protocol with Explicit Authentication
    Yang, Haomin
    Zhang, Yaoxue
    Zhou, Yuezhi
    2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2012,
  • [46] IDENTITY-BASED CONFERENCE KEY DISTRIBUTION-SYSTEM
    KOYAMA, K
    ELECTRONICS LETTERS, 1987, 23 (10) : 495 - 496
  • [47] Zero-Knowledge and Identity-Based Authentication, Authorization, Access Control, and Key Exchange for Publish/Subscribe in Internet of Things
    Simsek, Irfan
    2023 6TH CONFERENCE ON CLOUD AND INTERNET OF THINGS, CIOT, 2023, : 47 - 54
  • [48] A Lightweight Leakage-Resilient Identity-Based Mutual Authentication and Key Exchange Protocol for Resource-limited Devices
    Tseng, Yuh-Min
    Chen, Jian-Lun
    Huang, Sen-Shan
    COMPUTER NETWORKS, 2021, 196
  • [49] Integrating identity-based and certificate-based authenticated key exchange protocols
    Berkant Ustaoğlu
    International Journal of Information Security, 2011, 10 : 201 - 212
  • [50] Towards a fully self-organized identity-based key management system for MANETs
    da Silva, Eduardo
    Pessoa Albini, Luiz Carlos
    2013 IEEE 9TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2013, : 717 - 723