Collaborative approach to secure agents in ubiquitous healthcare systems

被引:0
作者
Bouchemal N. [1 ,2 ]
Maamri R. [3 ]
Bouchemal N. [1 ,2 ]
机构
[1] Department of Mathematics and Informatics, Abdelhafid Boussouf University Center of Mila, Mila
[2] LIRE Laboratory of Constantine 2, Constantine
[3] LIRE Laboratory of Constantine 2, Software and Information Systems Technologies Department, Abdelhamid Mehri University, Constantine 2, Constantine
[4] Altran Technology, Paris
关键词
Collaboration; Collective decision; Security; U-agents; U-healthcare; Ubiquitous agents; Ubiquitous healthcare;
D O I
10.1504/IJISTA.2019.102666
中图分类号
学科分类号
摘要
In sensitive domain such as healthcare, lives of people are controlled and it is very important to have fast access to health information especially in case of emergency (e.g., chronic diseases). For that, agent paradigm is very promising in ubiquitous healthcare systems. But, the inherent complexity of information security is bigger because agents are characterised by autonomy, intelligence and not under the control of a single entity. Indeed, the big challenge in agent-based ubiquitous healthcare systems is to assure that emergency workers and doctors can access personal information fast and whenever needed but with high level security. The idea, in this paper, is to lighten agents with simple cryptography concepts while strengthening the surveillance and make it collaborative. Consequently, all agents of the system are concerned by security and collaborate to maintain it. The proposed agents are implemented in JADE-LEAP platform designed for restricted devices. Copyright © 2019 Inderscience Enterprises Ltd.
引用
收藏
页码:560 / 578
页数:18
相关论文
共 29 条
  • [1] Alonso R.S., Saavedra A., Tapia D., Corchado J.M., Heterogeneous wireless sensor networks in a telemonitoring system for homecare, Proceedings of IWANN, 2, pp. 663-670, (2009)
  • [2] Augusto J.C., Ambient intelligence: Basic concepts and applications, Computer and Information Science: Software and Data Technologies, 10, (2008)
  • [3] Basin D., Cremers C., Kunihiko M., Dai W., Improving the security of cryptographic protocol standards, Int. J. IEEE Security & Privacy, 13, 3, pp. 24-31, (2014)
  • [4] Beckwith R., Lederer S., Designing for one’s dotage: Ubicomp and residential care facilities, Conf. Home-Oriented Informatics and Telematics (HOIT 03), (2013)
  • [5] Bellifemine F., Caire G., Trucco T., Rimassa G., Jade programmer’s guide, version 3.2, Journal of Telecom Italia Lab, (2004)
  • [6] Bouchemal N., Maamri R., SGP: Security by guaranty protocol, Proceeding of International Conference on Distributed Computing and Artificial Intelligence (DCAI’12), 151, pp. 289-296, (2012)
  • [7] Bouchemal N., Maamri R., SPIG: Security by privileges, inspection and guaranty for ambient agents group, Proceeding of International Conference on Agents and Artificial Intelligence (ICAART’13), (2013)
  • [8] Bouchemal N., Maamri R., Securing ambient agents groups by using verification, judgment and surveillance, International Journal of Ambient Computing Intelligence (IJACI), 5, 3, pp. 44-60, (2013)
  • [9] Caire G., LEAP 3.0 User Guide, TILAB, JADE-LEAP, (2003)
  • [10] Collins M., Dobson S., Nixon P., Security issues with pervasive computing frameworks, Proceeding of Workshop on Privacy, Trust and Identity Issues for Ambient Intelligence at Pervasive, (2006)