SAKE: scalable authenticated key exchange for mobile e-health networks

被引:2
作者
Liu, Weiran [1 ]
Liu, Jianwei [1 ]
Wu, Qianhong [1 ]
Susilo, Willy [2 ]
Deng, Hua [3 ]
Qin, Bo [4 ]
机构
[1] Beihang Univ, Sch Elect & Informat Engn, 37 Xueyuan Rd, Beijing 100191, Peoples R China
[2] Univ Wollongong, Sch Comp Sci & Software Engn, Wollongong, NSW 2522, Australia
[3] Wuhan Univ, Sch Comp, Wuhan, Peoples R China
[4] Renmin Univ China, Sch Informat, Beijing, Peoples R China
基金
北京市自然科学基金;
关键词
mobile e-health network; data security and privacy; authenticated key exchange; cloud privacy; SENSOR NETWORKS; PRIVACY; CARE; SECURE; SCHEME;
D O I
10.1002/sec.1198
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile e-Health Network (MHN) is an emerging cloud-aided networking application across the entire range of functions involved in e-Health systems. It is important to establish secure channels between users because the data transmitted in MHNs are private, for example, personal electronic healthcare records. It is of great significance to employ key management mechanism and encrypt the data before transmitting in MHNs. However, secure key management is challenging in MHNs because of its highly dynamic and large-scale nature. In this paper, we first model MHNs and formalize a hierarchical network architecture mirroring the administrative hierarchy and dynamic autonomy in MHNs in the real world. We next present a virtual MHN architecture with only three levels yet suitable to realistic MHNs with arbitrary hierarchical levels. By exploiting the virtual architecture, we propose an efficient authenticated key exchange framework to secure MHNs. We realize a scalable authenticated key exchange scheme with a dedicated variant of a recent hierarchical identity-based signature and the well-known Diffie-Hellman key exchange protocol. Theoretical analyses and experimental results show that scalable authenticated key exchange is secure and scalable and hence is practical to secure MHNs. Copyright (c) 2015 John Wiley & Sons, Ltd.
引用
收藏
页码:2754 / 2765
页数:12
相关论文
共 45 条
[1]   Wireless sensor networks for healthcare: A survey [J].
Alemdar, Hande ;
Ersoy, Cem .
COMPUTER NETWORKS, 2010, 54 (15) :2688-2710
[2]  
[Anonymous], ASTL SIA
[3]   ESPAC: Enabling security and patient-centric access control for ehealth in cloud computing [J].
Barua M. ;
Liang X. ;
Lu R. ;
Shen X. .
International Journal of Security and Networks, 2011, 6 (2-3) :67-76
[4]  
Bin Li., 2010, Power and Energy Engineering Conference (APPEEC), P1
[5]   Emergency Access Authorization for Personally Controlled Online Health Care Data [J].
Chen, Tingting ;
Zhong, Sheng .
JOURNAL OF MEDICAL SYSTEMS, 2012, 36 (01) :291-300
[6]   A round- and computation-efficient three-party authenticated key exchange protocol [J].
Chen, Tzung-Her ;
Lee, Wei-Bin ;
Chen, Hsing-Bai .
JOURNAL OF SYSTEMS AND SOFTWARE, 2008, 81 (09) :1581-1590
[7]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[8]   TRANSFORMING HEALTHCARE AND MEDICAL TELEMETRY THROUGH COGNITIVE RADIO NETWORKS [J].
Doost-Mohammady, Rahman ;
Chowdhury, Kaushik R. .
IEEE WIRELESS COMMUNICATIONS, 2012, 19 (04) :67-73
[9]   Ubiquitous Health Monitoring Using Mobile Web Services [J].
Elgazzar, Khalid ;
Aboelfotoh, Muhammad ;
Martin, Patrick ;
Hassanein, Hossam S. .
ANT 2012 AND MOBIWIS 2012, 2012, 10 :332-339
[10]   Hierarchical ID-based cryptography [J].
Gentry, C ;
Silverberg, A .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2002, PROCEEDINGS, 2002, 2501 :548-566