Abstract
The remote health monitoring system enables a doctor to diagnose and monitor health problems anywhere for a patient. However, since the patient health information is very sensitive and the Internet is unsecure and prone to many attacks, data can be easily compromised by adversaries. Worse, the mobile phone is also easy to be compromised. Clearly, these issues have brought different privacy and security requirements in wireless healthcare. To address these challenging issues, in this paper, we propose an efficient privacy-preserving authentication scheme with adaptive key evolution, which can prevent illegal access to the patient’s vital signs. Furthermore, we model the leakage process of the key information to set proper key renewal interval, which can adaptively control the key evolution to balance the trade-off between the communication efficiency and security level. The security analysis demonstrates that our scheme can achieve authenticated key agreement, perfect and strong key insulation, privacy preservation, and other important security goals, e.g. authenticity, integrity and freshness of transmitted messages. The performance evaluation shows that our scheme is computationally efficient for the typical mobile phone with limited resources, and it has low communication overhead.





Similar content being viewed by others
References
Massey T, Marfia G, Stoelting A, Tomasi R, Spirito MA, Sarrafzadeh M, Pau G (2011) Leveraging social system networks in ubiquitous high-data-rate health systems. IEEE Trans Inf Technol Biomed 15(3):491–498
Yan H, Huo H, Xu Y, Gidlund M (2010) Wireless sensor network based E-health system implementation and experimental results. IEEE Trans Consum Electron 56(4):2288–2295
Patel M, Wang J (2010) Applications, challenges, and prospective in emerging body area networking technologies. IEEE Wirel Commun 17(1):80–88
Almenares F, Arias P, Marin A, Diaz-Sanchez D, Sanchez R (2013) Overhead of using secure wireless communications in mobile computing. IEEE Trans Consum Electron 59(2):335–342
Lim S, Tae H, Choi Y, Lakshman T (2010) Security issues on wireless body area network for remote healthcare monitoring. Proc. IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, Newport Beach, USA, pp. 327–332, June 2010
Al Ameen M, Liu J, Kwak K (2012) Security and privacy issues in wireless sensor networks for healthcare applications. J Med Syst 36(1):93–101
Mabo P, Victor F, Bazin P, Ahres S, Babuty D, Da Costa A, Daubert JC (2012) A randomized trial of long-term remote monitoring of pacemaker recipients. Eur Heart J 33(9):1105–1111
Venkatasubramanian KK, Banerjee A, Gupta SKS (2008) EKG-based key agreement in Body Sensor Networks. Proc. IEEE INFOCOM Workshop, Phoenix, USA, pp. 13–18, April 2008
Li M, Yu S, Lou W, Ren K (2010) Group device pairing based secure sensor association and key management for body area networks. Proc. IEEE INFOCOM Workshop, San Diego, USA, pp. 1–9, March 2010
Shen J, Moh S, Chung IY (2010) Comment: “Eenhanced novel access control protocol over wireless sensor networks”. IEEE Trans Consum Electron 56(3):2019–2021
Tan C, Wang H, Zhong S, Li Q (2009) IBE-lite: A lightweight identity-based cryptography for body sensor networks. IEEE Trans Inf Technol Biomed 13(6):926–932
Liang X, Lu R, Chen L, Lin X, Shen X (2011) PEC: A privacy-preserving emergency call scheme for mobile healthcare social networks. J Commun Netw 13(2):102–112
He D, Chen C, Chan S, Bu J, Vasilakos AV (2012) A distributed trust evaluation model and its application scenarios to medical sensor networks. IEEE Trans Inf Technol Biomed 16(6):1164–1175
He D, Chen C, Chan S, Bu J, Zhang P (2013) Secure and lightweight network admission and transmission protocol for body sensor networks. IEEE J Biomed Health Inform 17(3):664–674
Shi L, Li M, Yu S, Yuan J (2012) Bana: body area network authentication exploiting channel characteristics. Proc. ACM conference on Security and Privacy in Wireless and Mobile Networks, Tucson, USA, pp. 27–38, April 2012
Li M, Lou W, Ren K (2010) Data security and privacy in wireless body area networks. IEEE Wirel Commun 17(1):51–58
Ali ST, Sivaraman V, Ostry D (2012) Authentication of lossy data in body-sensor networks for healthcare monitoring. Proc. IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, Seoul, Korea, pp. 470–478, June 2012
Li H, Lu R, Zhou L, Yang B, Shen X (2014) An efficient merkle tree based authentication scheme for smart grid. IEEE Syst J 8(2):655–663
Boneh D, Franklin M (2011) Identity-based encryption from the Weil pairing. Proc. CRYPTO 2001, Santa Barbara, USA, pp. 213–229, January 2011
Smart NP (2002) Identity-based authenticated key agreement protocol based on Weil pairing. Electron Lett 38(13):630–632
Dodis Y, Katz J, Xu S, Yung M (2002) Key-insulated public key cryptosystems. Proc. EUROCRYPT 2002, Amsterdam, Netherlands, pp. 65–82, April 2002
Canetti R, Halevi S, Katz J (2003) A forward-secure public-key encryption scheme. Proc. EUROCRYPT 2003, Warsaw, Poland, pp. 255–271, May 2003
Li H, Liang X, Lu R, Lin X, Shen X (2012) EDR: An efficient demand response scheme for achieving forward secrecy in smart grid, 2012 I.E. Global Telecommunications Conference (IEEE GLOBECOM 2012) 929–934
Li H, Lin X, Yang H, Liang X, Lu R, Shen X (2013) EPPDR: An efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid. IEEE Trans Parallel Distrib Syst doi:10.1109/TPDS.2013.124
Chen L, Cheng Z, Smart NP (2007) Identity-based key agreement protocols from pairings. Int J Inf Secur 6(4):213–241
Lee E, Lee HS, Park CM (2009) Efficient and generalized pairing computation on abelian varieties. IEEE Trans Inf Theory 55(4):1793–1803
Yang Y, Li H, Wen M, Luo H, Lu R (2014) Achieving ranked range query in smart grid auction market. Proceedings of ICC, Sydney, Australia, 2014, to appear
Liu D, Li H, Yang Y, Yang H (2014) Achieving multi-authority access control with efficient attribute revocation in smart grid. Proceedings of ICC, Sydney, Australia, 2014, to appear
Acknowledgments
Authors would like to thank Daojing He and Xiaofen Wang for comments on an earlier draft related to this paper. Also, authors would like to thank the student, Dianhua Tang, for his collaboration in performing the performance evaluation.
This work is supported by the Korea-China Young Scientist Exchange Program, the National Natural Science Foundation of China under Grants U1233108, U1333127 and 61103207, the Fundamental Research Funds for Chinese Central Universities under Grant ZYGX2011J059, the International Science and Technology Cooperation and Exchange Program of Sichuan Province under Grant 2014HH0029, the Huawei Company Innovation Research Program under contract IRP-2012-04-03, and the National Research Foundation of Korea under Grant NRF-2010-0021575.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Yang, H., Kim, H. & Mtonga, K. An efficient privacy-preserving authentication scheme with adaptive key evolution in remote health monitoring system. Peer-to-Peer Netw. Appl. 8, 1059–1069 (2015). https://doi.org/10.1007/s12083-014-0299-6
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-014-0299-6