Abstract
In this paper a secure distributed system is proposed to manage patients’ information in an emergency service in order to improve efficiency. Authentication, confidentiality and automatic and robust patient identification are provided. The system elements are NFC wristbands, assigned to patients, mobile devices assigned to medical staff and a server to manage the information and verify that its use is legitimate. Patient’s identification is carried out through a keyed-Hash Message Authentication Code. In addition, a challenge-response protocol is proposed for mutual authentication of medical staff and the server using the FullIdent scheme Identity Based Encryption. The same scheme gives confidentiality to the system. The definition of this system provides a secure solution based on mHealth for managing patients in an emergency service.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
TechTarget, mhealth security: best practices and industry trends, TechTarget, Technical report (2015)
Organization, W.H.: Patient safety solutions. http://goo.gl/EuAX51
Pablo-Comeche, D., Buitrago-Vera, C., Meneu, R.: Identificación inequívoca de pacientes. evaluación del lanzamiento y su implantación en los hospitales de la agencia valenciana de salud, Medicina Clínica, vol. 135, no. Julio 2010, pp. 1–6, 2010. http://dx.doi.org/10.1007/s10916-015-0362-8
Want, R.: Near field communication. IEEE Pervasive Comput. 3, 4–7 (2011)
Finkenzeller, K., Handbook, R.: Radio-Frequency Identification Fundamentals and Applications. John Wiley & Son, Chippenham (1999)
Lee, J.-S., Su, Y.-W., Shen, C.-C.: A comparative study of wireless protocols: bluetooth,UWB, ZigBee, and Wi-Fi. In: 33rd Annual Conference of the IEEE on Industrial Electronics Society, IECON 2007. IEEE, pp. 46–51 (2007)
Jin, C., Xu, C., Zhang, X., Li, F.: A secure ECC-based RFID mutual authentication protocol to enhance patient medication safety. J. Med. Syst. 40(1), 1–6 (2015). http://dx.doi.org/10.1007/s10916-015-0362-8
H. id: Health system platform (2012). https://www.healthid.com/
Lee, C.-I., Chien, H.-Y.: An elliptic curve cryptography-based rfid authentication securing e-health system. Int. J. Distrib. Sens. Netw. 11, 1–7 (2015). http://dx.doi.org/10.1155/2015/642425
He, D., Kumar, N., Chilamkurti, N., Lee, J.-H.: Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol. J. Med. Syst. 38(10), 1–6 (2014). http://dx.doi.org/10.1007/s10916-014-0116-z
Kstinger, H., Gobber, M., Grechenig, T., Tappeiner, B., Schramm, W.: Developing a NFC based patient identification and ward round system for mobile devices using the android platform. In: 2013 IEEE Point-of-Care Healthcare Technologies (PHT), pp. 176–179, January 2013
P. data sheet NTAG213, 215, 216, Nfc forum type 2 tag compliant ic with 144, 504, 888 bytes user memory (2015). http://www.who.int/patientsafety/solutions/patientsafety/PS-Solution2.pdf
NFCFORUM, Official web page (2016). http://nfc-forum.org/
Bellare, M., Canetti, R., Krawczyk, H.: Message authentication using hash functions: the HMAC construction. RSA Lab. Cryptobytes 2(1), 12–15 (1996)
Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001). doi:10.1007/3-540-44647-8_13
Santos-González, I., Rivero-García, A., Caballero-Gil, P., Hernández-Goya, C.: Alternative communication system for emergency situations. In: WEBIST, vol. 2, pp. 397–402 (2014)
Miller, V.S.: Use of elliptic curves in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417–426. Springer, Heidelberg (1986). doi:10.1007/3-540-39799-X_31
Menezes, A.J., Van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)
Acknowledgements
Research supported by TESIS2015010102, TESIS2015010106, RTC-2014-1648-8, TEC2014-54110-R, MTM-2015-69138-REDT and DIG02-INSITU.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing AG
About this paper
Cite this paper
Rivero-García, A., Hernández-Goya, C., Santos-González, I., Caballero-Gil, P. (2016). Patients’ Data Management System Through Identity Based Encryption. In: García, C., Caballero-Gil, P., Burmester, M., Quesada-Arencibia, A. (eds) Ubiquitous Computing and Ambient Intelligence. IWAAL AmIHEALTH UCAmI 2016 2016 2016. Lecture Notes in Computer Science(), vol 10070. Springer, Cham. https://doi.org/10.1007/978-3-319-48799-1_55
Download citation
DOI: https://doi.org/10.1007/978-3-319-48799-1_55
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-48798-4
Online ISBN: 978-3-319-48799-1
eBook Packages: Computer ScienceComputer Science (R0)