Skip to main content

Secure System Communication to Emergencies for Victims Management Through Identity Based Signcryption Scheme

  • Conference paper
  • First Online:
Ubiquitous Computing and Ambient Intelligence (UCAmI 2017)

Abstract

In this proposal an optimized system designed to help the greatest number of injured people in emergency situations is described, using the shortest possible time and cost. It is composed of a mobile application (assigned to medical staff and helpers), a web service and Near Field Communication wristbands assigned to victims. The mobile application is devoted to providing medical staff with the geolocation of victims as well as with an assistant indicating the best route to follow in order to take care of them based on the severity of their conditions and based on a triage method. Resolution of the routes is solved based on a classical problem, a Travelling Salesman Problem, using a k-partition algorithm to divide the huge number of victims in different clusters. Thus, each doctor has a specific area to assist victims. Besides, doctors can use a functionality of the application to contact their peers through a chat when additional help is needed. An IDentity-Based Signcryption is used for communication confidentiality, authenticity and integrity, both among peers, and between server and medical staff.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Rivero-Garcıa, A., Hernández-Goya, C., Santos-González, I., Caballero-Gil, P.: Fasttriaje: A mobile system for victim classification in emergency situations (2014)

    Google Scholar 

  2. Kahn, C.A., Schultz, C.H., Miller, K.T., Anderson, C.L.: Does start triage work? an outcomes assessment after a disaster. Ann. Emerg. Med. 54(3), 424–430 (2009)

    Article  Google Scholar 

  3. Romig, L.E.: Pediatric triage. A system to jumpstart your triage of young patients at MCIs. JEMS J. Emerg. Med. Serv. 27(7), 52–58 (2002)

    Google Scholar 

  4. Want, R.: Near field communication. IEEE Pervasive Comput. 10(3), 4–7 (2011)

    Article  Google Scholar 

  5. Chopde, N.R., Nichat, M.: Landmark based shortest path detection by using A* and Haversine formula. Int. J. Innov. Res. Comput. Commun. Eng. 1(2), 298–302 (2013)

    Google Scholar 

  6. de Berg, M., Cheong, O., van Kreveld, M., Overmars, M.: Delaunay triangulations. Computational Geometry: Algorithms and Applications, pp. 191–218. Springer, Heidelberg (2008). doi:10.1007/978-3-540-77974-2_9

    Chapter  Google Scholar 

  7. Hespanha, J.P.: An efficient matlab algorithm for graph partitioning. University of California, Santa Barbara, CA, USA (2004)

    Google Scholar 

  8. Hoffman, K.L., Padberg, M., Rinaldi, G.: Traveling salesman problem. Encyclopedia of Operations Research and Management Science, pp. 1573–1578. Springer, New York (2013). doi:10.1007/978-1-4419-1153-7_1068

    Chapter  Google Scholar 

  9. Boyen, X.: Identity-Based Signcryption. In: Dent, A., Zheng, Y. (eds.) Practical Signcryption. Information Security and Cryptography. Springer, Heidelberg (2010). doi:10.1007/978-3-540-89411-7_10

    Google Scholar 

  10. Malone-Lee, J.: Identity-based signcryption. IACR Cryptol. ePrint Arch. 2002, 98 (2002)

    Google Scholar 

  11. Santos-González, I., Rivero-García, A., Caballero-Gil, P., Hernández-Goya, C.: Alternative communication system for emergency situations. In: WEBIST (2), pp. 397–402 (2014)

    Google Scholar 

  12. Bos, J.W., Halderman, J.A., Heninger, N., Moore, J., Naehrig, M., Wustrow, E.: Elliptic curve cryptography in practice. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 157–175. Springer, Heidelberg (2014). doi:10.1007/978-3-662-45472-5_11

    Google Scholar 

Download references

Research supported by TESIS2015010102, TESIS2015010106, RTC-2014-1648-8, TEC2014-54110-R, MTM-2015-69138-REDT and DIG02-INSITU.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Alexandra Rivero-García , Candelaria Hernández-Goya , Iván Santos-González or Pino Caballero-Gil .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Rivero-García, A., Hernández-Goya, C., Santos-González, I., Caballero-Gil, P. (2017). Secure System Communication to Emergencies for Victims Management Through Identity Based Signcryption Scheme. In: Ochoa, S., Singh, P., Bravo, J. (eds) Ubiquitous Computing and Ambient Intelligence. UCAmI 2017. Lecture Notes in Computer Science(), vol 10586. Springer, Cham. https://doi.org/10.1007/978-3-319-67585-5_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-67585-5_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-67584-8

  • Online ISBN: 978-3-319-67585-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics