Skip to main content

Advertisement

Log in

A Lightweight Encryption Scheme Combined with Trust Management for Privacy-Preserving in Body Sensor Networks

  • Mobile Systems
  • Published:
Journal of Medical Systems Aims and scope Submit manuscript

Abstract

With the pervasiveness of smart phones and the advance of wireless body sensor network (BSN), mobile Healthcare (m-Healthcare), which extends the operation of Healthcare provider into a pervasive environment for better health monitoring, has attracted considerable interest recently. However, the flourish of m-Healthcare still faces many challenges including information security and privacy preservation. In this paper, we propose a secure and privacy-preserving framework combining with multilevel trust management. In our scheme, smart phone resources including computing power and energy can be opportunistically gathered to process the computing-intensive PHI (personal health information) during m-Healthcare emergency with minimal privacy disclosure. In specific, to leverage the PHI privacy disclosure and the high reliability of PHI process and transmission in m-Healthcare emergency, we introduce an efficient lightweight encryption for those users whose trust level is low, which is based on mix cipher algorithms and pair of plain text and cipher texts, and allow a medical user to decide who can participate in the opportunistic computing to assist in processing his overwhelming PHI data. Detailed security analysis and simulations show that the proposed framework can efficiently achieve user-centric privacy protection in m-Healthcare system.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Kumar, P., and Lee, H. J., Security issues in healthcare applications using wireless medical sensor networks: a survey. Sensors 11(12):55–91, 2012.

    Google Scholar 

  2. Li, M., Lou, W., and Ren, K., Data security and privacy in wireless body area networks. IEEE Wirel. Commun. 17(1):51–58, 2010.

    Article  Google Scholar 

  3. Fernández-Alemán, J. L., Seva-Llor, C. L., Toval, A., Ouhbi, S., and Fernández-Luque, L., Free web-based personal health records: analysis of functionality. J. Med. Syst. 37(6):9990, 2013. doi:10.1007/s10916-013-9990-z.

    Article  PubMed  Google Scholar 

  4. Contis, M., and Kumar, M., Opportunities in opportunistic computing. IEEE Compute. 43(1):42–50, 2011.

    Article  Google Scholar 

  5. Curtis, D., Shih, E., and Waterman, J., Physiological signal monitoring in the waiting areas of an emergency room. In: Proceedings of body networks workshop. 2:5–8, 2008.

  6. Hsu, C. L., Lee, M. R., and Su, C. H., The role of privacy protection in healthcare information systems adoption. J. Med. Syst. 31(2). doi:10.1007/s10916-013-9966-z, 2013.

  7. Evered, M., and Bogeholz, S., A case study in access control requirements for a health information system. In: The Second workshop on Australasian information security, data mining and web intelligence, and software internationalization, 2004.

  8. Meingast, M., Roosta, T., and Sastry, S., Security and privacy issues with health care information technology. In: Proceedings of the 28th IEEE EMBS annual international conference, 2006.

  9. Tan, C. C., Wang, H. D., and Zhong, S., IBE-Lite:a lightweight identity-based cryptography for body sensor networks. IEEE Trans. Inf. Technol. Bio-Med. 13(6):926–932, 2009.

    Article  Google Scholar 

  10. Rehman, O. U., Performance study of localization techniques in wireless body area sensor networks. In: Proceedings of international symposium on advances in ubiquitous, 2012.

  11. Lu, R. X., Lin, X. D., and Shen, X. M., SPOC: a secure and privacy-preserving opportunistic computing framework for mobile-healthcare emergency. IEEE Trans. Parallel Distrib. Syst. 24(3):614–625, 2013.

    Article  Google Scholar 

  12. Wei, L., Hiroki, N., and Ansari, N., Cluster-based certificate revocation for mobile body sensor networks. IEEE Trans. Parallel Distrib. Syst. 24(2):239–249, 2013.

    Article  Google Scholar 

  13. Raazi, S. M., and Kuras, U. R., BARI: a biometric based distributed key management approach for wireless body area networks. Sensors 10(8):3911–3933, 2010.

    Google Scholar 

  14. Shen, J., Zheng, W. Y., Wang, J., Zheng, Y. H., and Sun, X. M., An efficient verifiably encrypted signature from weil pairing. J. Internet Technol. 14(6):947–952, 2014.

    Google Scholar 

  15. Wang, J., Zhang, Z. H., and Xia, F., An energy efficient stable election-based routing algorithm for wireless sensor networks. Sensors 13(11):14301–14320, 2013.

    Article  PubMed Central  PubMed  Google Scholar 

  16. Wang, J., Zhang, J. W., Lee, S. Y., and Sherratt, R. S., Mobility based energy efficient and multi-sink algorithms for consumer home networks. IEEE Trans. Consum. Electron. 59(1):77–84, 2013.

    Article  Google Scholar 

  17. Chen, C. L., Yang, T. T., and Shih, T. F., A secure medical data exchange protocol based on cloud environment. J. Med. Syst. 38(9). doi:10.1007/s10916-014-0112-3, 2014.

  18. Zhou, G., BodyQoS: adaptive and radio-agnostic QoS for body sensor networks. INFOCOM, 2009

  19. Hong, R. C., Pan, J. X., Hao, S. J., Wang, M., Xue, F., and Xu, X. D., Image quality assessment based on matching pursuit. Inf. Sci. 273:196–211, 2014.

    Article  Google Scholar 

  20. Li, J., Li, X. L., Yang, B., and Sun, X. M., Segmentation-based image copy-move forgery detection scheme. IEEE Trans. Inf. Forensics Secur. 2015. doi:10.1109/TIFS.2014.2381872.

    Google Scholar 

  21. Fan, Y., Network coding based privacy preservation against traffic analysis in multi-hop wireless networks. Trans. Wirel. Commun. 10(6):834–843, 2011.

    Article  Google Scholar 

  22. Sung, N. Y., Jen, C. A., wireless physiological signal monitoring system with integrated bluetooth and WiFi technologies. In: Proceedings of IEEE 27th Annual International Conference of the Engineering in Medicine and Biology Society. 3:2203–2206, 2005.

  23. Govindan, K., and Mohapatra, P., Trust computations and trust dynamics in wireless sensor networks: a survey. IEEE Commun. Surv. Tutorials 14(2):279–298, 2012.

    Article  Google Scholar 

  24. Ayday, E., and Fekri, F., An interative algorithm for trust management and adversary detection for delay tolerant networks. IEEE Trans. Mob. Comput. 11(9):1514–1531, 2012.

    Article  Google Scholar 

Download references

Acknowledgments

This work was funded in part by Jiangsu Province training programs of innovation and entrepreneurship for college students under grants 201410300049Z. It was also supported by National Natural Science Foundation of China (61070133, 61472344, 61402234, 61311140264), Project of six personnel in Jiangsu Province (2013-WLW-012) and PAPD fund. Prof. Jin Wang is the corresponding author.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jin Wang.

Additional information

This article is part of the Topical Collection on Mobile Systems.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Guo, P., Wang, J., Ji, S. et al. A Lightweight Encryption Scheme Combined with Trust Management for Privacy-Preserving in Body Sensor Networks. J Med Syst 39, 190 (2015). https://doi.org/10.1007/s10916-015-0341-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10916-015-0341-0

Keywords