Abstract
With the pervasiveness of smart phones and the advance of wireless body sensor network (BSN), mobile Healthcare (m-Healthcare), which extends the operation of Healthcare provider into a pervasive environment for better health monitoring, has attracted considerable interest recently. However, the flourish of m-Healthcare still faces many challenges including information security and privacy preservation. In this paper, we propose a secure and privacy-preserving framework combining with multilevel trust management. In our scheme, smart phone resources including computing power and energy can be opportunistically gathered to process the computing-intensive PHI (personal health information) during m-Healthcare emergency with minimal privacy disclosure. In specific, to leverage the PHI privacy disclosure and the high reliability of PHI process and transmission in m-Healthcare emergency, we introduce an efficient lightweight encryption for those users whose trust level is low, which is based on mix cipher algorithms and pair of plain text and cipher texts, and allow a medical user to decide who can participate in the opportunistic computing to assist in processing his overwhelming PHI data. Detailed security analysis and simulations show that the proposed framework can efficiently achieve user-centric privacy protection in m-Healthcare system.






Similar content being viewed by others
References
Kumar, P., and Lee, H. J., Security issues in healthcare applications using wireless medical sensor networks: a survey. Sensors 11(12):55–91, 2012.
Li, M., Lou, W., and Ren, K., Data security and privacy in wireless body area networks. IEEE Wirel. Commun. 17(1):51–58, 2010.
Fernández-Alemán, J. L., Seva-Llor, C. L., Toval, A., Ouhbi, S., and Fernández-Luque, L., Free web-based personal health records: analysis of functionality. J. Med. Syst. 37(6):9990, 2013. doi:10.1007/s10916-013-9990-z.
Contis, M., and Kumar, M., Opportunities in opportunistic computing. IEEE Compute. 43(1):42–50, 2011.
Curtis, D., Shih, E., and Waterman, J., Physiological signal monitoring in the waiting areas of an emergency room. In: Proceedings of body networks workshop. 2:5–8, 2008.
Hsu, C. L., Lee, M. R., and Su, C. H., The role of privacy protection in healthcare information systems adoption. J. Med. Syst. 31(2). doi:10.1007/s10916-013-9966-z, 2013.
Evered, M., and Bogeholz, S., A case study in access control requirements for a health information system. In: The Second workshop on Australasian information security, data mining and web intelligence, and software internationalization, 2004.
Meingast, M., Roosta, T., and Sastry, S., Security and privacy issues with health care information technology. In: Proceedings of the 28th IEEE EMBS annual international conference, 2006.
Tan, C. C., Wang, H. D., and Zhong, S., IBE-Lite:a lightweight identity-based cryptography for body sensor networks. IEEE Trans. Inf. Technol. Bio-Med. 13(6):926–932, 2009.
Rehman, O. U., Performance study of localization techniques in wireless body area sensor networks. In: Proceedings of international symposium on advances in ubiquitous, 2012.
Lu, R. X., Lin, X. D., and Shen, X. M., SPOC: a secure and privacy-preserving opportunistic computing framework for mobile-healthcare emergency. IEEE Trans. Parallel Distrib. Syst. 24(3):614–625, 2013.
Wei, L., Hiroki, N., and Ansari, N., Cluster-based certificate revocation for mobile body sensor networks. IEEE Trans. Parallel Distrib. Syst. 24(2):239–249, 2013.
Raazi, S. M., and Kuras, U. R., BARI: a biometric based distributed key management approach for wireless body area networks. Sensors 10(8):3911–3933, 2010.
Shen, J., Zheng, W. Y., Wang, J., Zheng, Y. H., and Sun, X. M., An efficient verifiably encrypted signature from weil pairing. J. Internet Technol. 14(6):947–952, 2014.
Wang, J., Zhang, Z. H., and Xia, F., An energy efficient stable election-based routing algorithm for wireless sensor networks. Sensors 13(11):14301–14320, 2013.
Wang, J., Zhang, J. W., Lee, S. Y., and Sherratt, R. S., Mobility based energy efficient and multi-sink algorithms for consumer home networks. IEEE Trans. Consum. Electron. 59(1):77–84, 2013.
Chen, C. L., Yang, T. T., and Shih, T. F., A secure medical data exchange protocol based on cloud environment. J. Med. Syst. 38(9). doi:10.1007/s10916-014-0112-3, 2014.
Zhou, G., BodyQoS: adaptive and radio-agnostic QoS for body sensor networks. INFOCOM, 2009
Hong, R. C., Pan, J. X., Hao, S. J., Wang, M., Xue, F., and Xu, X. D., Image quality assessment based on matching pursuit. Inf. Sci. 273:196–211, 2014.
Li, J., Li, X. L., Yang, B., and Sun, X. M., Segmentation-based image copy-move forgery detection scheme. IEEE Trans. Inf. Forensics Secur. 2015. doi:10.1109/TIFS.2014.2381872.
Fan, Y., Network coding based privacy preservation against traffic analysis in multi-hop wireless networks. Trans. Wirel. Commun. 10(6):834–843, 2011.
Sung, N. Y., Jen, C. A., wireless physiological signal monitoring system with integrated bluetooth and WiFi technologies. In: Proceedings of IEEE 27th Annual International Conference of the Engineering in Medicine and Biology Society. 3:2203–2206, 2005.
Govindan, K., and Mohapatra, P., Trust computations and trust dynamics in wireless sensor networks: a survey. IEEE Commun. Surv. Tutorials 14(2):279–298, 2012.
Ayday, E., and Fekri, F., An interative algorithm for trust management and adversary detection for delay tolerant networks. IEEE Trans. Mob. Comput. 11(9):1514–1531, 2012.
Acknowledgments
This work was funded in part by Jiangsu Province training programs of innovation and entrepreneurship for college students under grants 201410300049Z. It was also supported by National Natural Science Foundation of China (61070133, 61472344, 61402234, 61311140264), Project of six personnel in Jiangsu Province (2013-WLW-012) and PAPD fund. Prof. Jin Wang is the corresponding author.
Author information
Authors and Affiliations
Corresponding author
Additional information
This article is part of the Topical Collection on Mobile Systems.
Rights and permissions
About this article
Cite this article
Guo, P., Wang, J., Ji, S. et al. A Lightweight Encryption Scheme Combined with Trust Management for Privacy-Preserving in Body Sensor Networks. J Med Syst 39, 190 (2015). https://doi.org/10.1007/s10916-015-0341-0
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s10916-015-0341-0