skip to main content
10.1145/1871902.1871919acmconferencesArticle/Chapter ViewAbstractPublication PagescikmConference Proceedingsconference-collections
poster

A secure pervasive health care system using location dependent unicast key generation scheme

Published: 30 October 2010 Publication History

Abstract

Remote health monitoring has tremendous potential to improve quality of health care services in modern and ubiquitous medical environments. It helps to cut the cost in modern healthcare by avoiding unnecessary hospital visits for frequent checkups. In this context, security and protection of sensitive medical data such as Electronic Health Records (EHR), data integrity and protection of patient's privacy to be monitored are important aspects in order to increase user's acceptance of these new technologies. Secure communication protects data from unauthorized users and usually requires pair-wise keys. In all existing schemes these keys are generated and distributed to nodes wishing to communicate. The key generation phase is usually well-secured but the key distribution is not, as a result, they are vulnerable to security threats. This paper presents an overview of security threats in pervasive healthcare and presents a secure communication scheme which unlike other schemes does not store a key chain in the memory from a universal key space and eliminate key broadcast. Simulation and results indicate that our scheme outperforms the existing schemes by decreasing transmission and storage cost.

References

[1]
Bharathidasan, A. and Ponduru, V. 2004. Sensor Networks: An Overview. IEEE Infocom, Hongkong, 7--11 March 2004.
[2]
Eschenauer, L. and Gligor, V.D. 2002. A Key-Management Scheme for Distributed Sensor Networks. In 9th ACM Conference on Computer and Communications Security, Washington DC, 18-22 November 2002.
[3]
Chan, H. and Perrig, A. 2003. Random Key Predistribution Schemes for Sensor Networks. In IEEE Symposium on Research in Security and Privacy, California, 11--14 May 2003.
[4]
Liu, D. and Ning, P. 2003. Location-Based Pairwise Key Establishment for Static Sensor Networks. In 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, Fairfax, 31 October 2003.
[5]
http://www.sunspotworld.com
[6]
www.sunspotworld.com/docs/Purple/SunSPOT-OwnersManual.pdf
[7]
Spinellis, D. and Katsikas, S. 1999. Trusted Third Party services for deploying secure telemedical applications over the WWW. Computers and Security, vol. 18, No. 7, 1999.
[8]
Bao, S-Di and Zhang, Y. 2005. A New Symmetric Cryptosystem of Body Area Sensor Networks for Telemedicine. 6th Asian-Pacific Conference on Medical and Biological Engineering, Japan, 2005.
[9]
Jin, G. and Park, M. 2006. An Indoor Localization Mechanism Using Active RFID Tag. Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing -Vol 1 (SUTC'06) -- Volume 0, 2006.

Cited By

View all
  • (2017)Data Security and Privacy in Cyber‐Physical Systems for HealthcareSecurity and Privacy in Cyber‐Physical Systems10.1002/9781119226079.ch15(305-326)Online publication date: 6-Oct-2017
  • (2013)A sensitive data aggregation scheme for body sensor networks based on data hidingPersonal and Ubiquitous Computing10.1007/s00779-012-0566-617:7(1317-1329)Online publication date: 1-Oct-2013
  • (2011)Emerging multidisciplinary research across database management systemsACM SIGMOD Record10.1145/1942776.194278639:3(33-36)Online publication date: 8-Feb-2011
  • Show More Cited By

Index Terms

  1. A secure pervasive health care system using location dependent unicast key generation scheme

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      PIKM '10: Proceedings of the 3rd workshop on Ph.D. students in information and knowledge management
      October 2010
      104 pages
      ISBN:9781450303859
      DOI:10.1145/1871902
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 30 October 2010

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. electronic health record(ehr)
      2. health care services
      3. key distribution
      4. location parameters
      5. security
      6. wireless sensor networks

      Qualifiers

      • Poster

      Conference

      CIKM '10

      Acceptance Rates

      PIKM '10 Paper Acceptance Rate 10 of 23 submissions, 43%;
      Overall Acceptance Rate 25 of 62 submissions, 40%

      Upcoming Conference

      CIKM '25

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 05 Mar 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2017)Data Security and Privacy in Cyber‐Physical Systems for HealthcareSecurity and Privacy in Cyber‐Physical Systems10.1002/9781119226079.ch15(305-326)Online publication date: 6-Oct-2017
      • (2013)A sensitive data aggregation scheme for body sensor networks based on data hidingPersonal and Ubiquitous Computing10.1007/s00779-012-0566-617:7(1317-1329)Online publication date: 1-Oct-2013
      • (2011)Emerging multidisciplinary research across database management systemsACM SIGMOD Record10.1145/1942776.194278639:3(33-36)Online publication date: 8-Feb-2011
      • (2010)PIKM 2010Proceedings of the 19th ACM international conference on Information and knowledge management10.1145/1871437.1871795(1979-1980)Online publication date: 26-Oct-2010

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media