메뉴 건너뛰기




Volumn 40, Issue 5, 2016, Pages

A Secure Cloud-Assisted Wireless Body Area Network in Mobile Emergency Medical Care System

Author keywords

Authentication; Chaotic maps; Cloud computing; Emergency medical care system; Network security; Wireless body area network

Indexed keywords

CONFIDENTIALITY; EMERGENCY CARE; HUMAN; HUMAN EXPERIMENT; MONITORING; PRIVACY; AMBULATORY MONITORING; CLOUD COMPUTING; COMPUTER NETWORK; COMPUTER SECURITY; EMERGENCY HEALTH SERVICE; MOBILE PHONE; PROCEDURES; TELEMETRY;

EID: 84961572683     PISSN: 01485598     EISSN: 1573689X     Source Type: Journal    
DOI: 10.1007/s10916-016-0474-9     Document Type: Article
Times cited : (72)

References (48)
  • 1
    • 84939430498 scopus 로고    scopus 로고
    • Key agreement schemes in wireless body area networks: taxonomy and state-of-the-art
    • PID: 2628032
    • Ali, A., and Khan, F.A., Key agreement schemes in wireless body area networks: taxonomy and state-of-the-art. J. Med. Syst. 39:115, 2015.
    • (2015) J. Med. Syst. , vol.39 , pp. 115
    • Ali, A.1    Khan, F.A.2
  • 3
    • 35048860626 scopus 로고    scopus 로고
    • Analysis of key-exchange protocols and their use for building secure channels
    • Canetti, R., and Krawczyk, H., Analysis of key-exchange protocols and their use for building secure channels. Lect. Notes Comput. Sci. 2045:453–474, 2001.
    • (2001) Lect. Notes Comput. Sci. , vol.2045 , pp. 453-474
    • Canetti, R.1    Krawczyk, H.2
  • 4
    • 84904272742 scopus 로고    scopus 로고
    • A secure medical data exchange protocol based on cloud environments
    • PID: 2503771
    • Chen, C.L., Yang, T.T., Shih, T.F., A secure medical data exchange protocol based on cloud environments. J. Med. Syst. 38:112, 2014.
    • (2014) J. Med. Syst. , vol.38 , pp. 112
    • Chen, C.L.1    Yang, T.T.2    Shih, T.F.3
  • 7
    • 84897560767 scopus 로고    scopus 로고
    • Integration of Cloud computing and body sensor networks
    • Fortino, G., and Pathan, M., Integration of Cloud computing and body sensor networks. Futur. Gener. Comput. Syst. 35:57–61, 2014.
    • (2014) Futur. Gener. Comput. Syst. , vol.35 , pp. 57-61
    • Fortino, G.1    Pathan, M.2
  • 8
    • 84916883747 scopus 로고    scopus 로고
    • A variable threshold-value authentication architecture for wireless mesh networks
    • Guo, P., Wang, J., Li, B., Lee, S., A variable threshold-value authentication architecture for wireless mesh networks. J. Internet Technol. 15(6):929–936, 2014.
    • (2014) J. Internet Technol. , vol.15 , Issue.6 , pp. 929-936
    • Guo, P.1    Wang, J.2    Li, B.3    Lee, S.4
  • 10
    • 84961679380 scopus 로고    scopus 로고
    • HAVO: , Available access: 2015/04/1
    • HAVO: http://www.hvc.com.tw/lang/HAVO-E/Home%20HAVO.html, Available access: 2015/04/18
  • 11
    • 84935865949 scopus 로고    scopus 로고
    • A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks
    • He, D., Kumar, N., Chilamkurti, N., A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Inf. Sci. 321:263–277, 2015.
    • (2015) Inf. Sci. , vol.321 , pp. 263-277
    • He, D.1    Kumar, N.2    Chilamkurti, N.3
  • 12
    • 84921481484 scopus 로고    scopus 로고
    • Authentication protocol for ambient assisted living system
    • He, D., and Zeadally, S., Authentication protocol for ambient assisted living system. IEEE Commun. Mag. 35(1):71–77, 2015.
    • (2015) IEEE Commun. Mag. , vol.35 , Issue.1 , pp. 71-77
    • He, D.1    Zeadally, S.2
  • 13
    • 84922001116 scopus 로고    scopus 로고
    • Robust anonymous authentication protocol for healthcare applications using wireless medical sensor networks
    • He, D., Kumar, N., Chen, J., Robust anonymous authentication protocol for healthcare applications using wireless medical sensor networks. Multimedia Systems 21(1):49–60, 2015.
    • (2015) Multimedia Systems , vol.21 , Issue.1 , pp. 49-60
    • He, D.1    Kumar, N.2    Chen, J.3
  • 14
    • 85027949488 scopus 로고    scopus 로고
    • Robust biometrics-based authentication scheme for multi-server environment
    • He, D., and Wang, D., Robust biometrics-based authentication scheme for multi-server environment. IEEE Syst. J. 9(3):816–823, 2015.
    • (2015) IEEE Syst. J. , vol.9 , Issue.3 , pp. 816-823
    • He, D.1    Wang, D.2
  • 15
    • 84924080806 scopus 로고    scopus 로고
    • A revised key agreement protocol based on chaotic maps
    • Jabbari, A., and Bagherzadeh, J., A revised key agreement protocol based on chaotic maps. Nonlinear Dyn. 78(1):669–680, 2014.
    • (2014) Nonlinear Dyn. , vol.78 , Issue.1 , pp. 669-680
    • Jabbari, A.1    Bagherzadeh, J.2
  • 16
    • 84872108080 scopus 로고    scopus 로고
    • A privacy enhanced authentication scheme for telecare medical information systems
    • PID: 2332195
    • Jiang, Q., Ma, J., Ma, Z., Li, G., A privacy enhanced authentication scheme for telecare medical information systems. J. Med. Syst. 37:9897, 2013.
    • (2013) J. Med. Syst. , vol.37 , pp. 9897
    • Jiang, Q.1    Ma, J.2    Ma, Z.3    Li, G.4
  • 17
    • 84906810339 scopus 로고    scopus 로고
    • A cloud-based healthcare framework for security and patients’ data privacy using wireless body area networks
    • Khan, F.A., Ali, A., Abbas, H., Haldar, N.A.H., A cloud-based healthcare framework for security and patients’ data privacy using wireless body area networks. Procedia Comput. Sci. 34:511–517, 2014.
    • (2014) Procedia Comput. Sci. , vol.34 , pp. 511-517
    • Khan, F.A.1    Ali, A.2    Abbas, H.3    Haldar, N.A.H.4
  • 18
    • 84888642495 scopus 로고    scopus 로고
    • An extended chaotic maps based user authentication and privacy preserving scheme against DoS attacks in pervasive and ubiquitous computing environments
    • Li, C.T., Lee, C.C., Weng, C.Y., An extended chaotic maps based user authentication and privacy preserving scheme against DoS attacks in pervasive and ubiquitous computing environments. Nonlinear Dyn. 74(4): 1133–1143, 2013.
    • (2013) Nonlinear Dyn. , vol.74 , Issue.4 , pp. 1133-1143
    • Li, C.T.1    Lee, C.C.2    Weng, C.Y.3
  • 19
    • 84905560609 scopus 로고    scopus 로고
    • A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems
    • COI: 1:CAS:528:DC%2BC2cXps1Ontr4%3
    • Li, C.T., Lee, C.C., Weng, C.Y., A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems. J. Med. Syst. 38(9):1–11, 2014.
    • (2014) J. Med. Syst. , vol.38 , Issue.9 , pp. 1-11
    • Li, C.T.1    Lee, C.C.2    Weng, C.Y.3
  • 20
    • 84939958429 scopus 로고    scopus 로고
    • An extended chaotic maps based keyword search scheme over encrypted data resist outside and inside keyword guessing attacks in cloud storage services
    • Li, C.T., Lee, C.W., Shen, J.J., An extended chaotic maps based keyword search scheme over encrypted data resist outside and inside keyword guessing attacks in cloud storage services. Nonlinear Dyn. 80(3):1601–1611, 2015.
    • (2015) Nonlinear Dyn. , vol.80 , Issue.3 , pp. 1601-1611
    • Li, C.T.1    Lee, C.W.2    Shen, J.J.3
  • 21
    • 84928721359 scopus 로고    scopus 로고
    • A dynamic identity-based user authentication scheme for remote login systems
    • Li, C.T., Lee, C.C., Weng, C.Y., A dynamic identity-based user authentication scheme for remote login systems. Security and Communication Networks 8(18):3372–3382, 2015.
    • (2015) Security and Communication Networks , vol.8 , Issue.18 , pp. 3372-3382
    • Li, C.T.1    Lee, C.C.2    Weng, C.Y.3
  • 22
    • 84947440526 scopus 로고    scopus 로고
    • A secure dynamic identity based authentication protocol with smart cards for multi-server architecture
    • Li, C.T., Lee, C.C., Weng, C.Y., Fan, C.I., A secure dynamic identity based authentication protocol with smart cards for multi-server architecture. J. Inf. Sci. Eng. 31(6):1975–1992, 2015.
    • (2015) J. Inf. Sci. Eng. , vol.31 , Issue.6 , pp. 1975-1992
    • Li, C.T.1    Lee, C.C.2    Weng, C.Y.3    Fan, C.I.4
  • 23
    • 84935850541 scopus 로고    scopus 로고
    • A secure RFID tag authentication protocol with privacy preserving in telecare medicine information systems
    • Li, C.T., Weng, C.Y., Lee, C.C., A secure RFID tag authentication protocol with privacy preserving in telecare medicine information systems. J. Med. Syst. 39(8):1–8, 2015.
    • (2015) J. Med. Syst. , vol.39 , Issue.8 , pp. 1-8
    • Li, C.T.1    Weng, C.Y.2    Lee, C.C.3
  • 24
    • 84941268418 scopus 로고    scopus 로고
    • A hash based remote user authentication and authenticated key agreement scheme for the integrated EPR information system
    • Li, C.T., Weng, C.Y., Lee, C.C., Wang, C.C., A hash based remote user authentication and authenticated key agreement scheme for the integrated EPR information system. J. Med. Syst. 39(11):1–11, 2015.
    • (2015) J. Med. Syst. , vol.39 , Issue.11 , pp. 1-11
    • Li, C.T.1    Weng, C.Y.2    Lee, C.C.3    Wang, C.C.4
  • 25
    • 84951986324 scopus 로고    scopus 로고
    • Design flaws in a secure medical data exchange protocol based on cloud environments. Lect. Notes Comput
    • Li, C.T., Lee, C.C., Wang, C.C., Yang, T.H., Chen, S.J., Design flaws in a secure medical data exchange protocol based on cloud environments. Lect. Notes Comput. Sci. 9532, 2015.
    • (2015) Sci , pp. 9532
    • Li, C.T.1    Lee, C.C.2    Wang, C.C.3    Yang, T.H.4    Chen, S.J.5
  • 26
    • 84961634519 scopus 로고    scopus 로고
    • Li, C. T., Lee, C. C., Weng, C. Y., A chaotic maps based key agreement and user anonymity protocol without using smart cards and symmetric key en/decryptions. J. Internet Technol., 2015. article in press
    • Li, C. T., Lee, C. C., Weng, C. Y., A chaotic maps based key agreement and user anonymity protocol without using smart cards and symmetric key en/decryptions. J. Internet Technol., 2015. article in press.
  • 27
    • 84891804845 scopus 로고    scopus 로고
    • Certificateless remote anonymous authentication schemes for wireless body sensor networks
    • Liu, J., Zhang, Z., Chen, X., Kwak, K., Certificateless remote anonymous authentication schemes for wireless body sensor networks. IEEE Transactions on Parallel and Distributed Systems 25(2):332–342, 2014.
    • (2014) IEEE Transactions on Parallel and Distributed Systems , vol.25 , Issue.2 , pp. 332-342
    • Liu, J.1    Zhang, Z.2    Chen, X.3    Kwak, K.4
  • 28
    • 84961595870 scopus 로고    scopus 로고
    • Lounis, A., Hadjidj, A., Bouabdallah, A., Challal, Y., Healing on the cloud: Secure cloud architecture for medical wireless sensor networks. Futur. Gener. Comput. Syst., 2015. article in press
    • Lounis, A., Hadjidj, A., Bouabdallah, A., Challal, Y., Healing on the cloud: Secure cloud architecture for medical wireless sensor networks. Futur. Gener. Comput. Syst., 2015. article in press.
  • 29
    • 80053520387 scopus 로고    scopus 로고
    • Trust key management scheme for wireless body area networks
    • Mana, M., Feham, M., Bensaber, B.A., Trust key management scheme for wireless body area networks. Int. J. Netw. Security 12(2):75–83, 2011.
    • (2011) Int. J. Netw. Security , vol.12 , Issue.2 , pp. 75-83
    • Mana, M.1    Feham, M.2    Bensaber, B.A.3
  • 30
    • 77951699595 scopus 로고    scopus 로고
    • BARI+: a biometric based distributed key management approach for wireless body area networks
    • PID: 2231933
    • Muhammad, K.R.R.S., Lee, H., Lee, S., Lee, Y.K., BARI+: a biometric based distributed key management approach for wireless body area networks. Sensors 10(4):3911–3933, 2010.
    • (2010) Sensors , vol.10 , Issue.4 , pp. 3911-3933
    • Muhammad, K.R.R.S.1    Lee, H.2    Lee, S.3    Lee, Y.K.4
  • 31
    • 84946499511 scopus 로고    scopus 로고
    • Application specific study, analysis and classification of body area wireless sensor network applications
    • Nadeem, A., Hussain, M.A., Owais, O., Salam, A., Iqbal, S., Ahsan, K., Application specific study, analysis and classification of body area wireless sensor network applications. Comput. Netw. 83:363–380, 2015.
    • (2015) Comput. Netw. , vol.83 , pp. 363-380
    • Nadeem, A.1    Hussain, M.A.2    Owais, O.3    Salam, A.4    Iqbal, S.5    Ahsan, K.6
  • 33
    • 77649151691 scopus 로고    scopus 로고
    • Monitoring patients via a secure and mobile healthcare system
    • Ren, Y., Pazzi, R.W.N., Boukerche, A., Monitoring patients via a secure and mobile healthcare system. IEEE Wirel. Commun. 17(1):59–65, 2010.
    • (2010) IEEE Wirel. Commun. , vol.17 , Issue.1 , pp. 59-65
    • Ren, Y.1    Pazzi, R.W.N.2    Boukerche, A.3
  • 34
    • 84928106743 scopus 로고    scopus 로고
    • Mutual verifiable provable data auditing in public cloud storage
    • Ren, Y., Shen, J., Wang, J., Han, J., Lee, S., Mutual verifiable provable data auditing in public cloud storage. J. Internet Technol. 16(2):317–324, 2015.
    • (2015) J. Internet Technol. , vol.16 , Issue.2 , pp. 317-324
    • Ren, Y.1    Shen, J.2    Wang, J.3    Han, J.4    Lee, S.5
  • 35
    • 84961573102 scopus 로고    scopus 로고
    • RFC 2104 - HMAC: Keyed-hashing for message authentication. < >
    • RFC 2104 - HMAC: Keyed-hashing for message authentication.
  • 36
    • 79952089663 scopus 로고    scopus 로고
    • A study of IEEE 802.15.4 security framework for wireless body area networks
    • PID: 2231935
    • Saleem, S., Ullah, S., Kwak, K.S., A study of IEEE 802.15.4 security framework for wireless body area networks. Sensors 11(2):1383–1395, 2011.
    • (2011) Sensors , vol.11 , Issue.2 , pp. 1383-1395
    • Saleem, S.1    Ullah, S.2    Kwak, K.S.3
  • 38
    • 84922323888 scopus 로고    scopus 로고
    • A novel routing protocol providing good transmission reliability in underwater sensor networks
    • Shen, J., Tan, H., Wang, J., Lee, S., A novel routing protocol providing good transmission reliability in underwater sensor networks. J. Internet Technol. 16(1):171–178, 2015.
    • (2015) J. Internet Technol. , vol.16 , Issue.1 , pp. 171-178
    • Shen, J.1    Tan, H.2    Wang, J.3    Lee, S.4
  • 39
    • 78649322624 scopus 로고    scopus 로고
    • A survey on security issues in service delivery models of cloud computing
    • Subashini, S., and Kavitha, V., A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1):1–11, 2011.
    • (2011) J. Netw. Comput. Appl. , vol.34 , Issue.1 , pp. 1-11
    • Subashini, S.1    Kavitha, V.2
  • 40
    • 84940848791 scopus 로고    scopus 로고
    • New authentication scheme for wireless body area networks using the bilinear pairing
    • PID: 2632417
    • Wang, C., and Zhang, Y., New authentication scheme for wireless body area networks using the bilinear pairing. J. Med. Syst. 39:136, 2015.
    • (2015) J. Med. Syst. , vol.39 , pp. 136
    • Wang, C.1    Zhang, Y.2
  • 41
    • 84864061174 scopus 로고    scopus 로고
    • A secure authentication scheme for telecare medicine information systems
    • PID: 2097892
    • Wu, Z.Y., Lee, Y.C., Lai, F., Lee, H.C., Chung, Y., A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1529–1535, 2012.
    • (2012) J. Med. Syst. , vol.36 , Issue.3 , pp. 1529-1535
    • Wu, Z.Y.1    Lee, Y.C.2    Lai, F.3    Lee, H.C.4    Chung, Y.5
  • 42
    • 84962448916 scopus 로고    scopus 로고
    • A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data
    • Xia, Z., Wang, X., Sun, X., Wang, Q., A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems 27(2):340–352, 2016.
    • (2016) IEEE Transactions on Parallel and Distributed Systems , vol.27 , Issue.2 , pp. 340-352
    • Xia, Z.1    Wang, X.2    Sun, X.3    Wang, Q.4
  • 43
    • 84888643068 scopus 로고    scopus 로고
    • Chaotic maps-based three-party password-authenticated key agreement scheme
    • Xie, Q., Zhao, J., Yu, X., Chaotic maps-based three-party password-authenticated key agreement scheme. Nonlinear Dyn. 74(4):1021–1027, 2013.
    • (2013) Nonlinear Dyn. , vol.74 , Issue.4 , pp. 1021-1027
    • Xie, Q.1    Zhao, J.2    Yu, X.3
  • 44
    • 40249103088 scopus 로고    scopus 로고
    • Cryptanalysis of the public key encryption based on multiple chaotic systems
    • Zhang, L., Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos, Solitons & Fractals 37(3):669–674, 2008.
    • (2008) Chaos, Solitons & Fractals , vol.37 , Issue.3 , pp. 669-674
    • Zhang, L.1
  • 45
    • 84893021026 scopus 로고    scopus 로고
    • An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem
    • COI: 1:CAS:528:DC%2BC2cXitV2jsLb
    • Zhao, Z., An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem. J. Med. Syst. 38(2):1–7, 2014.
    • (2014) J. Med. Syst. , vol.38 , Issue.2 , pp. 1-7
    • Zhao, Z.1
  • 47
    • 84929268858 scopus 로고    scopus 로고
    • 4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks
    • Zhou, J., Cao, Z., Dong, X., Xiong, N., Vasilakos, A.V., 4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks. Inf. Sci. 314: 255–276, 2015.
    • (2015) Inf. Sci. , vol.314 , pp. 255-276
    • Zhou, J.1    Cao, Z.2    Dong, X.3    Xiong, N.4    Vasilakos, A.V.5
  • 48
    • 79959557055 scopus 로고    scopus 로고
    • Addressing cloud computing security issues
    • Zissis, D., and Lekkas, D., Addressing cloud computing security issues. Futur. Gener. Comput. Syst. 28(3): 583–592, 2012.
    • (2012) Futur. Gener. Comput. Syst. , vol.28 , Issue.3 , pp. 583-592
    • Zissis, D.1    Lekkas, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.