4.5 Article

An efficient privacy-preserving authentication scheme with adaptive key evolution in remote health monitoring system

期刊

PEER-TO-PEER NETWORKING AND APPLICATIONS
卷 8, 期 6, 页码 1059-1069

出版社

SPRINGER
DOI: 10.1007/s12083-014-0299-6

关键词

Telecommunication security; Authentication; Key evolution; Mobile computing

资金

  1. Korea-China Young Scientist Exchange Program
  2. National Natural Science Foundation of China [U1233108, U1333127, 61103207]
  3. Fundamental Research Funds for Chinese Central Universities [ZYGX2011J059]
  4. International Science and Technology Cooperation and Exchange Program of Sichuan Province [2014HH0029]
  5. Huawei Company Innovation Research Program [IRP-2012-04-03]
  6. National Research Foundation of Korea [NRF-2010-0021575]

向作者/读者索取更多资源

The remote health monitoring system enables a doctor to diagnose and monitor health problems anywhere for a patient. However, since the patient health information is very sensitive and the Internet is unsecure and prone to many attacks, data can be easily compromised by adversaries. Worse, the mobile phone is also easy to be compromised. Clearly, these issues have brought different privacy and security requirements in wireless healthcare. To address these challenging issues, in this paper, we propose an efficient privacy-preserving authentication scheme with adaptive key evolution, which can prevent illegal access to the patient's vital signs. Furthermore, we model the leakage process of the key information to set proper key renewal interval, which can adaptively control the key evolution to balance the trade-off between the communication efficiency and security level. The security analysis demonstrates that our scheme can achieve authenticated key agreement, perfect and strong key insulation, privacy preservation, and other important security goals, e.g. authenticity, integrity and freshness of transmitted messages. The performance evaluation shows that our scheme is computationally efficient for the typical mobile phone with limited resources, and it has low communication overhead.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据