DOI QR코드

DOI QR Code

A Secure Medical Information Management System for Wireless Body Area Networks

  • Liu, Xiyao (School of Information Science and Engineering, Central South University) ;
  • Zhu, Yuesheng (The Communication and Information Security Lab, Institute of Big Data Technologies, Shenzhen Graduate School, Peking University) ;
  • Ge, Yu (Institute for Infocomm Research) ;
  • Wu, Dajun (Institute for Infocomm Research) ;
  • Zou, Beiji (School of Information Science and Engineering, Central South University)
  • Received : 2015.06.04
  • Accepted : 2015.11.08
  • Published : 2016.01.31

Abstract

The wireless body area networks (WBANs) consist of wearable computing devices and can support various healthcare-related applications. There exist two crucial issues when WBANs are utilized for healthcare applications. One is the protection of the sensitive biometric data transmitted over the insecure wireless channels. The other is the design of effective medical management mechanisms. In this paper, a secure medical information management system is proposed and implemented on a TinyOS-based WBAN test bed to simultaneously address these two issues. In this system, the electronic medical record (EMR) is bound to the biometric data with a novel fragile zero-watermarking scheme based on the modified visual secret sharing (MVSS). In this manner, the EMR can be utilized not only for medical management but also for data integrity checking. Additionally, both the biometric data and the EMR are encrypted, and the EMR is further protected by the MVSS. Our analysis and experimental results demonstrate that the proposed system not only protects the confidentialities of both the biometric data and the EMR but also offers reliable patient information authentication, explicit healthcare operation verification and undeniable doctor liability identification for WBANs.

Keywords

References

  1. B. Latré, B. Braem, I. Moerman, C. Blondia and P. Demeester, “A survey on wireless body area networks,” Wireless Networks, vol. 17, no. 1, pp. 1-18, January, 2011. Article (CrossRef Link). https://doi.org/10.1007/s11276-010-0252-4
  2. H. Cao, V. Leung, C. Chow and H. Chan, “Enabling technologies for wireless body area networks: A survey and outlook,” IEEE Communications Magazine, vol. 47, no. 12, pp. 84-93, December, 2009. Article (CrossRef Link). https://doi.org/10.1109/MCOM.2009.5350373
  3. C. Otto, A. Milenkovic, C. Sanders and E. Jovanov, “System architecture of a wireless body area sensor network for ubiquitous health monitoring,” Journal of Mobile Multimedia, vol. 1, no. 4, pp. 307-326, January, 2006. Article (CrossRef Link).
  4. M. A. Hanson, H. C. Powell Jr, A. T. Barth, K. Ringgenberg, B. H. Calhoun, J. H. Aylor and J. Lach, “Body area sensor networks: Challenges and opportunities,” Computer, vol. 42, no. 1, pp. 58-65, January, 2009. Article (CrossRef Link). https://doi.org/10.1109/MC.2009.5
  5. J. Y. Khan, M .R .Yuce, G. Bulger and B. Harding, “Wireless body area network (WBAN) design techniques and performance evaluation,” Journal of Medical Systems, vol. 36, no. 3, pp. 1441-1457, October, 2012. Article (CrossRef Link). https://doi.org/10.1007/s10916-010-9605-x
  6. S. Lim and H. Lee, “Factors affecting medical incident care on WBAN,” KSII Transactions on Internet and Information Systems (TIIS), vol. 7, no. 5, pp. 1058-1076, May, 2013. Article (CrossRef Link). https://doi.org/10.3837/tiis.2013.05.007
  7. Y. O. Mohammed and U. A. Baroudi, “Partially observable Markov decision processes (POMDPS) and wireless body area networks (WBAN),” KSII Transactions on Internet and Information Systems (TIIS), vol. 7, no. 5, pp. 1036-1057, May, 2013. Article (CrossRef Link). https://doi.org/10.3837/tiis.2013.05.006
  8. T. Hayajneh, G. Almashaqbeh, S. Ullah and A.V. Vasilakos, “A survey of wireless technologies coexistence in WBAN: analysis and open research issues,” Wireless Networks, vol. 20 no. 8, pp. 2165-2199, May, 2014. Article (CrossRef Link). https://doi.org/10.1007/s11276-014-0736-8
  9. J. Liu, Q. Wang, J. Wan, J. Xiong and B. Zeng, “Towards key issues of disaster aid based on wireless body area networks,” KSII Transactions on Internet and Information Systems (TIIS), vol. 7, no. 5, pp. 1014-1035, May, 2013. Article (CrossRef Link). https://doi.org/10.3837/tiis.2013.05.005
  10. M. A. Ameen, J. Liu and K. Kwak, “Security and privacy issues in wireless sensor networks for healthcare applications,” Journal of medical systems, vol. 36, no. 1, pp. 93-101, February, 2012. Article (CrossRef Link). https://doi.org/10.1007/s10916-010-9449-4
  11. M. Li, W. Lou and K. Ren, “Data security and privacy in wireless body area networks,” Wireless Communications, IEEE, vol. 17, no. 1, pp. 51-58, February, 2010. Article (CrossRef Link). https://doi.org/10.1109/MWC.2010.5416350
  12. C. C. Tan , H. Wang , S. Zhong and L. Qun, "Body sensor network security: an identity-based cryptography approach," in Proc. of the 1st Conf. on Wireless network security, ACM, pp. 148-153, March 31-April 2, 2008. Article (CrossRef Link).
  13. X. Liu, Y. Ge, Y. Zhu and D. Wu, “A Lightweight Integrity Authentication Scheme based on Reversible Watermark for Wireless Body Area Networks,” KSII Transactions on Internet and Information Systems (TIIS), vol.8, no.12, pp. 4643-4660, December, 2014. Article (CrossRef Link). https://doi.org/10.3837/tiis.2014.12.023
  14. C.C.Y. Poon, Y.T. Zhang and S.D. Bao, “A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health,” IEEE Communications Magazine, vol. 44, no. 4, pp. 73-81, April, 2006. Article (CrossRef Link). https://doi.org/10.1109/MCOM.2006.1632652
  15. K. Zeng, K. Govindan and P. Mohapatra, “Non-cryptographic authentication and identification in wireless networks [security and privacy in emerging wireless networks],” IEEE Wireless Communications, vol. 17, no. 5, pp. 56 – 62, October, 2010. Article (CrossRef Link). https://doi.org/10.1109/MWC.2010.5601959
  16. L. Shi, M. Li, S. Yu and J. Yuan, “BANA: body area network authentication exploiting channel characteristics,” IEEE Journal on Selected Areas in Communications, vol. 31, no. 9, pp. 1803-1816, September, 2013.Article (CrossRef Link). https://doi.org/10.1109/JSAC.2013.130913
  17. L. Ma, Y. Ge and Y. Zhu, “TinyZKP: a lightweight authentication scheme based on zero-knowledge proof for wireless body area networks,” Wireless Personal Communications, vol. 77, no. 2, pp. 1077–1090, July, 2014. Article (CrossRef Link) https://doi.org/10.1007/s11277-013-1555-4
  18. M. Li, S. Yu, J.D. Guttman, W. Lou and K. Ren, “Secure ad hoc trust initialization and key management in wireless body area networks,” ACM Transactions on Sensor Networks, vol. 9, no. 2, pp. 18-52, March, 2013. Article (CrossRef Link). https://doi.org/10.1145/2422966.2422975
  19. S. Mathur, W. Trappe, N. Mandayam, C. Ye and A. Reznik, "Radio-telepathy: extracting a secret key from an unauthenticated wireless channel," in Proc. of the 14th Int. Conf. on Mobile computing and networking, ACM, pp. 128-139, September 14-19, 2008. Article (CrossRef Link).
  20. S. Jana, S.N. Premnath, M. Clark, S.K. Kasera, N.Patwari and S.V. Krishnamurthy, "On the effectiveness of secret key extraction from wireless signal strength in real environments," in Proc. of the 15th annual Int. Conf. on Mobile computing and networking, ACM, pp. 321-332, September 20-25, 2009. Article (CrossRef Link).
  21. K.K. Venkatasubramanian, A. Banerjee and S.K.S. Gupta, “PSKA: usable and secure key agreement scheme for body area networks,” IEEE Transactions on Information Technology in Biomedicine, vol. 14, no. 1, pp. 60-68, January, 2010. Article (CrossRef Link). https://doi.org/10.1109/TITB.2009.2037617
  22. K.K. Venkatasubramanian and S.K.S. Gupta, “Physiological value-based efficient usable security solutions for body sensor networks,” ACM Transactions on Sensor Networks, vol. 6, no. 4, pp. 31-64, July, 2010.Article (CrossRef Link). https://doi.org/10.1145/1777406.1777410
  23. J. Zhou, Z. Cao, X. Dong, N. Xiong and A.V. Vasilakos, “4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks,” Information Sciences, vol. 314, pp. 255-276, September, 2015. Article (CrossRef Link). https://doi.org/10.1016/j.ins.2014.09.003
  24. U.C. Niranjan, S.S. Iyengar, N. Kannathal and L. C. Mina, “Simultaneous storage of patient information with medical images in the frequency domain,” Computer methods and programs in Biomedicine, vol. 76, no. 1, pp. 13-19, October, 2004. Article (CrossRef Link). https://doi.org/10.1016/j.cmpb.2004.02.009
  25. D.C. Lou, M.C. Hu and J.L. Liu, “Multiple layer data hiding scheme for medical images,” Computer Standards & Interfaces, vol. 31 no. 2, pp. 329-335, February, 2009. Article (CrossRef Link). https://doi.org/10.1016/j.csi.2008.05.009
  26. M. Ulutas, G. Ulutas, V.V. Nabiyev, “Medical image security and EPR hiding using Shamir's secret sharing scheme,” Journal of Systems and Software, vol. 84, no. 3, pp.341-353, March, 2011. Article (CrossRef Link). https://doi.org/10.1016/j.jss.2010.11.928
  27. N.A. Memon, S.A.M. Gilani, A. Ali, "Watermarking of chest CT scan medical images for content authentication," In Int. Conf. on Information and Communication Technologies, pp. 175-180, August 15-16, 2009. Article (CrossRef Link).
  28. S. Rawat and B. Raman, “A blind watermarking algorithm based on fractional Fourier transform and visual cryptography,” Signal Process, vol. 92 no. 6, pp. 1480–1491, June, 2012. Article (CrossRef Link). https://doi.org/10.1016/j.sigpro.2011.12.006
  29. B. Surekha, G.N. Swamy and K.R.L. Reddy, "A novel copyright protection scheme based on Visual Secret Sharing," in Proc. of 3rd Int. Conf. on Computing Communication & Networking Technologies (ICCCNT), pp. 1-5, July 26-28, 2012. Article (CrossRef Link).
  30. T.R. Singh, K.M. Singh and S Roy, “Video watermarking scheme based on visual cryptography and scene change detection,” AEU-International Journal of Electronics and Communications, vol. 67, no. 8, pp. 645–651, August, 2013. Article (CrossRef Link). https://doi.org/10.1016/j.aeue.2013.01.008
  31. M. Naor and A. Shamir, "Visual cryptography," Advances in Cryptology-EUROCRYPT'94 Lecture Notes in Computer Science, vol. 950, pp. 1-12, May 23, 2006. Article (CrossRef Link).
  32. CrossBow, MICAZ datasheet, 2010.Available: Article (CrossRef Link).
  33. Sparkfun, "Pulse Sensor SEN-11574." Available: Article (CrossRef Link).