Trách Nhiệm Thời Gian và Anonymity trong Các Mạng Cảm Biến Y Tế

Jing Liu1, Yang Xiao1
1Department of Computer Science, The University of Alabama Tuscaloosa USA

Tóm tắt

Sự gia tăng số lượng bệnh nhân cao tuổi trên thế giới đã dẫn đến các thiết bị và công nghệ mới trong nền tảng chăm sóc sức khỏe từ xa hiện đại. Một ứng dụng như vậy là mạng cảm biến y tế (MSN). Trong ứng dụng này, bệnh nhân được trang bị một số cảm biến y tế và thiết bị đeo có thể theo dõi từ xa bởi các chuyên gia. Do đó, việc gặp bác sĩ trực tiếp không còn là lựa chọn duy nhất cho những người cần chăm sóc y tế. Vì đây cũng là một cách tiết kiệm để giảm chi phí chăm sóc sức khỏe và tiết kiệm tài nguyên y tế, chúng tôi kỳ vọng sẽ có một mạng MSN mạnh mẽ, đáng tin cậy và có khả năng mở rộng trong tương lai gần. Tuy nhiên, tín hiệu thời gian và lịch sử tạm thời trong MSN hiện tại đang gặp rủi ro do cơ sở hạ tầng và chiến lược truyền tải không an toàn. Trong khi đó, MSN có thể tiết lộ thông tin nhận dạng của bệnh nhân hoặc thông tin nhạy cảm khác vi phạm quyền riêng tư cá nhân. Để đảm bảo rằng tín hiệu thời gian quan trọng có thể được truy cứu, chúng tôi đề xuất một kiến trúc mới cho MSN có khả năng truy cứu tạm thời. Thêm vào đó, nó cũng bảo tồn khả năng riêng tư thông qua hệ thống ẩn danh Crowds. Kết quả phân tích rõ ràng chỉ ra những lợi ích của các phương pháp mà chúng tôi đề xuất về chi phí thấp, đáng tin cậy và có khả năng mở rộng.

Từ khóa

#mạng cảm biến y tế #chăm sóc sức khỏe từ xa #tín hiệu thời gian #quyền riêng tư #ẩn danh

Tài liệu tham khảo

Wikipedia (2009) Heart disease. http://en.wikipedia.org/wiki/Heart_diseases

Hu F, Celentano L, Xiao Y (2008) Error-resistant RFID-assisted wireless sensor networks for cardiac telehealthcare. Wireless Comm Mobile Comput 9(1):85–101

Ferreira A, Shiu S, Baldwin A (2003) Towards accountability for electronic patient records. In: Proceedings of the 16th IEEE Symposium on Computer-Based Medical Systems, (CBMS'03), New York, USA, pp 189–194, Jun 2003

Bhattacharya S, Paul R (1999) Accountability issues in multihop message communication. In: IEEE Symposium on Application-Specific Systems and Software Engineering and Technology (ASSET’99), Richardson, USA, pp 74–81, May 1999

Reiter MK, Rubin AD (1998) Crowds: anonymity for web transactions. ACM Trans Inf Syst Secur 1(1):66–92

Xiao Y (2006) Editorial. Int J Secur Netw 1(1/2):1

Shehab M, Bertino E, Ghafoor A (2006) Workflow authorisation in mediator-free environments. Int J Secur Netw 1(1/2):2–12

Jung E, Gouda MG (2006) Vulnerability analysis of certificate graphs. Int J Secur Netw 1(1/2):13–23

Kiayias A, Yung M (2006) Secure scalable group signature with dynamic joins and separable authorities. Int J Secur Netw 1(1/2):24–45

Franklin M (2006) A survey of key evolving cryptosystems. Int J Secur Netw 1(1/2):46–53

Hamadeh I, Kesidis G (2006) A taxonomy of internet traceback. Int J Secur Netw 1(1/2):54–61

Jhumka A, Freiling F, Fetzer C, Suri N (2006) An approach to synthesise safe systems. Int J Sec Netw 1(1/2):62–74

Evans JB, Wang W, Ewy BJ (2006) Wireless networking security: open issues in trust, management, interoperation and measurement. Int J Secur Netw 1(1/2):84–94

Englund H, Johansson T (2006) Three ways to mount distinguishing attacks on irregularly clocked stream ciphers. Int J Secur Netw 1(1/2):95–102

Zhu B, Jajodia S, Kankanhalli MS (2006) Building trust in peer-to-peer systems: a review. Int J Secur Netw 1(1/2):103–112

Ramkumar M, Memon N (2006) Secure collaborations over message boards. Int J Secur Netw 1(1/2):113–124

Xiao Y, Jia X, Sun B, Du X (2006) Editorial: security issues on sensor networks. Int J Secur Netw 1(3/4):125–126

Wang H, Sheng B, Li Q (2006) Elliptic curve cryptography-based access control. Int J Secur Netw 1(3/4):127–137

Zheng J, Li J, Lee MJ, Anshel M (2006) A lightweight encryption and authentication scheme for wireless sensor networks. Int J Secur Netw 1(3/4):138–146

Al-Karaki JN (2006) Analysis of routing security-energy trade-offs in wireless sensor networks. Int J Secur Netw 1(3/4):147–157

Araz O, Qi H (2006) Load-balanced key establishment methodologies in wireless sensor networks. Int J Secur Netw 1(3/4):158–166

Deng J, Han R, Mishra S (2006) Limiting DoS attacks during multihop data delivery in wireless sensor networks. Int J Secur Netw 1(3/4):167–178

Hwu J, Hsu S, Lin Y-B, Chen R-J (2006) End-to-end security mechanisms for SMS. Int J Secur Netw 1(3/4):177–183

Wang X (2006) The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones. Int J Secur Netw 1(3/4):184–197

Jiang Y, Lin C, Shi M, Shen X (2006) A self-encryption authentication protocol for teleconference services. Int J Secur Netw 1(3/4):198–205

Owens SF, Levary RR (2006) An adaptive expert system approach for intrusion detection. Int J Secur Netw 1(3/4):206–217

Chen Y, Susilo W, Mu Y (2006) Convertible identity-based anonymous designated ring signatures. Int J Secur Netw 1(3/4):218–225

Teo J, Tan C, Ng J (2006) Low-power authenticated group key agreement for heterogeneous wireless networks. Int J Secur Netw 1(3/4):226–236

Tan C (2006) A new signature scheme without random oracles. Int J Secur Netw 1(3/4):237–242

Liu Y, Comaniciu C, Man H (2006) Modelling misbehaviour in ad hoc networks: a game theoretic approach for intrusion detection. Int J Secur Netw 1(3/4):243–254

Karyotis V, Papavassiliou S, Grammatikou M, Maglaris V (2006) A novel framework for mobile attack strategy modelling and vulnerability analysis in wireless ad hoc networks. Int J Secur Netw 1(3/4):255–265

Haeberlen A, Kouznetsov P, Druschel P (2007) PeerReview: practical accountability for distributed systems. ACM SIGOPS Operating Systems Review 41(6):175–188

Ting TC (1999) Privacy and confidentiality in healthcare delivery information system. In Proceedings of the 12th IEEE Symposium on Computer-Based Medical Systems. Stamford, U.S.A., June 1999, pp 2–4

Xiao Y, Takahashi D, Hu F (2007) Telemedicine usage and potentials. In: IEEE Wireless Communications and Networking Conference (WCNC’07), Hong Kong, China, Mar 2007, pp 2736–2740

Liszka KJ, York DW, Mackin MA, Lichter MJ (2004) Remote monitoring of a heterogeneous sensor network for biomedical research in space. In: Proceedings of the International Conference on Pervasive Computing and Communications, June 2004, pp 829–833

Shnayder V, Chen B, Lorincz K, Fulford-Jones TRF, Welsh M (2005) Sensor networks for medical care. Technical Report TR-08-05, Division of Engineering and Applied Sciences, Harvard University

Hu F, Jiang M, Xiao Y (2007) Low-cost wireless sensor networks for remote cardiac patients monitoring applications. Wireless Comm Mobile Comput 8(4):513–529

Xiao Y (2009) Flow-net methodology for accountability in wireless networks. IEEE Netw 23(5):30–37

Xiao Z, Xiao Y (2010) PeerReview analysis and re-evaluation for accountability in distributed systems or networks. Proceedings of The 4th International Conference on Information Security and Assurance (ISA2010), CCIS 76, pp 149–162

Xiao Z, Xiao Y (2010) P-accountable networked systems. In: Proceeding of INFOCOM 2010, Work in Progress (WIP) Track, accepted

Xiao Z, Xiao Y, Wu J (2010) A quantitative study of accountability in wireless multi-hop networks. Proceedings of 2010 39th International Conference on Parallel Processing (ICPP 2010), accepted

Xiao Y (2008) Accountability for wireless LANs, ad hoc networks, and wireless mesh networks. IEEE Communication Magazine, special issue on Security in Mobile Ad Hoc and Sensor Networks, 46(4), pp 116–126, Apr

Syverson PF (1993) Adding time to a logic of authentication. In: Proceedings of the 1st ACM Conference on Computer and Communications Security. Fairfax, Virginia, U.S.A, pp 97–101

Kailar R (1996) Accountability in electronic commerce protocols. IEEE Trans Softw Eng 22(5):313–328

Liang J, Ao Q, You J (2002) Analyzing the temporal accountability of secure protocols. Chin J Electron (Acta Electronica Sinica) 30(10):1451–1454

Kudo M (1998) Electronic submission protocol based on temporal accountability. In Proceedings of the 14th Annual Computer Security Applications Conference, 1998, pp 353–363

Meng B, Zhang H (2005) Research on accountability in electronic transaction. In Proceedings of the 9th International Conference on Computer Supported Cooperative Work in Design, 2005, pp 745–749

Galloway M, Zhang Y, Xiao Y, Shao P (2010) Time synchronization in sensor networks and underwater sensor networks. Underwater Acoustic Sensor Networks, CRC Press, ISBN-10: 1420067117, ISBN-13: 978-1420067118, 2010, Chapter 6, pp 143–175

Chen H, Xiao Y, Hong X, Hu F, Xie J (2008) A survey of anonymity in wireless communication systems. Secur Comm Network 2(5):427–444

Burrows M, Abadi M, Needham R (1990) A logic of authentication. ACM Trans Comput Syst 8(1):18–36

Abadi M, Tuttle MR (1991) A semantics for a logic of authentication. In: Proceedings of the 10th Annual ACM Symposium on Principles of Distributed Computing. Aug, pp 201–216

Stubblebine SG (1995) Recent-Secure authentication: enforcing revocation in distributed systems. 19th IEEE Symposium on Research in Security and Privacy, pp 224–235

Stubblebine SG, Wright RN (1996) An authentication logic supporting synchronization, revocation, and recency. In: Proceeding of the 3rd ACM Conference on Computer and Communications Security. New Delhi, India, Mar. 1996, pp 95–105

Xu N, Rangwala S, Chintalapudi KK, Ganesan D, Broad A, Govindan R, Estrin D (2004) A wireless sensor network for structural monitoring. In Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems. Baltimore, U.S.A., Nov. 2004, pp 13–24

Quan Y, Liu G (2008) Drifting clock model for network simulation in time synchronization. In Proceedings of the 2008 3rd International Conference on Innovative Computing Information and Control, Dalian, China, June 2008, pp 385–389