Low delay and secure M2M communication mechanism for eHealthcare

Currently, the eHealthcare information management is the most critical and hot research topic. Especially with the involvement of new and promising telecommunication technologies like Machine to Machine (M2M) Communication. In M2M communication the devices interact and exchange information with each other in an autonomous manner to accomplish the required tasks. Mostly machine communicate to another machine wirelessly. The wireless communication opens the medium for enormous vulnerabilities and make it very easy for hackers to access the confidential information and can perform malicious activities. In this paper, we propose a Machine to Machine (M2M) Low Delay and Secure (LDS) communication system for e-healthcare community based on random distributive key management scheme and modified Kerberos realm to ensure data security. The system is capable to perform the tasks in an autonomous and intelligent manner that minimizes the workload of medical staffs, and improves the quality of patient care as well as the system performance. We show how the different actors in the e-healthcare community can interact with each other in a secure manner. The system handles dynamic assignments of doctors to specific patients. The proposed architecture further provides security against false attack, false triggering and temper attack. Finally, the simulation type implementation is performed on Visual Basic .net 2013 that shows the feasibility of the proposed Low Delay and Secure (LDS) algorithm.

[1]  Kijoon Chae,et al.  An Improved Security Approach Based on Kerberos for M2M Open IPTV System , 2012, 2012 15th International Conference on Network-Based Information Systems.

[2]  Gu-Yeon Wei,et al.  A portable, low-power, wireless two-lead EKG system , 2004, The 26th Annual International Conference of the IEEE Engineering in Medicine and Biology Society.

[3]  Jin Cao,et al.  Security Issues on Machine to Machine Communications , 2012, KSII Trans. Internet Inf. Syst..

[4]  Guiran Chang,et al.  A Survey on Security Issues of M2M Communications in Cyber-Physical Systems , 2012, KSII Trans. Internet Inf. Syst..

[5]  Jeff A. Bilmes,et al.  Recognizing Activities and Spatial Context Using Wearable Sensors , 2006, UAI.

[6]  Mohsen Guizani,et al.  Home M2M networks: Architectures, standards, and QoS improvement , 2011, IEEE Communications Magazine.

[7]  Eui-nam Huh,et al.  A dynamic ID-based authentication scheme , 2010, The 6th International Conference on Networked Computing and Advanced Information Management.

[8]  Min Chen,et al.  Machine-to-Machine Communications: Architectures, Standards and Applications , 2012, KSII Trans. Internet Inf. Syst..

[9]  Theodore S. Rappaport,et al.  A Survey of Recent Developments in Home M2M Networks , 2013, IEEE Communications Surveys & Tutorials.

[10]  Chris Toumazou,et al.  Medical Healthcare Monitoring with Wearable and Implantable Sensors , 2004 .

[11]  B. Kröse,et al.  Bayesian Activity Recognition in Residence for Elders , 2007 .

[12]  Edmundo Monteiro,et al.  Security Issues and Approaches on Wireless M2M Systems , 2013, Wireless Networks and Security.

[13]  Abraham O. Fapojuwo,et al.  A Survey of System Architecture Requirements for Health Care-Based Wireless Sensor Networks , 2011, Sensors.

[14]  Context-Aware Computing,et al.  Inferring Activities from Interactions with Objects , 2004 .

[15]  Niina Keränen,et al.  Security threats against the transmission chain of a medical health monitoring system , 2013, 2013 IEEE 15th International Conference on e-Health Networking, Applications and Services (Healthcom 2013).

[16]  Merryn J Mathie,et al.  Accelerometry: providing an integrated, practical method for long-term, ambulatory monitoring of human movement , 2004, Physiological measurement.

[17]  William Stallings,et al.  Cryptography and Network Security (4th Edition) , 2005 .

[18]  Matt Welsh,et al.  Sensor networks for emergency response: challenges and opportunities , 2004, IEEE Pervasive Computing.

[19]  Zhong Fan,et al.  M2M communications for e-health: Standards, enabling technologies, and research challenges , 2012, 2012 6th International Symposium on Medical Information and Communication Technology (ISMICT).

[20]  J. Jenifer,et al.  Wireless Machine-To-Machine Healthcare Solution Using Android Mobile Devices In Global Networks , 2014 .

[21]  Kashif Saleem,et al.  Empirical Studies of Bio-Inspired Self-Organized Secure Autonomous Routing Protocol , 2014, IEEE Sensors Journal.

[22]  Victor C. M. Leung,et al.  A Survey of Recent Developments in Home M2M Networks , 2014, IEEE Commun. Surv. Tutorials.

[23]  William Stallings,et al.  Cryptography and network security , 1998 .

[24]  Zheng Zhou,et al.  A security authentication scheme in machine-to-machine home network service , 2015, Secur. Commun. Networks.

[25]  Inhyok Cha,et al.  Trust in M2M communication , 2009, IEEE Vehicular Technology Magazine.

[26]  Noriaki Kuwahara,et al.  Practical Design of A Sensor Network for Understanding Nursing Activities , 2006, Proceedings. 2006 31st IEEE Conference on Local Computer Networks.

[27]  Christopher G. Atkeson,et al.  Simultaneous Tracking and Activity Recognition (STAR) Using Many Anonymous, Binary Sensors , 2005, Pervasive.

[28]  Eric Dishman,et al.  Inventing wellness systems for aging in place , 2004, Computer.

[29]  Liangli Ma,et al.  RISE: A RelIable and SEcure scheme for wireless Machine to Machine communications , 2013 .

[30]  Jonathan Rodriguez,et al.  MoSHCA - my mobile and smart health care assistant , 2013, Healthcom.

[31]  Jesse Hoey,et al.  The use of an intelligent prompting system for people with dementia , 2007, Interactions.

[32]  N. Watthanawisuth,et al.  Wireless wearable pulse oximeter for health monitoring using ZigBee wireless sensor network , 2010, ECTI-CON2010: The 2010 ECTI International Confernce on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology.