Human-oriented design of secure Machine-to-Machine communication system for e-Healthcare society

Propose and implement a M2M Secure communication for e-Healthcare society.Perform tasks autonomously to minimize the workload and stress of medical staff.Different actors in the e-Healthcare society can interact in a secure manner.Staff dynamic assignments with intelligent authentication to ensure data privacy.Patients to share their health information while preserving privacy issue. In this paper, we propose a Machine to Machine (M2M) Low Cost and Secure (LCS) communication system for e-Healthcare society. The system is designed to take into consideration the psychological issues related to all actors in the e-Healthcare society such as: stress due to high workload, anxiety, and loneliness. The system is capable of performing most of the tasks in an autonomous and intelligent manner, which minimizes the workload of medical staffs, and consequently minimizes the associated psychological stress and improves the quality of patient care as well as the system performance. We show how the different actors in the e-Healthcare society can interact with each other in a secure manner. To ensure data privacy, the mechanism involves intelligent authentication based on random distributive key management, electronic certificate distribution, and modified realm Kerberos. The system handles dynamic assignments of doctors to specific patients. It also addresses the need for patients to share their health information with strangers while dealing with the privacy preservation issue. Finally, the simulation type implementation is performed on Visual Basic .net 2013 that shows the success of the proposed Low Cost and Secure (LCS) algorithm.

[1]  Sherali Zeadally,et al.  Machine-to-Machine (M2M) Communications in Vehicular Networks , 2012 .

[2]  Kijoon Chae,et al.  An Improved Security Approach Based on Kerberos for M2M Open IPTV System , 2012, 2012 15th International Conference on Network-Based Information Systems.

[3]  William Stallings,et al.  Cryptography and network security , 1998 .

[4]  Context-Aware Computing,et al.  Inferring Activities from Interactions with Objects , 2004 .

[5]  Kashif Saleem,et al.  An Intelligent Information Security Mechanism for the Network Layer of WSN: BIOSARP , 2011, CISIS.

[6]  Gu-Yeon Wei,et al.  A portable, low-power, wireless two-lead EKG system , 2004, The 26th Annual International Conference of the IEEE Engineering in Medicine and Biology Society.

[7]  Jin Cao,et al.  Security Issues on Machine to Machine Communications , 2012, KSII Trans. Internet Inf. Syst..

[8]  Guiran Chang,et al.  A Survey on Security Issues of M2M Communications in Cyber-Physical Systems , 2012, KSII Trans. Internet Inf. Syst..

[9]  Jae Eun Chung,et al.  Social interaction in online support groups: Preference for online social interaction over offline social interaction , 2013, Comput. Hum. Behav..

[10]  J. Jenifer,et al.  Wireless Machine-To-Machine Healthcare Solution Using Android Mobile Devices In Global Networks , 2014 .

[11]  Sungmo Jung,et al.  An Optimization Scheme for M2M-Based Patient Monitoring in Ubiquitous Healthcare Domain , 2012, Int. J. Distributed Sens. Networks.

[12]  Jeff A. Bilmes,et al.  Recognizing Activities and Spatial Context Using Wearable Sensors , 2006, UAI.

[13]  Zheng Zhou,et al.  A security authentication scheme in machine-to-machine home network service , 2015, Secur. Commun. Networks.

[14]  B. Kröse,et al.  Bayesian Activity Recognition in Residence for Elders , 2007 .

[15]  Christopher G. Atkeson,et al.  Simultaneous Tracking and Activity Recognition (STAR) Using Many Anonymous, Binary Sensors , 2005, Pervasive.

[16]  Eric Dishman,et al.  Inventing wellness systems for aging in place , 2004, Computer.

[17]  Norsheila Fisal,et al.  Cross layer based biological inspired self-organized routing protocol for wireless sensor network , 2009, TENCON 2009 - 2009 IEEE Region 10 Conference.

[18]  Mohsen Guizani,et al.  Home M2M networks: Architectures, standards, and QoS improvement , 2011, IEEE Communications Magazine.

[19]  Liangli Ma,et al.  RISE: A RelIable and SEcure scheme for wireless Machine to Machine communications , 2013 .

[20]  Norsheila Fisal,et al.  Biological inspired self-optimized routing algorithm for wireless sensor networks , 2009, 2009 IEEE 9th Malaysia International Conference on Communications (MICC).

[21]  Theodore S. Rappaport,et al.  A Survey of Recent Developments in Home M2M Networks , 2013, IEEE Communications Surveys & Tutorials.

[22]  Matt Welsh,et al.  Sensor networks for emergency response: challenges and opportunities , 2004, IEEE Pervasive Computing.

[23]  Basit Shahzad,et al.  Risk Mitigation And Management Scheme Based On Risk Priority , 2010 .

[24]  Abdelouahid Derhab,et al.  Low delay and secure M2M communication mechanism for eHealthcare , 2014, 2014 IEEE 16th International Conference on e-Health Networking, Applications and Services (Healthcom).

[25]  Zhong Fan,et al.  M2M communications for e-health: Standards, enabling technologies, and research challenges , 2012, 2012 6th International Symposium on Medical Information and Communication Technology (ISMICT).

[26]  Kashif Saleem QoS provisioning for real time services in MPLS diffserv aware IPv6 network using IXP-2xxx (Intel Network Processor) , 2006 .

[27]  Xiaohui Liang,et al.  HealthShare: Achieving secure and privacy-preserving health information sharing through health social networks , 2012, Comput. Commun..

[28]  Inhyok Cha,et al.  Trust in M2M communication , 2009, IEEE Vehicular Technology Magazine.

[29]  Noriaki Kuwahara,et al.  Practical Design of A Sensor Network for Understanding Nursing Activities , 2006, Proceedings. 2006 31st IEEE Conference on Local Computer Networks.

[30]  Mehmet A. Orgun,et al.  Efficient Random Key Based Encryption System for Data Packet Confidentiality in WSNs , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.

[31]  Kashif Saleem,et al.  Enhanced Ant Colony algorithm for self-optimized data assured routing in wireless sensor networks , 2012, 2012 18th IEEE International Conference on Networks (ICON).

[32]  Kashif Saleem,et al.  Empirical Studies of Bio-Inspired Self-Organized Secure Autonomous Routing Protocol , 2014, IEEE Sensors Journal.

[33]  Victor C. M. Leung,et al.  A Survey of Recent Developments in Home M2M Networks , 2014, IEEE Commun. Surv. Tutorials.

[34]  Kun-Ho Yoon,et al.  M2M-based smart health service for human UI/UX using motion recognition , 2014, Cluster Computing.

[35]  Edmundo Monteiro,et al.  Security Issues and Approaches on Wireless M2M Systems , 2013, Wireless Networks and Security.

[36]  Abraham O. Fapojuwo,et al.  A Survey of System Architecture Requirements for Health Care-Based Wireless Sensor Networks , 2011, Sensors.

[37]  Sherali Zeadally,et al.  Machine-to-Machine (M2M) Communications in Vehicular Networks , 2012, KSII Trans. Internet Inf. Syst..

[38]  Gita Reese Sukthankar,et al.  Motif Discovery and Feature Selection for CRF-based Activity Recognition , 2010, 2010 20th International Conference on Pattern Recognition.

[39]  Abdullah S. Al-Mudimigh,et al.  Risk Identification, Mitigation and Avoidance Model for Handling Software Risk , 2010, 2010 2nd International Conference on Computational Intelligence, Communication Systems and Networks.

[40]  Jesse Hoey,et al.  The use of an intelligent prompting system for people with dementia , 2007, Interactions.

[41]  Suleiman Zubair,et al.  Assessing Routing Strategies for Cognitive Radio Sensor Networks , 2013, Sensors.

[42]  Eui-nam Huh,et al.  A dynamic ID-based authentication scheme , 2010, The 6th International Conference on Networked Computing and Advanced Information Management.

[43]  Chris Toumazou,et al.  Medical Healthcare Monitoring with Wearable and Implantable Sensors , 2004 .

[44]  Saudi Arabia,et al.  Software Risk Management and Avoidance Strategy , 2011 .

[45]  Merryn J Mathie,et al.  Accelerometry: providing an integrated, practical method for long-term, ambulatory monitoring of human movement , 2004, Physiological measurement.

[46]  William Stallings,et al.  Cryptography and Network Security (4th Edition) , 2005 .

[47]  Min Chen,et al.  Machine-to-Machine Communications: Architectures, Standards and Applications , 2012, KSII Trans. Internet Inf. Syst..