E-Health Sensitive Data Dissemination Exploiting Trust and Mobility of Users

E-health services handle a massive amount of sensitive data, requiring reliability and privacy. The advent of new technologies drives e-health services into their continuous provision outside traditional care institutions. This creates uncertain and unreliable conditions, resulting in the challenge of controlling sensitive user data dissemination. Then, there is a gap in sensitive data dissemination under situations requiring fast response (e.g., cardiac arrest). This obligates networks to provide reliable sensitive data dissemination under user mobility, dynamic network topology, and occasional interactions between the devices. In this article, we propose STEALTH, a system that employs social trust and communities of interest to address these challenges. STEALTH follows two steps: clustering and dissemination. In the first, STEALTH groups devices based on the interests of their users, forming communities of interest. A healthcare urgency launches the second, in which STEALTH disseminates user sensitive data to devices belonging to specific communities, subjected to the level of trust between devices. Simulation results demonstrate that STEALTH ensures data dissemination to people who can contribute toward an efficient service. STEALTH has achieved up to 97.14% of reliability in accessing sensitive data with a maximum latency of 170 ms, and up to 100% of availability during emergencies.

[1]  Thiemo Voigt,et al.  Routing Attacks and Countermeasures in the RPL-Based Internet of Things , 2013, Int. J. Distributed Sens. Networks.

[2]  Jin-Woo Kim,et al.  A unified framework of trust prediction based on message passing , 2018, Cluster Computing.

[3]  Shigeru Kashihara,et al.  SOS Message Distribution for Searching Disaster Victims , 2017 .

[4]  Mikkel Baun Kjærgaard,et al.  Analysis methods for extracting knowledge from large-scale WiFi monitoring to inform building facility planning , 2014, 2014 IEEE International Conference on Pervasive Computing and Communications (PerCom).

[5]  Jeroen Famaey,et al.  Real-Time data dissemination and analytics platform for challenging IoT environments , 2017, 2017 Global Information Infrastructure and Networking Symposium (GIIS).

[6]  Armir Bujari A Survey of Opportunistic Data Gathering and Dissemination Techniques , 2012, 2012 21st International Conference on Computer Communications and Networks (ICCCN).

[7]  Hamid Al-Hamadi,et al.  Trust-Based Decision Making for Health IoT Systems , 2017, IEEE Internet of Things Journal.

[8]  Philip Resnik,et al.  Semantic Similarity in a Taxonomy: An Information-Based Measure and its Application to Problems of Ambiguity in Natural Language , 1999, J. Artif. Intell. Res..

[9]  V. Umarani,et al.  Survey of Various Trust Models and Their Behavior in Wireless Sensor Networks , 2013 .

[10]  Abbas Jamalipour,et al.  Wireless Body Area Networks: A Survey , 2014, IEEE Communications Surveys & Tutorials.

[11]  Gianluigi Ferrari,et al.  Data dissemination scheme for distributed storage for IoT observation systems at large scale , 2015, Inf. Fusion.

[12]  Dongman Lee,et al.  An adaptive IoT trust estimation scheme combining interaction history and stereotypical reputation , 2017, 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[13]  Hyun-Woo Lee,et al.  Toward a Trust Evaluation Mechanism in the Social Internet of Things , 2017, Sensors.

[14]  Dino Pedreschi,et al.  A classification for community discovery methods in complex networks , 2011, Stat. Anal. Data Min..

[15]  Graeme Hirst,et al.  Distributional Measures of Semantic Distance: A Survey , 2012, ArXiv.

[16]  Doan B. Hoang,et al.  Challenge-response trust assessment model for personal space IoT , 2016, 2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops).

[17]  O. Helgason,et al.  Does mobility matter? , 2010, 2010 Seventh International Conference on Wireless On-demand Network Systems and Services (WONS).

[18]  Martha Palmer,et al.  Verb Semantics and Lexical Selection , 1994, ACL.

[19]  Ing-Ray Chen,et al.  Trust management for the internet of things and its application to service composition , 2012, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).

[20]  Barbara Carminati,et al.  Detection of Unspecified Emergencies for Controlled Information Sharing , 2016, IEEE Transactions on Dependable and Secure Computing.

[21]  Fenye Bao,et al.  Dynamic trust management for internet of things applications , 2012, Self-IoT '12.

[22]  Kevin C. Almeroth,et al.  Coupons: A Multilevel Incentive Scheme for Information Dissemination in Mobile Networks , 2008, IEEE Transactions on Mobile Computing.

[23]  Gunnar Karlsson,et al.  Opportunistic Communication and Human Mobility , 2014, IEEE Transactions on Mobile Computing.

[24]  Anton Chistyakov,et al.  A Software Architecture for Large Multi-simulation Experiments over Ad Hoc Networks Using NS-3 Discrete-Event Network Simulator , 2014, 2014 European Modelling Symposium.

[25]  Nick Feamster,et al.  Cleartext Data Transmissions in Consumer IoT Medical Devices , 2017, IoT S&P@CCS.

[26]  Max Mühlhäuser,et al.  I Trust my Zombies: A Trust-enabled Botnet , 2017, ArXiv.

[27]  D. Mozaffarian,et al.  Executive Summary: Heart Disease and Stroke Statistics—2015 Update A Report From the American Heart Association , 2011, Circulation.

[28]  Jia Guo,et al.  A survey of trust computation models for service management in internet of things systems , 2017, Comput. Commun..

[29]  Jia Guo,et al.  Scalable, adaptive and survivable trust management for community of interest based Internet of Things systems , 2013, 2013 IEEE Eleventh International Symposium on Autonomous Decentralized Systems (ISADS).

[30]  Adriana Iamnitchi,et al.  A Survey of Socially Aware Peer-to-Peer Systems , 2016, ACM Comput. Surv..

[31]  Michele Nogueira Lima,et al.  Detection of sinkhole attacks for supporting secure routing on 6LoWPAN for Internet of Things , 2015, 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM).

[32]  Ingrid Moerman,et al.  A survey on wireless body area networks , 2011, Wirel. Networks.

[33]  Wei Liu,et al.  A Neighbor-Based Probabilistic Broadcast Protocol for Data Dissemination in Mobile IoT Networks , 2018, IEEE Access.

[34]  Sibel Adali,et al.  A Survey on Trust Modeling , 2015, ACM Comput. Surv..

[35]  Amos Fiat,et al.  Zero-knowledge proofs of identity , 1987, Journal of Cryptology.

[36]  Jin-Hee Cho,et al.  Trust-Based Task Assignment With Multiobjective Optimization in Service-Oriented Ad Hoc Networks , 2017, IEEE Transactions on Network and Service Management.

[37]  Giulio Rossetti,et al.  Community Discovery in Dynamic Networks , 2017, ACM Comput. Surv..

[38]  Yau-Hwang Kuo,et al.  Time-sensitive data dissemination in opportunistic networks , 2014, 2014 IEEE Wireless Communications and Networking Conference (WCNC).

[39]  Global Information Infrastructure and Networking Symposium, GIIS 2014, Montreal, QC, Canada, September 15-19, 2014 , 2014, GIIS.