Secured remote health monitoring system

Wireless medical sensor network is used in healthcare applications that have the collections of biosensors connected to a human body or emergency care unit to monitor the patient's physiological vital status. The real-time medical data collected using wearable medical sensors are transmitted to a diagnostic centre. The data generated from the sensors are aggregated at this centre and transmitted further to the doctor's personal digital assistant for diagnosis. The unauthorised access of one's health data may lead to misuse and legal complications while unreliable data transmission or storage may lead to life threatening risk to patients. So, this Letter combines the symmetric algorithm and attribute-based encryption to secure the data transmission and access control system for medical sensor network. In this work, existing systems and their algorithm are compared for identifying the best performance. The work also shows the graphical comparison of encryption time, decryption time and total computation time of the existing and the proposed systems.

[1]  Y. M. Huang,et al.  Pervasive, secure access to a hierarchical sensor-based healthcare monitoring architecture in wireless heterogeneous networks , 2009, IEEE Journal on Selected Areas in Communications.

[2]  Richard J. Duro,et al.  Ambient Intelligence Systems for Personalized Sport Training , 2010, Sensors.

[3]  M. E. Froggatt,et al.  Multiple Fiber Loop Strain Rosettes in a Single Fiber Using High Resolution Distributed Sensing , 2012, IEEE Sensors Journal.

[4]  Hai Jiang,et al.  Survey of attribute based encryption , 2014, 15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD).

[5]  Hamid Sharif,et al.  Resource-aware secure ECG healthcare monitoring through body sensor networks , 2010, IEEE Wireless Communications.

[6]  Cem Ersoy,et al.  Wireless sensor networks for healthcare: A survey , 2010, Comput. Networks.

[7]  Jibi Abraham,et al.  ANALYSIS AND COMPARISON OF SYMMETRIC KEY CRYPTOGRAPHIC ALGORITHMS BASED ON VARIOUS FILE FEATURES , 2014 .

[8]  Daojing He,et al.  A Novel and Lightweight System to Secure Wireless Medical Sensor Networks , 2014, IEEE Journal of Biomedical and Health Informatics.

[9]  P. Mackowiak,et al.  A critical appraisal of 98.6 degrees F, the upper limit of the normal body temperature, and other legacies of Carl Reinhold August Wunderlich. , 1992, JAMA.

[10]  Brent Waters,et al.  Attribute-Based Encryption with Fast Decryption , 2013, Public Key Cryptography.

[11]  Harsh K. Verma,et al.  Performance Evaluation of RC6, Blowfish, DES, IDEA, CAST-128 Block Ciphers , 2013 .

[12]  염흥렬,et al.  [서평]「Applied Cryptography」 , 1997 .

[13]  Ayman Ibaida,et al.  Wavelet-Based ECG Steganography for Protecting Patient Confidential Information in Point-of-Care Systems , 2013, IEEE Transactions on Biomedical Engineering.

[14]  Pardeep Kumar,et al.  Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey , 2011, Sensors.

[15]  Jan Willemson,et al.  Privacy Protection for Wireless Medical Sensor Data , 2016, IEEE Transactions on Dependable and Secure Computing.

[16]  Tao Xiang,et al.  Secure and Efficient Data Communication Protocol for Wireless Body Area Networks , 2016, IEEE Transactions on Multi-Scale Computing Systems.

[17]  Carmen C. Y. Poon,et al.  Using the Timing Information of Heartbeats as an Entity Identifier to Secure Body Sensor Network , 2008, IEEE Transactions on Information Technology in Biomedicine.