Secure Architecture for m-Health Communications Using Multi-agent Approach

In this study we propose a security architecture for mobile Health (mHealth) communications. mHealth is a term used for medical-related services or communication, delivered using mobile devices such as mobile phones, tablet computers and PDAs. Communication in the health-related field often involve sensitive information (e.g., an email about a patient's illness is sent between doctors), which is transmitted over the Internet. However, although the Internet greatly facilitates the communication, it is undeniable that the threats to the Internet are becoming more prevalent. A multi-agent security architecture is presented in this study to provide a secure environment for mHealth communication. Agents are skilled in order to handle the communication processes at both sender's and recipient's side. This includes the security processes, which make use of cryptography protocols to secure data at both sides.

[1]  Agostino Poggi,et al.  Developing Multi-agent Systems with JADE , 2007, ATAL.

[2]  Ramon Martí,et al.  Network and Application Security in Mobile e-Health Applications , 2004, ICOIN.

[3]  Gerhard Weiss,et al.  Multi-Agent Systems , 2013 .

[4]  G. Eysenbach What is e-health? , 2001, Journal of Medical Internet Research.

[5]  Jacques Pasquier-Rocha,et al.  Enhancing E-Health Information Systems with Agent Technology , 2008, International journal of telemedicine and applications.

[6]  Fagen Li,et al.  A Secure Mobile Agent Protocol for M-commerce Using Self-Certified Proxy Signcryption , 2009, 2009 Second International Symposium on Information Science and Engineering.

[7]  Gregory R. Madey,et al.  Tools of the Trade: A Survey of Various Agent Based Modeling Platforms , 2009, J. Artif. Soc. Soc. Simul..

[8]  Eugénio C. Oliveira,et al.  Multi-agent systems: which research for which applications , 1999, Robotics Auton. Syst..

[9]  Ganthan Narayana Samy,et al.  Security threats categories in healthcare information systems , 2010, Health Informatics J..

[10]  John K. Debenham,et al.  An Adaptive, Maintable, Extensible Process Agent , 1999, DEXA.

[11]  Hayfa Zgaya,et al.  Assignment and Integration of Distributed Transport Services in Agent-Based Architecture , 2006, 2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology.

[12]  W.D. Yu,et al.  A web-based wireless mobile system design of security and privacy framework for u-Healthcare , 2008, HealthCom 2008 - 10th International Conference on e-health Networking, Applications and Services.

[13]  Nicholas R. Jennings,et al.  A Roadmap of Agent Research and Development , 2004, Autonomous Agents and Multi-Agent Systems.

[14]  R. Colemon Securing Wireless Networks , 2004 .

[15]  Jeffrey M. Bradshaw,et al.  An introduction to software agents , 1997 .

[16]  Kosie Eloff Mobile devices in education , 2011 .

[17]  Wanli Ma,et al.  A Multi-agent Security Architecture , 2009, 2009 Third International Conference on Network and System Security.

[18]  Vipul Gupta,et al.  KSSL: experiments in wireless internet security , 2001 .