1 Secure Handshake with Symptoms-matching: The Essential to the Success of mHealthcare Social Network University of Waterloo & University of Ontario Institute.

Slides:



Advertisements
Similar presentations
RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks Chien-Ming Chen, Yue-Hsun Lin, Ya-Ching Lin, Hung-Ming Sun.
Advertisements

Further improvement on the modified authenticated key agreement scheme Authors: N.Y. Lee and M.F. Lee Source: Applied Mathematics and Computation, Vol.157,
GRS: The Green, Reliability, and Security of Emerging Machine to Machine Communications Rongxing Lu, Xu Li, Xiaohui Liang, Xuemin (Sherman) Shen, and Xiaodong.
PSKA: Usable and Secure Key Agreement Scheme for Body Area Networks Authors: Krishna K. Venkatasubramanian, Ayan Banerjee, Sandeep K.S. Gupta Presenter:Francis.
1 Distributed Control Algorithms for Service Differentiation in Wireless Packet Networks INFOCOM 2001 Michael Barry, Andrew T. Campbell Andras Veres.
Security and Privacy Issues in Wireless Communication By: Michael Glus, MSEE EEL
University of Waterloo & UOIT & INRIA Lille Presenter: Rongxing Lu
New Efficient Searchable Encryption Schemes from Bilinear Pairings Author:Chunxiang Gu and Yuefei Zhu International Journal of Network Security, 2007 Presenter:
Using Auxiliary Sensors for Pair-Wise Key Establishment in WSN Source: Lecture Notes in Computer Science (2010) Authors: Qi Dong and Donggang Liu Presenter:
A novel and efficient unlinkable secret handshakes scheme Author: Hai Huang and Zhenfu Cao (PR China) Source: IEEE Comm. Letters 13 (5) (2009) Presenter:
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Identity Based Encryption
1 Identity-Based Encryption form the Weil Pairing Author : Dan Boneh Matthew Franklin Presentered by Chia Jui Hsu Date :
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Component-Based Routing for Mobile Ad Hoc Networks Chunyue Liu, Tarek Saadawi & Myung Lee CUNY, City College.
Identity Base Threshold Proxy Signature Jing Xu, Zhenfeng Zhang, and Dengguo Feng Form eprint Presented by 魏聲尊.
DATA SECURITY AND PRIVACY IN WIRELESS BODY AREA NETWORKS MING LI AND WENJING LOU, WORCESTER POLYTECHNIC INSTITUTE KUI REN, ILLINOIS INSTITUTE OF TECHNOLOGY.
The University of Kansas Medical Center Shadow Experience Training.
By Jyh-haw Yeh Boise State University ICIKM 2013.
(Multimedia University) Ji-Jian Chin Swee-Huay Heng Bok-Min Goi
Wireless and Security CSCI 5857: Encoding and Encryption.
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
Preserving Link Privacy in Social Network Based Systems Prateek Mittal University of California, Berkeley Charalampos Papamanthou.
EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications Rongxing Lu, Xiaohui Liang, Xu Li, Xiaodong Lin, Xuemin.
Secure Cell Relay Routing Protocol for Sensor Networks Xiaojiang Du, Fengiing Lin Department of Computer Science North Dakota State University 24th IEEE.
1 Optimal Power Allocation and AP Deployment in Green Wireless Cooperative Communications Xiaoxia Zhang Department of Electrical.
Bit Error Probability Evaluation of RO PUFs Qinglong Zhang, Zongbin Liu, Cunqing Ma and Jiwu Jing Institute of Information Engineering, CAS, Beijing, China.
Stochastic sleep scheduling (SSS) for large scale wireless sensor networks Yaxiong Zhao Jie Wu Computer and Information Sciences Temple University.
Tracking with Unreliable Node Sequences Ziguo Zhong, Ting Zhu, Dan Wang and Tian He Computer Science and Engineering, University of Minnesota Infocom 2009.
Seung-Hoon Lee, Sewook Jung, Alexander Chang, Dea-Ki Cho, and Mario Gerla Network Research Lab Department of Computer Science University of California,
RELAX : An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks Bashir Yahya, Jalel Ben-Othman University of Versailles, France ICC.
Coordinated Sensor Deployment for Improving Secure Communications and Sensing Coverage Yinian Mao, Min Wu Security of ad hoc and Sensor Networks, Proceedings.
Secure Authentication Scheme with Anonymity for Wireless Communications Speaker : Hong-Ji Wei Date :
Presented by: Suparita Parakarn Kinzang Wangdi Research Report Presentation Computer Network Security.
Exploiting Context Analysis for Combining Multiple Entity Resolution Systems -Ramu Bandaru Zhaoqi Chen Dmitri V.kalashnikov Sharad Mehrotra.
OFDMA Based Two-hop Cooperative Relay Network Resources Allocation Mohamad Khattar Awad, Xuemin (Sherman) Shen Student Member, IEEE Senior Member, IEEE.
Full auto rate MAC protocol for wireless ad hoc networks Z. Li, A. Das, A.K. Gupta and S. Nandi School of Computer Engineering Nanyang Technological University.
Wireless communications and mobile computing conference, p.p , July 2011.
X. Li, W. LiuICC May 11, 2003A Joint Layer Design Smart Contention Resolution Random Access Wireless Networks With Unknown Multiple Users: A Joint.
Secure In-Network Aggregation for Wireless Sensor Networks
多媒體網路安全實驗室 Anonymous ID Signature Scheme with Provable Identity Date: Reporter :Chien-Wen Huang 出處: 2008 Second International Conference on Future.
Hyunsung Kim Dept. of Cyber Security, Kyungil University Korea Non-interactive Hierarchical Key Agreement Protocol over WHMS.
Identity based signature schemes by using pairings Parshuram Budhathoki Department of Mathematical Science FAU 02/21/2013 Cyber Security Seminar, FAU.
An Improved Efficient Secret Handshakes Scheme with Unlinkability Author: Jie Gu and Zhi Xue Source: IEEE Comm. Letters 15 (2) (2011) Presenter: Yu-Chi.
Privacy Preserving Payments in Credit Networks By: Moreno-Sanchez et al from Saarland University Presented By: Cody Watson Some Slides Borrowed From NDSS’15.
Sanjay K. Dhurandher, Mohammad S. Obaidat, Fellow of IEEE and Fellow of SCS, Siddharth Goel and Abhishek Gupta CAITFS, Division of Information Technology,
Shibo He 、 Jiming Chen 、 Xu Li 、, Xuemin (Sherman) Shen and Youxian Sun State Key Laboratory of Industrial Control Technology, Zhejiang University, China.
Key Establishment Scheme against Storage-Bounded Adversaries in Wireless Sensor Networks Authors: Shi-Chun Tsai, Wen-Guey Tzeng, and Kun-Yi Zhou Source:
Resource Allocation in Hospital Networks Based on Green Cognitive Radios 王冉茵
多媒體網路安全實驗室 Anonymous Authentication Systems Based on Private Information Retrieval Date: Reporter: Chien-Wen Huang 出處: Networked Digital Technologies,
Wireless Network Security CSIS 5857: Encoding and Encryption.
SPEAKER: HONG-JI WEI DATE: Efficient and Secure Anonymous Authentication Scheme with Roaming Used in Mobile Networks.
9.2 SECURE CHANNELS JEJI RAMCHAND VEDULLAPALLI. Content Introduction Authentication Message Integrity and Confidentiality Secure Group Communications.
Efficient Geographic Routing in Multihop Wireless Networks Seungjoon Lee*, Bobby Bhattacharjee*, and Suman Banerjee** *Department of Computer Science University.
Power-Efficient Rendez- vous Schemes for Dense Wireless Sensor Networks En-Yi A. Lin, Jan M. Rabaey Berkeley Wireless Research Center University of California,
Key Generation Protocol in IBC Author : Dhruti Sharma and Devesh Jinwala 論文報告 2015/12/24 董晏彰 1.
CLOUD ENABLED WIRELESS BODY AREA NETWORKS FOR PERVASIVE HEALTHCARE Presents: Roi Peretz Golan Haham
多媒體網路安全實驗室 A Secure Privacy-Preserving Roaming Protocol Based on Hierarchical Identity-Based Encryption for mobile Networks 作者 :Zhiguo Wan,Kui Ren,Bart.
VEHICULAR AD HOC NETWORKS GAURAV KORDE KAPIL SHARMA.
Presented by Edith Ngai MPhil Term 3 Presentation
Boneh-Franklin Identity Based Encryption Scheme
A robust and anonymous patient monitoring system using wireless medical sensor networks Source: Future Generation Computer Systems, Available online 8.
Location Cloaking for Location Safety Protection of Ad Hoc Networks
Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin (Sherman) Shen
Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin (Sherman) Shen
Identity-based secure collaboration in wireless ad hoc networks
Authors:Debiao He, Sherali Zeadally, Neeraj Kumar and Wei Wu
Collaborative Smart House Environment Computer Science Department University of Cyprus Contact: Christodoulou Eleni.
Authors: Yuh-Min TSENG, Tsu-Yang WU, Jui-DiWU
Privacy Protection for E-Health Systems by
Presentation transcript:

1 Secure Handshake with Symptoms-matching: The Essential to the Success of mHealthcare Social Network University of Waterloo & University of Ontario Institute of Technology Rongxing Lu, Xiaodong Lin, Xiaohui Liang and Sherman Shen BodyNets’10 Social Healthcare

2 R. Lu, X. Lin, X. Liang and X. Shen, Secure Handshake with Symptoms-matching: The Essential to the Success of mHealthcare Social Network Outline Introduction – Wireless Body Sensor Network – Mobile Healthcare Social Network Motivation – Privacy Challenges Proposed Secure Handshake Security Analysis Performance Evaluation Conclusions Outline

3 R. Lu, X. Lin, X. Liang and X. Shen, Secure Handshake with Symptoms-matching: The Essential to the Success of mHealthcare Social Network Wireless Body Sensor Network PDA Wireless/Wired eHealthcare center Doctor PHI Body sensor Patient Wireless Body Sensor Network (WBSN), as an emerging network paradigm in eHealthcare system aiming at providing patients with remote and continuous monitoring, has gathered great momentum from not only the governments but also the academia in our aging society.

4 R. Lu, X. Lin, X. Liang and X. Shen, Secure Handshake with Symptoms-matching: The Essential to the Success of mHealthcare Social Network WBSN Classification Based on wheter a patient is in-bed at home/hosptial or mobile outside, eHealthcare system can be divided into two categories: in-bed eHealthcare system and mobile eHealtcare (mHealthcare) system. In this work, we focus on the mHealthcare system. Based on wheter a patient is in-bed at home/hosptial or mobile outside, eHealthcare system can be divided into two categories: in-bed eHealthcare system and mobile eHealtcare (mHealthcare) system. In this work, we focus on the mHealthcare system. In-bed eHealthcare System Mobile eHealthcare System

5 R. Lu, X. Lin, X. Liang and X. Shen, Secure Handshake with Symptoms-matching: The Essential to the Success of mHealthcare Social Network mHealthcare Social Network In mHealthcare system, patient’s PHI is reported to the eHealth center, and only the related medical professionals can read them. At the same time, due to patient’s mobility, patients can often contact with each other in mHealthcare system. If two patients have the same symptom, it is possible for them to share their health condition and experience, provide mutual support and inspiration to each other to eliminate loneliness. This kind of social contact is called mHealthcare social network (MHSN). In mHealthcare system, patient’s PHI is reported to the eHealth center, and only the related medical professionals can read them. At the same time, due to patient’s mobility, patients can often contact with each other in mHealthcare system. If two patients have the same symptom, it is possible for them to share their health condition and experience, provide mutual support and inspiration to each other to eliminate loneliness. This kind of social contact is called mHealthcare social network (MHSN). mHealthcare mHealthcare Social Network

6 R. Lu, X. Lin, X. Liang and X. Shen, Secure Handshake with Symptoms-matching: The Essential to the Success of mHealthcare Social Network Motivation:: Privacy Challenges In our aging society, MHSN is promising and can be accepted by the seniors. However, new security issues arisen from MHSN should be considered: How to securely identify a patient who has the same symptom? How to prevent others who don’t have the same symptom from knowing someone’s symptom? To address these privacy challenges, we proposed a secure same- symptom-based handshake (SSH) scheme, which allows a patient to securely share his PHI with ones who have the same symptom. In our aging society, MHSN is promising and can be accepted by the seniors. However, new security issues arisen from MHSN should be considered: How to securely identify a patient who has the same symptom? How to prevent others who don’t have the same symptom from knowing someone’s symptom? To address these privacy challenges, we proposed a secure same- symptom-based handshake (SSH) scheme, which allows a patient to securely share his PHI with ones who have the same symptom. mHealthcare Social Network Security Privacy Challenges Share PHI, experiences

7 R. Lu, X. Lin, X. Liang and X. Shen, Secure Handshake with Symptoms-matching: The Essential to the Success of mHealthcare Social Network Proposed Secure Handshake When two patient Ui, Uj contact, the necessary conditions for establishing a social relationship based on the same symptom are : Mobility Sociality When Access Point (AP) is available, mobile patient can report the PHI to eHealth center 1: U i is social 0: U i is not social System Model

8 R. Lu, X. Lin, X. Liang and X. Shen, Secure Handshake with Symptoms-matching: The Essential to the Success of mHealthcare Social Network Proposed Secure Handshake Design Goals Patient's real identity should be protected in a MHSN. Patient's PHI should be controlled by patient himself and only shared with ones who have the same symptom. Patient's real identity should be protected in a MHSN. Patient's PHI should be controlled by patient himself and only shared with ones who have the same symptom. Ui Sym(Ui) Pseudo-id Pid_i Private key S_i Sym(Uj) Uj Pseudo-id Pid_j Private key S_j Mutual authentication Establish a shared key

9 R. Lu, X. Lin, X. Liang and X. Shen, Secure Handshake with Symptoms-matching: The Essential to the Success of mHealthcare Social Network Proposed Secure Handshake Design Goals Correctness: When two honest patients Ui, Uj run secure handshake, if soc(Ui)=soc(Uj)=1 and sym(Ui)=sym(Uj), they can always authenticate each other as one who has the same symptom, establish a shared key. Impersonator Resistance: If soc(Ui)=soc(Uj)=1 and sym(Ui)<>sym(Uj), the probability that Ui believes Uj has the same symptom is negligible. Detector Resistance: If soc(Ui)=soc(Uj)=1 and sym(Ui)<>sym(Uj), Uj has no idea on what symptom sym(Ui) that Ui has. Only when a MHSN is reinforced by a secure handshake scheme, it can be widely accepted by the patients and steps into its flourish stage.

10 R. Lu, X. Lin, X. Liang and X. Shen, Secure Handshake with Symptoms-matching: The Essential to the Success of mHealthcare Social Network Proposed Secure Handshake Bilinear Maps Let G be a cyclic additive group by P with a large prime order q, G T be a cyclic multiplicative group with the same order. An admissible bilinear pairing e: G×G-> G T is a map with the following properties: Bilinearity: For all P, Q in G, and any a,b in Zq, we have e(aP, bQ)=e(P,Q) ab Non-degeneracy: There exist P,Q in G such that e(P,Q)≠1 Computability: There is an efficient algorithm to compute e(P,Q) for all P,Q in G. Let G be a cyclic additive group by P with a large prime order q, G T be a cyclic multiplicative group with the same order. An admissible bilinear pairing e: G×G-> G T is a map with the following properties: Bilinearity: For all P, Q in G, and any a,b in Zq, we have e(aP, bQ)=e(P,Q) ab Non-degeneracy: There exist P,Q in G such that e(P,Q)≠1 Computability: There is an efficient algorithm to compute e(P,Q) for all P,Q in G. Sym(Ui)=Ti Ui Master key System Public key System Initialization

11 R. Lu, X. Lin, X. Liang and X. Shen, Secure Handshake with Symptoms-matching: The Essential to the Success of mHealthcare Social Network Proposed Secure Handshake Description If Ti=Tj, i.e., Ui and Uj have the same symptom, they can mutually authenticate each other, and establish a shared key If Ti≠Tj, i.e., Ui and Uj have different symptoms, they cannot authenticate each other or establish a shared key If Ti=Tj, i.e., Ui and Uj have the same symptom, they can mutually authenticate each other, and establish a shared key If Ti≠Tj, i.e., Ui and Uj have different symptoms, they cannot authenticate each other or establish a shared key

12 R. Lu, X. Lin, X. Liang and X. Shen, Secure Handshake with Symptoms-matching: The Essential to the Success of mHealthcare Social Network Security Analysis In the random oracle model, Ni and Nj can be shown semantic security with the provable security technique, which is the base for achieving the impersonator resistant and detector resistant. impersonator resistant detector resistant “fellow sufferers sympathize with each other” in mHealthcare social network

13 R. Lu, X. Lin, X. Liang and X. Shen, Secure Handshake with Symptoms-matching: The Essential to the Success of mHealthcare Social Network Performance Evaluation Scenarios: Since AP is not always available for a patient in mobile environment, those active patients, based on the same-symptom-based social relationship, can also help each other to relay their PHI. As a result, the PHI reporting delay can be reduced. Simulation area performance metric: the average PHI reporting delay (PRD), which is defined as the average time between when a PHI is generated and when it is successfully relayed to the eHealth center (the time to AP ≈ to center in simulation).

14 R. Lu, X. Lin, X. Liang and X. Shen, Secure Handshake with Symptoms-matching: The Essential to the Success of mHealthcare Social Network Performance Evaluation Simulation Result: The average PRD of sociable patients is obviously less than those of unsociable patients. The higher the social ratio ρ, the lower the PRD. These results demonstrate that the MHSN has positive affect on PRD, and can be accepted by the mobile patients.

15 R. Lu, X. Lin, X. Liang and X. Shen, Secure Handshake with Symptoms-matching: The Essential to the Success of mHealthcare Social Network Conclusions In this paper, based on the bilinear pairings, we have proposed an efficient secure handshake scheme for mHealthcare social network (MHSN). Since the proposed secure handshake scheme won’t disclose each other’s symptom information if two patients don’t have same symptom, MHSN can be widely accepted by patients, so that they can enjoy the benefits brought by MHSN, such as eliminating the loneliness in our aging society and collaborative PHI reporting in mobile environment. Thank you!