DOI QR코드

DOI QR Code

A Secure Key Exchange Protocol Using Smart Devices for U-healthcare Services

U-헬스케어 서비스에서 스마트 기기들을 활용한 안전한 키 교환 프로토콜

  • 박설하 (이화여자대학교 컴퓨터공학과) ;
  • 서승현 (한양대학교 공학대학 전자공학부) ;
  • 이상호 (이화여자대학교 컴퓨터공학과)
  • Received : 2016.08.31
  • Accepted : 2016.11.29
  • Published : 2017.03.15

Abstract

Due to the recent developments of various smart devices, U-healthcare services using these appliances has increased. However, the security of U-healthcare services is a very important issue since healthcare services contain highly sensitive and private personal health information. In order to handle the security issues, the functionality of encrypting medical information must be provided, and an encryption key exchange method is necessary. In this paper, we propose a key exchange protocol by utilizing smart devices for secure U-healthcare services. The proposed protocol has been designed based on the elliptic curve based public key cryptography, providing high level security for smart devices by using short keys. Moreover, in order to strengthen user authentication and security, a smart watch is used as a complementary device, whenever the key exchange protocol is performed.

다양한 스마트기기들의 발달로, 최근 들어 스마트기기를 이용한 U-헬스케어 관련 서비스들이 증가하고 있다. 하지만 U-헬스케어 서비스는 민감한 개인의 건강 정보를 다루는 것이기 때문에 정보보안이 매우 중요하다. 정보보안 이슈를 해결하기 위해서는 의료정보에 대한 암호화 기능이 기본적으로 제공되어야 하며, 이를 위한 암호키 교환 방법이 필요하다. 따라서 본 논문에서는 스마트 기기들을 활용하여 안전한 U-헬스케어 서비스를 위한 키 교환 프로토콜을 제안한다. 제안하는 프로토콜은 스마트 기기들에 적합하도록 비교적 짧은 키 길이로 높은 보안성을 제공하는 타원곡선 기반의 공개키 암호방식을 기반으로 설계 되었다. 또한, 키 교환 프로토콜을 수행할 때, 스마트워치를 보조 기기로 활용함으로써 사용자 인증을 강화하고 보안성을 높였다.

Keywords

Acknowledgement

Supported by : 한국연구재단

References

  1. Y. Yang and M. Kim, "A Study on Behavioral Intention on u-Health using Health Promotion Model," Journal of the Korea Institute of Information and Communication Engineering, Vol. 19, No. 3, pp. 747-755, Mar. 2015. https://doi.org/10.6109/jkiice.2015.19.3.747
  2. Y. Kim, H. Lee, H. Park, S. Lee, T. Kang and J. Moon, "Trends and Prospect of u-Healthcare Device Industry," Proc. of the Korean Society of Precision Engineering Conference, pp. 172-173, Jul. 2015.
  3. B. Lee, Y. Jeong, S. Lee, "Design of Personal Information Security Model in U-Healthcare Service Environment," Journal of the Korea Society of Computer and Information, Vol. 16, No. 11, pp. 189-200, 2011. https://doi.org/10.9708/jksci.2011.16.11.189
  4. H. Kim, E. Ryu, S. Lee, "Security Considerations on Cognitive Radio based on Body Area networks for u-Healthcare," Journal of Security Engineering, Vol. 10, No. 1, pp. 9-20, Feb. 2013.
  5. M. Sarvabhatla and C. S. Vorugunti, "An energy efficient mutual authentication scheme for secure data exchange in health-care applications using wireless body sensor network," 2015 7th International Conference on Communication Systems and Networks (COMSNETS), pp. 1-6, 2015.
  6. D. He, N. Kumar and N. Chilamkurti, "A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks," Information Sciences, Vol. 321, pp. 263-277, 2015. https://doi.org/10.1016/j.ins.2015.02.010
  7. E. Yoon and K. Yoo, "A biometric-based authenticated key agreement scheme using ECC for wireless sensor networks," Proc. of the 29th Annual ACM Symposium on Applied Computing, pp. 699-705, Mar. 2015.
  8. D. He, Y. Zhang and J. Chen, "Robust Biometric-Based User Authentication Scheme for Wireless Sensor Networks," IACR Cryptology ePrint Archive 2012, Vol. 203, 2012.
  9. D. Brown, SEC 2: Recommended Elliptic Curve Domain Parameters, 2nd Ed., pp.3-11, Certicom, 2010.