Browse > Article
http://dx.doi.org/10.14400/JDC.2019.17.2.187

Cryptanalysis and Solution on Secure Communication Scheme for Healthcare System using Wearable Devices  

Choi, Hae-Won (Department of Innovation Management, DGIST)
Kim, Sangjin (Department of Aerospace & Industrial Computing Security, Kyungwoon University)
Ryoo, Myungchun (Department of Aerospace & Industrial Computing Security, Kyungwoon University)
Publication Information
Journal of Digital Convergence / v.17, no.2, 2019 , pp. 187-194 More about this Journal
Abstract
A security company has been proposed for various healthcare systems. However, there are improvements in order to achieve better efficiency and stability in the various protocols presented. The purpose of this paper is to provide cryptanalysis and solution on Vijayakumar et al.'s secure communication scheme for healthcare system using wearable devices. Especially, it is weak against denial of service attack and it does not provide integrity of the transmitted messages. Thereby, this paper proposes a new secure communication scheme to cope from the problems in Vijayakumar et al.'s scheme. It provides authentication and integrity, which could be the security solution against Vijayakumar et al.'s scheme. Furthermore, it also provides a good computational overhead compared to Vijayakumar et al.'s scheme.
Keywords
Healthcare security; Information security; Wireless communication security; Secure communication; Privacy;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 H. Kim, E. K. Ryu & S. W. Lee. (2011). Security Considerations on Cognitive Radio based on Body Area Networks for u-Healthcare. Journal of Security Engineering, 10(1), 9-20.
2 S. Y. Mun, Y. M. Yun, T. H. Han, S. E. Lee, H. J. Chang, S. Y. Song & H. C. Kim. (2017). Public Awareness of Digital Healthcare Services. Journal of Digital Convergence, 15(4), 621-629.
3 J. E. Song, S. H. Kim, M. A. Chung & K. I, Chung. (2007). Security issues and its technology trends in u-Healthcare. Electronics and Telecommunications Trends, 22(1), 119-129.
4 T. M. Song & S. H. Jang. (2011). u-Healthcare : Issue and Research Trends. Korea Institute for Health and Social Affairs, 119-129.
5 C. B. Roh & J. B. Song. (2015). Hybrid Healch Care System Designs in a Wireless Network Environment, Journal of Digital Convergence, 13(3), 457-462.   DOI
6 J. E. Yoon & C. J. Suh. (2018). Research Trend Analysis on Smart Healthcare by using Topic Modeling and Ego Network Analysis. Journal of Digital Convergence, 16(5), 981-993.
7 L. Mark & F. John. (2011). Remote control of medical devices using instant messaging infrastructure. U.S. Patent CA2718696 A1, Dec. 8.
8 S. B. Othman & A. Trad. H. (2014). Youssef, Security artchitecture for at-home medical care using wireless sensor network, Proc. of International conference on wireless communications and mobile computing conference 2014, 304-309.
9 S. Syms & A. D. Kumar. (2016). Secured WBANs for pervasive m-healthcare social networks. Proc. of 10th International Conference on Intelligent Systems and Control.
10 S. Han, S. Q. Li, C. H. Ju & W. Zhou. (2016). PPM-HDA:Privacy-preserving and multifuntional health data aggregation with fault tolerance, IEEE Transactions on Information Forensics and Security, 11(9), 1940-1955.   DOI
11 J. Liu, Z. Zhang & K. S. Kwak. (2014). Certificateless remote anonymous authentication schemes for wireless body area networks. IEEE Transactions on Parallel and Distributed Systems, 25(2), 332-342.   DOI
12 P. Vijayakumar, P. Pandiaraja, M. Kaaruppiah & L. J. Deborah. (2017). An efficient secure communication for healthcare system using wearable devices. Computers and Electrical Engineering, 63, 232-245.   DOI
13 Wikipedia, Denial of service attack, https://ko.wikipedia.org/wiki/Denialofserviceattack.
14 Wikipedia. Data integrity, https://ko.wikipedia.org/wiki/Dataintegrity.
15 F. Wu, L. Xu, S. Kumari, X. Li, A. K. Das, M. K. Khan, M. Karuppiah & R. Baliyan. (2016). A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks. Security and Communication Networks, 9, 3527-2542.   DOI