Skip to main content

A Secure Privacy Data Transmission Method for Medical Internet of Things

  • Conference paper
  • First Online:
Book cover Industrial IoT Technologies and Applications (Industrial IoT 2016)

Abstract

With the improvement of people’s living level and the rapid development of information, people put forward higher requirements for medical standard. Effective combination between traditional medical system and modern communication technologies promotes the medical level more intelligent. The medical system involves a large number of data, which contains all kinds of information. Therefore, the patient’s information is facing the risk of data leakage and privacy information destruction in the transmission process. In order to effectively protect the patient’s privacy information, this paper presents a secure data transmission method for privacy data of Medical Internet of Things in three aspects: the transmission model of medical data, the registration authentication and key agreement between the Gateway-node and the Server, and Multi-path transmission mechanism. The theoretical analysis shows that the transmission model could effectively ensure the security of the patient’s privacy information.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Gao, M., Zhang, Q., Ni, L., et al.: Cardiosentinal: a 24-hour heart care and monitoring system. J. Comput. Sci. Eng. 6(1), 67–78 (2012)

    Article  Google Scholar 

  2. Zhang, J., Chen, D., Zhao, J., et al.: RASS: a portable real-time automatic sleep scoring system. In: 2013 IEEE 34th Real-Time Systems Symposium (2012)

    Google Scholar 

  3. Mni, L., Zhang, Q., Tan, H.Y., et al.: Smart healthcare: from IoT to cloud computing. Scientia Sinica 43(4), 515–528 (2013)

    Google Scholar 

  4. Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)

    Article  MATH  Google Scholar 

  5. Medaglia, C.M., Serbanati, A.: An overview of privacy and security issues in the internet of things. In: Internet of Things, pp. 389–395 (2009)

    Google Scholar 

  6. Ning, H.S., Xu, Q.Y.: Research on global internet of things developments and its lonstruction in China. Acta Electronica sinica 38(11), 2590–2599 (2010)

    Google Scholar 

  7. Wu, Z.Q., Zhou, Y.W., Ma, J.F.: A secure transmission model for internet of things. Chin. J. Comput. 34(8), 1351–1364 (2011)

    Article  Google Scholar 

  8. Du, W., Deng, J., Han, Y.S.: A pairwise key pre-distribution scheme for wireless sensor networks. In: CCS 2003 Proceedings of the 10th ACM Conference on Computer and Communications Security, vol. 8, issue: 2, pp. 42–51 (2003)

    Google Scholar 

  9. Song, Z., Zhang, Y., Wu, C.: A reliable transmission scheme for security and protection system based on Internet of Things. In: International Conference on Communication Technology & Application IET Digital Library (2011)

    Google Scholar 

  10. Lamport, L.: Password authentication with insecure communication. Commun. ACM 24(11), 770–772 (1981)

    Article  MathSciNet  Google Scholar 

  11. Kothmayr, T., Schmitt, C., Hu, W., et al.: A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication. In: IEEE Conference on Local Computer Networks Workshops, vol. 90, issue: 1, pp. 956–963 (2012)

    Google Scholar 

  12. Groce, A., Katz, J.: A new framework for efficient password-based authenticated key exchange. In: Proceedings of the 17th ACM Conference on Computer and Communications Security ACM (2010)

    Google Scholar 

  13. Hwang, J., Yeh, T.: Improvement on Peyravian-Zunics password authentication schemes. IEICE Trans. Commun. 85(4), 823–825 (2002)

    Google Scholar 

  14. Wang, B., Zhang, H., Wang, Z., et al.: A secure mutual password authentication scheme with user anonymity. Geomatics Inf. Sci. Wuhan Univ. 33(10), 1073–1075 (2008)

    Google Scholar 

  15. Peyravian, M., Jeffries, C.: Secure remote user access over insecure networks. Comput. Commun. 29(5), 660–667 (2006)

    Article  Google Scholar 

  16. Ma, W.J.: Research and Application on Security Authentication Technologies in Internet of Things. Shandong University (2011)

    Google Scholar 

  17. Xie, W.J.: A Secure Communication Scheme based on Multipath Transportation for the Internet of Things. South China University of Technology (2013)

    Google Scholar 

Download references

Acknowledgements

The authors would like to thank our colleagues and students in Engineering Technology Research Center of Network and Information Security at Anhui Normal University, in particular, Yonglong Luo, Xuemei Qi and Yunxiang Sun. We thank National Natural Science Foundation of China under Grant No. 61572036, University Natural Science Research Project of Anhui Province under Grant No. KJ2014A084, Wuhu City Science and Technology Project under Grant No. 2014cxy04, and Anhui Normal University Postdoctoral Project under Grant No. 161-071214 for support of this research.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fulong Chen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Ye, H., Yang, J., Zhu, J., Zhang, Z., Huang, Y., Chen, F. (2016). A Secure Privacy Data Transmission Method for Medical Internet of Things. In: Wan, J., Humar, I., Zhang, D. (eds) Industrial IoT Technologies and Applications. Industrial IoT 2016. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 173. Springer, Cham. https://doi.org/10.1007/978-3-319-44350-8_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-44350-8_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-44349-2

  • Online ISBN: 978-3-319-44350-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics