An ECC Based Secure and Convenient Rural Medical Care System
As hardware and software technologies have rapidly developed over recent years, many services and applications integrating these technologies into daily life have come to form the Internet of Things. At the same time, medical care requirements also raise rapidly. Governments formulate policies in order to respond the health-care requirements, one of these issues is rural medical care requirement. In recent years, the government has provided patrolling medical vehicle services to take care of residents in these remote areas. On the other hand, due to the rapid development of human physiological sensoring devices, residents with chronic diseases or those who need long-term monitoring of physiological conditions can wear these physiological sensoring devices, and these sensoring data can be provided to rural medical vehicles, so that doctors can diagnose symptoms. For residents with complicated or severe conditions, they can go to large hospitals in the urban areas for further diagnosis and treatment. However, a great deal of the information transmitted during these process are sensitive data, and must therefore be protected with security protocols. This paper proposes an ECC based secure and convenience rural medical care system. The proposed scheme provides mutual authentication, and guaranteeing data integrity, user untraceability and forward and backward secrecy, in addition to being resistant to replay attack.
KeywordsSensor network Rural medical vehicle Health-care Mutual authentication Privacy Untraceability
- 2.Chiuchisan I, Dimian M (2015) Internet of things for e-health: an approach to medical applications. In: IEEE international workshop on computational intelligence for multimedia understanding (IWCIM), pp 1–5Google Scholar
- 3.Khemissa H, Tandjaoui D (2015) A lightweight authentication scheme for e-health applications in the context of internet of things. In: International conference on next generation mobile applications, services and technologies, pp 90–95Google Scholar
- 4.Yang Y, Ma M (2016) Conjunctive keyword search with designated tester and timing enabled proxy re-encryption function for e-health clouds. IEEE Trans Inf Forensics Secur 11:746–759Google Scholar