Table of Contents Author Guidelines Submit a Manuscript
Journal of Electrical and Computer Engineering
Volume 2016, Article ID 1905872, 14 pages
http://dx.doi.org/10.1155/2016/1905872
Research Article

Anticollusion Attack Noninteractive Security Hierarchical Key Agreement Scheme in WHMS

School of Electronic and Information Engineering, Beihang University, Beijing 100191, China

Received 16 February 2016; Accepted 4 May 2016

Academic Editor: Jit S. Mandeep

Copyright © 2016 Kefei Mao et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. V. Custodio, F. J. Herrera, G. López, and J. I. Moreno, “A review on architectures and communications technologies for wearable health-monitoring systems,” Sensors, vol. 12, no. 10, pp. 13907–13946, 2012. View at Publisher · View at Google Scholar · View at Scopus
  2. F. Touati and R. Tabish, “U-healthcare system: state-of-the-art review and challenges,” Journal of Medical Systems, vol. 37, no. 3, pp. 9949–9969, 2013. View at Publisher · View at Google Scholar · View at Scopus
  3. H. F. Rashvand, V. Traver Salcedo, E. Montón Sánchez, and D. Iliescu, “Ubiquitous wireless telemedicine,” IET Communications, vol. 2, no. 2, pp. 237–254, 2008. View at Publisher · View at Google Scholar · View at Scopus
  4. R. Lu, X. Lin, X. Liang, and X. Shen, “A secure handshake scheme with symptoms-matching for mHealthcare social network,” Mobile Networks and Applications, vol. 16, no. 6, pp. 683–694, 2011. View at Publisher · View at Google Scholar · View at Scopus
  5. W. Liu, J. Liu, Q. Wu, W. Susilo, H. Deng, and B. Qin, “SAKE: scalable authenticated key exchange for mobile e-health networks,” Security and Communication Networks, 2015. View at Publisher · View at Google Scholar · View at Scopus
  6. X. Lin, R. Lu, X. S. Shen, Y. Nemoto, and N. Kato, “SAGE: a strong privacy-preserving scheme against global eavesdropping for ehealth systems,” IEEE Journal on Selected Areas in Communications, vol. 27, no. 4, pp. 365–378, 2009. View at Publisher · View at Google Scholar · View at Scopus
  7. Q. Huang, X. Yang, and S. Li, “Identity authentication and context privacy preservation in wireless health monitoring,” International Journal of Computer Network and Information Security, vol. 4, pp. 53–60, 2011. View at Google Scholar
  8. H. Kim, “Freshness-preserving non-interactive hierarchical key agreement protocol over WHMS,” Sensors, vol. 14, no. 12, pp. 23742–23757, 2014. View at Publisher · View at Google Scholar · View at Scopus
  9. D.-C. Lou, T.-F. Lee, and T.-H. Lin, “Efficient biometric authenticated key agreements based on extended chaotic maps for telecare medicine information systems,” Journal of Medical Systems, vol. 39, no. 5, pp. 58–68, 2015. View at Publisher · View at Google Scholar · View at Scopus
  10. S. H. Erfani, H. H. S. Javadi, and A. M. Rahmani, “A dynamic key management scheme for dynamic wireless sensor networks,” Security and Communication Networks, vol. 8, no. 6, pp. 1040–1049, 2015. View at Publisher · View at Google Scholar · View at Scopus
  11. R. Gennaro, S. Halevi, H. Krawczyk, T. Rabin, S. Reidt, and S. D. Wolthusen, “Strongly-resilient and non-interactive hierarchical key-agreement in MANETs,” in Proceedings of the 13th European Symposium on Research in Computer Security (ESORICS '08), pp. 49–65, Málaga, Spain, October 2008.
  12. R. Dupont and A. Enge, “Provably secure non-interactive key distribution based on pairings,” Discrete Applied Mathematics, vol. 154, no. 2, pp. 270–276, 2006. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  13. Y. Yang, “Broadcast encryption based non-interactive key distribution in MANETs,” Journal of Computer and System Sciences, vol. 80, no. 3, pp. 533–545, 2014. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  14. H. Guo, Y. Mu, Z. Li, and X. Zhang, “An efficient and non-interactive hierarchical key agreement protocol,” Computers and Security, vol. 30, no. 1, pp. 28–34, 2011. View at Publisher · View at Google Scholar · View at Scopus
  15. Chad Garland. Cedars-Sinai reports possible breach of patients' medical data, June 2015, http://www.latimes.com/business/la-fi-cedars-breach-20140823-story.html.
  16. M. Bellare and P. Rogaway, “Entity authentication and key distribution,” in Advances in Cryptology— CRYPTO '93, D. R. Stinson, Ed., vol. 773 of Lecture Notes in Computer Science, pp. 232–249, Springer, New York, NY, USA, 1994. View at Publisher · View at Google Scholar
  17. D. Boneh and M. Franklin, “Identity-based encryption from the Weil pairing,” SIAM Journal on Computing, vol. 32, no. 3, pp. 586–615, 2003. View at Publisher · View at Google Scholar · View at Scopus
  18. D. Hankerson and A. Menezes, “Elliptic curve discrete logarithm problem,” in Encyclopedia of Cryptography and Security, C. A. Van Tilborg and S. Jajodia, Eds., pp. 397–400, Springer US, 2011. View at Google Scholar
  19. A. De Caro and V. Iovino, “jPBC: Java pairing based cryptography,” in Proceedings of the 16th IEEE Symposium on Computers and Communications (ISCC '11), pp. 850–855, IEEE, Kerkyra, Greece, July 2011. View at Publisher · View at Google Scholar · View at Scopus