Table of Contents Author Guidelines Submit a Manuscript
Journal of Sensors
Volume 2017 (2017), Article ID 7862842, 14 pages
https://doi.org/10.1155/2017/7862842
Research Article

Data Transmission and Access Protection of Community Medical Internet of Things

1Department of Information Service, Anhui Institute of International Business, Hefei, Anhui 230000, China
2Engineering Technology Research Center of Network and Information Security, Anhui Normal University, Wuhu, Anhui 241002, China

Correspondence should be addressed to Fulong Chen; moc.liamg@gnolufnehc

Received 9 October 2016; Revised 8 January 2017; Accepted 12 February 2017; Published 13 April 2017

Academic Editor: Wei Li

Copyright © 2017 Xunbao Wang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. M. Gao, Q. Zhang, L. Ni, Y. Liu, and X. Tang, “CardioSentinal: a 24-hour heart care and monitoring system,” Journal of Computing Science & Engineering, vol. 6, no. 1, pp. 67–78, 2012. View at Publisher · View at Google Scholar
  2. J. Zhang, D. Chen, J. Zhao et al., “RASS: a portable real-time automatic sleep scoring system,” in Proceedings of the IEEE 34th Real-Time Systems Symposium, pp. 105–114, San Juan, Puerto Rico, USA, December 2012.
  3. M. Chen, Y. Zhang, Y. Li, M. M. Hassan, and A. Alamri, “AIWAC: affective interaction through wearable computing and cloud technology,” IEEE Wireless Communications, vol. 22, no. 1, pp. 20–27, 2015. View at Publisher · View at Google Scholar · View at Scopus
  4. Y. Zhang, M. Chen, D. Huang, D. Wu, and Y. Li, “IDoctor: personalized and professionalized medical recommendations based on hybrid matrix factorization,” Future Generation Computer Systems, vol. 66, pp. 30–35, 2017. View at Publisher · View at Google Scholar · View at Scopus
  5. J. Wan, C. Zou, S. Ullah, C.-F. Lai, M. Zhou, and X. Wang, “Cloud-enabled wireless body area networks for pervasive healthcare,” IEEE Network, vol. 27, no. 5, pp. 56–61, 2013. View at Publisher · View at Google Scholar · View at Scopus
  6. Y. Ma, Y. Zhang, J. Wan, D. Zhang, and N. Pan, “Robot and cloud-assisted multi-modal healthcare system,” Cluster Computing, vol. 18, no. 3, pp. 1295–1306, 2015. View at Publisher · View at Google Scholar · View at Scopus
  7. M. M. Hassan, K. Lin, X. Yue, and J. Wan, “A multimedia healthcare data sharing approach through cloud-based body area network,” Future Generation Computer Systems, vol. 66, pp. 48–58, 2017. View at Publisher · View at Google Scholar · View at Scopus
  8. L. Mni, Q. Zhang, H. Y. Tan et al., “Smart healthcare: from IoT to cloud computing,” Scientia Sinica, vol. 43, no. 4, pp. 515–528, 2013. View at Google Scholar
  9. M. Chen, Y. Qian, S. Mao, W. Tang, and X. Yang, “Software-defined mobile networks security,” Mobile Networks and Applications, vol. 21, no. 5, pp. 729–743, 2016. View at Publisher · View at Google Scholar
  10. Q. Jing, A. V. Vasilakos, J. Wan, J. Lu, and D. Qiu, “Security of the internet of things: perspectives and challenges,” Wireless Networks, vol. 20, no. 8, pp. 2481–2501, 2014. View at Publisher · View at Google Scholar · View at Scopus
  11. J.-J. Hwang and T.-C. Yeh, “Improvement on Peyravian-Zunic's password authentication schemes,” IEICE Transactions on Communications, vol. 85, no. 4, pp. 823–825, 2002. View at Google Scholar · View at Scopus
  12. M. Peyravian and C. Jeffries, “Secure remote user access over insecure networks,” Computer Communications, vol. 29, no. 5, pp. 660–667, 2006. View at Publisher · View at Google Scholar · View at Scopus
  13. B. Wang, H. Zhang, Z. Wang, and Y. Wang, “Secure mutual password authentication scheme with user anonymity,” Geomatics and Information Science of Wuhan University, vol. 33, no. 10, pp. 1073–1075, 2008. View at Google Scholar · View at Scopus
  14. W. J. Xie, “A Secure Communication Scheme based on Multipath Transportation for the Internet of Things,” South China University of Technology, Guangzhou, China, 2013.
  15. H.-S. Ning and Q.-Y. Xu, “Research on global Internet of Things' developments and it's construction in China,” Acta Electronica Sinica, vol. 38, no. 11, pp. 2590–2599, 2010. View at Google Scholar · View at Scopus
  16. L. Lamport, “Password authentication with insecure communication,” Communications of the ACM, vol. 24, no. 11, pp. 770–772, 1981. View at Publisher · View at Google Scholar · View at Scopus
  17. Z. Ding, J. Li, and B. Feng, “Research on hash-based RFID security authentication protocol,” Computer Research and Development, vol. 46, no. 4, pp. 583–592, 2009. View at Google Scholar · View at Scopus
  18. T. Maeda, K. Sato, Y. Muraoka et al., “RFID system and RFID tag,” U.S. Patent 8274367, 2012.
  19. Z.-Q. Wu, Y.-W. Zhou, and J.-F. Ma, “A security transmission model for internet of things,” Chinese Journal of Computers, vol. 34, no. 8, pp. 1351–1364, 2011. View at Publisher · View at Google Scholar · View at Scopus
  20. Z. Song, Y. Zhang, and C. Wu, “A reliable transmission scheme for security and protection system based on internet of things,” in Proceedings of the IET International Conference on Communication Technology and Application (ICCTA '11), pp. 806–810, October 2011. View at Scopus
  21. Y. U. Yong-Hong and W. Y. Bai, “Enforcing data privacy and user privacy over outsourced database service,” Application Research of Computers, vol. 6, no. 3, pp. 404–412, 2011. View at Google Scholar
  22. Z. Hong, Research on Electronic Health Records of Community Residents, Fudan University, 2008.
  23. K. K. Venkatasubramanian, A. Banerjee, and S. K. S. Gupta, “PSKA: usable and secure key agreement scheme for body area networks,” IEEE Transactions on Information Technology in Biomedicine, vol. 14, no. 1, pp. 60–68, 2010. View at Publisher · View at Google Scholar · View at Scopus
  24. L. Atzori, A. Iera, and G. Morabito, “The internet of things: a survey,” Computer Networks, vol. 54, no. 15, pp. 2787–2805, 2010. View at Publisher · View at Google Scholar · View at Scopus
  25. C. Medaglia and A. Serbanati, “An overview of privacy and security issues in the internet of things,” in Proceedings of the 20th Tyrrhenian Workshop on Digital Communications, pp. 389–395, Sardinia, Italy, September 2009.
  26. C. Wu, “An overview on the security techniques and challenges of the internet of things,” Journal of Cryptologic Research, vol. 2, no. 1, pp. 40–53, 2015. View at Google Scholar
  27. W. Du, J. Deng, Y. S. Han et al., “A Pairwise key pre-distribution scheme forwireless sensor networks,” in Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03), pp. 42–51, Washington, DC, USA, 2003.
  28. T. Kothmayr, C. Schmitt, W. Hu, M. Brunig, and G. Carle, “A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication,” in Proceedings of the IEEE 37th Conference on Local Computer Networks Workshops (LCN '12), pp. 956–963, October 2012. View at Publisher · View at Google Scholar · View at Scopus
  29. A. Groce and J. Katz, “A new framework for efficient password-based authenticated key exchange,” in Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS '10), pp. 516–525, ACM, Chicago, Ill, USA, October 2010. View at Publisher · View at Google Scholar · View at Scopus
  30. S. Forsström, T. Kanter, and P. Österberg, “Ubiquitous secure interactions with intelligent artifacts on the internet-of-things,” in Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom '12), pp. 1520–1524, June 2012. View at Publisher · View at Google Scholar · View at Scopus
  31. H. Ye, J. Yang, J. Zhu et al., “A secure privacy data transmission method for medical internet of things,” in Proceedings of the Industrial IoT Technologies and Applications, pp. 144–154, March 2016.
  32. M. Pirretti, P. Traynor, P. McDaniel, and B. Waters, “Secure attribute-based systems,” in Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS '06), pp. 99–112, Alexandria, Va, USA, October-November 2006. View at Publisher · View at Google Scholar · View at Scopus
  33. J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attribute-based encryption,” in Proceedings of the IEEE Symposium on Security and Privacy, pp. 321–334, May 2007.
  34. S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving secure, scalable, and fine-grained data access control in cloud computing,” in Proceedings of the 29th conference on Information communications (INFOCOM '10), pp. 534–542, San Diego, Calif, USA, March 2010.
  35. T. Yuen, S. M. Chow, Y. Zhang et al., “Identity-based encryption resilient to continual auxiliary leakage,” in Proceedings of the 31st Annual International Conference on Theory and Applications of Cryptographic Techniques, pp. 117–134, April 2012.
  36. F. Beato, S. Meul, and B. Preneel, “Practical identity-based private sharing for online social networks,” Computer Communications, vol. 73, pp. 243–250, 2016. View at Publisher · View at Google Scholar · View at Scopus