题名

適用於5G智慧救護車之植基於切比雪夫混沌映射聯合匿名身分管理協定

并列篇名

Federal Anonymous Identity Management for 5G-Based Smart Ambulance based on Chebyshev Chaotic Maps

作者

林子煒(Tzu-Wei Lin)

关键词

5G網路 ; 物聯網 ; 緊急醫療照護系統 ; 智慧救護車 ; 聯合匿名身分管理 ; 5G ; IoT ; Emergency Medical System ; Smart Ambulance ; Federal Anonymous Identity Management

期刊名称

資訊安全通訊

卷期/出版年月

28卷4期(2022 / 11 / 01)

页次

1 - 15

内容语文

繁體中文

中文摘要

5G網路為最新的行動通訊標準,而5G網路與物聯網結合,可提供即時、隨選、隨時連結、可重組計算的網路應用服務,而5G-IoT環境已被視為下個世代的智慧醫療健康照護的重要元素。緊急醫療照護系統已成為所有專業都在一台救護車裡的複雜系統,需要在第一時間對病患進行及時處置與反應,並在病患到院前與目的醫院聯繫,以便病患到院時可以接受即時的適當處置。醫療資料隱私,包含病患的身分,是醫療健康照護系統中至關重要的議題之一,一旦遭到破壞,不僅造成醫療院所的損失,還會對病患造成難以估計的損害。本研究設計一個適用於5G智慧救護車的聯合匿名身分管理協定,不僅可以允許救護車與目的醫院間安全地傳輸資料,亦可藉由匿名機制保護病患身分。

英文摘要

5G is the newest mobile communication standard, and 5G can be applied in Internet of Things environment to provide real time, on-demand, linkable, and re-computable applications. 5G-IoT has become one of the important parts of next generation smart medical healthcare services. Emergency medical system (EMS) has already become a complex system which content all professionals in an ambulance. EMS is required to take immediately reaction and response to patients at accident cites, and EMS staff has to communicate with destinate hospital while transporting patients. By doing so, patients can have proper treatment once arriving destination hospital. Privacy of medical data, including patients' personal data, is an important issue in medical healthcare system. Otherwise, damage to hospital and patient will be caused seriously if privacy is compromised. This paper designs a federal anonymous identity management for 5G-based smart ambulance based on Chebyshev chaotic maps which provides secure communication between ambulance and destination hospital and privacy preservation of patients' identity through anonymity mechanism.

主题分类 基礎與應用科學 > 資訊科學
参考文献
  1. Ahad, A.,Tahir, M.,Yau, K.L.A.(2019).5G-based smart healthcare network: architecture, taxonomy, challenges and future research directions.IEEE Access,7,100747-100762.
  2. Al Shareeda, M.,Khalil, A.,Fahs, W.(2019).Realistic heterogeneous genetic-based RSU placement solution for V2I networks.International Arab Journal of Information Technology,16(3A),540-547.
  3. Alshudukhi, J.S.,Al-Mekhlafi, Z.G.,Mohammed, B.A.(2019).A lightweight authentication with privacy-preserving scheme for vehicular ad hoc networks based on elliptic curve cryptography.IEEE Access,9,15633-15642.
  4. Anwar, S.,Prasad, R.(2018).Framework for future telemedicine planning and infrastructure using 5G technology.Wireless Personal Communications,100(1),193-208.
  5. Chettri, L.,Bera, R.(2020).a comprehensive survey on Internet of things (IoT) toward 5G wireless systems.IEEE Internet of Things Journal,7(1),16-32.
  6. EMS Agenda 2050 Technical Expert Panel(2019).,Washington, DC:National Highway Traffic Safety Administration.
  7. Fremantle, P.,Aziz, B.(2018).Cloud-based federated identity for the Internet of Things.Annales des Telecommunications/Annals of Telecommunications,73(7-8),415-427.
  8. Gentry, C.,Silverberg, A.(2002).Hierarchical ID-based cryptography.8th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2002),New Zealand:
  9. Haq, I.U.,Wang, J.,Zhu, Y.(2020).Secure two-factor lightweight authentication protocol using self-certified public key cryptography for multi-server 5G networks.Journal of Network and Computer Applications,161
  10. Kocarev, L.(2001).Chaos-based cryptography: a brief overview.IEEE Circuits and Systems Magazine,1(3),6-21.
  11. Kocarev, L.,Lian, S.(2011).Chaos-Based Cryptography: Theory, Algorithms and Applications.Germany (Berlin/Heidelberg):Springer.
  12. Leaby, A.K.,Yassin, A.,Hasson, M.,Rashid, A.(2021).Towards design strong emergency and COVID-19 authentication scheme in VANET.Indonesian Journal of Electrical Engineering and Computer Science,21(3),1808-1819.
  13. Lee, T.F.,Hsiao, C.H.,Hwang, S.H.,Lin, T.H.(2017).Enhanced smartcard-based password-authenticated key agreement using extended chaotic maps.PLoS ONE,12(7)
  14. Lin, H.Y.(2015).Improved chaotic maps-based password-authenticated key agreement using smart cards.Communications in Nonlinear Science and Numerical Simulation,20(2),482-488.
  15. Mukhopadhyay, A.,Sreekumar, S.,Xavier, B.,Suraj, M.(2019).A cloud-based smartphone solution for transmitting bio-signals from an emergency response vehicle.International Journal of E-Health and Medical Communications,10(3),22-38.
  16. Office of the National Coordinator for Health Information Technology, “Emergency medical services (EMS) data integration to optimize patient care: an overview of the search, alert, file, reconcile (SAFR) model of health information exchange,” URL: https://www.healthit.gov/sites/default/files/emr_safer_knowledge_product_final.pdf (存取時間: 2022/04/23).
  17. Park, Y.,Sur, C.,Rhee, K.H.(2011).A privacy-preserving location assurance protocol for location-aware services in VANETs.Wireless Personal Communications,61(4),779-791.
  18. Santos, M.L.B.A.,Carneiro, J.C.,Franco, A.M.R.,Teixeira, F.A.,Henriques, M.A.A.,Oliveira, L.B.(2020).FLAT: federated lightweight authentication for the Internet of Things.Ad Hoc Networks,107
  19. Shamir, A.(1985).Identity-based cryptosystems and signature schemes.Annual International Cryptology Conference (CRYPTO 1984),United States (Santa Barbara):
  20. Shen, V.R.L.,Huang, W.C.(2015).A time-bound and hierarchical key management scheme for secure multicast systems.Wireless Personal Communications,85(4),1741-1764.
  21. Solev, D.,Janjic, P.,Kocarev, L.(2011).Introduction to chaos.Studies in Computational Intelligence,354,1-25.
  22. Yan, L.,Rong, C.,Zhao, G.(2009).Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography.1st International Conference on Cloud Computing (CloudCom 2009),China (Beijing):
  23. Ying, B.,Nayak, A.(2019).Lightweight remote user authentication protocol for multi-server 5G networks using self-certified public key cryptography.Journal of Network and Computer Applications,131,66-74.
  24. Yoon, E.J.,Jeon, I.S.(2011).An efficient and secure Diffie-Hellman key agreement protocol based on Chebyshev chaotic map.Communications in Nonlinear Science and Numerical Simulation,16(6),2383-2389.
  25. Yoon, E.J.,Yoo, K.Y.(2011).Cryptanalysis of group key agreement protocol based on chaotic hash function.IEICE Transactions on Information and Systems,E94(11),2167-2170.
  26. Zhang, L.(2008).Cryptanalysis of the public key encryption based on multiple chaotic systems.Chaos, Solitons and Fractals,37(3),669-674.
  27. 中田孝明、織田成人、羽石秀昭、山尾恭生、鈴木哲也、近藤針次(2017)。實現及時正確急救醫療之智慧急救系統及裝置開發(早く正しい救急医療実現のためのスマートな救急情報システム・装置の開発)。第 26 次全國急救隊員論壇