计算机科学 ›› 2016, Vol. 43 ›› Issue (Z6): 365-369.doi: 10.11896/j.issn.1002-137X.2016.6A.087

• 信息安全 • 上一篇    下一篇

可穿戴医疗设备的安全方法研究

张彩霞,王向东   

  1. 佛山科学技术学院自动化系 佛山528000,佛山科学技术学院自动化系 佛山528000
  • 出版日期:2018-11-14 发布日期:2018-11-14
  • 基金资助:
    本文受广东省自然科学基金(2014A030313619,S2013010014485),广东省教育厅项目(2014KTSCX150,2014KZDXM063),广东省科技计划(2013B020314020)资助

Research on Safety Method of Wearable Medical Devices

ZHANG Cai-xia and WANG Xiang-dong   

  • Online:2018-11-14 Published:2018-11-14

摘要: 针对可穿戴医疗设备应用中所存在的隐私保护和安全问题,在分析了已有生物密钥和量子密钥的优缺点的基础上,给出了将两者结合并用于可穿戴医疗设备安全保护中的思路;针对可穿戴医疗设备组成的异构网络的数据安全传输问题,在分析已有的密钥预分配方案的基础上,提出将其应用于可穿戴医疗设备构成的动态、异构网络中,为解决可穿戴医疗设备数据安全传输提供理论和技术基础。

关键词: 可穿戴医疗设备,量子密钥,生物密钥,异构网络

Abstract: This paper researched on the security issues of wearable medical device,analyzed the strengths and weaknesses of biological key and quantum key,and gave an idea to protect wearable medical devices using both biological key and quantum key.Mereover,this paper researched on the security transmission of heterogeneous network composed by wearable medical devices.Based on the analysis of existing key pre-distribution scheme,we proposed to apply it to dynamic and heterogeneous network, to provide theoretical and technical basis for addressing the secure transmission of data.

Key words: Wearable medical devices,Biological key,Quantum key,Heterogeneous network

[1] 刘金芳.可穿戴设备的信息安全风险及我国应对建议[J].信息安全与技术,2014(11):10-12
[2] Chen B R,Patel S,Buckley T,et al.A Web-based system for home monitoring of patients with Parkinson’s disease using wearable sensors [J].IEEE Trans on Biomedical Engineering,2011,58(3):831-836
[3] 2015-2020年中国可穿戴设备行业分析与投资决策咨询报告[R/OL].(2014).http://www.chinairr.org
[4] 阮晓东.可穿戴设备:强势布局移动医疗 [J].新经济导刊,2015(Z1):46-49
[5] 张越.我国可穿戴设备产业现状[J].中国信息化,2014(17):14-15
[6] 深圳将重点培育机器人可穿戴设备 [J].领导决策信息,2014,44:14
[7] 深圳发布智能装备产业发展规划政策 [J].中国安防,2014,24:17
[8] 王宇.美国网络安全与信息保障研发计划简介 [J].信息安全与通信保密,2015(1):116-120
[9] 欧盟网络和信息安全局发布前沿报告 [J].信息安全与通信保密,2015(2):12
[10] Rico J,Sancho J,Díaz ,et al.Low power wireless sensor networks:secure applications and remote distribution of FW updates with key management on WSN [M]∥Trusted Computing for Embedded Systems.Springer International Publishing,2015:71-11
[11] Harris M A,Patten K P.Mobile device security considerations for small-and-medium-sized enterprise business mobility [J].Information Management & Computer Security,2014,22(1):97-114
[12] Poon C C Y,Zhang Y T,Bao S D.A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health [J].IEEE Communications Magazine,2006,44(4):73-81
[13] Dodis Y,Ostrovsky R,Reyzin L,et al.Fuzzy extractors:How to generate strong keys from biometrics and other noisy data [J].SIAM Journal on Computing,2008,38(1):97-139
[14] Venkatasubramanian K K,Banerjee A, Gupta S K S.PSKA:U-sable and Secure Key Agreement Scheme for Body Area Networks [J].IEEE Transactions on Information Technology in Biomedicine,2010,14(1):60-68
[15] Mana M,Feham M,Bensaber B A.Trust Key ManagementScheme for Wireless Body Area Networks [J].IJ Network Security,2011,12(2):75-83
[16] Lee C C,Chen C L,Wu C Y,et al.An extended chaotic maps-based key agreement protocol with user anonymity [J].Non-linear Dynamics,2012,69(1):79-87
[17] He D,Chen Y,Chen J.Cryptanalysis and improvement of an extend-ed chaotic maps-based key agreement protocol [J].Nonli-near Dynamics,2012,69(3):1149-1157
[18] Chen H,Zhao H,Pang L,et al.Multi fuzzy vault based on secret sharing for deadlock restoration [J].International Journal of Information Technology and Management,2012,1(1):50-60
[19] 周庆,胡月,廖晓峰.一种基于TD-ERCS的生物特征密钥产生算法 [J].物理学报,2009(7):4477-4484
[20] 陈熙.鉴别生物特征提取及密钥生成研究[D].成都:西南交通大学,2011
[21] 邓琦,佟国香.一种基于TD-ERCS生物特征密钥提取的鉴别方案[J].微计算机信息,2011(1):197-199
[22] 周俊,曹琦,王帅.基于虹膜特征的密钥生成研究 [J].计算机工程与应用,2012(21):31-34
[23] 洪田,鲍淑娣,张元亭.基于生物特征的躯感网密钥分发机制 [J].传感器与微系统,2012,31(2):19-31
[24] 舒剑.一种使用扩展混沌映射的基于生物特征密钥协商协议 [J].小型微型计算机系统,2015(3):524-528
[25] Shi B S,Li J,Liu J M,et al.Quantum key distribution and quantum authentica-tion based on entangled state [J].Physics Letters A,2001,281(2/3):83-87
[26] Li X,Chen L.Quantum authentication protocol using bell state [C]∥The First International Symposium on Data,Privacy,and E-Commerce.IEEE,2007:128-132
[27] Djellab R,Benmohammed M.Securing encryption key distribution in WLAN via QKD [C]∥2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery.IEEE,2012:160-165
[28] Huang X,Wijesekera S.Quantum cryptography based key distribution in WiFi networks [C]∥2012 International Conference on Information Networking.IEEE,2012:251-256
[29] Shi R H,Zhong H.Multi-party Quantum key agreement with bell states and bell measurements [J].Quantum Information Processing,2013,12(2):921-932
[30] Liu B,Gao F,Huang W,et al.Multiparty Quantum key agreement with single particles [J].Quantum Information Proces-sing,2013,12(4):1797-1805
[31] Simon D S,Lawrence N,Trevino J,et al.High-capacity quantum Fibonacci coding for key distribution [J].Physics Review A,2013,87(3):032312
[32] Leverrier A,García-Patrón R,Renner R,et al.Security of continuous-variable quantum key distribution against general attacks [J].Physics Review Letters,2013,110(3):030502
[33] 冯志宏,谭晓青,梁翠.基于Bell态与其纠缠性质的量子密钥分发 [J].计算机应用研究,2015(3):873-876,0
[34] 申冬苏,马文平,尹逊汝,等.两方量子密钥协商协议的改进 [J].西安电子科技大学学报,2015(1):86-90,186
[35] Eschenauer L,Gligor V D.A key management scheme for distributed sensor networks [C]∥Proceeding of the 9th ACM Conference on Computer and Communications Security.Wa-shington,2002:41-47
[36] Chan H,Perrig A,Song D.Random key predistribution schemes for sensor networks [C]∥2003 IEEE Symposium on Security and Privacy.Berkeley,USA,2003:197-213
[37] Babar S D,Prasad N R.CMKMS:Cluster-based mobile keymanagement scheme for wireless sensor network [J].International Journal of Pervasive Computing and Communications,2014,10(2):196-211
[38] Jolly G,Kuscu M C,Kokate P,et al.A low-energy key management protocol for wireless sensor networks [C]∥Proceedings of the Eighth IEEE International Symposium on Computers and Communication.Turkey,2003:335-340
[39] Cheng Y,Agrawal D P.An improved key distribution mecha-nism for large-scale hierarchical wireless sensor networks [J].Ad Hoc Networks,2007,5(1):35-48
[40] Wang W,Li F,Ma J.Efficient and secure group key management for high delay networks [J].Chinese Journal of Electroni-cs,2007,16(4):721-726
[41] Doraipandian M,Rajapackiyam E.An efficient and hybrid keymanagement scheme for three tier wireless sensor networksusing LU matrix [J].Communications in Computer and Information Science,2011,192(3):111-121
[42] Khan S U,Lavagno L,Pastrone C.Online Authentication and Key Establishment Scheme for Heterogeneous Sensor Networks [J].International Journal of Distributed Sensor Networks,2014,2014:1-11
[43] Lee J H,Kwon T,Ehlers F.Location-Aware Key Management for General Deployment of Wireless Sensor Networks [J].International Journal of Distributed Sensor Networks,2014,2014:1-17
[44] Dai H,Xu H.Key predistribution approach in wireless sensor networks using LU matrix [J].IEEE Sensors Journal,2010,10(8):1399-1409
[45] 马春光,张秉政,孙原.基于按对平衡设计的异构无线传感器网络密钥预分配方案 [J].通信学报,2010,31(1):37-43
[46] Zhang C X,Cheng L L,Wang X D.Efficient key pre-distribution protocol for Heterogeneous wireless sensor networks [J].Journal of Computational Information Systems,2013,9(11):4583-4592
[47] 覃荣华,解永生,袁晓兵.异构分组无线传感器网络密钥管理机制 [J].华中科技大学学报(自然科学版),2012,40(4):19-42
[48] 掌明,王锁萍,徐鹤.基于分簇的无线传感器网络动态密钥管理方案 [J].南京邮电大学学报(自然科学版),2012,32(1):98-103
[49] 钟晓睿,马春光.一种抗LU攻击的传感器网络密钥预分配方案 [J].计算机学报,2013,36(6):1155-1167
[50] 胡小春,陈燕,梁俊斌,等.Sink移动的无线传感网中高连通性密钥预分配方案研究[J].数学的实践与认识,2014,44(6):128-134
[51] 黄廷辉,杨旻,崔更申,等.基于LEACH协议的无线传感器网络密钥管理路由方案[J].传感技术学报,2014(8):1143-1146
[52] 李兰英,易春焕,孙建达,等.基于单位元的无线传感器网络密钥管理方案[J].计算机工程与应用,2015(2):94-98

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!