scholarly journals FAIDM for Medical Privacy Protection in 5G Telemedicine Systems

2021 ◽  
Vol 11 (3) ◽  
pp. 1155
Author(s):  
Tzu-Wei Lin ◽  
Chien-Lung Hsu

5G networks have an efficient effect in energy consumption and provide a quality experience to many communication devices. Device-to-device communication is one of the key technologies of 5G networks. Internet of Things (IoT) applying 5G infrastructure changes the application scenario in many fields especially real-time communication between machines, data, and people. The 5G network has expanded rapidly around the world including in healthcare. Telemedicine provides long-distance medical communication and services. Patient can get help with ambulatory care or other medical services in remote areas. 5G and IoT will become important parts of next generation smart medical healthcare. Telemedicine is a technology of electronic message and telecommunication related to healthcare, which is implemented in public networks. Privacy issue of transmitted information in telemedicine is important because the information is sensitive and private. In this paper, 5G-based federated anonymous identity management for medical privacy protection is proposed, and it can provide a secure way to protect medical privacy. There are some properties below. (i) The proposed scheme provides federated identity management which can manage identity of devices in a hierarchical structure efficiently. (ii) Identity authentication will be achieved by mutual authentication. (iii) The proposed scheme provides session key to secure transmitted data which is related to privacy of patients. (iv) The proposed scheme provides anonymous identities for devices in order to reduce the possibility of leaking transmitted medical data and real information of device and its owner. (v) If one of devices transmit abnormal data, proposed scheme provides traceability for servers of medical institute. (vi) Proposed scheme provides signature for non-repudiation.

2019 ◽  
Vol 8 (4) ◽  
pp. 12839-12841

The authentication is an essential concern in the cloud environment to restrict the unauthorized users to retrieve the files from cloud server. Moreover, authentication mechanisms are used to prevent illegal access of resources over insecure channel. Thus proposed work provides the strong and efficient authentication process in cloud computing environment by chebyshev polynomial based chaotic maps Diffie Hellman property. The proposed authentication mechanism does not disclose the identity of the user to CSP. Moreover proposed authentication mechanism enables mutual authentication, Identity management, and session-key agreement. The Proposed mechanism of security analysis includes the enabling mutual authentication and key agreement, restricting the impersonation attack, man in the middle attack and replay attack.


2014 ◽  
Vol 2014 ◽  
pp. 1-15 ◽  
Author(s):  
Younsung Choi ◽  
Junghyun Nam ◽  
Donghoon Lee ◽  
Jiye Kim ◽  
Jaewook Jung ◽  
...  

An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user’s biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen’s scheme.


2021 ◽  
Vol 2026 (1) ◽  
pp. 012004
Author(s):  
Duo Zhang ◽  
Shangping Wang ◽  
Qian Zhang ◽  
Yinjuan Deng ◽  
Jifang Wang

2019 ◽  
Vol 6 ◽  
pp. 161-170
Author(s):  
Rosen Pasarelski

The currently widely used 4G cellular networks face many challenges. The growing demand for high-resolution mobile multimedia applications is bringing these networks to their practical limits. 5G networks, the next generation of wireless communications, are standardized to ease the burden on current infrastructure by offering significantly higher data rates through increased channel bandwidth. Given the lack of accessible frequencies traditionally used for mobile communications, millimeter bandwidths (mmWave) are quite a challenging alternative. This technology is a cornerstone of upcoming 5G networks, allowing faster data speeds and much higher bandwidth than ever before, but not every 5G network will necessarily use this frequency band, at least not all the time. As with any new technology, there are unavoidable problems that need to be overcome. The purpose of the research and analysis in this article is to systematize issues and solutions related to the potential problems of spectrum sharing in mmWave frequency range, its suitability for long-distance communications, indoors, in bad weather conditions, as well as biological aspects, and relevant conclusions have been done to meet these challenges.


Sign in / Sign up

Export Citation Format

Share Document