期刊文献+

基于混合加密的无线医疗传感网数据安全与隐私保护 被引量:1

Data security and privacy protection of wireless medical sensor network based on hybrid encryption
下载PDF
导出
摘要 目的:针对医疗数据在无线信道传输过程中易被窃听甚至篡改的问题,提出一种椭圆曲线密码学(elliptic curve cryptography,ECC)与高级加密标准(advanced encryption standard,AES)混合加密算法。方法:发送方使用AES会话密钥加密医疗数据、ECC公钥加密AES会话密钥,使用SHA-1计算医疗数据的散列值,继而使用ECC公钥对散列值签名;接收方使用ECC私钥验证签名,接着使用ECC私钥解密AES会话密钥,再用AES会话密钥解密医疗数据。结果:该安全方案在加解密时间、安全强度及能源消耗方面均优于常规的ECC算法或RSA和AES混合加密算法,保证了医疗数据在传输过程中的机密性和完整性。结论:该混合加密方案能够满足无线医疗传感网低时间复杂度的需求,较好地实现了对患者数据和隐私保护的目的。 Objective To propose a hybrid encryption algorithm involving in elliptic curve cryptography(ECC) and advanced encryption standard(AES) to solve the problems of wiretapping and tampering of medical data in wireless channel transmission. Methods The sender used AES session key for medical data encryption and ECC public key for AES session key, and applied SHA-1 to obtaining the information summary of medical data and ECC public key to gaining information summary signature. The recipient employed ECC private key to verify the signature and then to decrypt AES session key, and finally decrypt medical data with AES session key. Results The proposed security solution gained advantages over the conventional ECC algorithm and hybrid cryptographic algorithm of RSA and AES in encryption and decryption time, safety strength and energy consumption, so that the confidentiality and integrity of medical data could be ensured during transmission. Conclusion The hybrid encryption scheme can meet the requirement of wireless medical sensor network in low time complexity, and realizes the protection of the patient data and privacy.
出处 《医疗卫生装备》 CAS 2017年第12期11-15,共5页 Chinese Medical Equipment Journal
基金 上海高校青年教师培养资助计划专项基金(ZZGCD15088)
关键词 无线医疗传感网 数据安全 隐私保护 ECC加密 AES加密 混合加密算法 wireless medical sensor network data security privacy protection ECC encryption AES encryption hybrid encryption algorithm
  • 相关文献

参考文献2

二级参考文献20

  • 1蒋小刚,周贤伟,郑连存,杨军.基于密钥存储优化的LKH++算法[J].微电子学与计算机,2005,22(2):51-54. 被引量:1
  • 2朱根标,张凤鸣,王金干.基于混合加密算法的网络安全体系构造[J].微电子学与计算机,2005,22(6):31-33. 被引量:8
  • 3Kyong Hoon.Extending adaptive ECC scheme for window-constrained real-time communications in wireless networks[C].Proceedings of the 4th IASTED International Multi-Conference on Wireless and Optical Communications,Banff,Canada,2004:686-691.
  • 4Amol Dabholkar,Kin Choong Yow.Efficient implementation of elliptic curve cryptography (ECC) for personal digital assistants (PDAs)[J].Wireless Personal Communications.2004,29(3-4):233-246.
  • 5IEEE P1363:Standard for public key cryptography working draft[S].IEEE,1998.
  • 6Kossinets G. Effects of tnissing data in social networks [ J ]. Social Networks, 2006,28 ( 3 ) :247 - 268.
  • 7Freeman L C. Graphic techniques for exploring social network data [ D ]. Irvine : University of California,2001.
  • 8Wondracek G, I-Iolz T, Kirda E, eta/. A practical attack to de-anony- mize social network users[ C]//Proc of IEEE Symposium on Security and Privacy.[S. 1. ] :IEEE Press,2010:223-238.
  • 9Fogel J, Nehmad E. lnternet social network communities: risk taking, trust, and privacy concerns [ J]. Computers in Human Behavior, 2011,25( 1 ) :153-160.
  • 10Narayanan A, Shmatikov V. De-anonymizing social networks [ C ]// Proc of the 30th IEEE Symposium on Security and Privacy. [ S. 1. ] : IEEE Press,2009 : 173-187.

共引文献22

同被引文献7

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部