1
|
Mutlaq KAA, Nyangaresi VO, Omar MA, Abduljabbar ZA, Abduljaleel IQ, Ma J, Al Sibahee MA. Low complexity smart grid security protocol based on elliptic curve cryptography, biometrics and hamming distance. PLoS One 2024; 19:e0296781. [PMID: 38261555 PMCID: PMC10805298 DOI: 10.1371/journal.pone.0296781] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [MESH Headings] [Grants] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 08/19/2023] [Accepted: 12/19/2023] [Indexed: 01/25/2024] Open
Abstract
The incorporation of information and communication technologies in the power grids has greatly enhanced efficiency in the management of demand-responses. In addition, smart grids have seen considerable minimization in energy consumption and enhancement in power supply quality. However, the transmission of control and consumption information over open public communication channels renders the transmitted messages vulnerable to numerous security and privacy violations. Although many authentication and key agreement protocols have been developed to counter these issues, the achievement of ideal security and privacy levels at optimal performance still remains an uphill task. In this paper, we leverage on Hamming distance, elliptic curve cryptography, smart cards and biometrics to develop an authentication protocol. It is formally analyzed using the Burrows-Abadi-Needham (BAN) logic, which shows strong mutual authentication and session key negotiation. Its semantic security analysis demonstrates its robustness under all the assumptions of the Dolev-Yao (DY) and Canetti- Krawczyk (CK) threat models. From the performance perspective, it is shown to incur communication, storage and computation complexities compared with other related state of the art protocols.
Collapse
Affiliation(s)
- Keyan Abdul-Aziz Mutlaq
- School of Computer Sciences, Universiti Sains Malaysia, USM, Gelugor, Penang, Malaysia
- IT and Communications Center, University of Basrah, Basrah, Iraq
| | - Vincent Omollo Nyangaresi
- Department of Computer Science and Software Engineering, Jaramogi Oginga Odinga University of Science & Technology, Bondo, Kenya
| | - Mohd Adib Omar
- School of Computer Sciences, Universiti Sains Malaysia, USM, Gelugor, Penang, Malaysia
| | - Zaid Ameen Abduljabbar
- Department of Computer Science, College of Education for Pure Sciences, University of Basrah, Basrah, Iraq
| | - Iman Qays Abduljaleel
- Department of Computer Science, College of Computer Science and Information Technology, University of Basrah, Basrah, Iraq
| | - Junchao Ma
- College of Big Data and Internet, Shenzhen Technology University, Shenzhen, China
| | - Mustafa A. Al Sibahee
- National Engineering Laboratory for Big Data System Computing Technology, Shenzhen University, Shenzhen, China
- Computer Technology Engineering Department, Iraq University College, Basrah, Iraq
| |
Collapse
|
2
|
Lizana M, Choudhury C, Watling D. Investigating the potential of aggregated mobility indices for inferring public transport ridership changes. PLoS One 2024; 19:e0296686. [PMID: 38180958 PMCID: PMC10769062 DOI: 10.1371/journal.pone.0296686] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 09/13/2023] [Accepted: 12/15/2023] [Indexed: 01/07/2024] Open
Abstract
Aggregated mobility indices (AMIs) derived from information and communications technologies have recently emerged as a new data source for transport planners, with particular value during periods of major disturbances or when other sources of mobility data are scarce. Particularly, indices estimated on the aggregate user concentration in public transport (PT) hubs based on GPS of smartphones, or the number of PT navigation queries in smartphone applications have been used as proxies for the temporal changes in PT aggregate demand levels. Despite the popularity of these indices, it remains largely untested whether they can provide a reasonable characterisation of actual PT ridership changes. This study aims to address this research gap by investigating the reliability of using AMIs for inferring PT ridership changes by offering the first rigorous benchmarking between them and ridership data derived from smart card validations and tickets. For the comparison, we use monthly and daily ridership data from 12 cities worldwide and two AMIs shared globally by Google and Apple during periods of major change in 2020-22. We also explore the complementary role of AMIs on traditional ridership data. The comparative analysis revealed that the index based on human mobility (Google) exhibited a notable alignment with the trends reported by ridership data and performed better than the one based on PT queries (Apple). Our results differ from previous studies by showing that AMIs performed considerably better for similar periods. This finding highlights the huge relevance of dealing with methodological differences in datasets before comparing. Moreover, we demonstrated that AMIs can also complement data from smart card records when ticketing is missing or of doubtful quality. The outcomes of this study are particularly relevant for cities of developing countries, which usually have limited data to analyse their PT ridership, and AMIs may offer an attractive alternative.
Collapse
Affiliation(s)
- Maximiliano Lizana
- Institute for Transport Studies, University of Leeds, Leeds, United Kingdom
- Department of Civil Engineering, Universidad de La Frontera, Temuco, Chile
| | - Charisma Choudhury
- Institute for Transport Studies, University of Leeds, Leeds, United Kingdom
| | - David Watling
- Institute for Transport Studies, University of Leeds, Leeds, United Kingdom
| |
Collapse
|
3
|
Yee Yen Y, Yeow PHP, Wee Hong L. Encouraging gender-inclusive acceptance of multipurpose national-identity smart cards. PLoS One 2022; 17:e0271033. [PMID: 35867638 PMCID: PMC9307195 DOI: 10.1371/journal.pone.0271033] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 03/31/2021] [Accepted: 06/22/2022] [Indexed: 11/19/2022] Open
Abstract
Purpose Gender-inclusive adoption of multipurpose national-identity smart cards (MNIS) is important to ensure gender equality, particularly in accessing public services offered by the card e.g. identity verification, healthcare, transit, banking, driving license, passport, etc. The aim is to study the gender differences in terms of the motivation and impediments of adopting MNIS to recommend gender-specific adoption strategies. Methodology The research framework is based on the Unified Theory of Acceptance and Use of Technology (UTAUT) with the added constructs of perceived credibility and anxiety. The data was collected through five hundred questionnaires from Malaysia (the MNIS pioneer) and analyzed using structural equation modeling. Findings The results show that females have significantly higher perceived credibility while males have significantly higher performance expectancy for MNIS. The correlation between performance expectancy and perceived credibility is significantly stronger among males. Practical implications Strategies recommended to policymakers include having social messages related to MNIS utility and convenience in campaigns targeting males while alleviating concerns over security and privacy for campaigns targeting females. Originality/value This is the first study that investigated the gender differences in adoption of MNIS by comparing the structural UTAUT models of both genders. The gender differences in MNIS adoption were explained using gender theories.
Collapse
Affiliation(s)
- Yuen Yee Yen
- Faculty of Business, Multimedia University, Melaka, Melaka, Malaysia
- * E-mail:
| | - P. H. P. Yeow
- Department of Marketing, Sunway University Business School, Sunway University, Subang Jaya, Malaysia
| | - Loo Wee Hong
- Department of Marketing, Sunway University Business School, Sunway University, Subang Jaya, Malaysia
| |
Collapse
|
4
|
Lee I, Cho SH, Kim K, Kho SY, Kim DK. Travel pattern-based bus trip origin-destination estimation using smart card data. PLoS One 2022; 17:e0270346. [PMID: 35749407 PMCID: PMC9231760 DOI: 10.1371/journal.pone.0270346] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [MESH Headings] [Grants] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/09/2021] [Accepted: 06/08/2022] [Indexed: 11/19/2022] Open
Abstract
Smart card data are widely used in generating the origin and destination (O–D) matrix for public transit, which contains important information for transportation planning and operation. However, the generation of the O–D matrix is limited by the smart card data information that includes the boarding (origin) information without the alighting (destination) information. To solve this problem, trip chain methods have been proposed, thereby greatly contributing in estimating the destination using the smart card data. Nevertheless, unlinked trips, that is, trips with unknown destinations, are a persisting issue. The purpose of this study is to develop a method for estimating the destination of unlinked trips, in which trip chain methods cannot be applied, using temporal travel patterns and historical boarding records of the passengers based on long-term smart card data. The passengers were clustered by k-means clustering, and the time-of-day travel patterns were estimated for each cluster using a Gaussian mixture model. The travel patterns were formulated to estimate the destination of the passengers from the smart card data. The proposed method was verified using the 2018 smart card data collected in Sejong City, South Korea. The existing trip chain method matched the destinations of 60.0% of the total trips, whereas the proposed method improved the matching to 74.9% by additionally matching the destinations of 37.2% of the unlinked trips.
Collapse
Affiliation(s)
- Inmook Lee
- Innovative Transportation and Logistics Research Center, Korea Railroad Research Institute, Uiwang-si, Gyeonggi-do, Republic of Korea
- Department of Civil and Environmental Engineering, Seoul National University, Seoul, Republic of Korea
| | - Shin-Hyung Cho
- Department of Transportation Engineering, University of Seoul, Seoul, Republic of Korea
| | - Kyoungtae Kim
- Innovative Transportation and Logistics Research Center, Korea Railroad Research Institute, Uiwang-si, Gyeonggi-do, Republic of Korea
| | - Seung-Young Kho
- Department of Civil and Environmental Engineering, Seoul National University, Seoul, Republic of Korea
- Institute of Construction and Environmental Engineering, Seoul National University, Seoul, Republic of Korea
| | - Dong-Kyu Kim
- Department of Civil and Environmental Engineering, Seoul National University, Seoul, Republic of Korea
- Institute of Construction and Environmental Engineering, Seoul National University, Seoul, Republic of Korea
- * E-mail:
| |
Collapse
|
5
|
O'Neill S. Update on technologies, medicines and treatments. Diabet Med 2021; 38:e14601. [PMID: 34028889 DOI: 10.1111/dme.14601] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [MESH Headings] [Track Full Text] [Journal Information] [Submit a Manuscript] [Subscribe] [Scholar Register] [Indexed: 10/21/2022]
|
6
|
Liu X, Lin Z, Huang J, Gao H, Shi W. Evaluating the Inequality of Medical Service Accessibility Using Smart Card Data. Int J Environ Res Public Health 2021; 18:2711. [PMID: 33800216 PMCID: PMC7967441 DOI: 10.3390/ijerph18052711] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 01/25/2021] [Revised: 02/25/2021] [Accepted: 03/01/2021] [Indexed: 11/16/2022]
Abstract
The measurement of medical service accessibility is typically based on driving or Euclidean distance. However, in most non-emergency cases, public transport is the travel mode used by the public to access medical services. Yet, there has been little evaluation of the public transport system-based inequality of medical service accessibility. This work uses massive real smart card data (SCD) and an improved potential model to estimate the public transport-based medical service accessibility in Beijing, China. These real SCD data are used to calculate travel costs in terms of time and distance, and medical service accessibility is estimated using an improved potential model. The spatiotemporal variations and patterns of medical service accessibility are explored, and the results show that it is unevenly spatiotemporally distributed across the study area. For example, medical service accessibility in urban areas is higher than that in suburban areas, accessibility during peak periods is higher than that during off-peak periods, and accessibility on weekends is generally higher than that on weekdays. To explore the association of medical service accessibility with socio-economic factors, the relationship between accessibility and house price is investigated via a spatial econometric analysis. The results show that, at a global level, house price is positively correlated with medical service accessibility. In particular, the medical service accessibility of a higher-priced spatial housing unit is lower than that of its neighboring spatial units, owing to the positive spatial spillover effect of house price. This work sheds new light on the inequality of medical service accessibility from the perspective of public transport, which may benefit urban policymakers and planners.
Collapse
Affiliation(s)
- Xintao Liu
- Department of Land Surveying and Geo-Informatics, The Hong Kong Polytechnic University, Kowloon, Hong Kong; (X.L.); (H.G.); (W.S.)
- Smart Cities Research Institute (SCRI), The Hong Kong Polytechnic University, Kowloon, Hong Kong
| | - Ziwei Lin
- Department of Land Surveying and Geo-Informatics, The Hong Kong Polytechnic University, Kowloon, Hong Kong; (X.L.); (H.G.); (W.S.)
| | - Jianwei Huang
- Institute of Space and Earth Information Science, The Chinese University of Hong Kong (CUHK), Shatin, Hong Kong;
| | - He Gao
- Department of Land Surveying and Geo-Informatics, The Hong Kong Polytechnic University, Kowloon, Hong Kong; (X.L.); (H.G.); (W.S.)
| | - Wenzhong Shi
- Department of Land Surveying and Geo-Informatics, The Hong Kong Polytechnic University, Kowloon, Hong Kong; (X.L.); (H.G.); (W.S.)
- Smart Cities Research Institute (SCRI), The Hong Kong Polytechnic University, Kowloon, Hong Kong
| |
Collapse
|
7
|
Beaugé Y, De Allegri M, Ouédraogo S, Bonnet E, Kuunibe N, Ridde V. Do Targeted User Fee Exemptions Reach the Ultra-Poor and Increase their Healthcare Utilisation? A Panel Study from Burkina Faso. Int J Environ Res Public Health 2020; 17:ijerph17186543. [PMID: 32911868 PMCID: PMC7559284 DOI: 10.3390/ijerph17186543] [Citation(s) in RCA: 7] [Impact Index Per Article: 1.8] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Grants] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 07/23/2020] [Revised: 08/25/2020] [Accepted: 09/02/2020] [Indexed: 12/22/2022]
Abstract
Background: A component of the performance-based financing intervention implemented in Burkina Faso was to provide free access to healthcare via the distribution of user fee exemption cards to previously identified ultra-poor. This study examines the factors that led to the receipt of user fee exemption cards, and the effect of card possession on the utilisation of healthcare services. Methods: A panel data set of 1652 randomly selected ultra-poor individuals was used. Logistic regression was applied on the end line data to identify factors associated with the receipt of user fee exemption cards. Random-effects modelling was applied to the panel data to determine the effect of the card possession on healthcare service utilisation among those who reported an illness six months before the surveys. Results: Out of the ultra-poor surveyed in 2017, 75.51% received exemption cards. Basic literacy (p = 0.03), living within 5 km from a healthcare centre (p = 0.02) and being resident in Diébougou or Gourcy (p = 0.00) were positively associated with card possession. Card possession did not increase health service utilisation (β = −0.07; 95% CI = −0.45; 0.32; p = 0.73). Conclusion: A better intervention design and implementation is required. Complementing demand-side strategies could guide the ultra-poor in overcoming all barriers to healthcare access.
Collapse
Affiliation(s)
- Yvonne Beaugé
- Heidelberg Institute for Global Health, Medical Faculty and University Hospital, Heidelberg University, Im Neuenheimer Feld 365, 69120 Heidelberg, Germany; (M.D.A.); (N.K.)
- Correspondence: ; Tel.: +49-6221-56-35057; Fax: +49-6221-56-5948
| | - Manuela De Allegri
- Heidelberg Institute for Global Health, Medical Faculty and University Hospital, Heidelberg University, Im Neuenheimer Feld 365, 69120 Heidelberg, Germany; (M.D.A.); (N.K.)
| | - Samiratou Ouédraogo
- The Canadian Institutes of Health Research (CIHR), Ottawa, ON K1A 0W9, Canada;
- National Public Health Institute of Quebec (INSPQ), Quebec City, QC G1V 5B3, Canada
- Department of Epidemiology, Biostatistics and Occupational Health (EBOH), Faculty of Medicine, McGill University, Montreal, QC H3A 1A2, Canada
| | - Emmanuel Bonnet
- French Institute for Research on Sustainable Development (IRD), Unité Mixte Internationale (UMI) Résiliences, 93143 Bondy, France;
| | - Naasegnibe Kuunibe
- Heidelberg Institute for Global Health, Medical Faculty and University Hospital, Heidelberg University, Im Neuenheimer Feld 365, 69120 Heidelberg, Germany; (M.D.A.); (N.K.)
- Department of Economics and Entrepreneurship Development Studies, Faculty of Integrated Development Studies, University for Development Studies, P. O. Box 520, Wa, Upper West Region, Ghana
| | - Valéry Ridde
- French Institute for Research on sustainable Development (IRD), Centre Population et Développement (CEPED), Universités de Paris, ERL INSERM SAGESUD, 75006 Paris, France;
| |
Collapse
|
8
|
Abstract
OBJECTIVES To identify current patient identification techniques and approaches used worldwide in today's healthcare environment. To identify challenges associated with improper patient identification. METHODS A literature review of relevant peer-reviewed and grey literature published from January 2015 to October 2019 was conducted to inform the paper. The focus was on: 1) patient identification techniques and 2) unintended consequences and ramifications of unresolved patient identification issues. RESULTS The literature review showed six common patient identification techniques implemented worldwide ranging from unique patient identifiers, algorithmic approaches, referential matching software, biometrics, radio frequency identification device (RFID) systems, and hybrid models. The review revealed three themes associated with unresolved patient identification: 1) treatment, care delivery, and patient safety errors, 2) cost and resource considerations, and 3) data sharing and interoperability challenges. CONCLUSIONS Errors in patient identification have implications for patient care and safety, payment, as well as data sharing and interoperability. Different patient identification techniques ranging from unique patient identifiers and algorithms to hybrid models have been implemented worldwide. However, no current patient identification techniques have resulted in a 100% match rate. Optimizing algorithmic matching through data standardization and referential matching software should be studied further to identify opportunities to enhance patient identification techniques and approaches. Further efforts to improve patient identity management include adoption of patients' photos at registration, naming conventions, and standardized processes for recording patients' demographic data attributes.
Collapse
Affiliation(s)
| | - Jordi Piera-Jiménez
- AHIMA International, Barcelona, Spain; Open Evidence Research Group, Universitat Oberta de Catalunya, Barcelona, Spain
| | | |
Collapse
|
9
|
Sanders C, Burnett K, Lam S, Hassan M, Skinner K. "You Need ID to Get ID": A Scoping Review of Personal Identification as a Barrier to and Facilitator of the Social Determinants of Health in North America. Int J Environ Res Public Health 2020; 17:ijerph17124227. [PMID: 32545798 PMCID: PMC7345293 DOI: 10.3390/ijerph17124227] [Citation(s) in RCA: 12] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 04/29/2020] [Revised: 06/01/2020] [Accepted: 06/11/2020] [Indexed: 11/16/2022]
Abstract
Personal identification (PID) is an important, if often overlooked, barrier to accessing the social determinants of health for many marginalized people in society. A scoping review was undertaken to explore the range of research addressing the role of PID in the social determinants of health in North America, barriers to acquiring and maintaining PID, and to identify gaps in the existing research. A systematic search of academic and gray literature was performed, and a thematic analysis of the included studies (n = 31) was conducted. The themes identified were: (1) gaining and retaining identification, (2) access to health and social services, and (3) facilitating identification programs. The findings suggest a paucity of research on PID services and the role of PID in the social determinants of health. We contend that research is urgently required to build a more robust understanding of existing PID service models, particularly in rural contexts, as well as on barriers to accessing and maintaining PID, especially among the most marginalized groups in society.
Collapse
Affiliation(s)
- Chris Sanders
- Department of Sociology, Lakehead University, 955 Oliver Road, Thunder Bay, ON P7B 5E1, Canada
- Correspondence:
| | - Kristin Burnett
- Indigenous Studies, Lakehead University, 955 Oliver Road, Thunder Bay, ON P7B 5E1, Canada;
| | - Steven Lam
- Department of Population Medicine, University of Guelph, 50 Stone Road E., Guelph, ON N1G 2W1, Canada;
| | - Mehdia Hassan
- Social Justice Studies, Lakehead University, 955 Oliver Road, Thunder Bay, ON P7B 5E1, Canada;
| | - Kelly Skinner
- School of Public Health and Health Systems, University of Waterloo, 200 University Avenue West, Waterloo, ON N2L 3G1, Canada;
| |
Collapse
|
10
|
Li S, Wu X, Zhao D, Li A, Tian Z, Yang X. An efficient dynamic ID-based remote user authentication scheme using self-certified public keys for multi-server environments. PLoS One 2018; 13:e0202657. [PMID: 30300362 PMCID: PMC6177128 DOI: 10.1371/journal.pone.0202657] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [MESH Headings] [Grants] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/18/2017] [Accepted: 07/15/2018] [Indexed: 11/19/2022] Open
Abstract
Recently, Li et al. proposed a novel smart card and dynamic ID-based remote user authentication scheme for multi-server environments. They claimed that their scheme can resist several types of attacks. However, through careful analysis, we find that Li et al.’s scheme is vulnerable to stolen smart card and off-line dictionary attacks, replay attacks, impersonation attacks and server spoofing attacks. By analyzing other similar schemes, we find that a certain type of dynamic ID-based multi-server authentication scheme in which only hash functions are used and whereby no registration center participates in the authentication and session key agreement phase faces difficulties in providing perfectly efficient and secure authentication. To compensate for these shortcomings, we propose a novel dynamic ID-based remote user authentication scheme for multi-server environments based on pairing and self-certified public keys. Security and performance analyses show that the proposed scheme is secure against various attacks and has many excellent features.
Collapse
Affiliation(s)
- Shudong Li
- Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China
- College of Computer, National University of Defense Technology, Hunan Changsha, China
| | - Xiaobo Wu
- School of Software Engineering, Yantai Vocational College, Shandong Yantai, China
| | - Dawei Zhao
- Shandong Provincial Key Laboratory of Computer Networks, Shandong Computer Science Center (National Supercomputer Center in Jinan), Qilu University of Technology (Shandong Academy of Sciences), Jinan, China
- * E-mail: (DZ); (ZT)
| | - Aiping Li
- College of Computer, National University of Defense Technology, Hunan Changsha, China
| | - Zhihong Tian
- Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China
- * E-mail: (DZ); (ZT)
| | - Xiaodong Yang
- College of Computer Science and Engineering, Northwest Normal University, Gansu Lanzhou, China
| |
Collapse
|
11
|
Xu D, Chen J, Zhang S, Liu Q. Privacy-Preserving and Efficient Truly Three-Factor Authentication Scheme for Telecare Medical Information Systems. J Med Syst 2018; 42:219. [PMID: 30280263 DOI: 10.1007/s10916-018-1047-x] [Citation(s) in RCA: 10] [Impact Index Per Article: 1.7] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/01/2017] [Accepted: 08/27/2018] [Indexed: 11/26/2022]
Abstract
Significant development of information technologies has made Telecare Medical Information Systems (TMISs) increasingly popular. In a TMIS, patients upload their medical data through smart devices to obtain a doctor's diagnosis. However, these smart devices have limited computing and storage capacities, so it is difficult to store substantial patient information and to support time-consuming operations. Moreover, although many three-factor authentication protocols have been proposed for TMISs, the problems of privacy leaks and other security flaws are serious. In addition, authentication factors are verified at the user side in most protocols, giving users a high level of trust and resulting in a potential lack of security. In this paper, we propose a novel efficient truly three-factor authentication protocol for TMISs. In our proposed protocol, three factors (i.e., password, smart card and biometrics) are verified at the server side, which reduces the storage and computational burden of the user side. Additionally, our proposed protocol uses only lightweight operators and is thus efficient. A formal proof analysis demonstrates that our proposed protocol is provably secure in the random oracle model. The performance evaluation shows that the proposed protocol is very efficient and suitable for TMISs.
Collapse
Affiliation(s)
- Dongqing Xu
- School of Mathematics and Statistics, Wuhan University, Wuhan, China
| | - Jianhua Chen
- School of Mathematics and Statistics, Wuhan University, Wuhan, China
| | - Shu Zhang
- School of Mathematics and Statistics, Wuhan University, Wuhan, China
| | - Qin Liu
- Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, 430072, China.
| |
Collapse
|
12
|
Lee TF, Hsiao CH, Hwang SH, Lin TH. Enhanced smartcard-based password-authenticated key agreement using extended chaotic maps. PLoS One 2017; 12:e0181744. [PMID: 28759615 PMCID: PMC5536435 DOI: 10.1371/journal.pone.0181744] [Citation(s) in RCA: 8] [Impact Index Per Article: 1.1] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [MESH Headings] [Grants] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/01/2016] [Accepted: 07/06/2017] [Indexed: 12/03/2022] Open
Abstract
A smartcard based password-authenticated key agreement scheme enables a legal user to log in to a remote authentication server and access remote services through public networks using a weak password and a smart card. Lin recently presented an improved chaotic maps-based password-authenticated key agreement scheme that used smartcards to eliminate the weaknesses of the scheme of Guo and Chang, which does not provide strong user anonymity and violates session key security. However, the improved scheme of Lin does not exhibit the freshness property and the validity of messages so it still fails to withstand denial-of-service and privileged-insider attacks. Additionally, a single malicious participant can predetermine the session key such that the improved scheme does not exhibit the contributory property of key agreements. This investigation discusses these weaknesses and proposes an enhanced smartcard-based password-authenticated key agreement scheme that utilizes extended chaotic maps. The session security of this enhanced scheme is based on the extended chaotic map-based Diffie-Hellman problem, and is proven in the real-or-random and the sequence of games models. Moreover, the enhanced scheme ensures the freshness of communicating messages by appending timestamps, and thereby avoids the weaknesses in previous schemes.
Collapse
Affiliation(s)
- Tian-Fu Lee
- Department of Medical Informatics, Tzu Chi University, Hualien, Taiwan, ROC
- Department of Medical Informatics, Institute of Medical Sciences, Tzu Chi University, Hualien, Taiwan, ROC
| | - Chia-Hung Hsiao
- Department of Medical Informatics, Tzu Chi University, Hualien, Taiwan, ROC
| | - Shi-Han Hwang
- Department of Medical Informatics, Tzu Chi University, Hualien, Taiwan, ROC
| | - Tsung-Hung Lin
- Department of Computer Science and Information Engineering, National Chin-Yi University of Technology, Taichung, Taiwan, ROC
- * E-mail:
| |
Collapse
|
13
|
Shimp K, Sims A. Photo Identification on a Medical-Surgical Unit Improves Communication Resulting in Positive Patient Outcomes. Nurs Econ 2016; 34:309-311. [PMID: 29975495] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [MESH Headings] [Subscribe] [Scholar Register] [Indexed: 06/08/2023]
Abstract
Creating an environment that allows for ease of communication is imperative to meet the demands of health care that is focused on quality, safety, and outcomes. As a way to improve the communication between and identification of nursing staff by the interprofessional team, a process was created to aide in timely identification and communication between health care members. Enhanced communication can result in an increase in Hospital Consumer Assessment of Healthcare Providers and Systems (HCAHPS) scores for patient satisfaction in responsiveness, communication with nurses, and bathroom help.
Collapse
|
14
|
Cano Pérez Ó, Pombo Jiménez M, Coma Samartín R. Spanish Pacemaker Registry. Twelfth Official Report of the Spanish Society of Cardiology Working Group on Cardiac Pacing (2014). Rev Esp Cardiol (Engl Ed) 2015; 68:1138-1153. [PMID: 26553269 DOI: 10.1016/j.rec.2015.08.013] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 07/28/2015] [Accepted: 08/11/2015] [Indexed: 06/05/2023]
Abstract
INTRODUCTION AND OBJECTIVES This report describes the results of the analysis of pacemaker implant and replacement data submitted to the Spanish Pacemaker Registry in 2014, with special reference to pacing mode selection. METHODS The report is based on the processing of information provided by the European Pacemaker Patient Identification Card. RESULTS Information was received from 117 hospitals, with a total of 12 358 cards, representing 34% of estimated activity. Use of conventional generators and resynchronization devices was 784 and 64.4 units per million population, respectively. The mean age of patients receiving an implant was 77.3 years. Men received 59% of implants and 56.4% of replacements. Most patients receiving generator implants and replacements were in the age range 80 to 89 years. Most endocardial leads used were bipolar, and 84.2% had an active fixation system. Pacing was in VVI/R mode despite being in sinus rhythm in 24.7% of patients with sick sinus syndrome and 24% of those with atrioventricular block. CONCLUSIONS The use of pacemaker generators and resynchronization devices per million population continued to increase. Most implanted leads had active fixation and approximately 20% had magnetic resonance imaging protection. Age and sex directly influenced pacing mode selection, which could have been improved in more than 20% of cases.
Collapse
Affiliation(s)
- Óscar Cano Pérez
- Sección de Estimulación Cardiaca, Sociedad Española de Cardiología, Madrid, Spain; Unidad de Electrofisiología y Arritmias, Hospital Universitari i Politècnic La Fe, Valencia, Spain.
| | - Marta Pombo Jiménez
- Sección de Estimulación Cardiaca, Sociedad Española de Cardiología, Madrid, Spain; Unidad de Estimulación Cardiaca, Hospital Costal de Sol, Marbella, Málaga, Spain
| | - Raúl Coma Samartín
- Sección de Estimulación Cardiaca, Sociedad Española de Cardiología, Madrid, Spain; Unidad de Cuidados Críticos Cardiológicos, Hospital 12 de Octubre, Madrid, Spain
| |
Collapse
|
15
|
Rubenfire A. Municipal IDs help prevent medical mishaps, provide access to care. Mod Healthc 2015; 45:10-11. [PMID: 26642536] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [MESH Headings] [Subscribe] [Scholar Register] [Indexed: 06/05/2023]
|
16
|
Kalachev OV, Stolyar VP, Kuandykov MG, Papkov AY. [Personal e-cards for military personnel and military-medical information system]. Voen Med Zh 2015; 336:4-10. [PMID: 26829864] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [MESH Headings] [Subscribe] [Scholar Register] [Indexed: 06/05/2023]
Abstract
The article presents main directions of activities of the medical service, dealing with implementation of personal electronic cards for military personnel, organizing the process of automation of medical service management, military and medical organizations and health care departments. The given article, reveals the on-going activity, concerning creation of the military-medical information system, which will unite all medical units, organizations, and governments into one information space.
Collapse
|
17
|
Lu Y, Li L, Yang X, Yang Y. Robust biometrics based authentication and key agreement scheme for multi-server environments using smart cards. PLoS One 2015; 10:e0126323. [PMID: 25978373 PMCID: PMC4433342 DOI: 10.1371/journal.pone.0126323] [Citation(s) in RCA: 54] [Impact Index Per Article: 6.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 09/17/2014] [Accepted: 03/30/2015] [Indexed: 11/19/2022] Open
Abstract
Biometrics authenticated schemes using smart cards have attracted much attention in multi-server environments. Several schemes of this type where proposed in the past. However, many of them were found to have some design flaws. This paper concentrates on the security weaknesses of the three-factor authentication scheme by Mishra et al. After careful analysis, we find their scheme does not really resist replay attack while failing to provide an efficient password change phase. We further propose an improvement of Mishra et al.'s scheme with the purpose of preventing the security threats of their scheme. We demonstrate the proposed scheme is given to strong authentication against several attacks including attacks shown in the original scheme. In addition, we compare the performance and functionality with other multi-server authenticated key schemes.
Collapse
Affiliation(s)
- Yanrong Lu
- Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
- National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing 100876, China
| | - Lixiang Li
- Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
- National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing 100876, China
| | - Xing Yang
- Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
- National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing 100876, China
| | - Yixian Yang
- Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
- National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing 100876, China
| |
Collapse
|
18
|
Nam J, Choo KKR, Han S, Kim M, Paik J, Won D. Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation. PLoS One 2015; 10:e0116709. [PMID: 25849359 PMCID: PMC4389980 DOI: 10.1371/journal.pone.0116709] [Citation(s) in RCA: 49] [Impact Index Per Article: 5.4] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/19/2014] [Accepted: 12/14/2014] [Indexed: 11/18/2022] Open
Abstract
A smart-card-based user authentication scheme for wireless sensor networks
(hereafter referred to as a SCA-WSN scheme) is designed to ensure that only
users who possess both a smart card and the corresponding password are allowed
to gain access to sensor data and their transmissions. Despite many research
efforts in recent years, it remains a challenging task to design an efficient
SCA-WSN scheme that achieves user anonymity. The majority of published SCA-WSN
schemes use only lightweight cryptographic techniques (rather than public-key
cryptographic techniques) for the sake of efficiency, and have been demonstrated
to suffer from the inability to provide user anonymity. Some schemes employ
elliptic curve cryptography for better security but require sensors with strict
resource constraints to perform computationally expensive scalar-point
multiplications; despite the increased computational requirements, these schemes
do not provide user anonymity. In this paper, we present a new SCA-WSN scheme
that not only achieves user anonymity but also is efficient in terms of the
computation loads for sensors. Our scheme employs elliptic curve cryptography
but restricts its use only to anonymous user-to-gateway authentication, thereby
allowing sensors to perform only lightweight cryptographic operations. Our
scheme also enjoys provable security in a formal model extended from the widely
accepted Bellare-Pointcheval-Rogaway (2000) model to capture the user anonymity
property and various SCA-WSN specific attacks (e.g., stolen smart card attacks,
node capture attacks, privileged insider attacks, and stolen verifier
attacks).
Collapse
Affiliation(s)
- Junghyun Nam
- Department of Computer Engineering, Konkuk University, Chungju,
Chungcheongbukdo, Korea
| | - Kim-Kwang Raymond Choo
- School of Information Technology and Mathematical Sciences, University of
South Australia, Mawson Lakes, South Australia, Australia
| | - Sangchul Han
- Department of Computer Engineering, Konkuk University, Chungju,
Chungcheongbukdo, Korea
- * E-mail:
| | - Moonseong Kim
- Information Management Division, Korean Intellectual Property Office,
Daejeon, Korea
| | - Juryon Paik
- Department of Computer Engineering, Sungkyunkwan University, Suwon,
Gyeonggido, Korea
| | - Dongho Won
- Department of Computer Engineering, Sungkyunkwan University, Suwon,
Gyeonggido, Korea
| |
Collapse
|
19
|
Das AK, Bruhadeshwar B. An improved and effective secure password-based authentication and key agreement scheme using smart cards for the telecare medicine information system. J Med Syst 2013; 37:9969. [PMID: 24061705 DOI: 10.1007/s10916-013-9969-9] [Citation(s) in RCA: 47] [Impact Index Per Article: 4.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/08/2013] [Accepted: 08/21/2013] [Indexed: 12/01/2022]
Abstract
Recently Lee and Liu proposed an efficient password based authentication and key agreement scheme using smart card for the telecare medicine information system [J. Med. Syst. (2013) 37:9933]. In this paper, we show that though their scheme is efficient, their scheme still has two security weaknesses such as (1) it has design flaws in authentication phase and (2) it has design flaws in password change phase. In order to withstand these flaws found in Lee-Liu's scheme, we propose an improvement of their scheme. Our improved scheme keeps also the original merits of Lee-Liu's scheme. We show that our scheme is efficient as compared to Lee-Liu's scheme. Further, through the security analysis, we show that our scheme is secure against possible known attacks. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our scheme is secure against passive and active attacks.
Collapse
Affiliation(s)
- Ashok Kumar Das
- Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad, 500 032, India,
| | | |
Collapse
|