Skip to main content
Sensors (Basel, Switzerland) logoLink to Sensors (Basel, Switzerland)
. 2022 Sep 9;22(18):6838. doi: 10.3390/s22186838

A Privacy-Preserved ID-Based Secure Communication Scheme in 5G-IoT Telemedicine Systems

Tzu-Wei Lin 1,2
Editors: Tomas Cerny, Jiman Hong, Dongwan Shin
PMCID: PMC9503048  PMID: 36146188

Abstract

5G networks have an efficient effect in providing quality of experience and massive Internet of things (IoT) communication. Applications of 5G-IoT networks have been expanded rapidly, including in smart medical healthcare. Emergency medical services (EMS) hold an assignable proportion in our lives, which has become a complex network of all types of professionals, including care in an ambulance. A 5G network with EMS can simplify the medical treatment process and improve the efficiency of patient treatment. The importance of healthcare-related privacy preservation is rising. If the work of privacy preservation fails, not only will medical institutes have economic and credibility losses but also property losses and even the lives of patients will be harmed. This paper proposes a privacy-preserved ID-based secure communication scheme in 5G-IoT telemedicine systems that can achieve the features below. (i) The proposed scheme is the first scheme that integrates the process of telemedicine systems and EMS; (ii) the proposed scheme allows emergency signals to be transmitted immediately with decreasing risk of secret key leakage; (iii) the information of the patient and their prehospital treatments can be transmitted securely while transferring the patient to the destination medical institute; (iv) the quality of healthcare services can be assured while preserving the privacy of the patient; (v) the proposed scheme supports not only normal situations but also emergencies. (vi) the proposed scheme can resist potential attacks.

Keywords: telemedicine systems, 5G, IoT, emergency medical services, privacy preservation

1. Introduction

The 5G (fifth generation) networks are the newest standard of mobile telecommunication that is being deployed on the earth. 5G networks provide speed, capacity, and scalability, which have an efficient effect on energy consumption and provide quality of services (QoS) and amount of devices communication [1,2]. A device connects with a small base station through high-band spectrum technology and devices-to-devices communication [1,3,4]. 5G networks combine and connect virtual systems to the cloud and help derive different calculating models [5]. 5G networks will have a huge impact on connected services and devices through higher reliability, connectivity, and storage [5]. Internet of things (IoT) arranges objects as a part of network settings in a distributed network. IoT has become a concept of enclosing several technologies and a network between objects and human beings, which can interact and cooperate with other devices to communicate and share information. The vision of next-generation 5G wireless communications lies in providing very high data rates, extremely low latency, manifold an increase in base station capacity, and significant improvement in users’ perceived quality of service compared to current 4G LTE networks [6]. 5G can significantly increase the capacity and speed to provide reliable and speedy connectivity to the future IoT and, moreover, provide reliable connections to thousands of devices at the same time [7]. 5G will be able to provide a massive connection of Internet of things (IoT), where billions of smart devices can be connected to the internet [7]. However, security and privacy issues of transmitted information between objects are rising these years because wireless communications are vulnerable to many adversarial attacks, which is an important transmitting media of IoT networks.

Medical healthcare systems currently have many challenges, such as infrastructure, connections, professional requirements, data management, real-time monitoring, etc., and each challenge affects the quality of healthcare services [8]. Applications of 5G networks have been expanded rapidly, including in healthcare, and IoT with 5G environments provides solutions for network layers, including enhancing QoS to solve the challenges above [1,4]. On the other hand, the importance of healthcare-related privacy preservation is rising. If the work of privacy preservation fails, not only will medical institutes have economic and credibility losses but also property losses and even the lives of patients will be harmed. Maintaining the privacy of patient data, which is usually stored in conventional systems and difficult to share due to varying standards and data formats, is one of the important sectors of the healthcare industry. If the healthcare information of patients is the key to finding medical treatment, maintaining the privacy of patient data becomes a central issue that determines the success of medical practices [8].

Emergency medical services (EMS) hold an assignable proportion in our lives, which has become a complex network of all types of professionals, including care in an ambulance, serving as educators, practicing community paramedicine, and conducting research [9]. EMS has to be the first to respond and take care of minor and major injured patients while attending to calls coming from different situations, such as accidents, natural disasters, terrorism, pandemics, and patient transport. The state of California Emergency Medical Services Authority of US developed a search, alert, file, and reconcile (SAFR) model to reach goals of bidirectional data exchange between the EMS and the health information exchange (HIE) organization to enhance prehospital treatments, prehospital decision-making, better longitudinal patient record, and overall care [10]. The 5G network has the potential to bring benefits to individuals, organizations, and society, which enables ambulances to connect a patient who wears wearable devices to the emergency department of the destination hospital. Measured biodata is collected at the incident scene and transmitted to the servers of the destination hospital when the patient is being transported, which can allow the medical professional team at the destination hospital to immediately realize the condition of the patient, the prehospital treatment performed by a medical professional on an ambulance, and help decision-making. Measured biodata can be interconnected with hospital information systems, laboratory information systems, geographic information systems, picture archiving and communications systems, and document management systems, which enable medical professionals in destination hospitals to realize the historical medical records of patients, decide first-aid information, and issue examination sheets. 5G networks with EMS can simplify the medical treatment process and improve the efficiency of patient treatment [11].

This paper proposes a privacy-preserved ID-based secure communication scheme in 5G-IoT telemedicine systems that can achieve the features below. (i) The proposed scheme allows emergency signals to be transmitted immediately with decreasing risk of secret key leakage; (ii) the information of the patient and their prehospital treatments can be securely transmitted while transferring the patient to the destination medical institute; (iii) the quality of healthcare services can be assured while preserving the privacy of the patient; (iv) the proposed scheme supports not only normal situations but also emergencies. (v) the proposed scheme can resist potential attacks. The remaining organization of paper is sketched below. Telemedicine systems, federal identity management mechanisms, key insulation, and Chebyshev chaotic maps are introduced in Section 2. Section 3 introduces the proposed scheme, and security and performance analysis are detailed in Section 4 and Section 5. Finally, the conclusion is drawn in Section 6.

2. Related Works

Telemedicine systems are a combination of healthcare, electronic messaging, and telecommunication technology [8,12,13]. Patients can transmit healthcare-related information, which is usually important, sensitive, and private, to healthcare services through public networks when using telemedicine systems [8,12,13]. This means that medical professionals are able to know the health condition of a patient immediately and following up on the health condition of the patient becomes more convenient than before [12]. A general telemedicine system in 5G-IoT environments includes three types of telemedicine, which are synchronous telemedicine, asynchronous telemedicine, and remote health monitoring [2,14]. Synchronous telemedicine allows the patient and the medical professional to communicate directly through telecommunication technology, such as Microsoft Teams (version 1.5, Microsoft Corporation, Washington, US), Cisco Webex (version 42.9, Cisco Systems, San Jose, California, US), Zoom (version 5.11, Zoom Video Communications, Inc., San Jose, California, US), etc. Asynchronous telemedicine means that the medical professional can follow up on the patient’s health condition through biodata continually transmitted by the patient and stored and analyzed by the server in the medical institute. Furthermore, the system can automatically notify the medical professional when the patient’s health condition turns bad after analyzing and predicting the biodata. Remote health monitoring allows the medical professional in real-time to monitor the patient’s health condition, and the medical professional can receive an alert immediately if an emergency happens to the patient through this type of telemedicine. This paper focuses on the scenarios of remote health monitoring and asynchronous telemedicine. Meanwhile, data transmission security will be discussed, such as eavesdropping, man-in-the-middle (MITM) attack, data tempering attack, message modification attack, data interception attack, etc. [8,15]. Technical support is not enough though famous regulations providing personal information privacy have been announced [8,15].

Shamir introduced an identity-based (ID-based) cryptosystem [16], and an ID-based cryptosystem derives the user’s public key from the public and unique information of the user. Gentry et al. developed hierarchical ID-based cryptography (HIDC) based on the original ID-based cryptosystem, and HIDC has been proven to reduce the loading of private key generation and the risk of key escrow [17]. Several works have been proposed in the past two decades [18,19,20,21], including Santos et al.’s work, which is a lightweight federal identity management mechanism for IoT [22]. Moreover, Lin and Hsu [8] proposed a hierarchical ID-based cryptography for federal identity management in telemedicine in a 5G-IoT environment, which includes IoT gateways in the system structure. The proposed scheme applied a similar structure that the smart lamp replaces IoT gateway in the work of Lin and Hsu [8], and the scenario of the proposed scheme includes an emergency that is not included in Lin and Hsu’s work [8].

Key insulation, which is introduced by Dodis et al., is one of the effective solutions to a key exposure problem [23]. More and more wearable healthcare devices are used, and they only have limited resources to protect keys. Any malicious adversary can easily obtain the key information of users or devices, which leads to the key exposure problem. Once a private key is compromised, a malicious adversary has the chance to use the exposed private key to submit a legitimate request [24]. In a public key cryptosystem that is key-insulated, a receiver has two types of secret keys, a decryption key and a helper key. The decryption key is a short-term key for decrypting ciphertexts and is periodically updated by the helper key. More specifically, the lifetime of a system is divided into discrete time periods, and the receiver can decrypt the ciphertext, which is encrypted at some time period, by using a decryption key updated by the helper key at the same time period. The decryption key is stored in a powerful but insecure device such as portable healthcare devices, and the helper key is stored in a physically secure but computationally limited device called a helper, such as a smartphone. Key-insulated encryption can significantly reduce the impact of the key exposure problem, and many researchers have taken several approaches to realize secure key-insulated cryptosystems. Many cryptographers have proposed several types of key-insulated cryptographic schemes, such as symmetric-key-based key-insulated encryption [23], key-insulated signatures [25], parallel key-insulated encryption [24,26], etc.

A chaotic system has features that can correspond to important features, confusion and diffusion of cryptosystems [27,28,29]. First, the result of a chaotic system is unpredictable if small changes in initial values happen [27,30]. Second, a chaotic system is a complex oscillation [27,30]. Third, a chaotic system has a qualitative change of character of solutions [27,30]. Cryptosystems based on Chebyshev chaotic maps have been widely discussed for decades, including lightweight solutions [13,28,29,31,32,33]. Mathematical definitions of Chebyshev chaotic maps are given in Table 1 [13,28,29,31,32,33]. Proposed schemes in this paper apply extended Chebyshev chaotic maps that satisfy definitions in Table 1.

Table 1.

Mathematical definitions of Chebyshev chaotic maps.

Mathematical Definitions Descriptions
Chebyshev polynomial Chebyshev polynomial Tn(x): [1,1] is a polynomial in x of degree n, defined as Tn(x)=cos(ncos1(x)).
Recurrent relation Tn(x)=2xTn1(x)Tn2(x)for any n  2, T0(x)=1, and T1(x)=x.
Semi-group property Tr(Ts(x))=Trs(x)=Ts(Tr(x))for any (s, r)Zand s[1,1].
Chebyshev polynomial restricted to interval [–1, 1] is a well-known chaotic map for all n > 1, which has a unique continuous invariant measure with positive Lyapunov exponent ln n. For n = 2, Chebyshev maps reduces to well-known logistic maps.
Extended Chebyshev polynomials Zhang [34] proved that the semi-group property holds for Chebyshev polynomials defined on interval (,+), and extended Chebyshev polynomials is defined as Tn(x)=(2xTn1(x)Tn2(x)) mod N, where n  2, x(,+), and N is a large prime number. Semi-group property holds, and extended Chebyshev polynomials also commute as Tr(Ts(x)) mod N=Trs(x) mod N=Ts(Tr(x)) mod N.
Chaotic maps-based discrete logarithm problem (CMDLP) Given two elements x and y, it is computationally infeasible to find the integer n such that Tn(x) mod N=y.
Chaotic maps-based Diffie-Hellman problem (CMDHP) Given three elements x, Tr(x) mod N, and Ts(x) mod N, it is computationally infeasible to compute Trs(x) mod N.

3. Proposed Scheme

In this paper, a scenario that includes a patient Pai, a smart lamp SLj, an ambulance Aij, and a server of a medical institute (MS) is focused as illustrated in Figure 1.

Figure 1.

Figure 1

System structure of proposed scheme.

Once an emergency occurs to the patient, an emergency signal is sent by the wearable device(s) to a nearby smart lamp, and then the smart lamp transmits a signal to the nearest medical institute. Another way for the smart lamp to send an emergency signal is for other passersby nearby the patient to press the emergency button on the smart lamp, as in Figure 2. After receiving the signal, a medical institute resolves the location of the patient, transmits related information to EMS staff, and assigns an ambulance to the site. After EMS staff move the patient into the ambulance, EMS can send information about the patient, including status and prehospital treatments to the destination medical institute. The staff of the emergency department at the destination medical institute can provide proper treatment according to the information on the prehospital treatments after receiving the patient. The interaction between 5G links and a core network should be secure, which may be guaranteed by functions in the core network, but secure communication between 5G links and a core network is not discussed in the proposed scheme.

Figure 2.

Figure 2

Smart lamp with emergency button.

The proposed scheme has five phases: system initialization phase, registration phase, key update phase, emergency signal sending phase, and secure ambulance communication phase. In the system initialization phase, the server of the medical institute (MS) generates essential parameters and functions. The patient (Pai), smart lamp (SLj), and ambulance (Aij) become legitimate parties through a registration phase. In the key update phase, a patient’s (Pai’s) smartphone can help a patient (Pai) update keys and secure a component in the smart lamp that can help the smart lamp (SLj) update keys. In the secure ambulance communication phase, the ambulance (Aij) and the smart lamp (SLj) authenticate each other and establish a session key for symmetric encryption for communication and transmitted information on the status and prehospital treatments. Notations are defined in Table 2.

Table 2.

Notations of proposed scheme.

Notations Definitions
PIDi Identity of patient Pai
SLIDj Identity of smart lamp SLj.
AIDij Identity of ambulance Aij.
k Encryption/decryption key k.
Ek(.)/Dk(.) A symmetric encryption/decryption algorithm with secret key k.
Sj Private key of smart lamp SLj.
Sij Private key of ambulance Aij.
skSLjAij Session key of smart lamp SLj and ambulance Aij.
p, pj , qj Large random prime numbers.
x, ej , dj Random numbers.
hk(.) Collision-resistance secure one-way keyed chaotic hash function.
sMS, ωMS The secrete values of server of medical institute (MS).
Exclusive OR (XOR) operation.
A ?= B Checking if value A is equal to B or not.
MACA The message authentication code algorithm of A.
CertificateHCAMS Certification issued by healthcare certification authority to a server of a medical institute (MS).
CertificateMSSLj Certification issued by a server of a medical institute (MS) to a smart lamp SLjthat is generated from CertificateHCAMS.
CertificateSLjAij Certification issued by a smart lamp SLj to an ambulance Aijthat is generated from CertificateMSSLj.
w Warrant including delegation information.
bi , bs Number of key update time.
EMi Emergency signal.

3.1. System Initialization Phase

In the system initialization phase, a server of a medical institute (MS), which provides telemedicine services and is certified by a healthcare certification authority, sets up parameters by performing the following steps.

Step 1: The healthcare certification authority issues a certificate CertificateHCAMS to the server of a medical institute (MS) that provides telemedicine services and is certified by a healthcare certification authority.

Step 2: The server of a medical institute (MS) generates secret values (sMS, ωMS)Zp*, a big prime p, and a random number x(,+) and computes PMS and PHA according to mathematical definitions of extended Chebyshev polynomials in Table 1.

PMS=TsMS(x) mod p (1)
PHA=TωMS(x) mod p (2)

Step 3: The server of a medical institute (MS) chooses a symmetric encryption algorithm Ek(.), a symmetric decryption algorithm Dk(.), collision-resistance one-way hash functions (H0(.), H1(.), H2(.)) where H{0, 1}*{0, 1}n that takes a binary string q {0, 1}* of any arbitrary length as input and produces a binary string Hq{0, 1}n as an output, and a collision-resistance secure one-way chaotic keyed hash function hk(.).

Step 4: The server of a medical institute (MS) outputs public parameters {PMS, PHA, p, x, H0(.), H1(.), H2(.), hk(.), Ek(.), Dk(.)} and private parameters (sMS, ωMS).

Step 5: The smart lamp (SLj) generates two large random primes (pj, qj), and φj. Then, the smart lamp (SLj) selects a random integer ej, where 1 < ej < φj and gcd(ej, φj) = 1, and makes it public. After that, the smart lamp (SLj) computes dj, where 1 < dj < φj and ejdj  1 (mod φj) and keeps dj secretly.

3.2. Registration Phase

In this phase, the patient (Pai) and the smart lamp (SLj) interact with the server of a medical institute (MS) for registration, and the ambulance (Aij) interacts with the smart lamp (SLj) for registration via a secure channel. To deal with the registration request submitted by the patient (Pai) and the smart lamp (SLj), the server of a medical institute (MS) validates the legitimacy of the patient PaI and the smart lamp SLj. After that, the server of a medical institute (MS) issues a private key (Sj) and a certificate CertificateMSSLj via a secure channel while computing and sending σI to the patient (Pai). The ambulance (Aij) submits registration information to the smart lamp (SLj), and the smart lamp (SLj) verifies the ambulance’s (Aij) legitimacy then issues private key (Sij) and certificate CertificateSLjAij. Detailed descriptions are stated as follows and illustrated in Figure 3.

Figure 3.

Figure 3

Registration phase.

Step 1: The patient, Pai, chooses an identifier, PIDi, and a random number, riZp*, and computes αi. After that, the patient, Pai, sends (PIDi, αi) to the server of a medical institute (MS). Meanwhile, the smart lamp, SLj, chooses an identifier, SLIDj, and submits to the server of a medical institute (MS).

αi=Tri(x) mod p (3)

Step 2: After receiving (PIDi, αi) from the patient (Pai) and SLIDj from the smart lamp (SLj), the server of a medical institute (MS) computes the elements below. Then, the server of a medical institute (MS) returns (Si, 0, σi) to the patient (Pai) and Sj with CertificateMSSLj, which is generated by the server of a medical institute (MS), to the smart lamp (SLj).

βi=TsMS(αi) mod p (4)
Si, 0=H0(PIDi||βi)ωMSH0(PIDi||0) (5)
σi=PMSH0(PIDi||βi) (6)
Vj=H0(SLIDj) (7)
Sj=TsMS(Vj) mod p (8)

Step 3: The smart lamp (SLj) chooses a random number sjZq* as a secret value and computed Wj and stores CertificateMSSLj.

Wj=Tsj(x) mod p (9)

Step 4: The ambulance (Aij) chooses an identifier (AIDij) and a random number (sij Zp*) as a secret value, computes Wij, and sends (AIDij, Wij) to the smart lamp (SLj).

Wij=Tsij(x) mod p (10)

Step 5: After receiving AIDij from the ambulance (Aij), the smart lamp (SLj) checks the format of AIDij. If AIDij is valid, the smart lamp SLj computes a private key Sij corresponding to the AIDij, then generates the CertificateSLjAij from the CertificateMSSLj, and sends (Sij, CertificateSLjAij) to the ambulance (Aij) via a secure channel.

Vij=H1(Wij, SLIDj) (11)
Sij=SjTsj(Vij) mod p (12)

Step 6: The ambulance (Aij) stores (Sij, CertificateSLjAij).

3.3. Key Update Phase

The patient’s (Pai’s) smartphone can help the patient (Pai) update keys through following the steps as illustrated in Figure 4.

Figure 4.

Figure 4

Key update phase.

Step 1: The smartphone computes and sends the helper key HKPai, bi as below.

HKPai, bi=ωMS[H0(PIDi||bi)  H0(PIDi||bi1)] (13)

Step 2: After receiving HKPai, bi, the patient (Pai) computes SPai, bi to update the key.

SPai, bi=SPai, bi+HKPai, bi (14)

3.4. Emergency Signal Sending Phase

When an emergency happens to a patient (Pai) outdoors, the patient (Pai) can commission a nearby smart lamp (SLj) to sign and send an emergency signal (EMi) to a server of a medical institute (MS). The server of the medical institute (MS) can verify the message from patient (Pai) through the following steps as illustrated in Figure 5.

Figure 5.

Figure 5

Emergency signal sending phase.

Step 1: The patient generates a signed emergency signal. The patient (Pai) computes (σPai1, σPai2) as below and sends (σPai, w) to the smart lamp (SLj) that w is a warrant including delegation information generated by patient (Pai).

σPai1=SPai, biriH1(EMi) (15)
σPai2=αi (16)
σPai=(σPai1, σPai2, EMi, bi) (17)

Step 2: The smart lamp transmits a signed emergency signal. After receiving (σPai, w), the smart lamp (SLj) computes (σSLj1, σSLj2, σSLj3) as below and sends (σSLj, w) to the server of the medical institute (MS).

σSLj1=σPai1SSLj, bjriH2(EMi)riH1(w) (18)
σSLj2=σPai2αi (19)
σSLj3=αi (20)
σSLj=(σSLj1, σSLj2, σSLj3, EMi, bi, bj) (21)

Step 3: The server of the medical institute verifies the signed emergency signal. After receiving (σSLj, w), the server of the medical institute (MS) verifies the message as below. If it holds, the server of the medical institute (MS) can confirm that the message was sent from the patient (Pai). The server of the medical institute (MS) utilizes information from the smart lamp (σSLj1, σSLj2, σSLj3, EMi, bj) to compute verification parameters (ν1, ν2, ν4, ν5, ν6, ν7). In addition, the smart lamp (SLj) sends information of the owner of the emergency signal patient Pai and bi, so the medical institute (MS) is able to compute the verification parameter, ν3. Finally, the medical institute (MS) verifies the validity of the emergency signal by checking the equality between ν1 and (ν2, ν3, ν4, ν5, ν6, ν7) with PMS and PHA. The process of verification can be referred to in [35], which has been proven.

ν1=TσSLj1(x) mod p (22)
ν2=TH0(PIDi||σSLj2)(x) mod p (23)
ν3=TH1(PIDi||bi)(x) mod p (24)
ν4=TH1(EMi)(x) mod p (25)
ν5=TH0(SLIDj||σSLj3)(x) mod p (26)
ν6=TH1(SLIDj||bj)(x) mod p (27)
ν7=TH2(EMi)(x) mod p (28)
ν1 ?=ν2PMSν3PHAν4σPi2ν5PMSν6PHAν7σSLj3 (29)

3.5. Secure Ambulance Communication Phase

After the ambulance (Aij) picks up the patient (Pai), the ambulance (Aij) can initiate communication with the server of the medical institute (MS) through the smart lamp (SLt). The smart lamp (SLt) and the ambulance (Aij) will execute mutual authentication to ensure further interaction between the smart lamp (SLt) and the ambulance (Aij). Detailed descriptions are stated as follows and illustrated in Figure 6.

Figure 6.

Figure 6

Secure ambulance communication phase.

Step 1: The ambulance requests for communication. The ambulance (Aij) chooses a random number (aij), computes μij and Ct, and sends (Ct, AIDij) to the smart lamp (SLt).

μij=Tsij(aij) mod p (30)
Ct=(Tet(μij||aij||CertificateSLjAij) mod p)Pt (31)

Step 2: The smart lamp verifies the request. After receiving (Ct, AIDij), the smart lamp (SLt) obtains (μij||aij||CertificateSLjAij) by decrypting Pt and verifies if the CertificateSLjAij is valid. If the CertificateSLjAij is valid, the smart lamp (SLt) progresses to the steps below, or the smart lamp (SLt) abandons the request.

(μij||aij||CertificateSLjAij)=(Tdt(Ct) mod p)/Pt (32)

Step 3: The smart lamp establishes a session key. The smart lamp (SLt) computes (ωt, skSLtAij, Pj, Pij, Pt, k, MACSLt) and sends (MACSLt, ωt) to the ambulance (Aij).

ωt=Tst(aij) mod p (33)
skSLtAij=H2(Tst(μij) mod p) (34)
Pj=H1(SLIDj) (35)
Pij=H1(Wij, SLIDj) (36)
Pt=H0(SLIDt) (37)
k=(Pj||W0)(Pij||Wi)(Pt||Wij)(skSLtAij||ωt) (38)
MACSLt=hk(Pt, Pij, μij) (39)

Step 4: The ambulance verifies the session key. After receiving (MACSLt, ωt), the ambulance (Aij) computes (skSLtAij, k) and verifies MACSLt. If the result of the verification is true, the ambulance (Aij) computes MACAij and sends MACAij to the smart lamp (SLt).

skSLtAij=H2(Tsij(ωt) mod p) (40)
k=(Pj||W0)(Pij||Wi)(Pt||Wij)(skSLtAij||ωt) (41)
hk(Pt, Pij, μij) ?=MACSLt (42)
MACAij=hskSLtAij(Pij, Pt, ωt) (43)

Step 5: The smart lamp confirms the session key. After receiving MACAij, the smart lamp (SLt) verifies MACAij. If the result of the verification is true, a mutual authentication and key agreement is completed.

hskSLtAij(Pij, Pt, ωt) ?=MACAij (44)

4. Security Analysis

This paper applies the random oracle model [36] and BAN logic [37] for formal security proof. The random oracle model [36] is used to prove the security of the emergency signal sending phase, and BAN logic [37] is used to prove the secure authentication of the secure ambulance communication phase. Note that the process of the random oracle model proof [36] can refer to other works using the random oracle model, including Liu’s work [38], because of a similar process of proof that aims to prove that the schemes can against eavesdropping attack to the Diffie–Hellman key exchange scheme. In addition, the process of BAN logic [37] can refer to other works using BAN logic, including Lee et al.’s [32] and Lin and Hsu’s [13] works, because of a similar process of proof that aims to prove that principals in schemes can believe established session keys. This paper will not describe the random oracle model and the BAN logic proof in detail. Informal security presents theoretical analyses that are present for proof of fulfillment of the security requirements of the proposed scheme.

4.1. Security of Secret Key

Assume an adversary wants to obtain the master secret key obtained by the server of the medical institute (MS), the smart lamp (SLj), and the ambulance (Aij), such that PMS=TsMS(x) mod p and Wj=Tsj(x) mod p. The adversary must have to solve the question based on CMDLP. If the adversary wants to obtain the smart lamp’s (SLj’s) secret key, the adversary is required to solve the question based on CMDLP. On the other hand, the smart lamp (SLj) generates the secret key for the ambulance (Aij) by performing Sij=SjTsj(Vij) mod p. The smart lamp (SLj) uses a private key (Sj) and a secret key (sj) in the computing process, hence only the smart lamp (SLj) is able to know the ambulance’s (Aij’s) secret key.

4.2. Key Confirmation and Security of Session Key

The ambulance (Aij) can check the session key (skSLtAij) by MACSLt ?=hk(Pt, Pij, μij), and the smart lamp (SLt) can also check the session key (skSLtAij) through MACAij ?=hskSLtAij(Pij, Pt, ωt) in the proposed scheme. If the adversary wants to obtain the session key (skSLtAij), the adversary has to solve CMDHP. Moreover, the session key (skSLtAij) is not the same every time because of the random number (aij). As a result, the proposed scheme achieves key confirmation while securing the session key.

4.3. Preventing Key-Compromise Impersonation Attacks

The ambulance’s (Aij’s) random number (sij) can be stored in the onboard unit of the ambulance, which is hard to obtain information. On the other hand, the adversary cannot obtain k due to not knowing st, and afterwards, the process cannot be completed by the adversary. As a result, the proposed scheme can prevent key-compromise impersonation attacks.

4.4. Mutual Authentication

In the secure ambulance communication phase, the ambulance (Aij) and the smart lamp (SLt) compute their session key k by public parameters (SLIDt, AIDij, Wij, SLIDj). In addition, each party generates a message authentication code (MACSLt) and MACAij by k and skSLtAij respectively to verify each other’s validity. Moreover, because of the feature of HIDC, the smart lamp (SLt) can realize that the ambulance (Aij) comes from the cloud services provider by public parameter AIDij.

4.5. Preventing MITM Attack

In order to prevent an MITM attack in the secure ambulance communication phase, the ambulance (Aij) and the smart lamp (SLt) can confirm whether the message is resent, modified, and replaced, by checking the information through message authentication codes MACSLt and MACAij. This means that the adversary cannot modify the message authentication codes MACSLt and MACAij without the session key skSLtAij. Thus, the proposed scheme can prevent an MITM attack.

4.6. Unforgeability

If the adversary wants to forge a validated anonymous identity, the adversary has to acquire smart lamp’s (SLj’s) secret (sj) and private key (Sj). The adversary has to solve CMDLP if the adversary wants to compute the smart lamp’s (SLj’s) secret (sj) and private key (Sj) from public parameter (Wj).

4.7. Without Assistance of Registration Center

The registration center (RC) is a third party for both sides of communication after the registration phase. A privilege or malicious insider attack may occur if the adversary is in the RC, and some risks may be led to, such as message leakage, verifications stolen, etc. If a privilege or malicious insider attack occurs in a telemedicine system, the patient’s privacy and security may be damaged. Although works related to the security of the 5G networks have been proposed recently [3,4], the RC is included in the system structure of these works, which is no different from conventional networks. In the proposed scheme, the hierarchical system structure was introduced, which is suitable for 5G networks without a RC or a trusted third party.

4.8. Resistant to Bergamo et al.’s Attack

Bergamo et al. proposed an attack on Chebyshev chaotic maps-based cryptosystems based on two reasons as below [39]. First, an adversary is able to obtain related elements (x, aij, μij, ωj). Second, several Chebyshev polynomials go through the same point due to the periodicity of the cosine function. In the proposed scheme, an adversary is unable to obtain any related elements (x, aij, μij, ωj) because of being encrypted in transmitted messages where only the ambulance (Aij) and the smart lamp (SLj) can retrieve the decryption key. Moreover, the proposed scheme utilizes extended Chebyshev polynomials proposed by Zhang [34], in which the periodicity of the cosine function can be avoided. As a result, the proposed scheme can resist attack proposed by Bergamo et al. [39].

5. Computational Complexity Analysis

According to previous research that uses MIRACL Library and Ubuntu 16.0 operating system with 4 GB RAM and 2.7 GHz processor and get execution time [3,4,13], the time of performing a one-way hash function operation (Th) is about 0.006 milliseconds (ms), and time for performing a Chebyshev chaotic maps operation (Tch) is approximately equal with 42.04 times of performing a one-way hash function operation that is about 0.252 ms and using Chebyshev chaotic maps can be more efficient than using elliptic-curve cryptography. The time taken for computing XOR operations is ignored because the value is too low to influence the result. The results of computational complexity and performing time of the proposed scheme are presented and shown in Table 3. In the emergency signal sending phase, the patient will take 0.006 ms, the smart lamp will take 0.012 ms, and the server of the medical institute will take 1.8 ms after receiving a message from the patient. The ambulance does not exist in the emergency signal sending phase. Performing the emergency signal sending phase will take at least 1.818 ms, according to the results above. In the secure ambulance communication phase, the ambulance will take 0.792 ms, and each smart lamp will take 0.774 ms after receiving a message from the ambulance. The patient and server of the medical institute do not exist in the secure ambulance communication phase. Performing the secure ambulance communication phase will take at least 1.566 ms, according to the results above. Although there are no requirements or standards about the recommendation of time to perform a cryptographic module, the proposed scheme has proven that is more efficient than the previous studies. For example, the time to perform the emergency signal sending phase is better than Abdel-Malek et al.’s work [40]; the process of the secure ambulance communication phase is similar to Lin and Hsu’s [13] work so that the results can be referred to Lin and Hsu’s [13] work.

Table 3.

Performance analysis of proposed scheme.

Phase Emergency Signal Sending Phase Secure Ambulance Communication Phase
Role
Patient Pai Th=0.006ms N/A
Smart lamp SLj 2Th=0.012ms 3Tch+6Th=0.756+0.036 ms=0.792 ms
Server of medical institute MS 7Tch+6Th=0.036+1.764 ms=1.8 ms N/A
Ambulance Aij N/A 3Tch+3Th=0.756+0.018 ms=0.774 ms
Total 7Tch+9Th=0.054+1.764 ms=1.818 ms 6Tch+9Th=1.512+0.054 ms=1.566 ms

6. Conclusions

5G networks provide high-speed network, big capacity, and scalability, which has an efficient effect on energy consumption and provides quality of experience and amount of devices communication, and 5G can provide connection massive IoT. IoT with 5G environments provides solutions of the network layer, including enhancing the quality of service, to solve challenges of smart medical healthcare. EMS has become a complex network of all types of professionals, including care in an ambulance. 5G network with EMS can simplify the medical treatment process and improve the efficiency of patient treatment. The importance of healthcare-related privacy preservation is rising. If the work of privacy preservation fails, not only will medical institutes have economic and credibility losses but also property losses and even the lives of patients will be harmed. This paper proposes a privacy-preserved ID-based secure communication scheme in 5G-IoT telemedicine systems that can achieve the features below. The proposed scheme allows the emergency signal to be transmitted immediately with decreasing risk of secret key leakage. Information about the patient and their prehospital treatments can be transmitted securely while transferring the patient to the destination medical institute, and the quality of healthcare services can be assured while preserving the privacy of the patient through the proposed scheme. The proposed scheme supports not only normal situations but also emergencies. The proposed scheme applies key insulation to prevent key exposure problems on wearable devices and provides federated identity management, which can manage the identity of ambulances in a hierarchical structure efficiently. Finally, the proposed scheme can resist potential attacks and has been proven secure enough using the random oracle model [36] and BAN logic [37].

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The author declares no conflict of interest.

Funding Statement

This research received no external funding.

Footnotes

Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

References

  • 1.Ahad A., Tahir M., Yau K.L.A. 5G-Based Smart Healthcare Network: Architecture, Taxonomy, Challenges and Future Research Directions. IEEE Access. 2019;7:100747–100762. doi: 10.1109/ACCESS.2019.2930628. [DOI] [Google Scholar]
  • 2.Chettri L., Bera R. A Comprehensive Survey on Internet of Things (IoT) Toward 5G Wireless Systems. IEEE Internet Things J. 2020;7:16–32. doi: 10.1109/JIOT.2019.2948888. [DOI] [Google Scholar]
  • 3.Ying B., Nayak A. Lightweight remote user authentication protocol for multi-server 5G networks using self-certified public key cryptography. J. Netw. Comput. Appl. 2019;131:66–74. doi: 10.1016/j.jnca.2019.01.017. [DOI] [Google Scholar]
  • 4.ul Haq I., Wang J., Zhu Y. Secure two-factor lightweight authentication protocol using self-certified public key cryptography for multi-server 5G networks. J. Netw. Comput. Appl. 2020;161:102660. doi: 10.1016/j.jnca.2020.102660. [DOI] [Google Scholar]
  • 5.Anwar S., Prasad R. Framework for Future Telemedicine Planning and Infrastructure using 5G Technology. Wirel. Pers. Commun. 2018;100:193–208. doi: 10.1007/s11277-018-5622-8. [DOI] [Google Scholar]
  • 6.Agiwal M., Roy A., Saxena N. Next Generation 5G Wireless Networks: A Comprehensive Survey. IEEE Commun. Surv. Tutor. 2016;18:1617–1655. doi: 10.1109/COMST.2016.2532458. [DOI] [Google Scholar]
  • 7.Li S., Xu L.D., Zhao S. 5G Internet of Things: A survey. J. Ind. Inf. Integr. 2018;10:1–9. doi: 10.1016/j.jii.2018.01.005. [DOI] [Google Scholar]
  • 8.Lin T.-W., Hsu C.-L. FAIDM for Medical Privacy Protection in 5G Telemedicine Systems. Appl. Sci. 2021;11:1155. doi: 10.3390/app11031155. [DOI] [Google Scholar]
  • 9.EMS Agenda 2050 . A People-Centered Vision for The Future of Emergency Medical Services. EMS Agenda 2050 Technical Expert Panel; Washington, DC, USA: 2019. [Google Scholar]
  • 10.Emergency Medical Services (EMS) Data Integration to Optimize Patient Care: An Overview of The Search, Alert, File, Reconcile (SAFR) Model of Health Information Exchange. Office of the National Coordinator for Health Information Technology; Washington, DC, USA: 2017. [Google Scholar]
  • 11.Mukhopadhyay A., Sreekumar S., Xavier B., Suraj M. A Cloud-Based Smartphone Solution for Transmitting Bio-Signals from an Emergency Response Vehicle. Int. J. E-Health Med. Commun. 2019;10:22–38. doi: 10.4018/IJEHMC.2019070102. [DOI] [Google Scholar]
  • 12.Garai Á., Péntek I., Attila A. Revolutionizing healthcare with IoT and cognitive, cloud-based telemedicine. Acta Polytech. Hung. 2019;16:163–181. doi: 10.12700/APH.16.2.2019.2.10. [DOI] [Google Scholar]
  • 13.Lin T.-W., Hsu C.-L., Le T.-V., Lu C.-F., Huang B.-Y. A Smartcard-Based User-Controlled Single Sign-On for Privacy Preservation in 5G-IoT Telemedicine Systems. Sensors. 2021;21:2880. doi: 10.3390/s21010001. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 14.Pramanik P.K.D., Pareek G., Nayyar A. Chapter 14—Security and Privacy in Remote Healthcare: Issues, Solutions, and Standards. In: Jude D.H., Balas V.E., editors. Telemedicine Technologies. Academic Press; Cambridge, MA, USA: 2019. pp. 201–225. [DOI] [Google Scholar]
  • 15.Zriqat I.A., Altamimi A. Security and Privacy Issues in eHealthcare Systems: Towards Trusted Services. Int. J. Comput. Sci. Appl. 2016;7 doi: 10.14569/IJACSA.2016.070933. [DOI] [Google Scholar]
  • 16.Shamir A. Advances in Cryptology. Springer; Berlin/Heidelberg, Germany: 1985. Identity-Based Cryptosystems and Signature Schemes; pp. 47–53. [Google Scholar]
  • 17.Gentry C., Silverberg A. Advances in Cryptology—ASIACRYPT 2002. Springer; Berlin/Heidelberg, Germany: 2002. Hierarchical ID-Based Cryptography; pp. 548–566. [Google Scholar]
  • 18.Yan L., Rong C., Zhao G. Cloud Computing. Springer; Berlin/Heidelberg, Germany: 2009. Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography; pp. 167–177. [Google Scholar]
  • 19.Park Y., Sur C., Rhee K.-H. A Privacy-Preserving Location Assurance Protocol for Location-Aware Services in VANETs. Wirel. Pers. Commun. 2011;61:779–791. doi: 10.1007/s11277-011-0432-2. [DOI] [Google Scholar]
  • 20.Shen V.R.L., Huang W.-C. A Time-Bound and Hierarchical Key Management Scheme for Secure Multicast Systems. Wirel. Pers. Commun. 2015;85:1741–1764. doi: 10.1007/s11277-015-2865-5. [DOI] [Google Scholar]
  • 21.Fremantle P., Aziz B. Cloud-based federated identity for the Internet of Things. Ann. Telecommun. 2018;73:415–427. doi: 10.1007/s12243-018-0641-8. [DOI] [Google Scholar]
  • 22.Santos M.L.B.A., Carneiro J.C., Franco A.M.R., Teixeira F.A., Henriques M.A.A., Oliveira L.B. FLAT: Federated lightweight authentication for the Internet of Things. Ad Hoc Netw. 2020;107:102253. doi: 10.1016/j.adhoc.2020.102253. [DOI] [Google Scholar]
  • 23.Dodis Y., Katz J., Xu S., Yung M. Advances in Cryptology—EUROCRYPT 2002. Springer; Berlin/Heidelberg, Germany: 2002. Key-Insulated Public Key Cryptosystems; pp. 65–82. [Google Scholar]
  • 24.Cui J., Lu J., Zhong H., Zhang Q., Gu C., Liu L. Parallel Key-Insulated Multiuser Searchable Encryption for Industrial Internet of Things. IEEE Trans. Ind. Inform. 2022;18:4875–4883. doi: 10.1109/TII.2021.3110193. [DOI] [Google Scholar]
  • 25.Dodis Y., Katz J., Xu S., Yung M. Public Key Cryptography—PKC 2003. Springer; Berlin/Heidelberg, Germany: 2002. Strong Key-Insulated Signature Schemes; pp. 130–144. [Google Scholar]
  • 26.Libert B., Quisquater J.-J., Yung M. Public Key Cryptography—PKC 2007. Springer; Berlin/Heidelberg, Germany: 2007. Parallel Key-Insulated Public Key Encryption without Random Oracles; pp. 298–314. [Google Scholar]
  • 27.Kocarev L. Chaos-based cryptography: A brief overview. IEEE Circuits Syst. Mag. 2001;1:6–21. doi: 10.1109/7384.963463. [DOI] [Google Scholar]
  • 28.Yoon E.-J., Jeon I.-S. An efficient and secure Diffie–Hellman key agreement protocol based on Chebyshev chaotic map. Commun. Nonlinear Sci. Numer. Simul. 2011;16:2383–2389. doi: 10.1016/j.cnsns.2010.09.021. [DOI] [Google Scholar]
  • 29.Yoon E.-J., Yoo K.-Y. Cryptanalysis of Group Key Agreement Protocol Based on Chaotic Hash Function. IEICE Trans. Inf. Syst. 2011;E94.D:2167–2170. doi: 10.1587/transinf.E94.D.2167. [DOI] [Google Scholar]
  • 30.Solev D., Janjic P., Kocarev L. Introduction to Chaos. In: Kocarev L., Lian S., editors. Chaos-Based Cryptography: Theory, Algorithms and Applications. Springer; Berlin/Heidelberg, Germany: 2011. pp. 1–25. [DOI] [Google Scholar]
  • 31.Lin H.-Y. Improved chaotic maps-based password-authenticated key agreement using smart cards. Commun. Nonlinear Sci. Numer. Simul. 2015;20:482–488. doi: 10.1016/j.cnsns.2014.05.027. [DOI] [Google Scholar]
  • 32.Lee T.-F., Hsiao C.-H., Hwang S.-H., Lin T.-H. Enhanced smartcard-based password-authenticated key agreement using extended chaotic maps. PLoS ONE. 2017;12:e0181744. doi: 10.1371/journal.pone.0181744. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 33.Lin T.-W., Hsu C.-L. Anonymous group key agreement protocol for multi-server and mobile environments based on Chebyshev chaotic maps. J. Supercomput. 2018;74:4521–4541. doi: 10.1007/s11227-018-2251-7. [DOI] [Google Scholar]
  • 34.Zhang L. Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos Solitons Fractals. 2008;37:669–674. doi: 10.1016/j.chaos.2006.09.047. [DOI] [Google Scholar]
  • 35.Wu W., Mu Y., Susilo W., Seberry J., Huang X. Autonomic and Trusted Computing. Springer; Berlin/Heidelberg, Germany: 2007. Identity-Based Proxy Signature from Pairings; pp. 22–31. [Google Scholar]
  • 36.Bellare M., Rogaway P. Random Oracles are Practical: A Paradigm for Designing Efficient Protocols; Proceedings of the 1st ACM Conference on Computer and Communications Security; Fairfax Virginia, VA, USA. 3–5 November 1993; pp. 62–73. [Google Scholar]
  • 37.Burrows M., Abadi M., Needham R. A logic of authentication. ACM Trans. Comput. Syst. 1990;8:18–36. doi: 10.1145/77648.77649. [DOI] [Google Scholar]
  • 38.Liu W. Contributions to Cryptography with Restricted Conditions. University of Wollongong; Wollongong, Australia: 2016. [Google Scholar]
  • 39.Bergamo P., Arco P.D., Santis A.D., Kocarev L. Security of public-key cryptosystems based on Chebyshev polynomials. IEEE Trans. Circuits Syst. I Regul. Pap. 2005;52:1382–1393. doi: 10.1109/TCSI.2005.851701. [DOI] [Google Scholar]
  • 40.Abdel-Malek M.A., Akkaya K., Bhuyan A., Ibrahim A.S. A Proxy Signature-Based Swarm Drone Authentication with Leader Selection in 5G Networks. IEEE Access. 2022;10:57485–57498. doi: 10.1109/ACCESS.2022.3178121. [DOI] [Google Scholar]

Associated Data

This section collects any data citations, data availability statements, or supplementary materials included in this article.

Data Availability Statement

Not applicable.


Articles from Sensors (Basel, Switzerland) are provided here courtesy of Multidisciplinary Digital Publishing Institute (MDPI)

RESOURCES