{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,5,16]],"date-time":"2024-05-16T20:19:06Z","timestamp":1715890746788},"reference-count":34,"publisher":"Wiley","issue":"5","license":[{"start":{"date-parts":[[2020,3,27]],"date-time":"2020-03-27T00:00:00Z","timestamp":1585267200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"funder":[{"DOI":"10.13039\/501100008859","name":"Fuzhou University","doi-asserted-by":"publisher","award":["510649\/XRC\u201018049","510650\/XRC\u201018050","510730\/XRC\u201018075","510809\/GXRC\u201019037"],"id":[{"id":"10.13039\/501100008859","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["11501114","11901100","61877010","61906043"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Trans Emerging Tel Tech"],"published-print":{"date-parts":[[2021,5]]},"abstract":"Abstract<\/jats:title>As the network technologies have rapidly developed in recent years, many Internet of Things (IoT) based services and applications have walked into our daily lives; one of these is the medical information system. In the early days, medical information was recorded and stored in article form. It contains a patient identity background, past medical history, and records of medical payment. With the development of medical technology, medical information is now stored and transmitted electronically. Medical information may be a person's most private information, but due to network operation errors or hacking attacks, there has been a crisis of large\u2010scale leakage of these personal privacy data in the past. In any cases, how to protect this medical information and ensure the privacy of patients has become a topic worthy of research. Therefore, many kinds of literature discussed how to improve medical information systems. In addition, how to effectively treat patients when accidents happen is also a topic worthy of research. Therefore, combined with IoT technologies and medical devices, it has been opened a whole new future for medical information system. This study focuses on security and privacy issues to design a security scheme for healthcare environments when a person encountered physical emergency. Mobile devices and cloud computing are combined into the proposed platform. The proposed scheme can defend against impersonation attack, man\u2010in\u2010middle attack, and replay attack. The modal logic is used to verify the proposed scheme. By using digital signature and SVO logic mechanism, the proposed scheme is proven with nonrepudiation.<\/jats:p>","DOI":"10.1002\/ett.3946","type":"journal-article","created":{"date-parts":[[2020,3,27]],"date-time":"2020-03-27T14:36:53Z","timestamp":1585319813000},"update-policy":"http:\/\/dx.doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["A secure Internet of Things medical information sharing and emergency notification system based on nonrepudiation mechanism"],"prefix":"10.1002","volume":"32","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-4958-2043","authenticated-orcid":false,"given":"Chin\u2010Ling","family":"Chen","sequence":"first","affiliation":[{"name":"School of Computer and Information Engineering Xiamen University of Technology Xiamen China"},{"name":"School of Information Engineering Changchun Sci\u2010Tech University Changchun China"},{"name":"Department of Computer Science and Information Engineering Chaoyang University of Technology Taichung Taiwan"}]},{"given":"Tsai\u2010Tung","family":"Yang","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Information Engineering Chaoyang University of Technology Taichung Taiwan"}]},{"given":"Yong\u2010Yuan","family":"Deng","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Information Engineering Chaoyang University of Technology Taichung Taiwan"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-7668-7425","authenticated-orcid":false,"given":"Chi\u2010Hua","family":"Chen","sequence":"additional","affiliation":[{"name":"College of Mathematics and Computer Science Fuzhou University Fuzhou China"}]}],"member":"311","published-online":{"date-parts":[[2020,3,27]]},"reference":[{"key":"e_1_2_10_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.02.005"},{"key":"e_1_2_10_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2896479"},{"key":"e_1_2_10_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2895502"},{"key":"e_1_2_10_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.01.003"},{"key":"e_1_2_10_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.11.017"},{"key":"e_1_2_10_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jemermed.2007.10.090"},{"key":"e_1_2_10_8_1","doi-asserted-by":"publisher","DOI":"10.7326\/0003-4819-123-2-199507150-00008"},{"key":"e_1_2_10_9_1","doi-asserted-by":"publisher","DOI":"10.12816\/0003092"},{"key":"e_1_2_10_10_1","doi-asserted-by":"publisher","DOI":"10.1046\/j.1365-2923.2001.01003.x"},{"key":"e_1_2_10_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-012-9835-1"},{"key":"e_1_2_10_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-010-9614-9"},{"key":"e_1_2_10_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-011-9658-5"},{"key":"e_1_2_10_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-012-9856-9"},{"key":"e_1_2_10_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-014-0112-3"},{"issue":"2","key":"e_1_2_10_16_1","first-page":"149","article-title":"Cryptanalysis and security enhancement of Zhu's authentication scheme for telecare medicine information system","volume":"8","author":"Bin MFT","year":"2014","journal-title":"Sec Commun Netw"},{"key":"e_1_2_10_17_1","unstructured":"YangTT ChenCL ChakrabortyG. Medical information sharing system based on non\u2010repudiation mechanism. Paper presented at: Proceedings of the 2015 International Conference on Innovation Communication and Engineering;2015 Vol 1816:1\u20104; China."},{"key":"e_1_2_10_18_1","unstructured":"MichelB JyanthiH EvangelosK. Detecting impersonation attacks in future wireless and mobile networks. Paper presented at: Proceedings of the 1st International Conference on Secure Mobile Ad\u2010Hoc Networks and Sensors;2005:20\u2010\u201322."},{"key":"e_1_2_10_19_1","unstructured":"How to defend yourself against MITM or Man\u2010in\u2010the\u2010middle attack.http:\/\/hackerspace.kinja.com\/how\u2010to\u2010defend\u2010yourself\u2010against\u2010mitm\u2010or\u2010man\u2010in\u2010the\u2010middl\u20101461796382."},{"key":"e_1_2_10_20_1","unstructured":"Replay attack\u00a0\u2013\u00a0Wikipedia.https:\/\/en.wikipedia.org\/wiki\/Replay_attack."},{"key":"e_1_2_10_21_1","unstructured":"ZhouJ GollmannD An efficient non\u2010repudiation protocol. Paper presented at: Proceedings of the 1997 IEEE Computer Security Foundations Workshop (CSFW' 10);1997:126\u2010132."},{"issue":"10","key":"e_1_2_10_22_1","first-page":"642","article-title":"Ubiquitous computing smart devices: smart environments and smart interaction","volume":"67","author":"Poslad S","year":"2009","journal-title":"Sirirajmedj Com"},{"key":"e_1_2_10_23_1","doi-asserted-by":"crossref","unstructured":"MeadowsCA. Formal verification of cryptographic protocols: a survey. Paper presented at: Proceedings of the 4th International Conference on the Theory and Applications of Cryptology: Advances in Cryptology the (ASIACRYPT'94);1994 Vol917:133\u2013150; Wollongong Australia LNCS.","DOI":"10.1007\/BFb0000430"},{"key":"e_1_2_10_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/77648.77649"},{"key":"e_1_2_10_25_1","doi-asserted-by":"crossref","unstructured":"GongL NeedhamR YahalomR Reasoning about belief in cryptographic protocols. Paper presented at: Proceedings of the IEEE Symposium on Security and Privacy;1990:234\u2010248.","DOI":"10.1109\/RISP.1990.63854"},{"key":"e_1_2_10_26_1","doi-asserted-by":"crossref","unstructured":"AbadiM TuttleMR A semantics for a logic of authentication. Paper presented at: Proceedings of the 10th Annual ACM Symposium on Principlea of Distributed Computing;1991:201\u2010216.","DOI":"10.1145\/112600.112618"},{"key":"e_1_2_10_27_1","doi-asserted-by":"crossref","unstructured":"vanOorschotPC Extending cryptographic logics of cryptographic logic of belief of key agreement protocols. Paper presented at: Proceedings of the 1st ACM Conference on Computers and Communication Security;1993:232\u2010243.","DOI":"10.1145\/168588.168617"},{"key":"e_1_2_10_28_1","unstructured":"SyversonP vanOorschorPC. On unifying some cryptographic protocol logics. Paper presented at: Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy;1994:14\u201028."},{"key":"e_1_2_10_29_1","unstructured":"ZhouJ GollmannD A fair non\u2010repudiation protocol. Paper presented at: Proceedings of the IEEE Symposium on Security and Privacy;1996:55\u201061; Los Alamitos CA."},{"key":"e_1_2_10_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"e_1_2_10_31_1","first-page":"213","article-title":"Identity\u2010based encryption from the weil pairing","volume":"2139","author":"Boneh D","year":"2001","journal-title":"Adv Crypt Crypto"},{"key":"e_1_2_10_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-010-9614-9"},{"key":"e_1_2_10_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-012-9897-0"},{"key":"e_1_2_10_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-014-0016-2"},{"key":"e_1_2_10_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-015-0221-7"}],"container-title":["Transactions on Emerging Telecommunications Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fett.3946","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/ett.3946","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1002\/ett.3946","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/ett.3946","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T13:57:02Z","timestamp":1693576622000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/ett.3946"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,27]]},"references-count":34,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2021,5]]}},"alternative-id":["10.1002\/ett.3946"],"URL":"https:\/\/doi.org\/10.1002\/ett.3946","archive":["Portico"],"relation":{},"ISSN":["2161-3915","2161-3915"],"issn-type":[{"value":"2161-3915","type":"print"},{"value":"2161-3915","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,3,27]]},"assertion":[{"value":"2019-12-31","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-02-29","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-03-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}