ACM Transactions on Computer Systems (TOCS)
A performance comparison of multi-hop wireless ad hoc network routing protocols
MobiCom '98 Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking
Ubiquitous Healthcare: The OnkoNet Mobile Agents Architecture
Mobile Computing in Medicine, Second Conference on Mobile Computing in Medicine, Workshop of the Project Group MoCoMed, GMDS-Fachbereich Medizinische Informatik & GI-Fachausschuss 4.7
The application of mobile computing and technology to health care services
Telematics and Informatics
Performance evaluation of routing protocols for ad hoc wireless networks
Mobile Networks and Applications
Trust evaluation in ad-hoc networks
Proceedings of the 3rd ACM workshop on Wireless security
What Drives Mobile Health Care? An Empirical Evaluation of Technology Acceptance
HICSS '05 Proceedings of the Proceedings of the 38th Annual Hawaii International Conference on System Sciences (HICSS'05) - Track 6 - Volume 06
Certain limitations of reputation--based schemes in mobile environments
MSWiM '05 Proceedings of the 8th ACM international symposium on Modeling, analysis and simulation of wireless and mobile systems
A quantitative trust establishment framework for reliable data packet delivery in MANETs
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
A Programmable Service Architecture for Mobile Medical Care
PERCOMW '06 Proceedings of the 4th annual IEEE international conference on Pervasive Computing and Communications Workshops
Handbook of Algorithms for Wireless Networking and Mobile Computing (Chapman & Hall/Crc Computer & Information Science)
Performance evaluation of an anonymity providing protocol for wireless ad hoc networks
Performance Evaluation - Performance modelling and evaluation of wireless ad hoc and sensor networks
Proceedings of the 1st ACM SIGMOBILE international workshop on Systems and networking support for healthcare and assisted living environments
Pervasive healthcare and wireless health monitoring
Mobile Networks and Applications
A Trust Evaluation Method for Node Cooperation in Mobile Ad Hoc Networks
ITNG '08 Proceedings of the Fifth International Conference on Information Technology: New Generations
A trust-based security system for ubiquitous and pervasive computing environments
Computer Communications
Towards a security policy for ubiquitous healthcare systems
ICUCT'06 Proceedings of the 1st international conference on Ubiquitous convergence technology
Mining based decision support multi-agent system for personalized e-healthcare service
KES-AMSTA'08 Proceedings of the 2nd KES International conference on Agent and multi-agent systems: technologies and applications
SAFECOMP'06 Proceedings of the 25th international conference on Computer Safety, Reliability, and Security
Monitoring patients via a secure and mobile healthcare system
IEEE Wireless Communications
Public key cryptography-based security scheme for wireless sensor networks in healthcare
Proceedings of the 4th International Conference on Uniquitous Information Management and Communication
Mobile phone based social relationship identification for target vaccination in mobile healthcare
Proceedings of the Third International Workshop on Sensing Applications on Mobile Phones
An integrated approach for trust management based on policy, community adherence and reputation
International Journal of Ad Hoc and Ubiquitous Computing
Hi-index | 0.00 |
Due to the introduction of telecommunication technologies in telemedicine services, the expeditious development of wireless and mobile networks has stimulated wide applications of mobile electronic healthcare systems. However, security is an essential system requirement since many patients have privacy concerns when it comes to releasing their personal information over the open wireless channels. For this reason, this study discusses the characteristics and security issues with wireless and pervasive data communications for a ubiquitous and mobile healthcare system which consists of a number of mobile devices and sensors attached to a patient. These devices form a mobile ad hoc sensor network and collect data that are sent to a hospital or healthcare center for monitoring. Subsequently, this paper discusses the innovation and design of a novel trust evaluation model. We then propose a secure multicast strategy that employs trust in order to evaluate the behavior of each node, so that only trustworthy nodes are allowed to participate in communications, while the misbehavior of malicious nodes is effectively prevented. We analyze the security properties of our multicast scheme and evaluate its performance based on simulation experiments. Our experimental results demonstrate that our scheme not only achieves the necessary data transmission in mobile environments, but also provides more security with reasonably little additional overhead.