EPF: An event-aided packet forwarding protocol for privacy-preserving mobile healthcare social networks

Le Chen*, Zhenfu Cao, Rongxing Lu, Xiaohui Liang, Xuemin Shen

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

17 Scopus citations

Abstract

In this paper, we propose an event-aided packet forwarding (EPF) protocol, which enables patients to efficiently communicate with each other in privacy-preserving Mobile Healthcare Social Networks (MHSNs). Since patients with common illnesses often attend the same related activities, EPF makes use of these activities in forwarding illness-related messages to the target patients so that it can achieve high target patients coverage ratio. In addition, EPF also adopts predicate encryption to guarantee patient privacy and message confidentiality. Through security analysis, we demonstrate that EPF can effectively resist various attacks launched by adversaries, and ensure patient identity and illness privacy. Extensive simulations are also conducted to evaluate the performance of EPF in terms of average target patients coverage ratio, average number of packet copies, and average packet delay.

Original languageEnglish
Title of host publication2011 IEEE Global Telecommunications Conference, GLOBECOM 2011
DOIs
StatePublished - 2011
Externally publishedYes
Event54th Annual IEEE Global Telecommunications Conference: "Energizing Global Communications", GLOBECOM 2011 - Houston, TX, United States
Duration: 5 Dec 20119 Dec 2011

Publication series

NameGLOBECOM - IEEE Global Telecommunications Conference

Conference

Conference54th Annual IEEE Global Telecommunications Conference: "Energizing Global Communications", GLOBECOM 2011
Country/TerritoryUnited States
CityHouston, TX
Period5/12/119/12/11

Keywords

  • MHSN
  • Packet forwarding
  • Privacy-preserving

Fingerprint

Dive into the research topics of 'EPF: An event-aided packet forwarding protocol for privacy-preserving mobile healthcare social networks'. Together they form a unique fingerprint.

Cite this