Research Article | OPEN ACCESS
Secure Architecture for m-Health Communications Using Multi-agent Approach
Mohd Fadhli Abdul Jalil and Rossilawati Sulaiman
Faculty of Information Science and Technologi, School of Computer Science,
National Universiti of Malaysia, 43600, Bangi, Selangor, Malaysia
Research Journal of Applied Sciences, Engineering and Technology 2014 12:2583-2588
Received: August 31, 2013 | Accepted: September 10, 2013 | Published: March 29, 2014
Abstract
In this study we propose a security architecture for mobile Health (mHealth) communications. mHealth is a term used for medical-related services or communication, delivered using mobile devices such as mobile phones, tablet computers and PDAs. Communication in the health-related field often involve sensitive information (e.g., an email about a patient's illness is sent between doctors), which is transmitted over the Internet. However, although the Internet greatly facilitates the communication, it is undeniable that the threats to the Internet are becoming more prevalent. A multi-agent security architecture is presented in this study to provide a secure environment for mHealth communication. Agents are skilled in order to handle the communication processes at both sender’s and recipient’s side. This includes the security processes, which make use of cryptography protocols to secure data at both sides.
Keywords:
Cryptography protocols, m-health, multi-agent system, security,
References
-
Ahmad, Z., 2003. Wireless security in health care. Proceeding of the 1st Australian Undergraduate Students' Computing Conference.
-
Antonio, M., 2010. On the application of multi-agent systems in healthcare. University Rovira I Virgili, Tarragona.
-
Bellifemine, F.L., G. Caire and D. Greenwood, 2007. Developing Multi-agent Systems with JADE. Wiley, NY.
CrossRef
-
Bowman, B., 2003.WPA Wireless Security for Home Networks [Electronic Version].
Direct Link
-
Bradshaw, J.M., 1997. An Introduction to Software Agents. In: Bradshaw, J.M. (Eds.), Software Agents. MIT Press, Cambridge, MA, pp: 3-46.
-
David, W., 2013. Seven Steps to Avoid Being 'Phished'.
Direct Link
-
Debenham, J., 1999. An Adaptive, Maintainable, Extensible Process Agent. In: Bench-Capon, T., G. Soda and A.M. Tjoa (Eds.), DEXA'99, LNCS 1677, Springer-Verlag, Berlin, Heidelberg, pp: 636-645.
CrossRef
-
Eysenbach, G., 2001. What is e-health? J. Med. Internet Res., 3(2): e20.
CrossRef PMid:11720962 PMCid:PMC1761894
-
Ganthan, N.S., A. Rabiah and I. Zuraini, 2010. Security threats categories in healthcare information systems. Health Inform. J., 16(3): 201-209.
CrossRef PMid:20889850
-
Germanakos, P., C. Mourlas and G. Samaras, 2005. A mobile agent approach for ubiquitous and personalized ehealth information systems. Proceedings of the Workshop on 'Personalization for e-Health' of the 10th International Conference on User Modeling (UM'05). Edinburgh, pp: 67-70.
-
Gupta, V. and S. Gupta, 2001. KSSL: Experiments in wireless internet security: TR-2001-103. Sun Microsystems Laboratories, Sun Microsystems Inc.
-
Jennings, N.R., K. Sycara and M. Wooldridge, 1998. A roadmap of agent research and development. Autonom. Agents Multi-Agent Syst., 1(1): 7-38.
CrossRef
-
Johari, J.A.Y., 2009. Securing Wireless Network. [Electronic Version].
Direct Link
-
Joseph, E.M. and S.M. Jennifer, 2012. Evaluating Mobile Device Usage in the Army.
Direct Link
-
Kosie, E., 2011. Mobile Devices in Education.
Direct Link
-
Lookout Mobile Security Blog, 2011. Security Alert: Droid Dream Malware Found in Official Android Market.
Direct Link
-
Marti, R., J. Delgado and X. Perramon, 2004. Network and application security in mobile e-health applications. Proceeding of the International Conference on Networking Technologies for Broadband and Mobile Network.
CrossRef
-
Mayuri, G., A. Snehal, P. Dipti and V.M. Wadhai, 2011. An intelligent architecture for multi-agent based m-health care system. Int. J. Comput. Trends Technol., 2011: 5.
-
Meridith, L., 2012. Mobile Malware: Beware Drive-by Downloads on Your Smartphone.
Direct Link
-
Nguyen, M.T., P. Fuhrer and J. Pasquier-Rocha, 2008. Enhancing e-health information systems with agent technology. Int. J. Telemed. Appl., Article ID 279091, 2009: 13.
-
Nikolai, C. and G. Madey, 2009. Tools of the trade: A survey of various agent based modeling platforms. J. Artif. Soc. Soc. Simul., 12(2): 2.
-
Oliveira, E.C., O. Stepankova and K. Fischer, 1999. Multi-agent systems: Which research for which application? J. Robotics Autonom. Syst., 27(1-2): 91-106.
CrossRef
-
Pedro, H., 2012. CDW Survey: Mobile Devices Boost Small Business Efficiency.
Direct Link
-
Steve, K., 2011. Here are all the Smartphone Features you Love so Much and who had them First.
Direct Link
-
Sulaiman, R., D. Sharma, M. Wanli and D. Tran, 2009. A multi-agent security architecture. Proceeding of the 3rd International Conference on Network and System Security. Gold Coast, QLD, pp: 84-91.
CrossRef
-
Sycara, K., 1998. Multi agent systems. AI Mag., 19: 79-92.
-
Wang, C., Y. Han and F. Li, 2011. A secure mobile agent protocol for m-commerce using self-certified proxy signcryption. Proceeding of the 2nd International Symposium on Information Science and Engineering (ISISE). Shanghai, pp: 376-380.
-
Weiss, G., 1999. Multi-agent System: A Modern Approach to Distribute Artificial Intelligence. MIT Press, London, UK.
-
Yu, W.D., R. Gummadikayala and S. Mudumbi, 2008. A web-based wireless mobile system design of security and privacy framework for u-healthcare. Proceeding of the 10th International Conference on e-health Networking, Applications and Services (HealthCom, 2008), pp: 96-101.
CrossRef
-
Zgaya, H. and S. Hammadi, 2006. Assignment and integration of distributed transport services in agent-based architecture. Proceedings of the IEEE/WIC/ACM International Conference on Intelligent Agent Technology.
CrossRef
Competing interests
The authors have no competing interests.
Open Access Policy
This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
Copyright
The authors have no competing interests.
|
|
|
ISSN (Online): 2040-7467
ISSN (Print): 2040-7459 |
|
Information |
|
|
|
Sales & Services |
|
|
|