Home            Contact us            FAQs
    
      Journal Home      |      Aim & Scope     |     Author(s) Information      |      Editorial Board      |      MSP Download Statistics

     Research Journal of Applied Sciences, Engineering and Technology


Secure Architecture for m-Health Communications Using Multi-agent Approach

Mohd Fadhli Abdul Jalil and Rossilawati Sulaiman
Faculty of Information Science and Technologi, School of Computer Science, National Universiti of Malaysia, 43600, Bangi, Selangor, Malaysia
Research Journal of Applied Sciences, Engineering and Technology  2014  12:2583-2588
http://dx.doi.org/10.19026/rjaset.7.571  |  © The Author(s) 2014
Received: August 31, 2013  |  Accepted: September 10, 2013  |  Published: March 29, 2014

Abstract

In this study we propose a security architecture for mobile Health (mHealth) communications. mHealth is a term used for medical-related services or communication, delivered using mobile devices such as mobile phones, tablet computers and PDAs. Communication in the health-related field often involve sensitive information (e.g., an email about a patient's illness is sent between doctors), which is transmitted over the Internet. However, although the Internet greatly facilitates the communication, it is undeniable that the threats to the Internet are becoming more prevalent. A multi-agent security architecture is presented in this study to provide a secure environment for mHealth communication. Agents are skilled in order to handle the communication processes at both sender’s and recipient’s side. This includes the security processes, which make use of cryptography protocols to secure data at both sides.

Keywords:

Cryptography protocols, m-health, multi-agent system, security,


References

  1. Ahmad, Z., 2003. Wireless security in health care. Proceeding of the 1st Australian Undergraduate Students' Computing Conference.
  2. Antonio, M., 2010. On the application of multi-agent systems in healthcare. University Rovira I Virgili, Tarragona.
  3. Bellifemine, F.L., G. Caire and D. Greenwood, 2007. Developing Multi-agent Systems with JADE. Wiley, NY.
    CrossRef    
  4. Bowman, B., 2003.WPA Wireless Security for Home Networks [Electronic Version].
    Direct Link
  5. Bradshaw, J.M., 1997. An Introduction to Software Agents. In: Bradshaw, J.M. (Eds.), Software Agents. MIT Press, Cambridge, MA, pp: 3-46.
  6. David, W., 2013. Seven Steps to Avoid Being 'Phished'.
    Direct Link
  7. Debenham, J., 1999. An Adaptive, Maintainable, Extensible Process Agent. In: Bench-Capon, T., G. Soda and A.M. Tjoa (Eds.), DEXA'99, LNCS 1677, Springer-Verlag, Berlin, Heidelberg, pp: 636-645.
    CrossRef    
  8. Eysenbach, G., 2001. What is e-health? J. Med. Internet Res., 3(2): e20.
    CrossRef    PMid:11720962 PMCid:PMC1761894    
  9. Ganthan, N.S., A. Rabiah and I. Zuraini, 2010. Security threats categories in healthcare information systems. Health Inform. J., 16(3): 201-209.
    CrossRef    PMid:20889850    
  10. Germanakos, P., C. Mourlas and G. Samaras, 2005. A mobile agent approach for ubiquitous and personalized ehealth information systems. Proceedings of the Workshop on 'Personalization for e-Health' of the 10th International Conference on User Modeling (UM'05). Edinburgh, pp: 67-70.
  11. Gupta, V. and S. Gupta, 2001. KSSL: Experiments in wireless internet security: TR-2001-103. Sun Microsystems Laboratories, Sun Microsystems Inc.
  12. Jennings, N.R., K. Sycara and M. Wooldridge, 1998. A roadmap of agent research and development. Autonom. Agents Multi-Agent Syst., 1(1): 7-38.
    CrossRef    
  13. Johari, J.A.Y., 2009. Securing Wireless Network. [Electronic Version].
    Direct Link
  14. Joseph, E.M. and S.M. Jennifer, 2012. Evaluating Mobile Device Usage in the Army.
    Direct Link
  15. Kosie, E., 2011. Mobile Devices in Education.
    Direct Link
  16. Lookout Mobile Security Blog, 2011. Security Alert: Droid Dream Malware Found in Official Android Market.
    Direct Link
  17. Marti, R., J. Delgado and X. Perramon, 2004. Network and application security in mobile e-health applications. Proceeding of the International Conference on Networking Technologies for Broadband and Mobile Network.
    CrossRef    
  18. Mayuri, G., A. Snehal, P. Dipti and V.M. Wadhai, 2011. An intelligent architecture for multi-agent based m-health care system. Int. J. Comput. Trends Technol., 2011: 5.
  19. Meridith, L., 2012. Mobile Malware: Beware Drive-by Downloads on Your Smartphone.
    Direct Link
  20. Nguyen, M.T., P. Fuhrer and J. Pasquier-Rocha, 2008. Enhancing e-health information systems with agent technology. Int. J. Telemed. Appl., Article ID 279091, 2009: 13.
  21. Nikolai, C. and G. Madey, 2009. Tools of the trade: A survey of various agent based modeling platforms. J. Artif. Soc. Soc. Simul., 12(2): 2.
  22. Oliveira, E.C., O. Stepankova and K. Fischer, 1999. Multi-agent systems: Which research for which application? J. Robotics Autonom. Syst., 27(1-2): 91-106.
    CrossRef    
  23. Pedro, H., 2012. CDW Survey: Mobile Devices Boost Small Business Efficiency.
    Direct Link
  24. Steve, K., 2011. Here are all the Smartphone Features you Love so Much and who had them First.
    Direct Link
  25. Sulaiman, R., D. Sharma, M. Wanli and D. Tran, 2009. A multi-agent security architecture. Proceeding of the 3rd International Conference on Network and System Security. Gold Coast, QLD, pp: 84-91.
    CrossRef    
  26. Sycara, K., 1998. Multi agent systems. AI Mag., 19: 79-92.
  27. Wang, C., Y. Han and F. Li, 2011. A secure mobile agent protocol for m-commerce using self-certified proxy signcryption. Proceeding of the 2nd International Symposium on Information Science and Engineering (ISISE). Shanghai, pp: 376-380.
  28. Weiss, G., 1999. Multi-agent System: A Modern Approach to Distribute Artificial Intelligence. MIT Press, London, UK.
  29. Yu, W.D., R. Gummadikayala and S. Mudumbi, 2008. A web-based wireless mobile system design of security and privacy framework for u-healthcare. Proceeding of the 10th International Conference on e-health Networking, Applications and Services (HealthCom, 2008), pp: 96-101.
    CrossRef    
  30. Zgaya, H. and S. Hammadi, 2006. Assignment and integration of distributed transport services in agent-based architecture. Proceedings of the IEEE/WIC/ACM International Conference on Intelligent Agent Technology.
    CrossRef    

Competing interests

The authors have no competing interests.

Open Access Policy

This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Copyright

The authors have no competing interests.

ISSN (Online):  2040-7467
ISSN (Print):   2040-7459
Submit Manuscript
   Information
   Sales & Services
Home   |  Contact us   |  About us   |  Privacy Policy
Copyright © 2024. MAXWELL Scientific Publication Corp., All rights reserved