skip to main content
research-article

Secure IoT-Based, Incentive-Aware Emergency Personnel Dispatching Scheme with Weighted Fine-Grained Access Control

Published:13 September 2017Publication History
Skip Abstract Section

Abstract

Emergency response times following a traffic accident are extremely crucial in reducing the number of traffic-related deaths. Existing emergency vehicle dispatching systems rely heavily on manual assignments. Although some technology-assisted emergency systems engage in emergency message dissemination and path planning, efficient emergency response is one of the main factors that can decrease traffic-related deaths. Obviously, effective emergency response often plays a far more important role in a successful rescue. In this article, we propose a secure IoT-based and incentive-aware emergency personnel dispatching scheme (EPDS) with weighted fine-grained access control. Our EPDS can recruit available medical personnel on-the-fly, such as physicians driving in the vicinity of the accident scene. An appropriate incentive, such as paid leave, can be offered to encourage medical personnel to join rescue missions. Furthermore, IoT-based devices are installed in vehicles or wearable on drivers to gather biometric signals from the driver, which can be used to decide precisely which divisions or physicians are needed to administer the appropriate remedy. Additionally, our scheme can cryptographically authorize the assigned rescue vehicle to control traffic to increase rescue efficacy. Our scheme also takes advantage of adjacent roadside units to organize the appropriate rescue personnel without requiring long-distance communication with a trusted traffic authority. Proof of security is provided and extensive analyses, including qualitative and quantitative analyses and simulations, show that the proposed scheme can significantly improve rescue response time and effectiveness. To the best of our knowledge, this is the first work to make use of medical personnel that are close by in emergency rescue missions.

Skip Supplemental Material Section

Supplemental Material

References

  1. Paulo S. L. M. Barreto, Benoît Libert, Noel McCullagh, and Jean-Jacques Quisquater. 2005. Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. In Proceedings of Asiacrypt. 515--532Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. I. Batal. 2016. A temporal pattern mining approach for classifying electronic health record data. ACM Trans. Intel. Syst. Tech. 8, 1 (2016), 9:1--9:34.Google ScholarGoogle Scholar
  3. J. Bethencourt, A. Sahai, and B. Waters. 2007. Ciphertext-policy attribute-based encryption. In Proceedings of the IEEE Symposium on Security and Privacy. 321--334. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Y. Bi, H. Shan, X. Shen, N. Wang, and H. Zhao. 2016. A multi-hop broadcast protocol for emergency message dissemination in urban vehicular ad hoc networks. IEEE Trans. Intel. Trans. Syst. 17, 3 (2016), 736--750. Google ScholarGoogle ScholarCross RefCross Ref
  5. D. Boneh, B. Lynn, and H. Shacham. 2001. Short signatures from the weil pairing. In Proceedings of Asiacrypt. Google ScholarGoogle ScholarCross RefCross Ref
  6. M. Botker, S. A. Bakke, and E. F. Christensen. 2009. A systematic review of controlled studies: Do physicians increase survival with prehospital treatment? Scand. J. Trauma Resusc. Emerg. Med. 17, 12 (2009), 1--8. Google ScholarGoogle ScholarCross RefCross Ref
  7. S. Chaklader, J. Alam, M. Islam, and A. S. Sabbir. 2014. Black box: An emergency rescue dispatch system for road vehicles for instant notification of road accidents and post crash analysis. In Proceedings of the International Conference on Informatics, Electronics & Vision (ICIEV’14). 1--6.Google ScholarGoogle Scholar
  8. C.-Y. Chen, P.-Y. Chen, and W.-T. Chen. 2013. A novel emergency vehicle dispatching system. In Proceedings of Vehicular Technology Conference (VTC’13). 1--5. Google ScholarGoogle ScholarCross RefCross Ref
  9. European Commission. 2015. eCall in All New Cars from April 2018. Retrieved from https://ec.europa.eu/digital-single-market/en/news/ecall-all-new-cars-april-2018.Google ScholarGoogle Scholar
  10. K. A. Hafeez, L. Zhao, B. Ma, and J. W. Mark. 2013. Performance analysis and enhancement of the DSRC for VANET's safety applications. IEEE Trans. Veh. Technol. 62, 7 (2013), 3069--3083. Google ScholarGoogle ScholarCross RefCross Ref
  11. D. Hankerson, A. Menezes, and S. Vanstone. 2004. Guide to Elliptic Curve Cryptography. LNCS, Springer-Verlag.Google ScholarGoogle Scholar
  12. C. M. Huang, C. C. Yang, C. Y. Tseng, and C. H. Chou. 2009. A centralized traffic control mechanism for evacuation of emergency vehicles using the DSRC protocol. In Proceedings of International Symposium on Wireless Pervasive Computing (ISWPC’09). 1--5. Google ScholarGoogle ScholarCross RefCross Ref
  13. J.-L. Huang, L.-Y. Yeh, and H.-Y. Chien. 2011. ABAKA an anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks. IEEE Trans. Veh. Technol. 60, 1 (2011), 248--262. Google ScholarGoogle ScholarCross RefCross Ref
  14. Y.-S. Huang, Y.-S. Weng, and M. C. Zhou. 2015. Design of traffic safety control systems for emergency vehicle preemption using timed petri nets. IEEE Trans. Intel. Trans. Syst. 16, 4 (2015), 2113--2120. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. IEEE. 2006. IEEE Trial-Use Standard for Wireless Access in Vehicular Environment-Security Services for Applications and Management Messages. IEEE std. 1609.2-2006.Google ScholarGoogle Scholar
  16. J. H. Ju, Y. J. Park, J. Park, B. G. Lee, J. Lee, and J. Y. Lee. 2015. Real-time driver’s biological signal monitoring system. Sens. Mater. 27. No. 1, 51--59 (2015).Google ScholarGoogle Scholar
  17. N. Koblitz, A. Menezes, and S. Vanstone. 2000. The state of elliptic curve cryptography. Designs Codes Cryptogr. 19, no. 2 (2000), 173--193. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. L. Kulseng, Z. Yu, Y. Wei, and Y. Guan. 2010. Lightweight mutual authentication and ownership transfer for RFID systems. In Proceedings of Infocom. 1--5. Google ScholarGoogle ScholarCross RefCross Ref
  19. C.-T. Li and M. S. Hwang. 2010. An efficient biometrics-based remote user authentication scheme using smart cards. J. Net. Com. App. 33 (2010), 1--5. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. X. Lin, X. Sun, X. Wang, C. Zhang, P.-H. Ho, and X. Shen. 2008. TSVC: Timed efficient and secure vehicular communications with privacy preserving. IEEE Trans. Wire. Comm. 7, 12 (2008), 4987--4998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. X. Liu, J. Ma, J. Xiong, Q. Li, and J. Ma. 2013. Ciphertext-policy weighted attribute-based encryption for fine-grained access conrol. In Proceedings of the International Conference on Computer and Information Technology (ICCIT’13). 51--57.Google ScholarGoogle Scholar
  22. M. Marino, A. D. Belvis, D. Basso, M. Avolio, F. Pelone, M. Tanzariello, and W. Ricciardi. 2013. Interventions to evaluate fitness to drive among people with chronic conditions: Systematic review of literature. Acc. Anal. Prevent. 50 (2013), 377--396. Google ScholarGoogle ScholarCross RefCross Ref
  23. E. McCluskey. 1956. Minimization of boolean functions. Bell Syst. Tech. J. (1956).Google ScholarGoogle Scholar
  24. S. Mikkelsen, A. J. Kruger, S. T. Zwisler, and A. C. Brochner. 2015. Outcome following physician supervised prehospital resuscitation: A retrospective study. Emerg. Med. (2015), 1--8. Google ScholarGoogle ScholarCross RefCross Ref
  25. Y. Moroi and K. Takami. 2015. A method of securing priority-use routes for emergency vehicles using inter-vehicle and vehicle-road communication. In Proceedings of the International Conference on New Technology, Mobility and Security (NTMS’15). 1--5. Google ScholarGoogle ScholarCross RefCross Ref
  26. T. D. Noia, V. C. Ostuni, P. Tomeo, and E. D. Sciascio. 2016. SPrank: Semantic path-based ranking for top-n recommendations using linked open data. ACM Trans. Intel. Syst. Tech. 8, 1 (2016), 9:1--9:34.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. M. Piórkowski, M. Raya, A. Lezama Lugo, P. Papadimitratos, M. Grossglauser, and J.-P. Hubaux. 2008. TraNS: Realistic joint traffic and network simulator for VANETs. SIGMOBILE Mob. Comput. Commun. Rev. 12, 1 (2008), 31--33.Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. The VINT project. 1995. The Network Simulator-NS-2. Retrieved from http://nsnam.isi.edu/nsnam/index.php.Google ScholarGoogle Scholar
  29. M. Raya and J.-P. Hubaux. 2007. Securing vehicular ad hoc networks. J. Comput. Secur. 15 (2007), 39--68. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. V. Rijmen and J. Daemen. 2002. The Design of Rijndael: AES—The Advanced Encryption Standard. Springer.Google ScholarGoogle Scholar
  31. K. Rostamzadeh, H. Nicanfar, N. Torabi, S. Gopalakrishnan, and V. C. M. Leung. 2015. A context-aware trust-based information dissemination framework for vehicular networks. IEEE Int. Things J. 2, 2 (2015), 121--132. Google ScholarGoogle ScholarCross RefCross Ref
  32. A. Sahai and B. Waters. 2005. Fuzzy identity-based encryption. In Proceedings of Eurocrypt, LNCS, Vol. 3494. Springer-Verlag, 457--473. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. M. Scott. 2005. Computing the Tate pairing. Topics Cryptol (2005), 293--304.Google ScholarGoogle Scholar
  34. H.-S. Shin, S.-J. Jung, J.-J. Kim, and W.-Y. Chung. 2010. Real time car driver’s condition monitoring system. In Proceedings of the IEEE Sensor Conference. 951--954.Google ScholarGoogle Scholar
  35. C. Suthaputchakun, M. Dianati, and Z. Sun. 2014. Trinary partitioned blackburst based broadcast protocol for time-critical emergency message dissemination in VANETs. IEEE Trans. Veh. Technol. 64, 6 (2014), 2926--2940. Google ScholarGoogle ScholarCross RefCross Ref
  36. Telecompaper. 2011. EU Adopts Automobile Emergency Calling Service Ecall. Retrieved from http://www.telecompaper.com/news/eu-adopts-automobile-emergency-calling-service-ecall-825732.Google ScholarGoogle Scholar
  37. Transport Research Library, UK. 2011. Commission Takes First Step Towards Rollout of eCall System. Retrieved from http://www.trl.co.uk/trl-news-hub/transport-news/latest-transport-news/commission-takes-first-step-towards-roll_800724486.htm.Google ScholarGoogle Scholar
  38. U.S. FCC. Dedicated Short Range Communications (DSRC). Retrieved from http://grouper.ieee.org/groups/scc32/dsrc/index.html.Google ScholarGoogle Scholar
  39. A. Wasef, Y. Jiang, and X. Shen. 2010. DCS: An efficient distributed certificate services scheme for vehicular networks. IEEE Trans. Veh. Tech. 59, 2 (2010), 533--549. Google ScholarGoogle ScholarCross RefCross Ref
  40. World Health Organization. 2015. Road traffic injuries fact sheet. Key facts, Fact sheet. Retrieved from http://www.who.int/mediacentre/factsheets/fs358/en/.Google ScholarGoogle Scholar
  41. L.-Y. Yeh, Y.-C. Chen, and J.-L. Huang. 2011. ABACS: An attribute-based access control system for emergency service over vehicular ad hoc network. IEEE J. Select. Area Comm. 29, 3 (2011), 630--643. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. L.-Y. Yeh and H.-L. Huang. 2014. PBS: A portable billing scheme with fine-grained access control for service-oriented vehicular networks. IEEE Trans. Mobil. Comp. 13, 11 (2014), 2606--2619. Google ScholarGoogle ScholarCross RefCross Ref
  43. Y.-S. Weng, Y.-S. Huang, S.-F. Su, and C.-S. Yu. 2011. Modelling of emergency vehicle preemption systems using statecharts. In IEEE Inter. Conf. Syst. Man. Cyber. 556--561. Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Secure IoT-Based, Incentive-Aware Emergency Personnel Dispatching Scheme with Weighted Fine-Grained Access Control

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM Transactions on Intelligent Systems and Technology
      ACM Transactions on Intelligent Systems and Technology  Volume 9, Issue 1
      Regular Papers and Special Issue: Data-driven Intelligence for Wireless Networking
      January 2018
      258 pages
      ISSN:2157-6904
      EISSN:2157-6912
      DOI:10.1145/3134224
      • Editor:
      • Yu Zheng
      Issue’s Table of Contents

      Copyright © 2017 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 13 September 2017
      • Accepted: 1 March 2017
      • Revised: 1 January 2017
      • Received: 1 September 2016
      Published in tist Volume 9, Issue 1

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader