Abstract
Emergency response times following a traffic accident are extremely crucial in reducing the number of traffic-related deaths. Existing emergency vehicle dispatching systems rely heavily on manual assignments. Although some technology-assisted emergency systems engage in emergency message dissemination and path planning, efficient emergency response is one of the main factors that can decrease traffic-related deaths. Obviously, effective emergency response often plays a far more important role in a successful rescue. In this article, we propose a secure IoT-based and incentive-aware emergency personnel dispatching scheme (EPDS) with weighted fine-grained access control. Our EPDS can recruit available medical personnel on-the-fly, such as physicians driving in the vicinity of the accident scene. An appropriate incentive, such as paid leave, can be offered to encourage medical personnel to join rescue missions. Furthermore, IoT-based devices are installed in vehicles or wearable on drivers to gather biometric signals from the driver, which can be used to decide precisely which divisions or physicians are needed to administer the appropriate remedy. Additionally, our scheme can cryptographically authorize the assigned rescue vehicle to control traffic to increase rescue efficacy. Our scheme also takes advantage of adjacent roadside units to organize the appropriate rescue personnel without requiring long-distance communication with a trusted traffic authority. Proof of security is provided and extensive analyses, including qualitative and quantitative analyses and simulations, show that the proposed scheme can significantly improve rescue response time and effectiveness. To the best of our knowledge, this is the first work to make use of medical personnel that are close by in emergency rescue missions.
Supplemental Material
Available for Download
Supplemental movie, appendix, image and software files for, Secure IoT-Based, Incentive-Aware Emergency Personnel Dispatching Scheme with Weighted Fine-Grained Access Control
- Paulo S. L. M. Barreto, Benoît Libert, Noel McCullagh, and Jean-Jacques Quisquater. 2005. Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. In Proceedings of Asiacrypt. 515--532Google ScholarDigital Library
- I. Batal. 2016. A temporal pattern mining approach for classifying electronic health record data. ACM Trans. Intel. Syst. Tech. 8, 1 (2016), 9:1--9:34.Google Scholar
- J. Bethencourt, A. Sahai, and B. Waters. 2007. Ciphertext-policy attribute-based encryption. In Proceedings of the IEEE Symposium on Security and Privacy. 321--334. Google ScholarDigital Library
- Y. Bi, H. Shan, X. Shen, N. Wang, and H. Zhao. 2016. A multi-hop broadcast protocol for emergency message dissemination in urban vehicular ad hoc networks. IEEE Trans. Intel. Trans. Syst. 17, 3 (2016), 736--750. Google ScholarCross Ref
- D. Boneh, B. Lynn, and H. Shacham. 2001. Short signatures from the weil pairing. In Proceedings of Asiacrypt. Google ScholarCross Ref
- M. Botker, S. A. Bakke, and E. F. Christensen. 2009. A systematic review of controlled studies: Do physicians increase survival with prehospital treatment? Scand. J. Trauma Resusc. Emerg. Med. 17, 12 (2009), 1--8. Google ScholarCross Ref
- S. Chaklader, J. Alam, M. Islam, and A. S. Sabbir. 2014. Black box: An emergency rescue dispatch system for road vehicles for instant notification of road accidents and post crash analysis. In Proceedings of the International Conference on Informatics, Electronics & Vision (ICIEV’14). 1--6.Google Scholar
- C.-Y. Chen, P.-Y. Chen, and W.-T. Chen. 2013. A novel emergency vehicle dispatching system. In Proceedings of Vehicular Technology Conference (VTC’13). 1--5. Google ScholarCross Ref
- European Commission. 2015. eCall in All New Cars from April 2018. Retrieved from https://ec.europa.eu/digital-single-market/en/news/ecall-all-new-cars-april-2018.Google Scholar
- K. A. Hafeez, L. Zhao, B. Ma, and J. W. Mark. 2013. Performance analysis and enhancement of the DSRC for VANET's safety applications. IEEE Trans. Veh. Technol. 62, 7 (2013), 3069--3083. Google ScholarCross Ref
- D. Hankerson, A. Menezes, and S. Vanstone. 2004. Guide to Elliptic Curve Cryptography. LNCS, Springer-Verlag.Google Scholar
- C. M. Huang, C. C. Yang, C. Y. Tseng, and C. H. Chou. 2009. A centralized traffic control mechanism for evacuation of emergency vehicles using the DSRC protocol. In Proceedings of International Symposium on Wireless Pervasive Computing (ISWPC’09). 1--5. Google ScholarCross Ref
- J.-L. Huang, L.-Y. Yeh, and H.-Y. Chien. 2011. ABAKA an anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks. IEEE Trans. Veh. Technol. 60, 1 (2011), 248--262. Google ScholarCross Ref
- Y.-S. Huang, Y.-S. Weng, and M. C. Zhou. 2015. Design of traffic safety control systems for emergency vehicle preemption using timed petri nets. IEEE Trans. Intel. Trans. Syst. 16, 4 (2015), 2113--2120. Google ScholarDigital Library
- IEEE. 2006. IEEE Trial-Use Standard for Wireless Access in Vehicular Environment-Security Services for Applications and Management Messages. IEEE std. 1609.2-2006.Google Scholar
- J. H. Ju, Y. J. Park, J. Park, B. G. Lee, J. Lee, and J. Y. Lee. 2015. Real-time driver’s biological signal monitoring system. Sens. Mater. 27. No. 1, 51--59 (2015).Google Scholar
- N. Koblitz, A. Menezes, and S. Vanstone. 2000. The state of elliptic curve cryptography. Designs Codes Cryptogr. 19, no. 2 (2000), 173--193. Google ScholarDigital Library
- L. Kulseng, Z. Yu, Y. Wei, and Y. Guan. 2010. Lightweight mutual authentication and ownership transfer for RFID systems. In Proceedings of Infocom. 1--5. Google ScholarCross Ref
- C.-T. Li and M. S. Hwang. 2010. An efficient biometrics-based remote user authentication scheme using smart cards. J. Net. Com. App. 33 (2010), 1--5. Google ScholarDigital Library
- X. Lin, X. Sun, X. Wang, C. Zhang, P.-H. Ho, and X. Shen. 2008. TSVC: Timed efficient and secure vehicular communications with privacy preserving. IEEE Trans. Wire. Comm. 7, 12 (2008), 4987--4998. Google ScholarDigital Library
- X. Liu, J. Ma, J. Xiong, Q. Li, and J. Ma. 2013. Ciphertext-policy weighted attribute-based encryption for fine-grained access conrol. In Proceedings of the International Conference on Computer and Information Technology (ICCIT’13). 51--57.Google Scholar
- M. Marino, A. D. Belvis, D. Basso, M. Avolio, F. Pelone, M. Tanzariello, and W. Ricciardi. 2013. Interventions to evaluate fitness to drive among people with chronic conditions: Systematic review of literature. Acc. Anal. Prevent. 50 (2013), 377--396. Google ScholarCross Ref
- E. McCluskey. 1956. Minimization of boolean functions. Bell Syst. Tech. J. (1956).Google Scholar
- S. Mikkelsen, A. J. Kruger, S. T. Zwisler, and A. C. Brochner. 2015. Outcome following physician supervised prehospital resuscitation: A retrospective study. Emerg. Med. (2015), 1--8. Google ScholarCross Ref
- Y. Moroi and K. Takami. 2015. A method of securing priority-use routes for emergency vehicles using inter-vehicle and vehicle-road communication. In Proceedings of the International Conference on New Technology, Mobility and Security (NTMS’15). 1--5. Google ScholarCross Ref
- T. D. Noia, V. C. Ostuni, P. Tomeo, and E. D. Sciascio. 2016. SPrank: Semantic path-based ranking for top-n recommendations using linked open data. ACM Trans. Intel. Syst. Tech. 8, 1 (2016), 9:1--9:34.Google ScholarDigital Library
- M. Piórkowski, M. Raya, A. Lezama Lugo, P. Papadimitratos, M. Grossglauser, and J.-P. Hubaux. 2008. TraNS: Realistic joint traffic and network simulator for VANETs. SIGMOBILE Mob. Comput. Commun. Rev. 12, 1 (2008), 31--33.Google ScholarDigital Library
- The VINT project. 1995. The Network Simulator-NS-2. Retrieved from http://nsnam.isi.edu/nsnam/index.php.Google Scholar
- M. Raya and J.-P. Hubaux. 2007. Securing vehicular ad hoc networks. J. Comput. Secur. 15 (2007), 39--68. Google ScholarDigital Library
- V. Rijmen and J. Daemen. 2002. The Design of Rijndael: AES—The Advanced Encryption Standard. Springer.Google Scholar
- K. Rostamzadeh, H. Nicanfar, N. Torabi, S. Gopalakrishnan, and V. C. M. Leung. 2015. A context-aware trust-based information dissemination framework for vehicular networks. IEEE Int. Things J. 2, 2 (2015), 121--132. Google ScholarCross Ref
- A. Sahai and B. Waters. 2005. Fuzzy identity-based encryption. In Proceedings of Eurocrypt, LNCS, Vol. 3494. Springer-Verlag, 457--473. Google ScholarDigital Library
- M. Scott. 2005. Computing the Tate pairing. Topics Cryptol (2005), 293--304.Google Scholar
- H.-S. Shin, S.-J. Jung, J.-J. Kim, and W.-Y. Chung. 2010. Real time car driver’s condition monitoring system. In Proceedings of the IEEE Sensor Conference. 951--954.Google Scholar
- C. Suthaputchakun, M. Dianati, and Z. Sun. 2014. Trinary partitioned blackburst based broadcast protocol for time-critical emergency message dissemination in VANETs. IEEE Trans. Veh. Technol. 64, 6 (2014), 2926--2940. Google ScholarCross Ref
- Telecompaper. 2011. EU Adopts Automobile Emergency Calling Service Ecall. Retrieved from http://www.telecompaper.com/news/eu-adopts-automobile-emergency-calling-service-ecall-825732.Google Scholar
- Transport Research Library, UK. 2011. Commission Takes First Step Towards Rollout of eCall System. Retrieved from http://www.trl.co.uk/trl-news-hub/transport-news/latest-transport-news/commission-takes-first-step-towards-roll_800724486.htm.Google Scholar
- U.S. FCC. Dedicated Short Range Communications (DSRC). Retrieved from http://grouper.ieee.org/groups/scc32/dsrc/index.html.Google Scholar
- A. Wasef, Y. Jiang, and X. Shen. 2010. DCS: An efficient distributed certificate services scheme for vehicular networks. IEEE Trans. Veh. Tech. 59, 2 (2010), 533--549. Google ScholarCross Ref
- World Health Organization. 2015. Road traffic injuries fact sheet. Key facts, Fact sheet. Retrieved from http://www.who.int/mediacentre/factsheets/fs358/en/.Google Scholar
- L.-Y. Yeh, Y.-C. Chen, and J.-L. Huang. 2011. ABACS: An attribute-based access control system for emergency service over vehicular ad hoc network. IEEE J. Select. Area Comm. 29, 3 (2011), 630--643. Google ScholarDigital Library
- L.-Y. Yeh and H.-L. Huang. 2014. PBS: A portable billing scheme with fine-grained access control for service-oriented vehicular networks. IEEE Trans. Mobil. Comp. 13, 11 (2014), 2606--2619. Google ScholarCross Ref
- Y.-S. Weng, Y.-S. Huang, S.-F. Su, and C.-S. Yu. 2011. Modelling of emergency vehicle preemption systems using statecharts. In IEEE Inter. Conf. Syst. Man. Cyber. 556--561. Google ScholarCross Ref
Index Terms
- Secure IoT-Based, Incentive-Aware Emergency Personnel Dispatching Scheme with Weighted Fine-Grained Access Control
Recommendations
Research on Highway Emergency Vehicle Dispatching Model
ICMTMA '09: Proceedings of the 2009 International Conference on Measuring Technology and Mechatronics Automation - Volume 02Rapid response is the core function of the highway emergency assistance system and the corresponding reasonable dispatching of rescue resource can shorten the response time. This paper deals with the problem of dispatching emergency vehicles on the ...
An intelligent IoT emergency vehicle warning system using RFID and Wi-Fi technologies for emergency medical services
Papers from the International Multi-Conference on Engineering and Technology Innovation 2016 (IMETI2016), 28 Oct.–1 Nov. 2016, Taichung, TaiwanBACKGROUND:Collisions between emergency vehicles for emergency medical services (EMS) and public road users have been a serious problem, impacting on the safety of road users, emergency medical technicians (EMTs), and the ...
A Fine-Grained Access Control Model and Implementation
CompSysTech '17: Proceedings of the 18th International Conference on Computer Systems and TechnologiesThe several models and solutions were introduced and implemented to address privacy and security issues during past decades. However, the most advanced role-based access control models support coarse-grained access control and widely used open source ...
Comments