Advertisement

Software Defined Personal Area Network for Secure and Efficient File Management

  • Young-Hoon Park
  • Kwangman Ko
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 474)

Abstract

As the use of wearable devices grows significantly, it is expected that the Personal Area Network (PAN) will play an important role due to its convenience and efficiency in linking the devices. A file sharing scheme can be employed for secure and efficient management of files stored in the devices. However, wearable devices’ battery consumption may be a problem when using traditional file sharing techniques because the battery capacity is relatively small and the heavy and complex file sharing and retrieval process is demanding. In this paper, we propose a solution to this problem, by applying a Software Defined Network (SDN) to the PAN, where a smart device plays the role of the control layer, and the other wearable devices become members of the infrastructure layer. Using this Software Defined Personal Area Network (SDPAN), the smart device determines how to generate file shares for storage and retrieval for loading rather than requiring each smart device to perform these tasks.

Notes

Acknowledgement

This work was supported by Institute for Information & Communication Technology Promotion (IITP) grant funded by the Korea government (MSIP) (No. 2017-0-01705, Development of SDN Platforms and Security Schemes for Service Scalable and Trustable IoT Environments).

References

  1. 1.
    Shen, W., et al.: Secure in-band bootstrapping for wireless personal area networks. IEEE Internet Things J. 3(6), 1385–1394 (2016)CrossRefGoogle Scholar
  2. 2.
    Guo, L., Zhang, C., Sun, J., Fang, Y.: A privacy-preserving attribute-based authentication system for mobile health networks. IEEE Trans. Mob. Comput. 13(9), 1927–1941 (2014)CrossRefGoogle Scholar
  3. 3.
    Mvelase, P., Dlamini, Z., Dludla, A., Sithole, H.: Integration of smart wearable mobile devices and cloud computing in South African healthcare. In: eChallenges e-2015 Conference, Vilnius, pp. 1–10 (2015)Google Scholar
  4. 4.
    Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)MathSciNetCrossRefGoogle Scholar
  5. 5.
    Blakley, G.R.: Safeguarding cryptographic keys. In: International Workshop on Managing Requirements Knowledge, vol. 0, p. 313 (1979)Google Scholar
  6. 6.
    Park, Y.H., Lee, E.D., Seo, S.W.: Lightweight (k, n)-file sharing scheme for distributed storages with diverse communication capacities. In: 2014 IEEE Conference on Communications and Network Security, San Francisco, CA, pp. 373–381 (2014)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  1. 1.Sookmyung Women’s UniversitySeoulSouth Korea
  2. 2.Sangji UniversityWonju-siRepublic of Korea

Personalised recommendations