Skip to main content

Mutually Authenticated Group Key Management Protocol for Healthcare IoT Networks

  • Conference paper
  • First Online:
Book cover Proceedings of the Future Technologies Conference (FTC) 2019 (FTC 2019)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1070))

Included in the following conference series:

Abstract

Healthcare is one of the most promising application of IoT. Because of the critical nature of health-related data, it is important to transfer it securely on the network and allow only legitimate IoT devices to participate in the network. This paper proposed a mutually authenticated group key management protocol (MAGKMP) for healthcare applications of IoT. Each IoT device is properly authenticated before allowing it to join the network. It also provides the facility to IoT devices to authenticate the trusted servers and smart e-health gateways before sharing the session and group keys with them. For secure multicast communication, group keys are distributed securely after mutual authentication between different participating devices in the network. The analysis of proposed MAGKMP shows that it is secure against different types of attacks and provides mutual authentication and forward and backward secrecy in the group communication. It also offers load balancing among gateways by exploiting the context profile of gateways.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 299.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 379.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Rescorla, E., Nagendra M.: Datagram transport layer security version 1.2, No. RFC 6347 (2012)

    Google Scholar 

  2. Arkko, J., Carrara, E., Lindholm, F., Norrman, K., Naslund, M.: Mikey: multimedia internet keying, No. RFC 3830 (2004)

    Google Scholar 

  3. Abdmeziem, M.R., Tandjaoui, D., Romdhani, I.: A new distributed MIKEY mode to secure e-health applications. In: Proceedings of the International Conference on Internet of Things and Big Data, IoTBD, vol. 1, pp. 88–95 (2016)

    Google Scholar 

  4. Nguyen, K.T., Oualha, N., Laurent, M.: Novel lightweight signcryption-based key distribution mechanisms for MIKEY. In: IFIP International Conference on Information Security Theory and Practice, pp. 19–34. Springer, Cham (2016)

    Google Scholar 

  5. Farash, M.S., Attari, M.A., Kumari, S.: Cryptanalysis and improvement of a three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps. Int. J. Commun. Syst. 30(1), e2912 (2017)

    Article  Google Scholar 

  6. Lu, C.F.: Multi-party password-authenticated key exchange scheme with privacy preservation for mobile environment. KSII Trans. Internet Inf. Syst. 9(12) (2015)

    Google Scholar 

  7. Kwon, J.O., Jeong, I.R., Lee, D.H.: Practical password-authenticated three-party key exchange. KSII Trans. Internet Inf. Syst. 2(6) (2008)

    Google Scholar 

  8. Lin, T.H., Lee, T.F.: Secure verifier-based three-party authentication schemes without server public keys for data exchange in telecare medicine information systems. J. Med. Syst. 38(5), 30 (2014)

    Article  Google Scholar 

  9. Al Salami, S., Baek, J., Salah, K., Damiani, E.: Lightweight encryption for smart home. In: 2016 11th International Conference on Availability, Reliability and Security (ARES), pp. 382–388. IEEE (2016)

    Google Scholar 

  10. Mahmood, Z., Ullah, A., Ning, H.: Distributed multi-party key management for efficient authentication in the Internet of Things. IEEE Access 6, 29460–29473 (2018)

    Article  Google Scholar 

  11. Abdmeziem, M.R., Tandjaoui, D.: An end-to-end secure key management protocol for e-health applications. Comput. Electr. Eng. 44, 184–197 (2015)

    Article  Google Scholar 

  12. Harb, H., William, A., El-Mohsen, O.A., Mansour, H.A: Multicast security model for Internet of Things based on context awareness. In: 13th International Computer Engineering Conference (ICENCO), Cairo, pp. 303–309 (2017)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Firdous Kausar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kausar, F., Aman, W., Al-Abri, D. (2020). Mutually Authenticated Group Key Management Protocol for Healthcare IoT Networks. In: Arai, K., Bhatia, R., Kapoor, S. (eds) Proceedings of the Future Technologies Conference (FTC) 2019. FTC 2019. Advances in Intelligent Systems and Computing, vol 1070. Springer, Cham. https://doi.org/10.1007/978-3-030-32523-7_1

Download citation

Publish with us

Policies and ethics