Advertisement

A Cooperative End to End Key Management Scheme for E-health Applications in the Context of Internet of Things

  • Mohammed Riyadh Abdmeziem
  • Djamel Tandjaoui
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8629)

Abstract

In the context of Internet of Things where real world objects will automatically be part of the Internet, e-health applications have emerged as a promising approach to provide unobtrusive support for elderly and frail people. However, due to the limited resources available and privacy concerns, security issues constitute a major obstacle to their deployment. Among these issues, key distribution for heterogeneous nodes is problematic due to the inconsistencies in their cryptographic primitives. This paper introduces a new key management scheme that aims to establish session keys for highly resource-constrained nodes ensuring security protection through strong encryption and authentication means. Our protocol is based on collaboration by offloading heavy asymmetric cryptographic operations to a set of third parties. The generated shared secret is then used to derive further credentials. Security analysis demonstrates that our protocol provides strong security features while the scarcity of resources is taken into consideration.

Keywords

Internet of things E-health Wireless Body Area Networks (WBAN) Confidentiality Key management Cooperation 

References

  1. 1.
    Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54, 2787–2805 (2010)CrossRefzbMATHGoogle Scholar
  2. 2.
    Istepanian, R., Jara, A., Sungoor, A., Philips, N.: Internet of things for m-health applications (IOMT). In: AMA-IEEE Medical Technology Conference on Individualized Healthcare, Washington DC (2010)Google Scholar
  3. 3.
    Dohr, A., Modre-Opsrian, R., Drobics, M., Hayn, D., Schreier, G.: The internet of things for ambient assisted living. In: Information Technology: New Generations (ITNG), pp. 804–809, April 2010Google Scholar
  4. 4.
    Patel, M., Wang, J.: Applications, challenges, and prospective in emerging body area networking technologies. Wirel. Commun. 17, 80–88 (2010)CrossRefGoogle Scholar
  5. 5.
    Li, M., Lou, W., Ren, K.: Data security and privacy in wireless body area networks. IEEE Wirel. Commun. 17(1), 51–58 (2010). doi: 10.1109/MWC.2010.5416350 CrossRefGoogle Scholar
  6. 6.
    Javadi, S.S., Razzaque, M.A.: Security and privacy in wireless body area networks for health care applications. In: Khan, S., Khan Pathan, A.-S. (eds.) Wireless Networks and Security. SCT, pp. 165–187. Springer, Heidelberg (2013)CrossRefGoogle Scholar
  7. 7.
    Lim, S., Oh, T., Choi, Y., Lakshman, T.: Security issues on wireless body area network for remote healthcare monitoring. In: IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC), pp. 327–332, February 2010Google Scholar
  8. 8.
    Ng, H.S., Sim, M., Tan, C.: Security issues of wireless sensor networks in healthcare applications. BT Technol. J. 24(2), 138–144 (2006)CrossRefGoogle Scholar
  9. 9.
    Ameen, M.A., Liu, J., Kwak, K.: Security and privacy issues in wireless sensor networks for healthcare applications. J. Med. Syst. 36, 93–101 (2012)CrossRefGoogle Scholar
  10. 10.
    Karlof, C., Sastry, N., Wagner, D.: Tinysec: a link layer security architecture for wireless sensor networks. In: Second ACM Conference on Embedded Networked Sensor Systems, November 2004Google Scholar
  11. 11.
    Healy, M., Newe, T., Lewis, E.: Analysis of hardware encryption versus software encryption on wireless sensor network motes. In: Mukhopadhyay, S.C., Gupta, G.S. (eds.) Smart Sensors and Sensing Technology. LNEE, vol. 20, pp. 3–14. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  12. 12.
    Meingast, S., Roosta, T., Lewis, E.: Security and privacy issues with health-care information technology. In: Proceedings of the 28th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, pp. 5453–5458 (2006)Google Scholar
  13. 13.
    Cherukuri, S., Venkatasubramanian, K., Gupta, S.: Biosec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human body. In: Proceedings of International Conference on Parallel Processing Workshops, October 2003Google Scholar
  14. 14.
    Poon, C., Zhang, Y.T., Bao, S.D.: A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health. IEEE Commun. Mag. 4, 73–81 (2006)CrossRefGoogle Scholar
  15. 15.
    Montenegro, G., Kushalnagar, N., Hui, J., Culler, D.: Transmission of IPv6 packets over IEEE 802.15.4 networks. RFC 4944, IETF (2007)Google Scholar
  16. 16.
    Hui, J., Thubert, P.: Compression format for IPv6 datagrams over IEEE 802.15.4-based networks. RFC 6282, IETF (2011)Google Scholar
  17. 17.
    Granjal, J., Monteiro, E., Silva, J.S.: Enabling network-layer security on IPv6 wireless sensor networks. In: Proceedings of IEEE GLOBECOM (2010)Google Scholar
  18. 18.
    Raza, S., Duquennoy, S., Chung, T., Yazar, D., Voigt, T., Roedig, U.: Securing communication in 6LoWPAN with compressed IPsec. In: Proceedings of IEEE DCOSS (2011)Google Scholar
  19. 19.
    Abdmeziem, R., Tandjaoui, D.: Tailoring mikey-ticket to e-health applications in the context of internet of things. In: Proceedings of International Conference on Advanced Networking, Distributed Systems and Applications (INDS’2014) (2014)Google Scholar
  20. 20.
    Raza, S., Voigt, T., Jutvik, V.: Lightweight IKEv2: a key management solution for both compressed IPsec and IEEE 802.15.4 security. In: IETF/IAB Workshop on Smart Object Security (2012)Google Scholar
  21. 21.
    Hummen, R., Wirtz, H., Ziegeldorf, J.H., Hiller, J., Wehrle, K.: Tailoring end-to-end IP security protocols to the internet of things. In: Proceedings of IEEE ICNP (2013)Google Scholar
  22. 22.
    Saied, Y.B., Olivereau, A.: D-hip: a distributed key exchange scheme for hip-based internet of things. In: Proceedings of IEEE WoWMoM (2012)Google Scholar
  23. 23.
    Bonetto, R., Bui, N., Lakkundi, V., Olivereau, A., Serbanati, A., Rossi, M.: Secure communication for smart iot objects: protocol stacks, use cases and practical examples. In: Proceedings of IEEE WoWMoM (2012)Google Scholar
  24. 24.
    Freeman, T., Housley, R., Malpani, A., Cooper, D., Polk, W.: Server-based certificate validation protocol (SCVP). RFC 5055, IETF (2007)Google Scholar
  25. 25.
    Reed, S., Solomon, G.: Polynomial codes over certain finite fields. J. Soc. Ind. Appl. Math. 8, 300–304 (1960)CrossRefzbMATHMathSciNetGoogle Scholar
  26. 26.
    Roman, R., Alcaraz, C., Lopez, J., Sklavos, N.: Key management systems for sensor networks in the context of internet of things. Comput. Electr. Eng. 37, 147–159 (2011)CrossRefGoogle Scholar
  27. 27.
    Dworkin, M.: Recommendation for block cipher modes of operation: the CCM mode for authentication and confidentiality. SP-800-38c, NIST, US Department of Commerce (2007)Google Scholar
  28. 28.
    Tsiftes, N., Dunkels, A.: A database in every sensor. In: Proceedings of the 9th ACM Conference on Embedded Networked Sensor Systems (2011)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2015

Authors and Affiliations

  1. 1.LSIUSTHB: University of Sciences and Technology Houari BoumedienneAlgiersAlgeria
  2. 2.CERIST: Center for Research on Scientific and Technical InformationBen Aknoun, AlgiersAlgeria

Personalised recommendations