Skip to main content

2022 | OriginalPaper | Buchkapitel

Comparative Analysis of Bluetooth LE and EDHOC for Potential Security Protocol in Artificial Pancreas System

verfasst von : Daniel Gerbi Duguma, Philip Virgil Astillo, Yonas Engida Gebremariam, Bonam Kim, Ilsun You

Erschienen in: Mobile Internet Security

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The Internet of Things (IoT) has shown to be beneficial in today’s increasingly connected world. IoT has transformed nearly every industry, opening up huge opportunities for future innovation and progress. The Internet of Medical Things (IoMT), as one important application area of IoT, has changed healthcare delivery, such as by playing a crucial role in treating diabetic patients with the use of Artificial Pancreas System (APS). On the other hand, a slew of current and new security threats have put IMoT’s ability to offer services safely in jeopardy. Hence, it is critical to minimize these security problems, such as by safeguarding information traveling from one IMoT device to another. In this context, we investigated two vital protocols for secure communication in APS: Bluetooth Low Energy (LE) and Ephemeral Diffie-Hellman over COSE (EDHOC). Consequently, we performed an experimental evaluation of these protocols based on a number of performance metrics, including protocol execution time, transmission cost, and total round-trip time. As a result, while both protocols perform similarly in terms of the first metrics, Bluetooth LE excels in terms of transmission cost, and EDHOC outperforms in terms of round-trip time.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Alizadeh, M., Andersson, K., Schelén, O.: A survey of secure internet of things in relation to blockchain. J. Internet Serv. Inf. Secur. (JISIS) 10(3), 47–75 (2020) Alizadeh, M., Andersson, K., Schelén, O.: A survey of secure internet of things in relation to blockchain. J. Internet Serv. Inf. Secur. (JISIS) 10(3), 47–75 (2020)
2.
Zurück zum Zitat Angin, P., Anisi, M.H., Göksel, F., Gürsoy, C., Büyükgülcü, A.: AgriLoRa: a digital twin framework for smart agriculture. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. 11(4), 77–96 (2020) Angin, P., Anisi, M.H., Göksel, F., Gürsoy, C., Büyükgülcü, A.: AgriLoRa: a digital twin framework for smart agriculture. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. 11(4), 77–96 (2020)
3.
Zurück zum Zitat Bembenik, R., Falcman, K.: BLE indoor positioning system using RSSI-based trilateration. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. 11(3), 50–69 (2020) Bembenik, R., Falcman, K.: BLE indoor positioning system using RSSI-based trilateration. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. 11(3), 50–69 (2020)
4.
Zurück zum Zitat Caputo, D., Verderame, L., Ranieri, A., Merlo, A., Caviglione, L.: Fine-hearing google home: why silence will not protect your privacy. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. 11(1), 35–53 (2020) Caputo, D., Verderame, L., Ranieri, A., Merlo, A., Caviglione, L.: Fine-hearing google home: why silence will not protect your privacy. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. 11(1), 35–53 (2020)
5.
Zurück zum Zitat Chen, H., Jia, X., Li, H.: A brief introduction to IoT gateway. In: IET International Conference on Communication Technology and Application (ICCTA 2011), pp. 610–613. IET (2011) Chen, H., Jia, X., Li, H.: A brief introduction to IoT gateway. In: IET International Conference on Communication Technology and Application (ICCTA 2011), pp. 610–613. IET (2011)
10.
Zurück zum Zitat Gajbhiye, S., Karmakar, S., Sharma, M., Sharma, S.: Two-party secure connection in bluetooth-enabled devices. Inf. Secur. J.: Glob. Perspect. 27(1), 42–56 (2018) Gajbhiye, S., Karmakar, S., Sharma, M., Sharma, S.: Two-party secure connection in bluetooth-enabled devices. Inf. Secur. J.: Glob. Perspect. 27(1), 42–56 (2018)
11.
Zurück zum Zitat Gajbhiye, S., Sharma, M., Karmkar, S., Sharma, S.: Design, implementation and security analysis of bluetooth pairing protocol in NS2. In: 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 1711–1717. IEEE (2016) Gajbhiye, S., Sharma, M., Karmkar, S., Sharma, S.: Design, implementation and security analysis of bluetooth pairing protocol in NS2. In: 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 1711–1717. IEEE (2016)
13.
Zurück zum Zitat Pérez, S., Hernández-Ramos, J.L., Raza, S., Skarmeta, A.: Application layer key establishment for end-to-end security in IoT. IEEE Internet Things J. 7(3), 2117–2128 (2019)CrossRef Pérez, S., Hernández-Ramos, J.L., Raza, S., Skarmeta, A.: Application layer key establishment for end-to-end security in IoT. IEEE Internet Things J. 7(3), 2117–2128 (2019)CrossRef
14.
Zurück zum Zitat Rescorla, E., Modadugu, N.: Datagram transport layer security version 1.2 (2012) Rescorla, E., Modadugu, N.: Datagram transport layer security version 1.2 (2012)
16.
Zurück zum Zitat Shelby, Z., Hartke, K., Bormann, C.: The constrained application protocol (CoAP) (2014) Shelby, Z., Hartke, K., Bormann, C.: The constrained application protocol (CoAP) (2014)
17.
Zurück zum Zitat Shichkina, Y.A., Kataeva, G.V., Irishina, Y.A., Stanevich, E.S.: The use of mobile phones to monitor the status of patients with parkinson’s disease. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. 11(2), 55–73 (2020) Shichkina, Y.A., Kataeva, G.V., Irishina, Y.A., Stanevich, E.S.: The use of mobile phones to monitor the status of patients with parkinson’s disease. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. 11(2), 55–73 (2020)
18.
Zurück zum Zitat Sun, D.Z., Sun, L.: On secure simple pairing in bluetooth standard v5. 0-part i: authenticated link key security and its home automation and entertainment applications. Sensors 19(5), 1158 (2019)CrossRef Sun, D.Z., Sun, L.: On secure simple pairing in bluetooth standard v5. 0-part i: authenticated link key security and its home automation and entertainment applications. Sensors 19(5), 1158 (2019)CrossRef
19.
Zurück zum Zitat Wong, S.K., Yiu, S.M.: Identification of device motion status via bluetooth discovery. J. Internet Serv. Inf. Secur. 10(4), 59–69 (2020) Wong, S.K., Yiu, S.M.: Identification of device motion status via bluetooth discovery. J. Internet Serv. Inf. Secur. 10(4), 59–69 (2020)
20.
Zurück zum Zitat Wong, S.K., Yiu, S.M.: Location spoofing attack detection with pre-installed sensors in mobile devices. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. 11(4), 16–30 (2020) Wong, S.K., Yiu, S.M.: Location spoofing attack detection with pre-installed sensors in mobile devices. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. 11(4), 16–30 (2020)
21.
Zurück zum Zitat Woolley, M.: Bluetooth core specification v5. In: Bluetooth (2019) Woolley, M.: Bluetooth core specification v5. In: Bluetooth (2019)
22.
Zurück zum Zitat Yeh, T.C., Peng, J.R., Wang, S.S., Hsu, J.P.: Securing bluetooth communications. Int. J. Netw. Secur. 14(4), 229–235 (2012) Yeh, T.C., Peng, J.R., Wang, S.S., Hsu, J.P.: Securing bluetooth communications. Int. J. Netw. Secur. 14(4), 229–235 (2012)
23.
Zurück zum Zitat Zhong, C.L., Zhu, Z., Huang, R.G.: Study on the iot architecture and gateway technology. In: 2015 14th International Symposium on Distributed Computing and Applications for Business Engineering and Science (DCABES), pp. 196–199. IEEE (2015) Zhong, C.L., Zhu, Z., Huang, R.G.: Study on the iot architecture and gateway technology. In: 2015 14th International Symposium on Distributed Computing and Applications for Business Engineering and Science (DCABES), pp. 196–199. IEEE (2015)
Metadaten
Titel
Comparative Analysis of Bluetooth LE and EDHOC for Potential Security Protocol in Artificial Pancreas System
verfasst von
Daniel Gerbi Duguma
Philip Virgil Astillo
Yonas Engida Gebremariam
Bonam Kim
Ilsun You
Copyright-Jahr
2022
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-16-9576-6_3

Premium Partner