Skip to main content
Top

2015 | OriginalPaper | Chapter

A Cooperative End to End Key Management Scheme for E-health Applications in the Context of Internet of Things

Authors : Mohammed Riyadh Abdmeziem, Djamel Tandjaoui

Published in: Ad-hoc Networks and Wireless

Publisher: Springer Berlin Heidelberg

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In the context of Internet of Things where real world objects will automatically be part of the Internet, e-health applications have emerged as a promising approach to provide unobtrusive support for elderly and frail people. However, due to the limited resources available and privacy concerns, security issues constitute a major obstacle to their deployment. Among these issues, key distribution for heterogeneous nodes is problematic due to the inconsistencies in their cryptographic primitives. This paper introduces a new key management scheme that aims to establish session keys for highly resource-constrained nodes ensuring security protection through strong encryption and authentication means. Our protocol is based on collaboration by offloading heavy asymmetric cryptographic operations to a set of third parties. The generated shared secret is then used to derive further credentials. Security analysis demonstrates that our protocol provides strong security features while the scarcity of resources is taken into consideration.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54, 2787–2805 (2010)CrossRefMATH Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54, 2787–2805 (2010)CrossRefMATH
2.
go back to reference Istepanian, R., Jara, A., Sungoor, A., Philips, N.: Internet of things for m-health applications (IOMT). In: AMA-IEEE Medical Technology Conference on Individualized Healthcare, Washington DC (2010) Istepanian, R., Jara, A., Sungoor, A., Philips, N.: Internet of things for m-health applications (IOMT). In: AMA-IEEE Medical Technology Conference on Individualized Healthcare, Washington DC (2010)
3.
go back to reference Dohr, A., Modre-Opsrian, R., Drobics, M., Hayn, D., Schreier, G.: The internet of things for ambient assisted living. In: Information Technology: New Generations (ITNG), pp. 804–809, April 2010 Dohr, A., Modre-Opsrian, R., Drobics, M., Hayn, D., Schreier, G.: The internet of things for ambient assisted living. In: Information Technology: New Generations (ITNG), pp. 804–809, April 2010
4.
go back to reference Patel, M., Wang, J.: Applications, challenges, and prospective in emerging body area networking technologies. Wirel. Commun. 17, 80–88 (2010)CrossRef Patel, M., Wang, J.: Applications, challenges, and prospective in emerging body area networking technologies. Wirel. Commun. 17, 80–88 (2010)CrossRef
6.
go back to reference Javadi, S.S., Razzaque, M.A.: Security and privacy in wireless body area networks for health care applications. In: Khan, S., Khan Pathan, A.-S. (eds.) Wireless Networks and Security. SCT, pp. 165–187. Springer, Heidelberg (2013)CrossRef Javadi, S.S., Razzaque, M.A.: Security and privacy in wireless body area networks for health care applications. In: Khan, S., Khan Pathan, A.-S. (eds.) Wireless Networks and Security. SCT, pp. 165–187. Springer, Heidelberg (2013)CrossRef
7.
go back to reference Lim, S., Oh, T., Choi, Y., Lakshman, T.: Security issues on wireless body area network for remote healthcare monitoring. In: IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC), pp. 327–332, February 2010 Lim, S., Oh, T., Choi, Y., Lakshman, T.: Security issues on wireless body area network for remote healthcare monitoring. In: IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC), pp. 327–332, February 2010
8.
go back to reference Ng, H.S., Sim, M., Tan, C.: Security issues of wireless sensor networks in healthcare applications. BT Technol. J. 24(2), 138–144 (2006)CrossRef Ng, H.S., Sim, M., Tan, C.: Security issues of wireless sensor networks in healthcare applications. BT Technol. J. 24(2), 138–144 (2006)CrossRef
9.
go back to reference Ameen, M.A., Liu, J., Kwak, K.: Security and privacy issues in wireless sensor networks for healthcare applications. J. Med. Syst. 36, 93–101 (2012)CrossRef Ameen, M.A., Liu, J., Kwak, K.: Security and privacy issues in wireless sensor networks for healthcare applications. J. Med. Syst. 36, 93–101 (2012)CrossRef
10.
go back to reference Karlof, C., Sastry, N., Wagner, D.: Tinysec: a link layer security architecture for wireless sensor networks. In: Second ACM Conference on Embedded Networked Sensor Systems, November 2004 Karlof, C., Sastry, N., Wagner, D.: Tinysec: a link layer security architecture for wireless sensor networks. In: Second ACM Conference on Embedded Networked Sensor Systems, November 2004
11.
go back to reference Healy, M., Newe, T., Lewis, E.: Analysis of hardware encryption versus software encryption on wireless sensor network motes. In: Mukhopadhyay, S.C., Gupta, G.S. (eds.) Smart Sensors and Sensing Technology. LNEE, vol. 20, pp. 3–14. Springer, Heidelberg (2008)CrossRef Healy, M., Newe, T., Lewis, E.: Analysis of hardware encryption versus software encryption on wireless sensor network motes. In: Mukhopadhyay, S.C., Gupta, G.S. (eds.) Smart Sensors and Sensing Technology. LNEE, vol. 20, pp. 3–14. Springer, Heidelberg (2008)CrossRef
12.
go back to reference Meingast, S., Roosta, T., Lewis, E.: Security and privacy issues with health-care information technology. In: Proceedings of the 28th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, pp. 5453–5458 (2006) Meingast, S., Roosta, T., Lewis, E.: Security and privacy issues with health-care information technology. In: Proceedings of the 28th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, pp. 5453–5458 (2006)
13.
go back to reference Cherukuri, S., Venkatasubramanian, K., Gupta, S.: Biosec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human body. In: Proceedings of International Conference on Parallel Processing Workshops, October 2003 Cherukuri, S., Venkatasubramanian, K., Gupta, S.: Biosec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human body. In: Proceedings of International Conference on Parallel Processing Workshops, October 2003
14.
go back to reference Poon, C., Zhang, Y.T., Bao, S.D.: A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health. IEEE Commun. Mag. 4, 73–81 (2006)CrossRef Poon, C., Zhang, Y.T., Bao, S.D.: A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health. IEEE Commun. Mag. 4, 73–81 (2006)CrossRef
15.
go back to reference Montenegro, G., Kushalnagar, N., Hui, J., Culler, D.: Transmission of IPv6 packets over IEEE 802.15.4 networks. RFC 4944, IETF (2007) Montenegro, G., Kushalnagar, N., Hui, J., Culler, D.: Transmission of IPv6 packets over IEEE 802.15.4 networks. RFC 4944, IETF (2007)
16.
go back to reference Hui, J., Thubert, P.: Compression format for IPv6 datagrams over IEEE 802.15.4-based networks. RFC 6282, IETF (2011) Hui, J., Thubert, P.: Compression format for IPv6 datagrams over IEEE 802.15.4-based networks. RFC 6282, IETF (2011)
17.
go back to reference Granjal, J., Monteiro, E., Silva, J.S.: Enabling network-layer security on IPv6 wireless sensor networks. In: Proceedings of IEEE GLOBECOM (2010) Granjal, J., Monteiro, E., Silva, J.S.: Enabling network-layer security on IPv6 wireless sensor networks. In: Proceedings of IEEE GLOBECOM (2010)
18.
go back to reference Raza, S., Duquennoy, S., Chung, T., Yazar, D., Voigt, T., Roedig, U.: Securing communication in 6LoWPAN with compressed IPsec. In: Proceedings of IEEE DCOSS (2011) Raza, S., Duquennoy, S., Chung, T., Yazar, D., Voigt, T., Roedig, U.: Securing communication in 6LoWPAN with compressed IPsec. In: Proceedings of IEEE DCOSS (2011)
19.
go back to reference Abdmeziem, R., Tandjaoui, D.: Tailoring mikey-ticket to e-health applications in the context of internet of things. In: Proceedings of International Conference on Advanced Networking, Distributed Systems and Applications (INDS’2014) (2014) Abdmeziem, R., Tandjaoui, D.: Tailoring mikey-ticket to e-health applications in the context of internet of things. In: Proceedings of International Conference on Advanced Networking, Distributed Systems and Applications (INDS’2014) (2014)
20.
go back to reference Raza, S., Voigt, T., Jutvik, V.: Lightweight IKEv2: a key management solution for both compressed IPsec and IEEE 802.15.4 security. In: IETF/IAB Workshop on Smart Object Security (2012) Raza, S., Voigt, T., Jutvik, V.: Lightweight IKEv2: a key management solution for both compressed IPsec and IEEE 802.15.4 security. In: IETF/IAB Workshop on Smart Object Security (2012)
21.
go back to reference Hummen, R., Wirtz, H., Ziegeldorf, J.H., Hiller, J., Wehrle, K.: Tailoring end-to-end IP security protocols to the internet of things. In: Proceedings of IEEE ICNP (2013) Hummen, R., Wirtz, H., Ziegeldorf, J.H., Hiller, J., Wehrle, K.: Tailoring end-to-end IP security protocols to the internet of things. In: Proceedings of IEEE ICNP (2013)
22.
go back to reference Saied, Y.B., Olivereau, A.: D-hip: a distributed key exchange scheme for hip-based internet of things. In: Proceedings of IEEE WoWMoM (2012) Saied, Y.B., Olivereau, A.: D-hip: a distributed key exchange scheme for hip-based internet of things. In: Proceedings of IEEE WoWMoM (2012)
23.
go back to reference Bonetto, R., Bui, N., Lakkundi, V., Olivereau, A., Serbanati, A., Rossi, M.: Secure communication for smart iot objects: protocol stacks, use cases and practical examples. In: Proceedings of IEEE WoWMoM (2012) Bonetto, R., Bui, N., Lakkundi, V., Olivereau, A., Serbanati, A., Rossi, M.: Secure communication for smart iot objects: protocol stacks, use cases and practical examples. In: Proceedings of IEEE WoWMoM (2012)
24.
go back to reference Freeman, T., Housley, R., Malpani, A., Cooper, D., Polk, W.: Server-based certificate validation protocol (SCVP). RFC 5055, IETF (2007) Freeman, T., Housley, R., Malpani, A., Cooper, D., Polk, W.: Server-based certificate validation protocol (SCVP). RFC 5055, IETF (2007)
26.
go back to reference Roman, R., Alcaraz, C., Lopez, J., Sklavos, N.: Key management systems for sensor networks in the context of internet of things. Comput. Electr. Eng. 37, 147–159 (2011)CrossRef Roman, R., Alcaraz, C., Lopez, J., Sklavos, N.: Key management systems for sensor networks in the context of internet of things. Comput. Electr. Eng. 37, 147–159 (2011)CrossRef
27.
go back to reference Dworkin, M.: Recommendation for block cipher modes of operation: the CCM mode for authentication and confidentiality. SP-800-38c, NIST, US Department of Commerce (2007) Dworkin, M.: Recommendation for block cipher modes of operation: the CCM mode for authentication and confidentiality. SP-800-38c, NIST, US Department of Commerce (2007)
28.
go back to reference Tsiftes, N., Dunkels, A.: A database in every sensor. In: Proceedings of the 9th ACM Conference on Embedded Networked Sensor Systems (2011) Tsiftes, N., Dunkels, A.: A database in every sensor. In: Proceedings of the 9th ACM Conference on Embedded Networked Sensor Systems (2011)
Metadata
Title
A Cooperative End to End Key Management Scheme for E-health Applications in the Context of Internet of Things
Authors
Mohammed Riyadh Abdmeziem
Djamel Tandjaoui
Copyright Year
2015
Publisher
Springer Berlin Heidelberg
DOI
https://doi.org/10.1007/978-3-662-46338-3_4

Premium Partner