Skip to main content
Erschienen in: The Journal of Supercomputing 6/2021

09.11.2020

Highly efficient key agreement for remote patient monitoring in MEC-enabled 5G networks

verfasst von: An Braeken, Madhusanka Liyanage

Erschienen in: The Journal of Supercomputing | Ausgabe 6/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Remote patient monitoring is one of the cornerstones to enable Ambient Assisted Living. Here, a set of devices provide their corresponding input, which should be carefully aggregated and analysed to derive health-related conclusions. In the new Fifth-Generation (5G) networks, Internet of Things (IoT) devices communicate directly to the mobile network without any need of proxy devices. Moreover, 5G networks consist of Multi-access Edge Computing (MEC) nodes, which are taking the role of a mini-cloud, able to provide sufficient computation and storage capacity at the edge of the network. MEC IoT integration in 5G offers a lot of benefits such as high availability, high scalability, low backhaul bandwidth costs, low latency, local awareness and additional security and privacy. In this paper, we first detail the procedure on how to establish such remote monitoring in 5G networks. Next, we focus on the key agreement between IoT, MEC and registration center in order to guarantee mutual authentication, anonymity, and unlinkability properties. Taking into account the high heterogeneity of IoT devices that can contribute to an accurate image of the health status of a patient, it is of utmost importance to design a very lightweight scheme that allows even the smallest devices to participate. The proposed protocol is symmetric key based and thus highly efficient. Moreover, it is shown that the required security features are established and protection against the most of the well-known attacks is guaranteed.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Aazam M, Harras KA, Zeadally S (2019) Fog computing for 5G tactile industrial internet of things: Qoe-aware resource allocation model. IEEE Trans Ind Inform 15(5):3085–3092CrossRef Aazam M, Harras KA, Zeadally S (2019) Fog computing for 5G tactile industrial internet of things: Qoe-aware resource allocation model. IEEE Trans Ind Inform 15(5):3085–3092CrossRef
2.
Zurück zum Zitat Al Hamid HA, Rahman SMM, Hossain MS, Almogren A, Alamri A (2017) A security model for preserving the privacy of medical big data in a healthcare cloud using a fog computing facility with pairing-based cryptography. IEEE Access 5:22313–22328CrossRef Al Hamid HA, Rahman SMM, Hossain MS, Almogren A, Alamri A (2017) A security model for preserving the privacy of medical big data in a healthcare cloud using a fog computing facility with pairing-based cryptography. IEEE Access 5:22313–22328CrossRef
3.
Zurück zum Zitat Almehmadi T, Alshehri S, Tahir S (2019) A secure fog-cloud based architecture for MIoT. In: 2019 2nd International Conference on Computer Applications and Information Security (ICCAIS). IEEE, pp 1–6 Almehmadi T, Alshehri S, Tahir S (2019) A secure fog-cloud based architecture for MIoT. In: 2019 2nd International Conference on Computer Applications and Information Security (ICCAIS). IEEE, pp 1–6
4.
Zurück zum Zitat Amin R, Kumar N, Biswas G, Iqbal R, Chang V (2018) A light weight authentication protocol for iot-enabled devices in distributed cloud computing environment. Future Gener Comput Syst 78:1005–1019CrossRef Amin R, Kumar N, Biswas G, Iqbal R, Chang V (2018) A light weight authentication protocol for iot-enabled devices in distributed cloud computing environment. Future Gener Comput Syst 78:1005–1019CrossRef
5.
Zurück zum Zitat Arkko J, Lehtovirta V, Eronen P (2009) Improved extensible authentication protocol method for 3rd generation authentication and key agreement (EAP-AKA’). Netw Work Group Req Comments 5448:1–29 Arkko J, Lehtovirta V, Eronen P (2009) Improved extensible authentication protocol method for 3rd generation authentication and key agreement (EAP-AKA’). Netw Work Group Req Comments 5448:1–29
6.
Zurück zum Zitat Bonomi F (2011) Connected vehicles, the internet of things, and fog computing, Vehicular Ad Hoc Networks (VANET) 2011 Bonomi F (2011) Connected vehicles, the internet of things, and fog computing, Vehicular Ad Hoc Networks (VANET) 2011
7.
Zurück zum Zitat Bonomi F, Milito R, Natarajan P, Zhu J (2014) Fog computing: a platform for internet of things and analytics. In: Bessis N, Dobre C (eds) Big Data and Internet of Things: A Roadmap for Smart Environments. Springer, Cham, pp 169–186CrossRef Bonomi F, Milito R, Natarajan P, Zhu J (2014) Fog computing: a platform for internet of things and analytics. In: Bessis N, Dobre C (eds) Big Data and Internet of Things: A Roadmap for Smart Environments. Springer, Cham, pp 169–186CrossRef
8.
Zurück zum Zitat Bonomi F, Milito R, Zhu J, Addepalli S (2012) Fog computing and its role in the internet of things. In: Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing. pp 13–16 Bonomi F, Milito R, Zhu J, Addepalli S (2012) Fog computing and its role in the internet of things. In: Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing. pp 13–16
9.
Zurück zum Zitat Braeken A (2020) Highly efficient symmetric key based authentication and key agreement protocol using keccak. Sensors 20(8):2160CrossRef Braeken A (2020) Highly efficient symmetric key based authentication and key agreement protocol using keccak. Sensors 20(8):2160CrossRef
10.
Zurück zum Zitat Braeken A, Kumar P, Martin A (2018) Efficient and provably secure key agreement for modern smart metering communications. Energies 11(10):2662CrossRef Braeken A, Kumar P, Martin A (2018) Efficient and provably secure key agreement for modern smart metering communications. Energies 11(10):2662CrossRef
11.
Zurück zum Zitat Braeken A, Liyanage M, Kumar P, Murphy J (2019) Novel 5G authentication protocol to improve the resistance against active attacks and malicious serving networks. IEEE Access 7:64040–64052CrossRef Braeken A, Liyanage M, Kumar P, Murphy J (2019) Novel 5G authentication protocol to improve the resistance against active attacks and malicious serving networks. IEEE Access 7:64040–64052CrossRef
12.
Zurück zum Zitat Braeken A, Porambage P (2015) ASEC: Anonym signcryption scheme based on EC operations. Int J Comput Appl 5(7):90–96 Braeken A, Porambage P (2015) ASEC: Anonym signcryption scheme based on EC operations. Int J Comput Appl 5(7):90–96
13.
Zurück zum Zitat Carlier M, Steenhaut K, Braeken A (2019) Symmetric-key-based security for multicast communication in wireless sensor networks. Computers 8(1):27CrossRef Carlier M, Steenhaut K, Braeken A (2019) Symmetric-key-based security for multicast communication in wireless sensor networks. Computers 8(1):27CrossRef
14.
Zurück zum Zitat Chen CM, Huang Y, Wang KH, Kumari S, Wu ME (2020) A secure authenticated and key exchange scheme for fog computing. Enterp Inf Syst 1–16 Chen CM, Huang Y, Wang KH, Kumari S, Wu ME (2020) A secure authenticated and key exchange scheme for fog computing. Enterp Inf Syst 1–16
15.
Zurück zum Zitat Chen CM, Xiang B, Wu TY, Wang KH (2018) An anonymous mutual authenticated key agreement scheme for wearable sensors in wireless body area networks. Appl Sci 8(7):1074CrossRef Chen CM, Xiang B, Wu TY, Wang KH (2018) An anonymous mutual authenticated key agreement scheme for wearable sensors in wireless body area networks. Appl Sci 8(7):1074CrossRef
16.
Zurück zum Zitat Choi Y, Lee D, Kim J, Jung J, Nam J, Won D (2014) Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 14(6):10081–10106CrossRef Choi Y, Lee D, Kim J, Jung J, Nam J, Won D (2014) Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 14(6):10081–10106CrossRef
17.
Zurück zum Zitat Delvaux J (2017) Security analysis of PUF-based key generation and entity authentication. Ph.D. dissertation Delvaux J (2017) Security analysis of PUF-based key generation and entity authentication. Ph.D. dissertation
18.
Zurück zum Zitat Dinarvand N, Barati H (2019) An efficient and secure RFID authentication protocol using elliptic curve cryptography. Wirel Netw 25(1):415–428CrossRef Dinarvand N, Barati H (2019) An efficient and secure RFID authentication protocol using elliptic curve cryptography. Wirel Netw 25(1):415–428CrossRef
19.
Zurück zum Zitat Hou X, Li Y, Chen M, Wu D, Jin D, Chen S (2016) Vehicular fog computing: a viewpoint of vehicles as the infrastructures. IEEE Trans Veh Technol 65(6):3860–3873CrossRef Hou X, Li Y, Chen M, Wu D, Jin D, Chen S (2016) Vehicular fog computing: a viewpoint of vehicles as the infrastructures. IEEE Trans Veh Technol 65(6):3860–3873CrossRef
20.
Zurück zum Zitat Hu VC, Kuhn DR, Ferraiolo DF, Voas J (2015) Attribute-based access control. Computer 48(2):85–88CrossRef Hu VC, Kuhn DR, Ferraiolo DF, Voas J (2015) Attribute-based access control. Computer 48(2):85–88CrossRef
22.
Zurück zum Zitat Jia X, He D, Kumar N, Choo KKR (2019) Authenticated key agreement scheme for fog-driven iot healthcare system. Wirel Netw 25(8):4737–4750CrossRef Jia X, He D, Kumar N, Choo KKR (2019) Authenticated key agreement scheme for fog-driven iot healthcare system. Wirel Netw 25(8):4737–4750CrossRef
23.
Zurück zum Zitat Kassab W, Darabkh KA (2020) A–z survey of internet of things: architectures, protocols, applications, recent advances, future directions and recommendations. J Netw Comput Appl 163:102663CrossRef Kassab W, Darabkh KA (2020) A–z survey of internet of things: architectures, protocols, applications, recent advances, future directions and recommendations. J Netw Comput Appl 163:102663CrossRef
24.
Zurück zum Zitat Kekki S, Featherstone W, Fang Y, Kuure P, Li A, Ranjan A, Purkayastha D, Jiangping F, Frydman D, Verin G et al (2018) Mec in 5G networks. ETSI White Pap 28:1–28 Kekki S, Featherstone W, Fang Y, Kuure P, Li A, Ranjan A, Purkayastha D, Jiangping F, Frydman D, Verin G et al (2018) Mec in 5G networks. ETSI White Pap 28:1–28
25.
Zurück zum Zitat Koutsos A (2019) The 5G-AKA authentication protocol privacy. In: 2019 IEEE European Symposium on Security and Privacy (EuroS&P). IEEE, pp 464–479 Koutsos A (2019) The 5G-AKA authentication protocol privacy. In: 2019 IEEE European Symposium on Security and Privacy (EuroS&P). IEEE, pp 464–479
26.
Zurück zum Zitat Kumar P, Braeken A, Gurtov A, Iinatti J, Ha PH (2017) Anonymous secure framework in connected smart home environments. IEEE Trans Inf Forensics Secur 12(4):968–979CrossRef Kumar P, Braeken A, Gurtov A, Iinatti J, Ha PH (2017) Anonymous secure framework in connected smart home environments. IEEE Trans Inf Forensics Secur 12(4):968–979CrossRef
27.
Zurück zum Zitat Kumar P, Choudhury AJ, Sain M, Lee SG, Lee HJ (2011) RUASN: A robust user authentication framework for wireless sensor networks. Sensors 11(5):5020–5046CrossRef Kumar P, Choudhury AJ, Sain M, Lee SG, Lee HJ (2011) RUASN: A robust user authentication framework for wireless sensor networks. Sensors 11(5):5020–5046CrossRef
28.
Zurück zum Zitat Liu CL, Tsai WJ, Chang TY, Liu TM (2018) Ephemeral-secret-leakage secure ID-based three-party authenticated key agreement protocol for mobile distributed computing environments. Symmetry 10(4):84MATHCrossRef Liu CL, Tsai WJ, Chang TY, Liu TM (2018) Ephemeral-secret-leakage secure ID-based three-party authenticated key agreement protocol for mobile distributed computing environments. Symmetry 10(4):84MATHCrossRef
29.
Zurück zum Zitat Liyanage M, Gurtov A, Ylianttila M (2015) Software defined mobile networks (SDMN): beyond LTE network architecture. Wiley, HobokenCrossRef Liyanage M, Gurtov A, Ylianttila M (2015) Software defined mobile networks (SDMN): beyond LTE network architecture. Wiley, HobokenCrossRef
30.
Zurück zum Zitat Mach P, Becvar Z (2017) Mobile edge computing: a survey on architecture and computation offloading. IEEE Commun Surv Tutor 19(3):1628–1656CrossRef Mach P, Becvar Z (2017) Mobile edge computing: a survey on architecture and computation offloading. IEEE Commun Surv Tutor 19(3):1628–1656CrossRef
31.
Zurück zum Zitat Mukherjee M, Shu L, Wang D (2018) Survey of fog computing: fundamental, network applications, and research challenges. IEEE Commun Surv Tutor 20(3):1826–1857CrossRef Mukherjee M, Shu L, Wang D (2018) Survey of fog computing: fundamental, network applications, and research challenges. IEEE Commun Surv Tutor 20(3):1826–1857CrossRef
32.
Zurück zum Zitat Mutlag AA, Ghani MKA, Na Arunkumar, Mohammed MA, Mohd O (2019) Enabling technologies for fog computing in healthcare IoT systems. Future Gener Comput Syst 90:62–78CrossRef Mutlag AA, Ghani MKA, Na Arunkumar, Mohammed MA, Mohd O (2019) Enabling technologies for fog computing in healthcare IoT systems. Future Gener Comput Syst 90:62–78CrossRef
33.
Zurück zum Zitat Patel M, Naughton B, Chan C, Sprecher N, Abeta S, Neal A, et al (2014) Mobile-edge computing introductory technical white paper. White paper, mobile-edge computing (MEC) industry initiative. pp 1089–7801 Patel M, Naughton B, Chan C, Sprecher N, Abeta S, Neal A, et al (2014) Mobile-edge computing introductory technical white paper. White paper, mobile-edge computing (MEC) industry initiative. pp 1089–7801
34.
Zurück zum Zitat Patonico S (2020) Study and analysis of security features for internet of things devices in a ONEM2M-based architecture. Ph.D. thesis Patonico S (2020) Study and analysis of security features for internet of things devices in a ONEM2M-based architecture. Ph.D. thesis
35.
Zurück zum Zitat Patonico S, Braeken A, Steenhaut K (2019) Identity-based and anonymous key agreement protocol for fog computing resistant in the canetti–krawczyk security model. Wirel Netw 1–13 Patonico S, Braeken A, Steenhaut K (2019) Identity-based and anonymous key agreement protocol for fog computing resistant in the canetti–krawczyk security model. Wirel Netw 1–13
36.
Zurück zum Zitat Porambage P, Okwuibe J, Liyanage M, Ylianttila M, Taleb T (2018) Survey on multi-access edge computing for internet of things realization. IEEE Commun Surv Tutor 20(4):2961–2991CrossRef Porambage P, Okwuibe J, Liyanage M, Ylianttila M, Taleb T (2018) Survey on multi-access edge computing for internet of things realization. IEEE Commun Surv Tutor 20(4):2961–2991CrossRef
37.
Zurück zum Zitat Rubin AD, Honeyman P (1994) Nonmonotonic cryptographic protocols. In: Proceedings The Computer Security Foundations Workshop VII. IEEE, pp 100–116 Rubin AD, Honeyman P (1994) Nonmonotonic cryptographic protocols. In: Proceedings The Computer Security Foundations Workshop VII. IEEE, pp 100–116
38.
Zurück zum Zitat Satyanarayanan M, Bahl P, Caceres R, Davies N (2009) The case for VM-based cloudlets in mobile computing. IEEE Pervasive Comput 8(4):14–23CrossRef Satyanarayanan M, Bahl P, Caceres R, Davies N (2009) The case for VM-based cloudlets in mobile computing. IEEE Pervasive Comput 8(4):14–23CrossRef
40.
Zurück zum Zitat Simon D, Aboba B, Hurst R, et al (2008) The EAP-TLS authentication protocol. RFC 5216 Simon D, Aboba B, Hurst R, et al (2008) The EAP-TLS authentication protocol. RFC 5216
42.
Zurück zum Zitat Venkatesan C, Karthigaikumar P, Paul A, Satheeskumaran S, Kumar R (2018) ECG signal preprocessing and SVM classifier-based abnormality detection in remote healthcare applications. IEEE Access 6:9767–9773CrossRef Venkatesan C, Karthigaikumar P, Paul A, Satheeskumaran S, Kumar R (2018) ECG signal preprocessing and SVM classifier-based abnormality detection in remote healthcare applications. IEEE Access 6:9767–9773CrossRef
43.
Zurück zum Zitat Wang D, Wang P (2014) On the anonymity of two-factor authentication schemes for wireless sensor networks: attacks, principle and solutions. Comput Netw 73:41–57CrossRef Wang D, Wang P (2014) On the anonymity of two-factor authentication schemes for wireless sensor networks: attacks, principle and solutions. Comput Netw 73:41–57CrossRef
44.
Zurück zum Zitat Wang J, Zhu Y et al (2020) Secure two-factor lightweight authentication protocol using self-certified public key cryptography for multi-server 5g networks. J Netw Comput Appl 161:102660CrossRef Wang J, Zhu Y et al (2020) Secure two-factor lightweight authentication protocol using self-certified public key cryptography for multi-server 5g networks. J Netw Comput Appl 161:102660CrossRef
45.
Zurück zum Zitat Wazid M, Das AK, Kumar N, Vasilakos AV (2019) Design of secure key management and user authentication scheme for fog computing services. Future Gener Comput Syst 91:475–492CrossRef Wazid M, Das AK, Kumar N, Vasilakos AV (2019) Design of secure key management and user authentication scheme for fog computing services. Future Gener Comput Syst 91:475–492CrossRef
46.
Zurück zum Zitat Zhen Y, Liu H (2019) Distributed privacy protection strategy for MEC enhanced wireless body area networks. Digit Commun Netw Zhen Y, Liu H (2019) Distributed privacy protection strategy for MEC enhanced wireless body area networks. Digit Commun Netw
Metadaten
Titel
Highly efficient key agreement for remote patient monitoring in MEC-enabled 5G networks
verfasst von
An Braeken
Madhusanka Liyanage
Publikationsdatum
09.11.2020
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 6/2021
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-020-03472-y

Weitere Artikel der Ausgabe 6/2021

The Journal of Supercomputing 6/2021 Zur Ausgabe