Skip to main content

A Cooperative End to End Key Management Scheme for E-health Applications in the Context of Internet of Things

  • Conference paper
  • First Online:
Ad-hoc Networks and Wireless (ADHOC-NOW 2014)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 8629))

Included in the following conference series:

Abstract

In the context of Internet of Things where real world objects will automatically be part of the Internet, e-health applications have emerged as a promising approach to provide unobtrusive support for elderly and frail people. However, due to the limited resources available and privacy concerns, security issues constitute a major obstacle to their deployment. Among these issues, key distribution for heterogeneous nodes is problematic due to the inconsistencies in their cryptographic primitives. This paper introduces a new key management scheme that aims to establish session keys for highly resource-constrained nodes ensuring security protection through strong encryption and authentication means. Our protocol is based on collaboration by offloading heavy asymmetric cryptographic operations to a set of third parties. The generated shared secret is then used to derive further credentials. Security analysis demonstrates that our protocol provides strong security features while the scarcity of resources is taken into consideration.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54, 2787–2805 (2010)

    Article  MATH  Google Scholar 

  2. Istepanian, R., Jara, A., Sungoor, A., Philips, N.: Internet of things for m-health applications (IOMT). In: AMA-IEEE Medical Technology Conference on Individualized Healthcare, Washington DC (2010)

    Google Scholar 

  3. Dohr, A., Modre-Opsrian, R., Drobics, M., Hayn, D., Schreier, G.: The internet of things for ambient assisted living. In: Information Technology: New Generations (ITNG), pp. 804–809, April 2010

    Google Scholar 

  4. Patel, M., Wang, J.: Applications, challenges, and prospective in emerging body area networking technologies. Wirel. Commun. 17, 80–88 (2010)

    Article  Google Scholar 

  5. Li, M., Lou, W., Ren, K.: Data security and privacy in wireless body area networks. IEEE Wirel. Commun. 17(1), 51–58 (2010). doi:10.1109/MWC.2010.5416350

    Article  Google Scholar 

  6. Javadi, S.S., Razzaque, M.A.: Security and privacy in wireless body area networks for health care applications. In: Khan, S., Khan Pathan, A.-S. (eds.) Wireless Networks and Security. SCT, pp. 165–187. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  7. Lim, S., Oh, T., Choi, Y., Lakshman, T.: Security issues on wireless body area network for remote healthcare monitoring. In: IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC), pp. 327–332, February 2010

    Google Scholar 

  8. Ng, H.S., Sim, M., Tan, C.: Security issues of wireless sensor networks in healthcare applications. BT Technol. J. 24(2), 138–144 (2006)

    Article  Google Scholar 

  9. Ameen, M.A., Liu, J., Kwak, K.: Security and privacy issues in wireless sensor networks for healthcare applications. J. Med. Syst. 36, 93–101 (2012)

    Article  Google Scholar 

  10. Karlof, C., Sastry, N., Wagner, D.: Tinysec: a link layer security architecture for wireless sensor networks. In: Second ACM Conference on Embedded Networked Sensor Systems, November 2004

    Google Scholar 

  11. Healy, M., Newe, T., Lewis, E.: Analysis of hardware encryption versus software encryption on wireless sensor network motes. In: Mukhopadhyay, S.C., Gupta, G.S. (eds.) Smart Sensors and Sensing Technology. LNEE, vol. 20, pp. 3–14. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  12. Meingast, S., Roosta, T., Lewis, E.: Security and privacy issues with health-care information technology. In: Proceedings of the 28th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, pp. 5453–5458 (2006)

    Google Scholar 

  13. Cherukuri, S., Venkatasubramanian, K., Gupta, S.: Biosec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human body. In: Proceedings of International Conference on Parallel Processing Workshops, October 2003

    Google Scholar 

  14. Poon, C., Zhang, Y.T., Bao, S.D.: A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health. IEEE Commun. Mag. 4, 73–81 (2006)

    Article  Google Scholar 

  15. Montenegro, G., Kushalnagar, N., Hui, J., Culler, D.: Transmission of IPv6 packets over IEEE 802.15.4 networks. RFC 4944, IETF (2007)

    Google Scholar 

  16. Hui, J., Thubert, P.: Compression format for IPv6 datagrams over IEEE 802.15.4-based networks. RFC 6282, IETF (2011)

    Google Scholar 

  17. Granjal, J., Monteiro, E., Silva, J.S.: Enabling network-layer security on IPv6 wireless sensor networks. In: Proceedings of IEEE GLOBECOM (2010)

    Google Scholar 

  18. Raza, S., Duquennoy, S., Chung, T., Yazar, D., Voigt, T., Roedig, U.: Securing communication in 6LoWPAN with compressed IPsec. In: Proceedings of IEEE DCOSS (2011)

    Google Scholar 

  19. Abdmeziem, R., Tandjaoui, D.: Tailoring mikey-ticket to e-health applications in the context of internet of things. In: Proceedings of International Conference on Advanced Networking, Distributed Systems and Applications (INDS’2014) (2014)

    Google Scholar 

  20. Raza, S., Voigt, T., Jutvik, V.: Lightweight IKEv2: a key management solution for both compressed IPsec and IEEE 802.15.4 security. In: IETF/IAB Workshop on Smart Object Security (2012)

    Google Scholar 

  21. Hummen, R., Wirtz, H., Ziegeldorf, J.H., Hiller, J., Wehrle, K.: Tailoring end-to-end IP security protocols to the internet of things. In: Proceedings of IEEE ICNP (2013)

    Google Scholar 

  22. Saied, Y.B., Olivereau, A.: D-hip: a distributed key exchange scheme for hip-based internet of things. In: Proceedings of IEEE WoWMoM (2012)

    Google Scholar 

  23. Bonetto, R., Bui, N., Lakkundi, V., Olivereau, A., Serbanati, A., Rossi, M.: Secure communication for smart iot objects: protocol stacks, use cases and practical examples. In: Proceedings of IEEE WoWMoM (2012)

    Google Scholar 

  24. Freeman, T., Housley, R., Malpani, A., Cooper, D., Polk, W.: Server-based certificate validation protocol (SCVP). RFC 5055, IETF (2007)

    Google Scholar 

  25. Reed, S., Solomon, G.: Polynomial codes over certain finite fields. J. Soc. Ind. Appl. Math. 8, 300–304 (1960)

    Article  MATH  MathSciNet  Google Scholar 

  26. Roman, R., Alcaraz, C., Lopez, J., Sklavos, N.: Key management systems for sensor networks in the context of internet of things. Comput. Electr. Eng. 37, 147–159 (2011)

    Article  Google Scholar 

  27. Dworkin, M.: Recommendation for block cipher modes of operation: the CCM mode for authentication and confidentiality. SP-800-38c, NIST, US Department of Commerce (2007)

    Google Scholar 

  28. Tsiftes, N., Dunkels, A.: A database in every sensor. In: Proceedings of the 9th ACM Conference on Embedded Networked Sensor Systems (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohammed Riyadh Abdmeziem .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Abdmeziem, M.R., Tandjaoui, D. (2015). A Cooperative End to End Key Management Scheme for E-health Applications in the Context of Internet of Things. In: Garcia Pineda, M., Lloret, J., Papavassiliou, S., Ruehrup, S., Westphall, C. (eds) Ad-hoc Networks and Wireless. ADHOC-NOW 2014. Lecture Notes in Computer Science(), vol 8629. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-46338-3_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-46338-3_4

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-46337-6

  • Online ISBN: 978-3-662-46338-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics