Abstract
In the context of Internet of Things where real world objects will automatically be part of the Internet, e-health applications have emerged as a promising approach to provide unobtrusive support for elderly and frail people. However, due to the limited resources available and privacy concerns, security issues constitute a major obstacle to their deployment. Among these issues, key distribution for heterogeneous nodes is problematic due to the inconsistencies in their cryptographic primitives. This paper introduces a new key management scheme that aims to establish session keys for highly resource-constrained nodes ensuring security protection through strong encryption and authentication means. Our protocol is based on collaboration by offloading heavy asymmetric cryptographic operations to a set of third parties. The generated shared secret is then used to derive further credentials. Security analysis demonstrates that our protocol provides strong security features while the scarcity of resources is taken into consideration.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54, 2787–2805 (2010)
Istepanian, R., Jara, A., Sungoor, A., Philips, N.: Internet of things for m-health applications (IOMT). In: AMA-IEEE Medical Technology Conference on Individualized Healthcare, Washington DC (2010)
Dohr, A., Modre-Opsrian, R., Drobics, M., Hayn, D., Schreier, G.: The internet of things for ambient assisted living. In: Information Technology: New Generations (ITNG), pp. 804–809, April 2010
Patel, M., Wang, J.: Applications, challenges, and prospective in emerging body area networking technologies. Wirel. Commun. 17, 80–88 (2010)
Li, M., Lou, W., Ren, K.: Data security and privacy in wireless body area networks. IEEE Wirel. Commun. 17(1), 51–58 (2010). doi:10.1109/MWC.2010.5416350
Javadi, S.S., Razzaque, M.A.: Security and privacy in wireless body area networks for health care applications. In: Khan, S., Khan Pathan, A.-S. (eds.) Wireless Networks and Security. SCT, pp. 165–187. Springer, Heidelberg (2013)
Lim, S., Oh, T., Choi, Y., Lakshman, T.: Security issues on wireless body area network for remote healthcare monitoring. In: IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC), pp. 327–332, February 2010
Ng, H.S., Sim, M., Tan, C.: Security issues of wireless sensor networks in healthcare applications. BT Technol. J. 24(2), 138–144 (2006)
Ameen, M.A., Liu, J., Kwak, K.: Security and privacy issues in wireless sensor networks for healthcare applications. J. Med. Syst. 36, 93–101 (2012)
Karlof, C., Sastry, N., Wagner, D.: Tinysec: a link layer security architecture for wireless sensor networks. In: Second ACM Conference on Embedded Networked Sensor Systems, November 2004
Healy, M., Newe, T., Lewis, E.: Analysis of hardware encryption versus software encryption on wireless sensor network motes. In: Mukhopadhyay, S.C., Gupta, G.S. (eds.) Smart Sensors and Sensing Technology. LNEE, vol. 20, pp. 3–14. Springer, Heidelberg (2008)
Meingast, S., Roosta, T., Lewis, E.: Security and privacy issues with health-care information technology. In: Proceedings of the 28th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, pp. 5453–5458 (2006)
Cherukuri, S., Venkatasubramanian, K., Gupta, S.: Biosec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human body. In: Proceedings of International Conference on Parallel Processing Workshops, October 2003
Poon, C., Zhang, Y.T., Bao, S.D.: A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health. IEEE Commun. Mag. 4, 73–81 (2006)
Montenegro, G., Kushalnagar, N., Hui, J., Culler, D.: Transmission of IPv6 packets over IEEE 802.15.4 networks. RFC 4944, IETF (2007)
Hui, J., Thubert, P.: Compression format for IPv6 datagrams over IEEE 802.15.4-based networks. RFC 6282, IETF (2011)
Granjal, J., Monteiro, E., Silva, J.S.: Enabling network-layer security on IPv6 wireless sensor networks. In: Proceedings of IEEE GLOBECOM (2010)
Raza, S., Duquennoy, S., Chung, T., Yazar, D., Voigt, T., Roedig, U.: Securing communication in 6LoWPAN with compressed IPsec. In: Proceedings of IEEE DCOSS (2011)
Abdmeziem, R., Tandjaoui, D.: Tailoring mikey-ticket to e-health applications in the context of internet of things. In: Proceedings of International Conference on Advanced Networking, Distributed Systems and Applications (INDS’2014) (2014)
Raza, S., Voigt, T., Jutvik, V.: Lightweight IKEv2: a key management solution for both compressed IPsec and IEEE 802.15.4 security. In: IETF/IAB Workshop on Smart Object Security (2012)
Hummen, R., Wirtz, H., Ziegeldorf, J.H., Hiller, J., Wehrle, K.: Tailoring end-to-end IP security protocols to the internet of things. In: Proceedings of IEEE ICNP (2013)
Saied, Y.B., Olivereau, A.: D-hip: a distributed key exchange scheme for hip-based internet of things. In: Proceedings of IEEE WoWMoM (2012)
Bonetto, R., Bui, N., Lakkundi, V., Olivereau, A., Serbanati, A., Rossi, M.: Secure communication for smart iot objects: protocol stacks, use cases and practical examples. In: Proceedings of IEEE WoWMoM (2012)
Freeman, T., Housley, R., Malpani, A., Cooper, D., Polk, W.: Server-based certificate validation protocol (SCVP). RFC 5055, IETF (2007)
Reed, S., Solomon, G.: Polynomial codes over certain finite fields. J. Soc. Ind. Appl. Math. 8, 300–304 (1960)
Roman, R., Alcaraz, C., Lopez, J., Sklavos, N.: Key management systems for sensor networks in the context of internet of things. Comput. Electr. Eng. 37, 147–159 (2011)
Dworkin, M.: Recommendation for block cipher modes of operation: the CCM mode for authentication and confidentiality. SP-800-38c, NIST, US Department of Commerce (2007)
Tsiftes, N., Dunkels, A.: A database in every sensor. In: Proceedings of the 9th ACM Conference on Embedded Networked Sensor Systems (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Abdmeziem, M.R., Tandjaoui, D. (2015). A Cooperative End to End Key Management Scheme for E-health Applications in the Context of Internet of Things. In: Garcia Pineda, M., Lloret, J., Papavassiliou, S., Ruehrup, S., Westphall, C. (eds) Ad-hoc Networks and Wireless. ADHOC-NOW 2014. Lecture Notes in Computer Science(), vol 8629. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-46338-3_4
Download citation
DOI: https://doi.org/10.1007/978-3-662-46338-3_4
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-46337-6
Online ISBN: 978-3-662-46338-3
eBook Packages: Computer ScienceComputer Science (R0)