Secure End-to-End Communication for Constrained Devices in IoT-enabled Ambient Assisted Living Systems

被引:0
|
作者
Porambage, Pawani [1 ]
Braeken, An
Gurtov, Andrei [2 ,3 ]
Ylianttila, Mika [1 ]
Spinsante, Susanna [4 ]
机构
[1] Univ Oulu, Ctr Wireless Commun, POB 4500, FI-90014 Oulu, Finland
[2] Aalto Univ, HIIT, FI-00076 Aalto, Finland
[3] Aalto Univ, Dept Comp Sci, FI-00076 Aalto, Finland
[4] Univ Politecn Marche, Dipartimento Ingn Informaz, IT-60131 Ancona, Italy
关键词
Internet of Things; authentication; key establishment; proxy; resource-constrained devices; HEALTH-CARE; INTERNET; THINGS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Internet of Things (IoT) technologies interconnect broad ranges of network devices irrespective of their resource capabilities and local networks. In order to upgrade the standard of life of elderly people, Ambient Assisted Living (AAL) systems are also widely deployed in the context of IoT applications. To preserve user security and privacy in AAL systems, it is significant to ensure secure communication link establishment among the medical devices and the remote hosts or servers that are interested in accessing the critical health data. However, due to the limited resources available in such constrained devices, it is challenging to exploit expensive cryptographic operations in the conventional security protocols. Therefore, in this paper we propose a novel proxy-based authentication and key establishment protocol, which is lightweight and suitable to safeguard sensitive data generated by resource-constrained devices in IoT-enabled AAL systems.
引用
收藏
页码:711 / 714
页数:4
相关论文
共 50 条
  • [31] Learning-Assisted Secure End-to-End Network Slicing for Cyber-Physical Systems
    Liu, Qiang
    Han, Tao
    Ansari, Nirwan
    IEEE NETWORK, 2020, 34 (03): : 37 - 43
  • [32] Validation of IoT secure communication gateway for constrained devices
    Peniak, Peter
    Bubenikova, Emilia
    2019 24TH INTERNATIONAL CONFERENCE ON APPLIED ELECTRONICS (AE), 2019, : 117 - 121
  • [33] DeepEdgeSoC: End-to-end deep learning framework for edge IoT devices
    Al Koutayni, Mhd Rashed
    Reis, Gerd
    Stricker, Didier
    INTERNET OF THINGS, 2023, 21
  • [34] An Accelerated End-to-End Probing Protocol for Narrowband IoT Medical Devices
    Ar-Reyouchi, El Miloud
    Ghoumid, Kamal
    Ar-Reyouchi, Doha
    Rattal, Salma
    Yahiaoui, Reda
    Elmazria, Omar
    IEEE ACCESS, 2021, 9 : 34131 - 34141
  • [35] FSEE: A Forward Secure End-to-End Encrypted Message Transmission System for IoT
    Cui, Li
    Xing Qianqian
    Yi, Wang
    Wang Baosheng
    Jing, Tao
    Liu, Liu
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [36] Secure IoT framework and 2D architecture for End-To-End security
    Choi, Jongseok
    In, Youngjin
    Park, Changjun
    Seok, Seonhee
    Seo, Hwajeong
    Kim, Howon
    JOURNAL OF SUPERCOMPUTING, 2018, 74 (08): : 3521 - 3535
  • [37] Quantum-resistant End-to-End Secure Messaging and Email Communication
    Doeberl, Christoph
    Eibner, Wolfgang
    Gaertner, Simon
    Kos, Manuela
    Kutschera, Florian
    Ramacher, Sebastian
    18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, 2023,
  • [38] End-to-End Secure Multi-Hop Communication with Untrusted Relays
    He, Xiang
    Yener, Aylin
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2013, 12 (01) : 1 - 11
  • [39] End-to-End Delay Minimization in Thermally Constrained Distributed Systems
    Kumar, Pratyush
    Thiele, Lothar
    PROCEEDINGS OF THE 23RD EUROMICRO CONFERENCE ON REAL-TIME SYSTEMS (ECRTS 2011), 2011, : 81 - 91
  • [40] End-to-End Reliability of Satellite Communication Network Systems
    Jung, Seunghwa
    Choi, Jihwan P.
    IEEE SYSTEMS JOURNAL, 2021, 15 (01): : 791 - 801