Session Resumption-Based End-to-End Security for Healthcare Internet-of-Things

被引:22
|
作者
Moosavi, Sanaz Rahimi [1 ]
Tuan Nguyen Gia [1 ]
Nigussie, Ethiopia [1 ]
Rahmani, Amir-Mohammad [1 ,2 ]
Virtanen, Seppo [1 ]
Tenhunen, Hannu [1 ,2 ]
Isoaho, Jouni [1 ]
机构
[1] Univ Turku, Dept Informat Technol, Turku, Finland
[2] KTH Royal Inst Technol, Dept Ind & Med Elect, Stockholm, Sweden
关键词
D O I
10.1109/CIT/IUCC/DASC/PICOM.2015.83
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a session resumption-based end-to end security scheme for healthcare Internet of things (IoT) is proposed. The proposed scheme is realized by employing certificate based DTLS handshake between end-users and smart gateways as well as utilizing DTLS session resumption technique. Smart gateways enable the sensors to no longer need to authenticate and authorize remote end-users by handing over the necessary security context. Session resumption technique enables end-users and medical sensors to directly communicate without the need for establishing the communication from the initial handshake. Session resumption technique has an abbreviated form of DTLS handshake and neither requires certificate-related nor public-key funtionalities. This alleviates some burden of medical sensors to no longer need to perform expensive operations. The energy performance evaluations of the proposed scheme are evaluated by developing a remote patient monitoring prototype based on healthcare IoT. The energy-performance evaluation results show that our scheme is about 97% and 10% faster than certificate based and symmetric key-based DTLS, respectively. Also, the certificate-based DTLS consumes about 2.2X more RAM and 2.9X more ROM resources required by our scheme. While, our scheme and symmetric key-based DTLS have almost similar RAM and ROM requirements. The security analysis reveals that the proposed scheme fulfills the requirements of end-to-end security and provides higher security level than related approaches found in the literature. Thus, the presented scheme is a well suited solution to provide end-to-end security for healthcare IoT.
引用
收藏
页码:581 / 588
页数:8
相关论文
共 50 条
  • [31] Towards End-to-end Privacy for Publish/Subscribe Architectures in the Internet of Things
    Coroller, Stevan
    Chabridon, Sophie
    Laurent, Maryline
    Conan, Denis
    Leneutre, Jean
    PROCEEDINGS OF THE 2018 WORKSHOP ON MIDDLEWARE AND APPLICATIONS FOR THE INTERNET OF THINGS (M4IOT '18), 2018, : 35 - 40
  • [32] End-to-End Evaluation of Federated Learning and Split Learning for Internet of Things
    Gao, Yansong
    Kim, Minki
    Abuadbba, Sharif
    Kim, Yeonjae
    Thapa, Chandra
    Kim, Kyuyeon
    Camtep, Seyit A.
    Kim, Hyoungshick
    Nepal, Surya
    2020 INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS 2020), 2020, : 91 - 100
  • [33] Security Model for Internet of Things end devices
    Rajashree, S.
    Shah, Pritam Gajkumar
    Murali, S.
    IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY, 2018, : 219 - 221
  • [34] Session Key Agreement for End-to-End Security in Time-Synchronized Networks
    Wang, Qinghua
    Huang, Xin
    Mengistu, Dawit
    2018 TENTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN 2018), 2018, : 493 - 496
  • [35] On the effectiveness of end-to-end security for Internet-integrated sensing applications
    Granjal, Jorge
    Monteiro, Edmundo
    Silva, Jorge Sa
    2012 IEEE INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND COMMUNICATIONS, CONFERENCE ON INTERNET OF THINGS, AND CONFERENCE ON CYBER, PHYSICAL AND SOCIAL COMPUTING (GREENCOM 2012), 2012, : 87 - 93
  • [36] End-to-End Sample Tracking in the Laboratory Using a Custom Internet of Things Device
    Neil, William
    Zipp, Greg
    Nemeth, Gregory
    Russo, Mark F.
    Nirschl, David S.
    SLAS TECHNOLOGY, 2018, 23 (05): : 412 - 422
  • [37] Federated End-to-End Authentication for the Constrained Internet of Things Using IBC and ECC
    Markmann, Tobias
    Schmidt, Thomas C.
    Waehlisch, Matthias
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2015, 45 (04) : 603 - 604
  • [38] Cooperation and end-to-end in the Internet
    Kantola, Raimo
    Kabir, Hammad
    Loiseau, Patrick
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (12)
  • [39] Federated End-to-End Authentication for the Constrained Internet of Things Using IBC and ECC
    Markmann, Tobias
    Schmidt, Thomas C.
    Waehlisch, Matthias
    SIGCOMM'15: PROCEEDINGS OF THE 2015 ACM CONFERENCE ON SPECIAL INTEREST GROUP ON DATA COMMUNICATION, 2015, : 603 - 604
  • [40] End-to-End Resources Planning Based on Internet of Service
    Li, Baoan
    Zhang, Wei
    WEB INFORMATION SYSTEMS AND MINING, PT II, 2011, 6988 : 19 - 26