Secrecy aware key management scheme for Internet of Healthcare Things

被引:5
|
作者
Trivedi, Chandan [1 ,2 ]
Rao, Udai Pratap [3 ]
机构
[1] Sardar Vallabhbhai Natl Inst Technol, Comp Sci & Engn, Surat 395007, Gujarat, India
[2] Nirma Univ, Inst Technol, Comp Sci & Engn, Ahemdabad 382481, Gujarat, India
[3] Natl Inst Technol, Comp Sci & Engn, Patna 800005, Bihar, India
来源
JOURNAL OF SUPERCOMPUTING | 2023年 / 79卷 / 11期
关键词
IoT; Secrecy; Healthcare; Key management; Elliptic curve cryptography; COLLUSION RESISTANCE; SECURITY; AUTHENTICATION; ESTABLISHMENT; FRAMEWORK; SYSTEM;
D O I
10.1007/s11227-023-05144-z
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is becoming an essential aspect of digital healthcare information; the goal is to monitor various health parameters regularly to make healthcare management more efficient and convenient. Gateway devices can broadcast/multicast messages securely to sensors or intended recipients to guarantee the confidentiality of medical readings in the healthcare environment utilizing IoT sensors. In this context, designing and executing a key management framework is critical for the healthcare environment, and working with limited computing and processing capacities is also challenging. The literature on IoT key management is inclined toward centralized solutions, provides solutions with heavy computation and communication costs, and partially addresses resource-constrained devices that guarantee forward and backward secrecy in the healthcare domain. This paper constructs a group key management scheme with node joining and leaving scenarios to provide forward and backward secrecy focusing on lightweight computation. We use the concept of one-way accumulation for secret message exchange by combining elliptic curve cryptography. We designed a scheme that refreshed the established group key as the group's size grows or shrinks, and the approach also applies to classical ciphers conveniently for the number of message exchanges for healthcare nodes. To demonstrate innovation in our method, we mathematically proved the soundness of our session key management scheme for the network model, and simulation findings show that the method is feasible as the processing and communication costs are reduced compared to related schemes.
引用
收藏
页码:12492 / 12522
页数:31
相关论文
共 50 条
  • [1] Secrecy aware key management scheme for Internet of Healthcare Things
    Chandan Trivedi
    Udai Pratap Rao
    [J]. The Journal of Supercomputing, 2023, 79 : 12492 - 12522
  • [2] Research on key management scheme for military internet of things
    Li, Haopeng
    Chen, Liyun
    Yan, Jie
    Qiao, Wenxin
    [J]. PROCEEDINGS OF THE 2017 2ND INTERNATIONAL CONFERENCE ON MATERIALS SCIENCE, MACHINERY AND ENERGY ENGINEERING (MSMEE 2017), 2017, 123 : 481 - 486
  • [4] Energy-aware key management and access control for the Internet of things
    Mohamed Mohammedi
    Mawloud Omar
    Djamila Zamouche
    Kahina Louiba
    Saliha Ouared
    Kenza Hocini
    [J]. World Wide Web, 2021, 24 : 1089 - 1120
  • [5] Energy-aware key management and access control for the Internet of things
    Mohammedi, Mohamed
    Omar, Mawloud
    Zamouche, Djamila
    Louiba, Kahina
    Ouared, Saliha
    Hocini, Kenza
    [J]. World Wide Web, 2021, 24 (04) : 1089 - 1120
  • [6] Energy-aware key management and access control for the Internet of things
    Mohammedi, Mohamed
    Omar, Mawloud
    Zamouche, Djamila
    Louiba, Kahina
    Ouared, Saliha
    Hocini, Kenza
    [J]. WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2021, 24 (04): : 1089 - 1120
  • [7] Distributed Time-Dependent Key Management Scheme for Internet of Things
    Tamizhselvan, C.
    Vijayalakshmi, V.
    [J]. Recent Advances in Computer Science and Communications, 2022, 15 (01) : 23 - 27
  • [8] Adaptive Time-Bound Key Management Scheme For The Internet of Things
    AboDoma, Noran
    Mostafa, Ahmad
    Shaaban, Eman
    [J]. 2018 IEEE 88TH VEHICULAR TECHNOLOGY CONFERENCE (VTC-FALL), 2018,
  • [9] Key Management Scheme Based on Micro-Certificate for Internet of Things
    Du, Liping
    Feng, Fuwei
    Guo, Jianwei
    [J]. PROCEEDINGS OF THE 2013 THE INTERNATIONAL CONFERENCE ON EDUCATION TECHNOLOGY AND INFORMATION SYSTEM (ICETIS 2013), 2013, 65 : 707 - 711
  • [10] Escrow and Pairing Free CP-ABE Scheme with Forward and Backward Secrecy for Healthcare Internet of Things
    Bhaskar, Sourabh
    Parmar, Keyur
    Jinwala, Devesh C.
    [J]. INFORMATION SYSTEMS SECURITY, ICISS 2023, 2023, 14424 : 306 - 316