Secrecy aware key management scheme for Internet of Healthcare Things

被引:6
|
作者
Trivedi, Chandan [1 ,2 ]
Rao, Udai Pratap [3 ]
机构
[1] Sardar Vallabhbhai Natl Inst Technol, Comp Sci & Engn, Surat 395007, Gujarat, India
[2] Nirma Univ, Inst Technol, Comp Sci & Engn, Ahemdabad 382481, Gujarat, India
[3] Natl Inst Technol, Comp Sci & Engn, Patna 800005, Bihar, India
来源
JOURNAL OF SUPERCOMPUTING | 2023年 / 79卷 / 11期
关键词
IoT; Secrecy; Healthcare; Key management; Elliptic curve cryptography; COLLUSION RESISTANCE; SECURITY; AUTHENTICATION; ESTABLISHMENT; FRAMEWORK; SYSTEM;
D O I
10.1007/s11227-023-05144-z
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is becoming an essential aspect of digital healthcare information; the goal is to monitor various health parameters regularly to make healthcare management more efficient and convenient. Gateway devices can broadcast/multicast messages securely to sensors or intended recipients to guarantee the confidentiality of medical readings in the healthcare environment utilizing IoT sensors. In this context, designing and executing a key management framework is critical for the healthcare environment, and working with limited computing and processing capacities is also challenging. The literature on IoT key management is inclined toward centralized solutions, provides solutions with heavy computation and communication costs, and partially addresses resource-constrained devices that guarantee forward and backward secrecy in the healthcare domain. This paper constructs a group key management scheme with node joining and leaving scenarios to provide forward and backward secrecy focusing on lightweight computation. We use the concept of one-way accumulation for secret message exchange by combining elliptic curve cryptography. We designed a scheme that refreshed the established group key as the group's size grows or shrinks, and the approach also applies to classical ciphers conveniently for the number of message exchanges for healthcare nodes. To demonstrate innovation in our method, we mathematically proved the soundness of our session key management scheme for the network model, and simulation findings show that the method is feasible as the processing and communication costs are reduced compared to related schemes.
引用
收藏
页码:12492 / 12522
页数:31
相关论文
共 50 条
  • [41] Context Aware Trust Management Scheme for Pervasive Healthcare
    N. Karthik
    V. S. Ananthanarayana
    Wireless Personal Communications, 2019, 105 : 725 - 763
  • [42] Privacy-aware resource management solutions in Internet of Things
    Souri, Alireza
    Kumari, Saru
    Elhoseny, Mohamed
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (08)
  • [43] Discrimination-aware trust management for social internet of things
    Jafarian, Besat
    Yazdani, Nasser
    Haghighi, Mohammad Sayad
    COMPUTER NETWORKS, 2020, 178
  • [44] Context Aware Trust Management Scheme for Pervasive Healthcare
    Karthik, N.
    Ananthanarayana, V. S.
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 105 (03) : 725 - 763
  • [45] Leveraging the Internet of Things Aware Healthcare Monitoring System for Better Living Standards
    Mirza, Nada Masood
    Bader, Rawad
    Ali, Adnan
    Ishak, Mohamad Khairi
    2022 SEVENTH INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING, FMEC, 2022, : 22 - 26
  • [46] A Lightweight Mutual Authentication and Key Agreement Scheme for Medical Internet of Things
    Xu, Zisang
    Xu, Cheng
    Liang, Wei
    Xu, Jianbo
    Chen, Haixian
    IEEE ACCESS, 2019, 7 : 53922 - 53931
  • [47] Sensing as a service in Internet of Things: Efficient authentication and key agreement scheme
    Bentahar, Atef
    Meraoumia, Abdallah
    Bradji, Louardi
    Bendjenna, Hakim
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (08) : 5493 - 5509
  • [48] A Dependable Authentication Scheme Based Protecting Private Key in the Internet of Things
    Cao Lai-Cheng
    Zhang Ming-Ming
    Du Hong-Lin
    Ru Qi
    Li Xiao-Min
    2012 INTERNATIONAL CONFERENCE ON APPLIED INFORMATICS AND COMMUNICATION (ICAIC 2012), 2013, : 74 - 80
  • [49] Certificateless Searchable Public Key Encryption Scheme for Industrial Internet of Things
    Ma, Mimi
    He, Debiao
    Kumar, Neeraj
    Choo, Kim-Kwang Raymond
    Chen, Jianhua
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (02) : 759 - 767
  • [50] TurboBlom: A light and resilient key predistribution scheme with application to Internet of Things
    Khabbazian, Majid
    Safavi-Naini, Reihaneh
    Shabani-Baghani, Ahmad
    PLOS ONE, 2024, 19 (03):