Low Delay and Secure M2M Communication Mechanism for eHealthcare

被引:0
|
作者
Saleem, Kashif [1 ]
Derhab, Abdelouahid [1 ]
Al-Muhtadi, Jalal [2 ]
机构
[1] King Saud Univ, Ctr Excellence Informat Assurance CoEIA, Riyadh, Saudi Arabia
[2] King Saud Univ, Coll Comp & Informat Sci CCIS, Riyadh, Saudi Arabia
关键词
Authentication; Decryption; eHealth; Encryption; Machine to Machine Communication; Malicious; Multihop; Random Key; Routing; Secure;
D O I
暂无
中图分类号
R-058 [];
学科分类号
摘要
Currently, the eHealthcare information management is the most critical and hot research topic. Especially with the involvement of new and promising telecommunication technologies like Machine to Machine (M2M) Communication. In M2M communication the devices interact and exchange information with each other in an autonomous manner to accomplish the required tasks. Mostly machine communicate to another machine wirelessly. The wireless communication opens the medium for enormous vulnerabilities and make it very easy for hackers to access the confidential information and can perform malicious activities. In this paper, we propose a Machine to Machine (M2M) Low Delay and Secure (LDS) communication system for e-healthcare community based on random distributive key management scheme and modified Kerberos realm to ensure data security. The system is capable to perform the tasks in an autonomous and intelligent manner that minimizes the workload of medical staffs, and improves the quality of patient care as well as the system performance. We show how the different actors in the e-healthcare community can interact with each other in a secure manner. The system handles dynamic assignments of doctors to specific patients. The proposed architecture further provides security against false attack, false triggering and temper attack. Finally, the simulation type implementation is performed on Visual Basic.net 2013 that shows the feasibility of the proposed Low Delay and Secure (LDS) algorithm.
引用
收藏
页码:105 / 110
页数:6
相关论文
共 50 条
  • [1] Secure Multimedia Content Distribution for M2M Communication
    Ye, Conghuan
    Xiong, Zenggang
    Ding, Yaoming
    Zhang, Xuemin
    Wang, Guangwei
    Xu, Fang
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (04): : 279 - 288
  • [2] An analysis of secure M2M communication in WSNs using DTLS
    Fuentes-Samaniego, Raul A.
    Cavalli, Ana R.
    Nolazco-Fores, Juan A.
    [J]. 2016 IEEE 36TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS (ICDCSW 2016), 2016, : 78 - 83
  • [3] M2M Communication
    Malleck, H.
    Mecklenbruker, C.
    [J]. ELEKTROTECHNIK UND INFORMATIONSTECHNIK, 2014, 131 (01): : 1 - 2
  • [4] M2M Communication
    Helmut Malleck
    Christoph Mecklenbräuker
    [J]. e & i Elektrotechnik und Informationstechnik, 2014, 131 (1) : 1 - 2
  • [5] M2M Communication Delay Challenges: Application and Measurement Perspectives
    Fabini, Joachim
    Zseby, Tanja
    [J]. 2015 IEEE INTERNATIONAL INSTRUMENTATION AND MEASUREMENT TECHNOLOGY CONFERENCE (I2MTC), 2015, : 1859 - 1864
  • [6] Cooperative Architecture for Secure M2M Communication in Distributed Sensor Networking
    Jung, Sungmo
    Kim, Donghyun
    Kim, Seoksoo
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (03): : 175 - 184
  • [7] Joint Fingerprinting and Encryption in the DWT Domain for Secure M2M Communication
    Ye, Conghuan
    Xiong, Zenggang
    Ding, Yaoming
    Zhang, Xueming
    Wang, Guangwei
    Xu, Fang
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (01): : 125 - 138
  • [8] Delay and Energy Consumption Analysis for M2M Communication with Data Aggregation
    Awal, Md Sadik
    Saha, Dhruba Anurag
    Uddin, Md Forkan
    [J]. 2020 8TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON WIRELESS FOR SPACE AND EXTREME ENVIRONMENTS (WISEE 2020), 2020, : 11 - 16
  • [9] TRUST IN M2M COMMUNICATION
    Cha, Inhyok
    Shah, Yogendra
    Schmidt, Andreas U.
    Leicher, Andreas
    Meyerstein, Michael Victor
    [J]. IEEE VEHICULAR TECHNOLOGY MAGAZINE, 2009, 4 (03): : 69 - 75
  • [10] Lightweight Protocol for M2M Communication
    Stepan, Jan
    Cimler, Richard
    Matyska, Jan
    Sec, David
    Krejcar, Ondrej
    [J]. COMPUTATIONAL COLLECTIVE INTELLIGENCE, ICCCI 2017, PT II, 2017, 10449 : 335 - 344