Session Resumption-Based End-to-End Security for Healthcare Internet-of-Things

被引:22
|
作者
Moosavi, Sanaz Rahimi [1 ]
Tuan Nguyen Gia [1 ]
Nigussie, Ethiopia [1 ]
Rahmani, Amir-Mohammad [1 ,2 ]
Virtanen, Seppo [1 ]
Tenhunen, Hannu [1 ,2 ]
Isoaho, Jouni [1 ]
机构
[1] Univ Turku, Dept Informat Technol, Turku, Finland
[2] KTH Royal Inst Technol, Dept Ind & Med Elect, Stockholm, Sweden
关键词
D O I
10.1109/CIT/IUCC/DASC/PICOM.2015.83
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a session resumption-based end-to end security scheme for healthcare Internet of things (IoT) is proposed. The proposed scheme is realized by employing certificate based DTLS handshake between end-users and smart gateways as well as utilizing DTLS session resumption technique. Smart gateways enable the sensors to no longer need to authenticate and authorize remote end-users by handing over the necessary security context. Session resumption technique enables end-users and medical sensors to directly communicate without the need for establishing the communication from the initial handshake. Session resumption technique has an abbreviated form of DTLS handshake and neither requires certificate-related nor public-key funtionalities. This alleviates some burden of medical sensors to no longer need to perform expensive operations. The energy performance evaluations of the proposed scheme are evaluated by developing a remote patient monitoring prototype based on healthcare IoT. The energy-performance evaluation results show that our scheme is about 97% and 10% faster than certificate based and symmetric key-based DTLS, respectively. Also, the certificate-based DTLS consumes about 2.2X more RAM and 2.9X more ROM resources required by our scheme. While, our scheme and symmetric key-based DTLS have almost similar RAM and ROM requirements. The security analysis reveals that the proposed scheme fulfills the requirements of end-to-end security and provides higher security level than related approaches found in the literature. Thus, the presented scheme is a well suited solution to provide end-to-end security for healthcare IoT.
引用
收藏
页码:581 / 588
页数:8
相关论文
共 50 条
  • [1] End-to-end security scheme for mobility enabled healthcare Internet of Things
    Moosavi, Sanaz Rahimi
    Tuan Nguyen Gia
    Nigussie, Ethiopia
    Rahmani, Amir M.
    Virtanen, Seppo
    Tenhunen, Hannu
    Isoaho, Jouni
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 64 : 108 - 124
  • [2] Internet of Things: An End-to-End Security Layer
    Behrens, Reinhard
    Ahmed, Ali
    PROCEEDINGS OF THE 2017 20TH CONFERENCE ON INNOVATIONS IN CLOUDS, INTERNET AND NETWORKS (ICIN), 2017, : 146 - 149
  • [3] Trust based Security Solution for Internet of Things Healthcare Solution: An End-to-End Trustworthy Architecture
    Jaigirdar, Fariha Tasmin
    PROCEEDINGS OF THE 2018 ACM INTERNATIONAL JOINT CONFERENCE ON PERVASIVE AND UBIQUITOUS COMPUTING AND PROCEEDINGS OF THE 2018 ACM INTERNATIONAL SYMPOSIUM ON WEARABLE COMPUTERS (UBICOMP/ISWC'18 ADJUNCT), 2018, : 1757 - 1760
  • [4] Standards-based End-to-End IP Security for the Internet of Things
    Hummen, Rene
    Wehrle, Klaus
    2013 21ST IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP), 2013,
  • [5] End-to-End Transport Security in the IP-based Internet of Things
    Brachmann, Martina
    Keoh, Sye Loong
    Morchon, Oscar Garcia
    Kumar, Sandeep S.
    2012 21ST INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2012,
  • [6] BlinkToSCoAP: An End-to-End Security Framework for the Internet of Things
    Peretti, Giulio
    Lakkundi, Vishwas
    Zorzi, Michele
    2015 7TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORKS IEEE COMSNETS 2015, 2015,
  • [7] End-to-End Trust and Security for Internet of Things Applications
    Bhattarai, Sulabh
    Wang, Yong
    COMPUTER, 2018, 51 (04) : 20 - 27
  • [8] Tailoring End-to-End IP Security Protocols to the Internet of Things
    Hummen, Rene
    Wirtz, Hanno
    Ziegeldorf, Jan Henrik
    Hiller, Jens
    Wehrle, Klaus
    2013 21ST IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP), 2013,
  • [9] Performance Evaluation of end-to-end security protocols in an Internet of Things
    De Rubertis, Antonio
    Mainetti, Luca
    Mighali, Vincenzo
    Patrono, Luigi
    Sergi, Ilaria
    Stefanizzi, Maria Laura
    Pascali, Stefano
    2013 21ST INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM 2013), 2013, : 94 - 99
  • [10] Efficient HIP-based approach to ensure lightweight end-to-end security in the internet of things
    Sahraoui, Somia
    Bilami, Azeddine
    COMPUTER NETWORKS, 2015, 91 : 26 - 45