Session Resumption-Based End-to-End Security for Healthcare Internet-of-Things

被引:22
|
作者
Moosavi, Sanaz Rahimi [1 ]
Tuan Nguyen Gia [1 ]
Nigussie, Ethiopia [1 ]
Rahmani, Amir-Mohammad [1 ,2 ]
Virtanen, Seppo [1 ]
Tenhunen, Hannu [1 ,2 ]
Isoaho, Jouni [1 ]
机构
[1] Univ Turku, Dept Informat Technol, Turku, Finland
[2] KTH Royal Inst Technol, Dept Ind & Med Elect, Stockholm, Sweden
关键词
D O I
10.1109/CIT/IUCC/DASC/PICOM.2015.83
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a session resumption-based end-to end security scheme for healthcare Internet of things (IoT) is proposed. The proposed scheme is realized by employing certificate based DTLS handshake between end-users and smart gateways as well as utilizing DTLS session resumption technique. Smart gateways enable the sensors to no longer need to authenticate and authorize remote end-users by handing over the necessary security context. Session resumption technique enables end-users and medical sensors to directly communicate without the need for establishing the communication from the initial handshake. Session resumption technique has an abbreviated form of DTLS handshake and neither requires certificate-related nor public-key funtionalities. This alleviates some burden of medical sensors to no longer need to perform expensive operations. The energy performance evaluations of the proposed scheme are evaluated by developing a remote patient monitoring prototype based on healthcare IoT. The energy-performance evaluation results show that our scheme is about 97% and 10% faster than certificate based and symmetric key-based DTLS, respectively. Also, the certificate-based DTLS consumes about 2.2X more RAM and 2.9X more ROM resources required by our scheme. While, our scheme and symmetric key-based DTLS have almost similar RAM and ROM requirements. The security analysis reveals that the proposed scheme fulfills the requirements of end-to-end security and provides higher security level than related approaches found in the literature. Thus, the presented scheme is a well suited solution to provide end-to-end security for healthcare IoT.
引用
收藏
页码:581 / 588
页数:8
相关论文
共 50 条
  • [21] Sizzle: A standards-based end-to-end security architecture for the embedded Internet
    Gupta, Vipul
    Wurm, Michael
    Zhu, Yu
    Millard, Matthew
    Fung, Stephen
    Gura, Nils
    Eberle, Hans
    Shantz, Sheueling Chang
    PERVASIVE AND MOBILE COMPUTING, 2005, 1 (04) : 425 - 445
  • [22] Performance Analysis of End-to-End Security Schemes in Healthcare IoT
    Moosavi, Sanaz Rahimi
    Nigussie, Ethiopia
    Levorato, Marco
    Virtanen, Seppo
    Isoaho, Jouni
    9TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT 2018) / THE 8TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2018) / AFFILIATED WORKSHOPS, 2018, 130 : 432 - 439
  • [23] The end of end-to-end security?
    Bradner, S
    IEEE SECURITY & PRIVACY, 2006, 4 (02) : 76 - 79
  • [24] End-to-End Session-Based Recommendation on GPU
    Pereira Moreira, Gabriel de Souza
    Rabhi, Sara
    Ak, Ronay
    Schifferer, Benedikt
    15TH ACM CONFERENCE ON RECOMMENDER SYSTEMS (RECSYS 2021), 2021, : 831 - 833
  • [25] A note on tools and techniques for end-to-end QoS monitoring in Internet of Things
    Ranjan, Rajiv
    Solaiman, Ellis
    Villari, Massimo
    Watson, Paul
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2019, 132 : 160 - 163
  • [26] Analysis of End-to-End Packet Delay for Internet of Things in Wireless Communications
    Maslouhi, Imane
    Ar-reyouchi, El Miloud
    Ghoumid, Kamal
    Baibai, Kaoutar
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (09) : 338 - 343
  • [27] Layered Fault Management Scheme for End-to-end Transmission in Internet of Things
    Li Xi
    Ji Hong
    Li Yi
    2011 6TH INTERNATIONAL ICST CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA (CHINACOM), 2011, : 1021 - 1025
  • [28] Layered Fault Management Scheme for End-to-end Transmission in Internet of Things
    Li, Xi
    Ji, Hong
    Li, Yi
    MOBILE NETWORKS & APPLICATIONS, 2013, 18 (02): : 195 - 205
  • [29] Towards End-to-end Privacy for Publish/Subscribe Architectures in the Internet of Things
    Coroller, Stevan
    Chabridon, Sophie
    Laurent, Maryline
    Conan, Denis
    Leneutre, Jean
    PROCEEDINGS OF THE 2018 WORKSHOP ON MIDDLEWARE AND APPLICATIONS FOR THE INTERNET OF THINGS (M4IOT '18), 2018, : 35 - 40
  • [30] End-to-End Evaluation of Federated Learning and Split Learning for Internet of Things
    Gao, Yansong
    Kim, Minki
    Abuadbba, Sharif
    Kim, Yeonjae
    Thapa, Chandra
    Kim, Kyuyeon
    Camtep, Seyit A.
    Kim, Hyoungshick
    Nepal, Surya
    2020 INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS 2020), 2020, : 91 - 100