کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
453958 695078 2015 14 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
An end-to-end secure key management protocol for e-health applications
ترجمه فارسی عنوان
یک پروتکل مدیریت کلیدی امنیتی پایاپای برای برنامه های بهداشت الکترونیکی
موضوعات مرتبط
مهندسی و علوم پایه مهندسی کامپیوتر شبکه های کامپیوتری و ارتباطات
چکیده انگلیسی


• We introduce an energy-aware key management protocol for e-health applications.
• The protocol guarantees the end-to-end principle.
• Constrained nodes offload asymmetric cryptographic operations to third parties.
• We conduct a formal validation regarding the security properties of our protocol.
• Analysis results highlight energy gains on constrained nodes.

Key distribution is required to secure e-health applications in the context of Internet of Things (IoT). However, resources constraints in IoT make these applications unable to run existing key management protocols. In this paper, we propose a new lightweight key management protocol. This protocol is based on collaboration to establish a secure end-to-end communication channel between a highly resource constrained node and a remote entity. The secure channel allows the constrained node to transmit captured data while ensuring confidentiality and authentication. To achieve this goal, we propose offloading highly consuming cryptographic primitives to third parties. As a result, the constrained node obtains assistance from powerful entities. To assess our protocol, we conduct a formal validation regarding security properties. In addition, we evaluate both communication and computational costs to highlight energy savings. The results show that our protocol provides a considerable gain in energy while its security properties are ensured.

Figure optionsDownload as PowerPoint slide

ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Computers & Electrical Engineering - Volume 44, May 2015, Pages 184–197
نویسندگان
, ,