• français
    • English
  • français 
    • français
    • English
  • Ouvrir une session
  • CGU
  • -
  • About
  • -
  • Contact
  • -
  • Team
Voir le document 
  •   CERIST DL
  • Articles Scientifiques
  • Rapports de Recherche Internes
  • Voir le document
  •   CERIST DL
  • Articles Scientifiques
  • Rapports de Recherche Internes
  • Voir le document
JavaScript is disabled for your browser. Some features of this site may not work without it.

Parcourir

Tout DLCommunautés & CollectionsPar date de publicationAuteursTitresSujetsCette collectionPar date de publicationAuteursTitresSujets

Mon compte

Ouvrir une sessionS'inscrire

A Lightweight Key Management Scheme for E-health applications in the context of Internet of Things

Thumbnail
Voir/Ouvrir
A Lightweight Key Management Scheme.pdf (531.7Ko)
Auteur(s) :
Abdmeziem, Riad
Tandjaoui, Djamel
Date :
2014-03-15
URI :
http://dl.cerist.dz/handle/CERIST/639
Résumé
In the context of Internet of Things where real world objects will automatically be part of the Internet, ehealth applications have emerged as a promising approach to provide unobtrusive support for elderly and frail people based on their situation and circumstances. However, due to the limited resource available in such systems and privacy concerns that might rise from the capture of personal data, security issues constitute a major obstacle to their deployment. Authentication of the different entities involved and data confidentiality constitute the main concerns for users that need to be addressed. In this paper, we propose a new key management scheme for an ehealth application to allow sensors and the Base Station (BS) to negotiate certain security credentials that will be used to protect the information flow. Our prtocol provides a strong level of security guaranteeing authentication and data confidentiality while the scarcity of resources is taken into consideration. The scheme is based on a lightweight Public Key Infrastructure (PKI) where the sensors have to perform only one Elliptic Curve Cryptography (ECC) decryption in the key establishment process. Data exchanges are then secured by the use of symmetric encryption. In addition, Time Stamps are used to prevent replay attacks along with Message Code Authentication (MAC) to ensure integrity.

Mots clés:

 E-health, Wireless Body Area Networks (WBAN), Internet of Things, Security, Confidentiality, Key Management 

Source:

Rapports de recherche internes
ISRN :CERIST-DTISI/RR--14-0000000010--dz

Éditeur / Etablissement:

CERIST

Lieu:

Alger
Collections
  • Rapports de Recherche Internes [234]

Tous les documents dans CERIST DIGITAL LIBRARY sont protégés par copyright, avec tous droits réservés. copyright © 2013-2015  CERIST
Contactez-nous | Faire parvenir un commentaire
Powered by 
@mire NV
 

 


Tous les documents dans CERIST DIGITAL LIBRARY sont protégés par copyright, avec tous droits réservés. copyright © 2013-2015  CERIST
Contactez-nous | Faire parvenir un commentaire
Powered by 
@mire NV