An end-to-end secure key management protocol for e-health applications

dc.contributor.authorAbdmeziem, Mohammed Riyadh
dc.contributor.authorTandjaoui, Djamel
dc.date.accessioned2016-01-20T09:06:34Z
dc.date.available2016-01-20T09:06:34Z
dc.date.issued2015
dc.description.abstractKey distribution is required to secure e-health applications in the context of Internet of Things (IoT). However, resources constraints in IoT make these applications unable to run existing key management protocols. In this paper, we propose a new lightweight key management protocol. This protocol is based on collaboration to establish a secure end-to-end communication channel between a highly resource constrained node and a remote entity. The secure channel allows the constrained node to transmit captured data while ensuring confidentiality and authentication. To achieve this goal, we propose offloading highly consuming cryptographic primitives to third parties. As a result, the constrained node obtains assistance from powerful entities. To assess our protocol, we conduct a formal validation regarding security properties. In addition, we evaluate both communication and computational costs to highlight energy savings. The results show that our protocol provides a considerable gain in energy while its security properties are ensured.fr_FR
dc.identifier.issn0045-7906fr_FR
dc.identifier.urihttp://dl.cerist.dz/handle/CERIST/789
dc.publisherElsevierfr_FR
dc.relation.ispartofseriesComputers & Electrical Engineering;44
dc.relation.pages184-197fr_FR
dc.structureSécurité des systèmes et applicationsfr_FR
dc.subjectE-healthfr_FR
dc.subjectInternet of Things (IoT)fr_FR
dc.subjectConfidentialityfr_FR
dc.subjectSecurityfr_FR
dc.subjectPrivacyfr_FR
dc.subjectKey managementfr_FR
dc.titleAn end-to-end secure key management protocol for e-health applicationsfr_FR
dc.typeArticle
Files