Browsing by Subject "E-health"
Now showing 1 - 4 of 4
- Results Per Page
- Sort Options
Item A Lightweight Key Management Scheme for E-health applications in the context of Internet of Things(CERIST, 2014-03-15) Abdmeziem, Riad; Tandjaoui, DjamelIn the context of Internet of Things where real world objects will automatically be part of the Internet, ehealth applications have emerged as a promising approach to provide unobtrusive support for elderly and frail people based on their situation and circumstances. However, due to the limited resource available in such systems and privacy concerns that might rise from the capture of personal data, security issues constitute a major obstacle to their deployment. Authentication of the different entities involved and data confidentiality constitute the main concerns for users that need to be addressed. In this paper, we propose a new key management scheme for an ehealth application to allow sensors and the Base Station (BS) to negotiate certain security credentials that will be used to protect the information flow. Our prtocol provides a strong level of security guaranteeing authentication and data confidentiality while the scarcity of resources is taken into consideration. The scheme is based on a lightweight Public Key Infrastructure (PKI) where the sensors have to perform only one Elliptic Curve Cryptography (ECC) decryption in the key establishment process. Data exchanges are then secured by the use of symmetric encryption. In addition, Time Stamps are used to prevent replay attacks along with Message Code Authentication (MAC) to ensure integrity.Item An end-to-end secure key management protocol for e-health applications(Elsevier, 2015) Abdmeziem, Mohammed Riyadh; Tandjaoui, DjamelKey distribution is required to secure e-health applications in the context of Internet of Things (IoT). However, resources constraints in IoT make these applications unable to run existing key management protocols. In this paper, we propose a new lightweight key management protocol. This protocol is based on collaboration to establish a secure end-to-end communication channel between a highly resource constrained node and a remote entity. The secure channel allows the constrained node to transmit captured data while ensuring confidentiality and authentication. To achieve this goal, we propose offloading highly consuming cryptographic primitives to third parties. As a result, the constrained node obtains assistance from powerful entities. To assess our protocol, we conduct a formal validation regarding security properties. In addition, we evaluate both communication and computational costs to highlight energy savings. The results show that our protocol provides a considerable gain in energy while its security properties are ensured.Item Design of Wearable Health Monitoring Systems: An Overview of Techniques and Technologies&(Springer International Publishing, 2016) Boulemtafes, Amine; Badache, NadjibBecause of the increasing costs of healthcare, wearable health monitoring systems (WHMS) are catching a lot of attention of the research community. Such systems are more and more propelled by advances in technology such as miniaturization, sensing devices and wireless communications. This study aims to review and synthesis the main implementation techniques and technologies used to design WHM Systems on the basis of the typical WBAN three-tiers architecture where the Body Area Network (BAN) represents the key infrastructure of such systems.Item Wearable Health Monitoring Systems: An Overview of Design Research Areas(Springer International Publishing, 2016) Boulemtafes, Amine; Badache, NadjibIn order to be effective and helping towards improving quality of living of people, design and development of wearable health monitoring systems needs to satisfy a number of medical and non-medical criteria’s while taking in consideration resource limitations and fulfilling ergonomic constraints. This study with the aim to serve as a quick reference for future works, attempts to cover main research areas including requirements, challenges and tradeoffs related to the design of such systems.