Highly efficient key agreement for remote patient monitoring in MEC-enabled 5G networks

被引:5
作者
Braeken, An [1 ]
Liyanage, Madhusanka [2 ,3 ]
机构
[1] Vrije Univ Brussel VUB, Ind Engn Dept INDI, Brussels, Belgium
[2] Univ Coll Dublin, Sch Comp Sci, Dublin, Ireland
[3] Univ Oulu, Ctr Wireless Commun, Oulu, Finland
基金
芬兰科学院;
关键词
Internet of things; Medical IoT; Multi-access edge computing; 5G; Health care; Symmetric key; Authentication scheme; AUTHENTICATION PROTOCOL; FRAMEWORK; ATTACKS;
D O I
10.1007/s11227-020-03472-y
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Remote patient monitoring is one of the cornerstones to enable Ambient Assisted Living. Here, a set of devices provide their corresponding input, which should be carefully aggregated and analysed to derive health-related conclusions. In the new Fifth-Generation (5G) networks, Internet of Things (IoT) devices communicate directly to the mobile network without any need of proxy devices. Moreover, 5G networks consist of Multi-access Edge Computing (MEC) nodes, which are taking the role of a mini-cloud, able to provide sufficient computation and storage capacity at the edge of the network. MEC IoT integration in 5G offers a lot of benefits such as high availability, high scalability, low backhaul bandwidth costs, low latency, local awareness and additional security and privacy. In this paper, we first detail the procedure on how to establish such remote monitoring in 5G networks. Next, we focus on the key agreement between IoT, MEC and registration center in order to guarantee mutual authentication, anonymity, and unlinkability properties. Taking into account the high heterogeneity of IoT devices that can contribute to an accurate image of the health status of a patient, it is of utmost importance to design a very lightweight scheme that allows even the smallest devices to participate. The proposed protocol is symmetric key based and thus highly efficient. Moreover, it is shown that the required security features are established and protection against the most of the well-known attacks is guaranteed.
引用
收藏
页码:5562 / 5585
页数:24
相关论文
共 46 条
[1]   Fog Computing for 5G Tactile Industrial Internet of Things: QoE-Aware Resource Allocation Model [J].
Aazam, Mohammad ;
Harras, Khaled A. ;
Zeadally, Sherali .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 15 (05) :3085-3092
[2]   A Security Model for Preserving the Privacy of Medical Big Data in a Healthcare Cloud Usinga Fog Computing Facility With Pairing-Based Cryptography [J].
Al Hamid, Hadeal Abdulaziz ;
Rahman, Sk Md Mizanur ;
Hossain, M. Shamim ;
Almogren, Ahmad ;
Alamri, Atif .
IEEE ACCESS, 2017, 5 :22313-22328
[3]  
Almehmadi T, 2019, 2019 2ND INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS)
[4]   A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment [J].
Amin, Ruhul ;
Kumar, Neeraj ;
Biswas, G. P. ;
Iqbal, R. ;
Chang, Victor .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 :1005-1019
[5]  
[Anonymous], 33501 GT ETSI
[6]  
[Anonymous], 2017, THESIS
[7]  
[Anonymous], 2020, IOT HEALTHC MARK BE
[8]  
[Anonymous], 2015, INT J COMPUTER APPL
[9]  
Arkko J., 2009, RFC 5448
[10]  
Bonomi F., 2012, P 1 EDITION MCC WORK, P13, DOI DOI 10.1145/2342509.2342513