Highly efficient key agreement for remote patient monitoring in MEC-enabled 5G networks

被引:5
作者
Braeken, An [1 ]
Liyanage, Madhusanka [2 ,3 ]
机构
[1] Vrije Univ Brussel VUB, Ind Engn Dept INDI, Brussels, Belgium
[2] Univ Coll Dublin, Sch Comp Sci, Dublin, Ireland
[3] Univ Oulu, Ctr Wireless Commun, Oulu, Finland
基金
芬兰科学院;
关键词
Internet of things; Medical IoT; Multi-access edge computing; 5G; Health care; Symmetric key; Authentication scheme; AUTHENTICATION PROTOCOL; FRAMEWORK; ATTACKS;
D O I
10.1007/s11227-020-03472-y
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Remote patient monitoring is one of the cornerstones to enable Ambient Assisted Living. Here, a set of devices provide their corresponding input, which should be carefully aggregated and analysed to derive health-related conclusions. In the new Fifth-Generation (5G) networks, Internet of Things (IoT) devices communicate directly to the mobile network without any need of proxy devices. Moreover, 5G networks consist of Multi-access Edge Computing (MEC) nodes, which are taking the role of a mini-cloud, able to provide sufficient computation and storage capacity at the edge of the network. MEC IoT integration in 5G offers a lot of benefits such as high availability, high scalability, low backhaul bandwidth costs, low latency, local awareness and additional security and privacy. In this paper, we first detail the procedure on how to establish such remote monitoring in 5G networks. Next, we focus on the key agreement between IoT, MEC and registration center in order to guarantee mutual authentication, anonymity, and unlinkability properties. Taking into account the high heterogeneity of IoT devices that can contribute to an accurate image of the health status of a patient, it is of utmost importance to design a very lightweight scheme that allows even the smallest devices to participate. The proposed protocol is symmetric key based and thus highly efficient. Moreover, it is shown that the required security features are established and protection against the most of the well-known attacks is guaranteed.
引用
收藏
页码:5562 / 5585
页数:24
相关论文
共 46 条
[21]   Vehicular Fog Computing: A Viewpoint of Vehicles as the Infrastructures [J].
Hou, Xueshi ;
Li, Yong ;
Chen, Min ;
Wu, Di ;
Jin, Depeng ;
Chen, Sheng .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2016, 65 (06) :3860-3873
[22]   Attribute-Based Access Control [J].
Hu, Vincent C. ;
Kuhn, D. Richard ;
Ferraiolo, David F. .
COMPUTER, 2015, 48 (02) :85-88
[23]   Authenticated key agreement scheme for fog-driven IoT healthcare system [J].
Jia, Xiaoying ;
He, Debiao ;
Kumar, Neeraj ;
Choo, Kim-Kwang Raymond .
WIRELESS NETWORKS, 2019, 25 (08) :4737-4750
[24]   A-Z survey of Internet of Things: Architectures, protocols, applications, recent advances, future directions and recommendations [J].
Kassab, Wafa'a ;
Darabkh, Khalid A. .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 163
[25]  
Kekki S., 2018, ETSI WHITE PAPER, V28, P1
[26]   The 5G-AKA Authentication Protocol Privacy [J].
Koutsos, Adrien .
2019 4TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P), 2019, :464-479
[27]   Anonymous Secure Framework in Connected Smart Home Environments [J].
Kumar, Pardeep ;
Braeken, An ;
Gurtov, Andrei ;
Iinatti, Jari ;
Ha, Phuong Hoai .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (04) :968-979
[28]   RUASN: A Robust User Authentication Framework for Wireless Sensor Networks [J].
Kumar, Pardeep ;
Choudhury, Amlan Jyoti ;
Sain, Mangal ;
Lee, Sang-Gon ;
Lee, Hoon-Jae .
SENSORS, 2011, 11 (05) :5020-5046
[29]   Ephemeral-Secret-Leakage Secure ID-Based Three-Party Authenticated Key Agreement Protocol for Mobile Distributed Computing Environments [J].
Liu, Chao-Liang ;
Tsai, Wang-Jui ;
Chang, Ting-Yi ;
Liu, Ta-Ming .
SYMMETRY-BASEL, 2018, 10 (04)
[30]  
Liyanage M., 2015, Software defined mobile networks, P289, DOI 10.1002/9781118900253.ch16