Highly efficient key agreement for remote patient monitoring in MEC-enabled 5G networks

被引:0
作者
An Braeken
Madhusanka Liyanage
机构
[1] Vrije Universiteit Brussel (VUB),Industrial Engineering Department (INDI)
[2] University College Dublin,School of Computer Science
[3] University of Oulu,Center for Wireless Communications
来源
The Journal of Supercomputing | 2021年 / 77卷
关键词
Internet of things; Medical IoT; Multi-access edge computing; 5G; Health care; Symmetric key; Authentication scheme;
D O I
暂无
中图分类号
学科分类号
摘要
Remote patient monitoring is one of the cornerstones to enable Ambient Assisted Living. Here, a set of devices provide their corresponding input, which should be carefully aggregated and analysed to derive health-related conclusions. In the new Fifth-Generation (5G) networks, Internet of Things (IoT) devices communicate directly to the mobile network without any need of proxy devices. Moreover, 5G networks consist of Multi-access Edge Computing (MEC) nodes, which are taking the role of a mini-cloud, able to provide sufficient computation and storage capacity at the edge of the network. MEC IoT integration in 5G offers a lot of benefits such as high availability, high scalability, low backhaul bandwidth costs, low latency, local awareness and additional security and privacy. In this paper, we first detail the procedure on how to establish such remote monitoring in 5G networks. Next, we focus on the key agreement between IoT, MEC and registration center in order to guarantee mutual authentication, anonymity, and unlinkability properties. Taking into account the high heterogeneity of IoT devices that can contribute to an accurate image of the health status of a patient, it is of utmost importance to design a very lightweight scheme that allows even the smallest devices to participate. The proposed protocol is symmetric key based and thus highly efficient. Moreover, it is shown that the required security features are established and protection against the most of the well-known attacks is guaranteed.
引用
收藏
页码:5562 / 5585
页数:23
相关论文
共 114 条
[1]  
Aazam M(2019)Fog computing for 5G tactile industrial internet of things: Qoe-aware resource allocation model IEEE Trans Ind Inform 15 3085-3092
[2]  
Harras KA(2017)A security model for preserving the privacy of medical big data in a healthcare cloud using a fog computing facility with pairing-based cryptography IEEE Access 5 22313-22328
[3]  
Zeadally S(2018)A light weight authentication protocol for iot-enabled devices in distributed cloud computing environment Future Gener Comput Syst 78 1005-1019
[4]  
Al Hamid HA(2009)Improved extensible authentication protocol method for 3rd generation authentication and key agreement (EAP-AKA’) Netw Work Group Req Comments 5448 1-29
[5]  
Rahman SMM(2020)Highly efficient symmetric key based authentication and key agreement protocol using keccak Sensors 20 2160-64052
[6]  
Hossain MS(2018)Efficient and provably secure key agreement for modern smart metering communications Energies 11 2662-96
[7]  
Almogren A(2019)Novel 5G authentication protocol to improve the resistance against active attacks and malicious serving networks IEEE Access 7 64040-10106
[8]  
Alamri A(2015)ASEC: Anonym signcryption scheme based on EC operations Int J Comput Appl 5 90-428
[9]  
Amin R(2019)Symmetric-key-based security for multicast communication in wireless sensor networks Computers 8 27-3873
[10]  
Kumar N(2018)An anonymous mutual authenticated key agreement scheme for wearable sensors in wireless body area networks Appl Sci 8 1074-88