Performance Analysis of End-to-End Security Schemes in Healthcare IoT

dc.contributor.authorSanaz Rahimi Moosavi
dc.contributor.authorEthiopia Nigussie
dc.contributor.authorMarco Levorato
dc.contributor.authorSeppo Virtanen
dc.contributor.authorJouni Isoaho
dc.contributor.organizationfi=ohjelmistotekniikka|en=Software Engineering|
dc.contributor.organizationfi=tietoliikennetekniikka|en=Communication Systems|
dc.contributor.organization-code1.2.246.10.2458963.20.65755342907
dc.contributor.organization-code2606804
dc.converis.publication-id35689929
dc.converis.urlhttps://research.utu.fi/converis/portal/Publication/35689929
dc.date.accessioned2022-10-27T12:19:59Z
dc.date.available2022-10-27T12:19:59Z
dc.description.abstract<p>In this paper, we analyze the performance of the state-of-the-art end-to-end security schemes in healthcare Internet of Things (IoT) systems. We identify that the essential requirements of robust security solutions for healthcare IoT systems comprise of (i) low-latency secure key generation approach using patients’ Electrocardiogram (ECG) signals, (ii) secure and efficient authentication and authorization for healthcare IoT devices based on the certificate-based datagram Transport Layer Security (DTLS), and (iii) robust and secure mobility-enabled end-to-end communication based on DTLS session resumption. The performance of the state-of-the-art security solutions including our end-to-end security scheme is tested by developing a prototype healthcare IoT system. The prototype is built of a Pandaboard, a TI SmartRF06 board and WiSMotes. The Pandaboard along with the CC2538 module acts as a smart gateway and the WisMotes act as medical sensor nodes. Based on the analysis, we found out that our solution has the most extensive set of performance features in comparison to related approaches found in the literature. The performance evaluation results show that compared to the existing approaches, the cryptographic key generation approach proposed in our end-to-end security scheme is on average 1.8 times faster than existing key generation approaches while being more energy-efficient. In addition, the scheme reduces the communication overhead by 26% and the communication latency between smart gateways and end users by 16%. Our scheme is also approximately 97% faster than certificate based and 10% faster that symmetric key-based DTLS. Certificate based DTLS requires about 2.9 times more ROM and 2.2 times more RAM resources. On the other hand, the ROM and RAM requirements of our scheme are almost as low as in symmetric key-based DTLS.<br /></p>
dc.format.pagerange432
dc.format.pagerange439
dc.identifier.issn1877-0509
dc.identifier.jour-issn1877-0509
dc.identifier.olddbid174790
dc.identifier.oldhandle10024/157884
dc.identifier.urihttps://www.utupub.fi/handle/11111/34902
dc.identifier.urlhttps://www.sciencedirect.com/science/article/pii/S1877050918304228
dc.identifier.urnURN:NBN:fi-fe2021042719658
dc.language.isoen
dc.okm.affiliatedauthorRahimi Moosavi, Sanaz
dc.okm.affiliatedauthorNigussie, Ethiopia
dc.okm.affiliatedauthorVirtanen, Seppo
dc.okm.affiliatedauthorIsoaho, Jouni
dc.okm.discipline213 Electronic, automation and communications engineering, electronicsen_GB
dc.okm.discipline213 Sähkö-, automaatio- ja tietoliikennetekniikka, elektroniikkafi_FI
dc.okm.internationalcopublicationnot an international co-publication
dc.okm.internationalityInternational publication
dc.okm.typeA4 Conference Article
dc.relation.conferenceInternational Conference on Ambient Systems, Networks and Technologies
dc.relation.doi10.1016/j.procs.2018.04.064
dc.relation.ispartofjournalProcedia Computer Science
dc.relation.volume130
dc.source.identifierhttps://www.utupub.fi/handle/10024/157884
dc.titlePerformance Analysis of End-to-End Security Schemes in Healthcare IoT
dc.title.bookThe 9th International Conference on Ambient Systems, Networks and Technologies (ANT 2018)
dc.year.issued2018

Tiedostot

Näytetään 1 - 1 / 1
Ladataan...
Name:
1-s2.0-S1877050918304228-main.pdf
Size:
545.71 KB
Format:
Adobe Portable Document Format
Description:
Publisher's PDF