A Novel Authentication and Key Agreement Protocol for Internet of Things Based Resource-Constrained Body Area Sensors

Secrecy and integrity of communication, as well as the authenticity of messages must be ensured by the security primitives and is critical element in Internet of Things (IoT). Devices in IoT applications such as smart healthcare applications deal with sensitive data of our health and daily lives and thus can execute malicious actuating commands with serious safety consequences. Therefore, it is important to ensure secure communication channel establishment among the medical sensors or devices and the remote servers. In this work, we propose a novel authentication and key agreement protocol that is lightweight for resource-constrained sensors and suitable to protect sensitive health related data in the context of IoT. The protocol is based on cooperation by offloading the heavy cryptographic functions of resource-constrained sensors to the trustful neighboring sensors. This trust verification is ensured by finding the data correlations from the data of embedded accelerometers in the smartphone acting as gateway and the sensors installed on the body. Security analysis and performance evaluation results show that the proposed protocol is secure and is energy efficient.

[1]  Georg Carle,et al.  DTLS based security and two-way authentication for the Internet of Things , 2013, Ad Hoc Networks.

[2]  Hanno Wirtz,et al.  Tailoring end-to-end IP security protocols to the Internet of Things , 2013, 2013 21st IEEE International Conference on Network Protocols (ICNP).

[3]  David Kotz,et al.  Recognizing whether sensors are on the same body , 2011, Pervasive Mob. Comput..

[4]  Dave Evans,et al.  How the Next Evolution of the Internet Is Changing Everything , 2011 .

[5]  Djamal Zeghlache,et al.  Lightweight collaborative key establishment scheme for the Internet of Things , 2014, Comput. Networks.

[6]  Utz Roedig,et al.  Securing communication in 6LoWPAN with compressed IPsec , 2011, 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS).

[7]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[8]  Hannes Tschofenig,et al.  Transport Layer Security (TLS) Cached Information Extension , 2016, RFC.

[9]  Eric Rescorla,et al.  Datagram Transport Layer Security Version 1.2 , 2012, RFC.

[10]  Lida Xu,et al.  The internet of things: a survey , 2014, Information Systems Frontiers.