LightIoT: Lightweight and Secure Communication for Energy-Efficient IoT in Health Informatics

Internet of Things (IoT) is considered as a key enabler of health informatics. IoT-enabled devices are used for in-hospital and in-home patient monitoring to collect and transfer biomedical data pertaining to blood pressure, electrocardiography (ECG), blood sugar levels, body temperature, etc. Among these devices, wearables have found their presence in a wide range of healthcare applications. These devices generate data in real-time and transmit them to nearby gateways and remote servers for processing and visualization. The data transmitted by these devices are vulnerable to a range of adversarial threats, and as such, privacy and integrity need to be preserved. In this paper, we present LightIoT, a lightweight and secure communication approach for data exchanged among the devices of a healthcare infrastructure. LightIoT operates in three phases: initialization, pairing, and authentication. These phases ensure the reliable transmission of data by establishing secure sessions among the communicating entities (wearables, gateways and a remote server). Statistical results exhibit that our scheme is lightweight, robust, and resilient against a wide range of adversarial attacks and incurs much lower computational and communication overhead for the transmitted data in the presence of existing approaches.

[1]  Muhammad Alam,et al.  A payload-based mutual authentication scheme for Internet of Things , 2017, Future Gener. Comput. Syst..

[2]  Chin-Chen Chang,et al.  A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks , 2016, IEEE Transactions on Wireless Communications.

[3]  Mohammad Dahman Alshehri,et al.  A Centralized Cluster-Based Hierarchical Approach for Green Communication in a Smart Healthcare System , 2020, IEEE Access.

[4]  Marko Hölbl,et al.  A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion , 2014, Ad Hoc Networks.

[5]  Prosanta Gope,et al.  A Realistic Lightweight Anonymous Authentication Protocol for Securing Real-Time Application Data Access in Wireless Sensor Networks , 2016, IEEE Transactions on Industrial Electronics.

[6]  Ateeq Ur Rehman,et al.  An AI-enabled lightweight data fusion and load optimization approach for Internet of Things , 2021, Future Gener. Comput. Syst..

[7]  Lixia Zhang,et al.  Distributed Dataset Synchronization in Disruptive Networks , 2019, 2019 IEEE 16th International Conference on Mobile Ad Hoc and Sensor Systems (MASS).

[8]  Pei-Chi Huang,et al.  DLWIoT: Deep Learning-based Watermarking for Authorized IoT Onboarding , 2020, 2021 IEEE 18th Annual Consumer Communications & Networking Conference (CCNC).

[9]  Jiannong Cao,et al.  A dynamic user authentication scheme for wireless sensor networks , 2006, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06).

[10]  Mauro Conti,et al.  SecLAP: Secure and lightweight RFID authentication protocol for Medical IoT , 2019, Future Gener. Comput. Syst..

[11]  Satyajayant Misra,et al.  ICedge: When Edge Computing Meets Information-Centric Networking , 2020, IEEE Internet of Things Journal.

[12]  Sherali Zeadally,et al.  Anonymous Authentication for Wireless Body Area Networks With Provable Security , 2017, IEEE Systems Journal.

[13]  Chao Liu,et al.  On the security of a provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks , 2018, Int. J. Distributed Sens. Networks.

[14]  Ruhul Amin,et al.  A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks , 2016, Ad Hoc Networks.

[15]  Xiaohui Liang,et al.  Security and Privacy in Smart City Applications: Challenges and Solutions , 2017, IEEE Communications Magazine.

[16]  Byung-Seo Kim,et al.  CCIC-WSN: An Architecture for Single-Channel Cluster-Based Information-Centric Wireless Sensor Networks , 2020, IEEE Internet of Things Journal.

[17]  Lianyong Qi,et al.  Enhancing the Performance of Flow Classification in SDN-Based Intelligent Vehicular Networks , 2021, IEEE Transactions on Intelligent Transportation Systems.

[18]  Sherali Zeadally,et al.  Toward self-authenticable wearable devices , 2015, IEEE Wireless Communications.

[19]  Kyung Sup Kwak,et al.  Certificateless Remote Anonymous Authentication Schemes for WirelessBody Area Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.

[20]  Jian Shen,et al.  Future Generation Computer Systems , 2022 .

[21]  Xiong Li,et al.  Provably secure user authentication and key agreement scheme for wireless sensor networks , 2016, Secur. Commun. Networks.

[22]  Syagnik Banerjee,et al.  Wearable devices and healthcare: Data sharing and privacy , 2018, Inf. Soc..

[23]  Xiang-Chuan Gao,et al.  Security and blockchain convergence with Internet of Multimedia Things: Current trends, research challenges and future directions , 2021, J. Netw. Comput. Appl..

[24]  Sinem Alturjman,et al.  Context-Sensitive Access in Industrial Internet of Things (IIoT) Healthcare Applications , 2018, IEEE Transactions on Industrial Informatics.

[25]  Fan Wu,et al.  A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things , 2018, IEEE Transactions on Industrial Informatics.

[26]  Kim-Kwang Raymond Choo,et al.  Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment , 2018, IEEE Journal of Biomedical and Health Informatics.

[27]  S. Jagtap,et al.  Internet of things-linked wearable devices for managing food safety in the healthcare sector , 2019 .

[28]  Xiong Li,et al.  Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks , 2017, Comput. Networks.

[29]  Rahim Khan,et al.  Lightweight Mutual Authentication and Privacy-Preservation Scheme for Intelligent Wearable Devices in Industrial-CPS , 2021, IEEE Transactions on Industrial Informatics.

[30]  Muhammad Khurram Khan,et al.  A robust and anonymous patient monitoring system using wireless medical sensor networks , 2018, Future Gener. Comput. Syst..

[31]  Jian Shen,et al.  A lightweight and privacy-preserving mutual authentication scheme for wearable devices assisted by cloud server , 2017, Comput. Electr. Eng..

[32]  Xiangjian He,et al.  SAMS: A Seamless and Authorized Multimedia Streaming Framework for WMSN-Based IoMT , 2019, IEEE Internet of Things Journal.

[33]  Hui Zhang,et al.  SafeCity: Toward Safe and Secured Data Management Design for IoT-Enabled Smart City Planning , 2020, IEEE Access.

[34]  Lixia Zhang,et al.  DAPES: Named Data for Off-the-Grid File Sharing with Peer-to-Peer Interactions , 2020, 2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS).

[35]  Ateeq Ur Rehman,et al.  A Secured and Intelligent Communication Scheme for IIoT-enabled Pervasive Edge Computing , 2021, IEEE Transactions on Industrial Informatics.

[36]  Wei Yao,et al.  A Secured and Efficient Communication Scheme for Decentralized Cognitive Radio-Based Internet of Vehicles , 2019, IEEE Access.

[37]  Mohammad R. Khosravi,et al.  Efficient Flow Processing in 5G-Envisioned SDN-Based Internet of Vehicles Using GPUs , 2021, IEEE Transactions on Intelligent Transportation Systems.

[38]  Chao Yang,et al.  Efficient end-to-end authentication protocol for wearable health monitoring systems , 2017, Comput. Electr. Eng..

[39]  Mauro Conti,et al.  A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring , 2017, Future Gener. Comput. Syst..