ECASS: an encryption compression aggregation security scheme for secure data transmission in ambient assisted living systems

Considerable efforts are being spent worldwide to ensure comfortable living environments and decent, on-time assistance to elderly and people requiring healthcare services. Recent advances in data acquisition and communication are allowing revolutionary ambient assisted leaving (AAL) systems to be implemented, where healthcare data are collected and reported on-the-fly to dedicated medical servers for further analysis and actions. Due to the increasing rely on distributed, resource constrained sensing devices, AAL systems are being subject to large number of attacks. In addition to usual high energy consumption and communication overhead, current systems are not yet able to fully safeguard the private data of their users. To overcome these shortcomings, we propose in this paper to combine the use of cryptography, compressed sensing, and steganography into a new generic solution called Encryption Compression Aggregation Security Scheme (ECASS). While focusing on the specific case of Medical Healthcare Systems, ECASS aims to secure private data exchanges over wireless networks while achieving lower energy consumption and communication overhead. Our simulations with the NS-2.35 simulator are showing an improvement of 40 and 50% in terms of energy consumption and communication overhead respectively compared to the IBE-Lite security scheme.

[1]  Yu-Fang Chung,et al.  A Secure Authentication Scheme for Telecare Medicine Information Systems , 2012, Journal of Medical Systems.

[2]  Sheng Zhong,et al.  IBE-Lite: A Lightweight Identity-Based Cryptography for Body Sensor Networks , 2009, IEEE Transactions on Information Technology in Biomedicine.

[3]  A. Kamilaris,et al.  Integrating Web-Enabled Energy-Aware Smart Homes to the Smart Grid , 2012 .

[4]  Anna Pagh,et al.  Uniform hashing in constant time and linear space , 2003, STOC '03.

[5]  Chong Kuan Chen,et al.  IoT Security: Ongoing Challenges and Research Opportunities , 2014, 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications.

[6]  Vladimir Stojanovic,et al.  Design and Analysis of a Hardware-Efficient Compressed Sensing Architecture for Data Compression in Wireless Sensors , 2012, IEEE Journal of Solid-State Circuits.

[7]  Vincent Yan Fu Tan,et al.  Wireless Compressive Sensing for Energy Harvesting Sensor Nodes , 2012, IEEE Transactions on Signal Processing.

[8]  Kyung Sup Kwak,et al.  Certificateless Remote Anonymous Authentication Schemes for WirelessBody Area Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.

[9]  Moti Yung,et al.  Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..

[10]  Sherali Zeadally,et al.  Authentication protocol for an ambient assisted living system , 2015, IEEE Communications Magazine.

[11]  Ming Li,et al.  Data security and privacy in wireless body area networks , 2010, IEEE Wireless Communications.

[12]  T. Blumensath,et al.  Theory and Applications , 2011 .

[13]  Liang Zhou,et al.  Multimedia traffic security architecture for the internet of things , 2011, IEEE Network.

[14]  R.W. Stephenson,et al.  Southwestern Bell Telephone's ISDN experience , 1989, IEEE Network.

[15]  Aref Meddeb,et al.  A broadcast authentication scheme in IoT environments , 2016, 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA).

[16]  N. Hamid,et al.  Image Steganography Techniques : An Overview , 2012 .

[17]  Jian Wang,et al.  Strong Authentication Scheme for Telecare Medicine Information Systems , 2011, Journal of Medical Systems.

[18]  Saikat Saha,et al.  Issues in Transmitting Physical Health Information in m-Healthcare , 2013 .

[19]  Y. M. Huang,et al.  Pervasive, secure access to a hierarchical sensor-based healthcare monitoring architecture in wireless heterogeneous networks , 2009, IEEE Journal on Selected Areas in Communications.

[20]  Hung-Ming Chen,et al.  An Authentication Protocol for Ubiquitous Health Monitoring Systems , 2013 .

[21]  Alisha Arora,et al.  IMAGE STEGANOGRAPHY TECHNIQUES: AN OVERVIEW , 2014 .

[22]  Wei Liang,et al.  A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity , 2016, Secur. Commun. Networks.

[23]  Amir Hossein Jahangir,et al.  Analysis of Public-Key Cryptography for Wireless Sensor Networks Security , 2008 .

[24]  Ian T. Downard,et al.  Simulating Sensor Networks in NS-2 , 2004 .

[25]  Sungyoung Lee,et al.  An Efficient Mutual Authentication and Access Control Scheme for Wireless Sensor Networks in Healthcare , 2011, J. Networks.

[26]  Lida Xu,et al.  A Continuous Biomedical Signal Acquisition System Based on Compressed Sensing in Body Sensor Networks , 2013, IEEE Transactions on Industrial Informatics.