PP-NDNoT: On preserving privacy in IoT-based E-health systems over NDN

Internet of Things (IoT) is a novel networking paradigm that contributes greatly in improving daily life. However, it includes a great number of interactive nodes that generate, aggregate and exchange critical data. Thus, security and privacy challenges must be handled. Named Data Networking (NDN) represents a promising future networking paradigm fitting perfectly with the requirements of IoT applications and especially those related to security and privacy. In this paper, we leverage the basic feats of NDN vision for designing a robust privacy preserving NDN-based e-health IoT system (PP-NDNoT). It ensures security and fulfills content and contextual privacy requirements. Indeed, the security and privacy level is fixed according to the patient's state. To prove the robustness and effectiveness of our proposal, an extensive security analysis and performance evaluation are reported.

[1]  Athanasios V. Vasilakos,et al.  Information-centric networking for the internet of things: challenges and opportunities , 2016, IEEE Network.

[2]  Ertugrul Dogruluk,et al.  Evaluating privacy attacks in Named Data Network , 2016, 2016 IEEE Symposium on Computers and Communication (ISCC).

[3]  Gene Tsudik,et al.  Namespace Tunnels in Content-Centric Networks , 2017, 2017 IEEE 42nd Conference on Local Computer Networks (LCN).

[4]  Sofien Gannouni,et al.  AFIRM: Adaptive forwarding based link recovery for mobility support in NDN/IoT networks , 2018, Future Gener. Comput. Syst..

[5]  Lixia Zhang Name-Based Access Control , 2015 .

[6]  Leïla Azouz Saïdane,et al.  A survey on privacy: Terminology, mechanisms and attacks , 2016, 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA).

[7]  Lixia Zhang,et al.  NDN-ACE : Access Control for Constrained Environments over Named Data Networking , 2015 .

[8]  Florian Hess,et al.  Efficient Identity Based Signature Schemes Based on Pairings , 2002, Selected Areas in Cryptography.

[9]  Xin-Ping Guan,et al.  Privacy-preserving design for emergency response scheduling system in medical social networks , 2016, Peer-to-Peer Networking and Applications.

[10]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[11]  Xiaodong Lin,et al.  Sage: a strong privacy-preserving scheme against global eavesdropping for ehealth systems , 2009, IEEE Journal on Selected Areas in Communications.

[12]  Leïla Azouz Saïdane,et al.  Toward privacy preserving in IoT e-health systems: A key escrow identity-based encryption scheme , 2018, 2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[13]  Leïla Azouz Saïdane,et al.  A Secure and Privacy-Preserving Solution for IoT over NDN Applied to E-health , 2018, 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC).

[14]  Aiqing Zhang,et al.  Light-Weight and Robust Security-Aware D2D-Assist Data Transmission Protocol for Mobile-Health Systems , 2017, IEEE Transactions on Information Forensics and Security.

[15]  Gene Tsudik,et al.  ANDaNA: Anonymous Named Data Networking Application , 2011, NDSS.