A Dynamic ID-Based Authentication Scheme for M2M Communication of Healthcare Systems

M2M (machine to machine) applications involving intelligence to ubiquitous environment have been in existence for the past many years. However, its provisioning using mobile technologies raises a new security challenge. Security services such as authentication and key establishment are critical in M2M, especially for healthcare systems. We proposed a simple architecture M2M service to apply any hospital which considers mobility of doctors and patients. An efficient security scheme with dynamic ID&Based authentication using pairwise key distribution is applied in M2M system. It can be assured high security through security analysis under shared key attack and Sybil attack.

[1]  Kuldip Singh,et al.  DDoS Incidents and their Impact: A Review , 2010, Int. Arab J. Inf. Technol..

[2]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[3]  Xiaojiang Du,et al.  A Survey on Sensor Network Security , 2008 .

[4]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, TSEC.

[5]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[6]  Mohsen Guizani,et al.  An Efficient Signal-Range-Based Probabilistic Key Predistribution Scheme in a Wireless Sensor Network , 2009, IEEE Transactions on Vehicular Technology.

[7]  Peter Kruus,et al.  TinyPK: securing sensor networks with public key technology , 2004, SASN '04.

[8]  Adrian Perrig,et al.  PIKE: peer intermediaries for key establishment in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[9]  Yunghsiang Sam Han,et al.  A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.

[10]  Jingsha He,et al.  A hexagon-based key predistribution scheme in sensor networks , 2006, 2006 International Conference on Parallel Processing Workshops (ICPPW'06).

[11]  Elaine Shi,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[12]  Pål Spilling,et al.  A survey of key management in ad hoc networks , 2006, IEEE Communications Surveys & Tutorials.

[13]  Rabi N. Mahapatra,et al.  An Efficient Key Distribution Scheme for Establishing Pairwise Keys with a Mobile Sink in Distributed Sensor Networks , 2008, 2008 IEEE International Performance, Computing and Communications Conference.

[14]  Yunghsiang Sam Han,et al.  A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.

[15]  Chinya V. Ravishankar,et al.  Efficient key establishment for group-based wireless sensor deployments , 2005, WiSe '05.

[16]  Rolf Blom,et al.  An Optimal Class of Symmetric Key Generation Systems , 1985, EUROCRYPT.

[17]  Rabi N. Mahapatra,et al.  Mobile sink using multiple channels to defend against wormhole attacks in wireless sensor networks , 2009, 2009 IEEE 28th International Performance Computing and Communications Conference.

[18]  DAVID W. CARMAN,et al.  New Directions in Sensor Network Key Management , 2005, Int. J. Distributed Sens. Networks.

[19]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[20]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[21]  Yong Wang,et al.  A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.

[22]  Donggang Liu,et al.  Improving key predistribution with deployment knowledge in static sensor networks , 2005, TOSN.