6 CONCLUSIONS
We addressed the problematic of establishing secured
communication channels in the constrained environ-
ment of e-health applications. In fact, we introduced
a new MIKEY mode that combines the pre-shared
key mode with the public key mode. In this mode,
heavy operations are offloaded to dedicated powerful
third parties. Doing so, the constrained entities are
only involved in the symmetric operations of the pre-
shared mode. The public key mode is left to the un-
constrained part of the network. As a result, the con-
strained entities are able to establish a secured chan-
nel with any remote entity without having established
an initial shared knowledge. Indeed, through our dis-
tributed hybrid mode, we benefit from the advantages
of both pre-shared mode (resource preservation) and
public key mode (scalability), while mitigating their
disadvantages. The first preliminary results show that
our mode is secure, and resource preserving at the
same time. In the future, we plan an implementation
on real test-beds to assess its energy consumption per-
formances under real conditions.
REFERENCES
Abdmeziem, M. and Tandjaoui, D. (2015). An end-to-end
secure key management protocol for e-health applica-
tions. Computers & Electrical Engineering.
Abdmeziem, M. R. and Tandjaoui, D. (2014). Tailoring
mikey-ticket to e-health applications in the context of
internet of things. In International Conference on Ad-
vanced Networking, Distributed Systems and Applica-
tions, pages 72–77.
Abdmeziem, M. R., Tandjaoui, D., and Romdhani, I.
(2016). Architecting the internet of things: State of
the art. In Robots and Sensor Clouds, pages 55–75.
Springer International Publishing.
Arkko, J., Lindholm, F., Naslund, M., and Norrman, K.
(2004). Mikey: Multimedia internet keying. RFC
3830, IETF.
Atzori, L., Iera, A., and Morabito, G. (2010). The internet
of things: A survey. Computer Networks, pages 2787–
2805.
Bonetto, R., Bui, N., Lakkundi, V., Olivereau, A., Serbanati,
A., and Rossi, M. (2012). Secure communication for
smart iot objects: Protocol stacks, use cases and prac-
tical examples. In Proc. of IEEE WoWMoM.
Chang, V. and Ramachandran, M. (2016). Towards achiev-
ing data security with the cloud computing adoption
framework. IEEE Transactions on Services Comput-
ing, 9(1):138–151.
Chevalier, Y., Compagna, L., Cuellar, J., Drielsma, P. H.,
Mantovani, J., and S. Modersheim, a. L. V. (2004). A
high level protocol specification language for indus-
trial security sensitive protocols. Proc. SAPS 04. Aus-
trian Computer Society, 2004.
Dohr, A., Modre-Opsrian, R., Drobics, M., Hayn, D., and
Schreier, G. (2010). The internet of things for ambi-
ent assisted living. In Information Technology: New
Generations (ITNG), pages 804–809.
Dolev, D. and Yao, C. (1981). On the security of public key
protocols. FOCS, IEEE, pages 350–357.
Dworkin, M. (2007). Recommendation for block cipher
modes of operation: The ccm mode for authentication
and confidentiality. SP-800-38c, NIST, US department
of
commerce.
Freeman, T., Housley, R., Malpani, A., Cooper, D., and
Polk, W. (2007). Server-based certificate validation
protocol(scvp). RFC 5055, IETF.
Hui, J. and Thubert, P. (2011). Compression format for ipv6
datagrams over ieee 802.15.4-based networks. RFC
6282, IETF.
Hummen, R., Hiller, J., Henze, M., and Wehrle, K. (2013).
Slimfit a hip dex compression layer for the ip-based
internet of things. WiMob, IEEE, pages 259–266.
Li, M. and Lou, W. (2010). Data security and privacy in
wireless body area networks. Wireless Technologies
for
E-healthcare.
Moedersheim, S. and Drielsma, P. (2003). Avispa project
deliverable d6.2: Specification of the problems in the
high-level specification language. http://www.avispa-
project.org.
Raza, S., Duquennoy, S., Chung, T., Yazar, D., Voigt, T.,
and Roedig, U. (2011). Securing communication in
6lowpan with compressed ipsec. in Proc. of IEEE
DCOSS.
Raza, S., Trabalza, D., and Voigt, T. (2012a). 6lowpan com-
pressed dtls for coap. in Proc. of IEEE DCOSS.
Raza, S., Voigt, T., and Jutvik, V. (2012b). Lightweight
ikev2: A key management solution for both com-
pressed ipsec and ieee 802.15.4 security. IETF/IAB
workshop on Smart Object Security.
Reed, S. and Solomon, G. (1960). Polynomial codes over
certain finite fields. Journal of the Society for Indus-
trial and Applied Mathematics, 8(2):300–304.
Rivest, R. L., Shamir, A., and Adleman, L. (1978). A
method for obtaining digital signatures and public-
key cryptosystems. Communications of the ACM,
21(2):120–126.
Roman, R., Alcaraz, C., Lopez, J., and Sklavos, N. (2011).
key management systems for sensor networks in the
context of internet of things. Computers and Electric
Engineering, 37:147–159.
Sahraoui, S. and Bilami, A. (2015). Efficient hip-based
approach to ensure lightweight end-to-end security in
the internet of things. Computer Networks, 91:26–45.
Saied, Y. B. and Olivereau, A. (2012). Hip tiny exchange
(tex): A distributed key exchange scheme for hip-
based internet of things. in Proc. of ComNet.
Tsiftes, N. and Dunkels, A. (2011). A database in every sen-
sor. Proceedings of the 9th ACM Conference on Em-
bedded Networked Sensor Systems, pages 316–332.