4.6 Article

Internet of Medical Things-Based Secure and Energy-Efficient Framework for Health Care

期刊

BIG DATA
卷 10, 期 1, 页码 18-33

出版社

MARY ANN LIEBERT, INC
DOI: 10.1089/big.2021.0202

关键词

CoAP; DTLS; IoMT; IoT; RSA

向作者/读者索取更多资源

The study aims to enhance the security of data collected from remote health monitoring devices within the Internet of Medical Things (IoMT) by utilizing CoAP and DTLS protocols to establish secure sessions. Proposed efficient and secure communication technique using ESCEC2-S-2 for key establishment between IoMT devices and distant servers seeks to address existing issues related to key management and multicast security in CoAP.
The Internet of Medical Things (IoMT) is a collection of medical equipment and software that can help patients get better care. The purpose of this study is to improve the security of data collected through remote health monitoring of patients utilizing Constrained Application Protocol (CoAP). Asymmetric cryptography techniques may be used to assure the security of such sensor networks. For communication between different IoMT devices and a remote server, the safe CoAP is compatible with the Datagram Transport Layer Security (DTLS) protocol for creating a secure session using existing algorithms such as Lightweight Establishment of Secure Session. The DTLS layer of CoAP, in contrast, has shortcomings in key control, session establishment, and multicast message exchange. As a consequence, for IoMT communication, the creation of an efficient protocol for safe CoAP session establishment is needed. Thus, to solve the existing problems related to key management and multicast security in CoAP, we have proposed an efficient and secure communication technique to establish a secure session key between IoMT devices and distant servers using lightweight Energy-Efficient and Secure CoAP Elliptic Curve Cryptography ((ESCEC2)-S-2). The advantage of using (ESCEC2)-S-2 over other identification methods such as Rivest-Shamir-Adleman (RSA) is its compact key size, which allows it to use a smaller key size. This article also compares these algorithms on parameters such as time spent generating keys, signature generation, and verification of (ESCEC2)-S-2 and RSA algorithms, as well as energy consumption and radio duty cycle, to see if they are compatible in constrained environments.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据