Secure Encapsulation Schemes Using Key Recovery System in IoMT Environments

Published on May 17, 2021in Sensors3.275
· DOI :10.3390/S21103474
Tae Hoon Kim38
Estimated H-index: 38
,
Won-Bin Kim1
Estimated H-index: 1
+ 1 AuthorsIm-Yeong Lee9
Estimated H-index: 9
Sources
Abstract
Recently, as Internet of Things systems have been introduced to facilitate diagnosis and treatment in healthcare and medical environments, there are many issues concerning threats to these systems’ security. For instance, if a key used for encryption is lost or corrupted, then ciphertexts produced with this key cannot be decrypted any more. Hence, this paper presents two schemes for key recovery systems that can recover the lost or the corrupted keys of an Internet of Medical Things. In our proposal, when the key used for the ciphertext is needed, this key is obtained from a Key Recovery Field present in the cyphertext. Thus, the recovered key will allow decrypting the ciphertext. However, there are threats to this proposal, including the case of the Key Recovery Field being forged or altered by a malicious user and the possibility of collusion among participating entities (Medical Institution, Key Recovery Auditor, and Key Recovery Center) which can interpret the Key Recovery Field and abuse their authority to gain access to the data. To prevent these threats, two schemes are proposed. The first one enhances the security of a multi-agent key recovery system by providing the Key Recovery Field with efficient integrity and non-repudiation functions, and the second one provides a proxy re-encryption function resistant to collusion attacks against the key recovery system.
References27
Newest
Internet has changed radically in the way people interact in the virtual world, in their careers or social relationships. IoT technology has added a new vision to this process by enabling connections between smart objects and humans, and also between smart objects themselves, which leads to anything, anytime, anywhere, and any media communications. IoT allows objects to physically see, hear, think, and perform tasks by making them talk to each other, share information and coordinate decisions. T...
5 CitationsSource
#1George Hatzivasilis (FORTH: Foundation for Research & Technology – Hellas)H-Index: 10
#2Othonas Soultatos (FORTH: Foundation for Research & Technology – Hellas)H-Index: 5
view all 6 authors...
Day-by-day modern circular economy (CE) models gain ground and penetrate the traditional business sectors. The Internet of Medical Things (IoMT) is the main enabler for this interplay of CE with healthcare. Novel services, like remote sensing, assisting of elder people, and e-visit, enhance the people's health and convenience, while reducing the per-patient cost for the medical institutions. However, the rise of mobile, wearable, and telemedicine solutions means that security can no longer be ex...
9 CitationsSource
#1Jin-Yong Yu (Sejong University)H-Index: 2
#2Young-Gab Kim (Sejong University)H-Index: 15
Because the IoT (Internet of Things) is emerging as the next generation growth engine that leads the IT (information technology) industry, many developed countries and companies are developing IoT based technologies to preoccupy the IoT market. Among the core technologies that make up IoT, IoT platform can have a huge impact on future devices. It is attracting attention as one of the most promising technologies of IoT technology, but at the same time concerns about platform security are also inc...
5 CitationsSource
#1Hua Guo (Beihang University)H-Index: 7
#2Yandong Zheng (UNB: University of New Brunswick)H-Index: 5
Last. Chunhe Xia (Beihang University)H-Index: 1
view all 5 authors...
Abstract The Internet of Things(IoT) aims to collect a large amount of data and exchange them over wireless networks by connecting billions of perception objects. Security becomes essential for IoT since unreliable wireless networks often create insecure connections. To ensure the group communication security and improve the communication efficiency, self-healing group key distribution (SGKD) protocols are introduced for unreliable wireless networks. In such scheme, lost session keys can be reco...
4 CitationsSource
#1Tie Qiu (TJU: Tianjin University)H-Index: 32
#2Ning Chen (DUT: Dalian University of Technology)H-Index: 6
Last. Wenbing Zhao (CSU: Cleveland State University)H-Index: 25
view all 5 authors...
Heterogeneous Internet of Things (HetIoT) is an emerging research field that has strong potential to transform both our understanding of fundamental computer science principles and our future living. HetIoT is being employed in increasing number of areas, such as smart home, smart city, intelligent transportation, environmental monitoring, security systems, and advanced manufacturing. Therefore, relaying on strong application fields, HetIoT will be filled in our life and provide a variety of con...
146 CitationsSource
#1Varunya Attasena (Kasetsart University)H-Index: 1
#1Varunya Attasena (Kasetsart University)H-Index: 4
Last. Nouria Harbi (University of Lyon)H-Index: 10
view all 3 authors...
Cloud computing helps reduce costs, increase business agility and deploy solutions with a high return on investment for many types of applications. However, data security is of premium importance to many users and often restrains their adoption of cloud technologies. Various approaches, i.e., data encryption, anonymization, replication and verification, help enforce different facets of data security. Secret sharing is a particularly interesting cryptographic technique. Its most advanced variants...
12 CitationsSource
Oct 1, 2017 in VLDB (Very Large Data Bases)
#1Varunya Attasena (Kasetsart University)H-Index: 1
#2Jérôme Darmont (University of Lyon)H-Index: 18
Last. Nouria Harbi (University of Lyon)H-Index: 10
view all 3 authors...
Cloud computing helps reduce costs, increase business agility and deploy solutions with a high return on investment for many types of applications. However, data security is of premium importance to many users and often restrains their adoption of cloud technologies. Various approaches, i.e., data encryption, anonymization, replication and verification, help enforce different facets of data security. Secret sharing is a particularly interesting cryptographic technique. Its most advanced variants...
25 CitationsSource
#1Yuriy Polyakov (NJIT: New Jersey Institute of Technology)H-Index: 16
#2Kurt Rohloff (NJIT: New Jersey Institute of Technology)H-Index: 18
Last. Vinod Vaikuntanathan (MIT: Massachusetts Institute of Technology)H-Index: 62
view all 4 authors...
We develop two IND-CPA-secure multihop unidirectional Proxy Re-Encryption (PRE) schemes by applying the Ring-LWE (RLWE) key switching approach from the homomorphic encryption literature. Unidirectional PRE is ideal for secure publish-subscribe operations where a publisher encrypts information using a public key without knowing upfront who the subscriber will be and what private key will be used for decryption. The proposed PRE schemes provide a multihop capability, meaning that when PRE-encrypte...
16 CitationsSource
#1Soonhwa Sung (CNU: Chungnam National University)H-Index: 4
Source
#1Yunjung LeeH-Index: 2
#2Yongjoon ParkH-Index: 2
Last. Bongkyu LeeH-Index: 4
view all 4 authors...
Source
Cited By0
Newest