This paper is published in Volume-2, Issue-3, 2016
Area
Ubiquitous Computing
Author
Shilpa Kansal, Navpreet Kaur
Org/Univ
Punjabi University Regional Centre for Information Technology and Management, Mohali, Punjab, India
Pub. Date
21 June, 2016
Paper ID
V2I3-1179
Publisher
Keywords
Authentication, IoT security, Multi-level security in IoT, HMSN, Secure key exchange.

Citationsacebook

IEEE
Shilpa Kansal, Navpreet Kaur. Multi-level Authentication for Internet of Things to Establish Secure Healthcare Network, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.

APA
Shilpa Kansal, Navpreet Kaur (2016). Multi-level Authentication for Internet of Things to Establish Secure Healthcare Network. International Journal of Advance Research, Ideas and Innovations in Technology, 2(3) www.IJARIIT.com.

MLA
Shilpa Kansal, Navpreet Kaur. "Multi-level Authentication for Internet of Things to Establish Secure Healthcare Network." International Journal of Advance Research, Ideas and Innovations in Technology 2.3 (2016). www.IJARIIT.com.

Abstract

The Cloud based healthcare monitoring sensor networks (C-HMSN) consist of a number of wireless nodes connected to each other using wireless connections. As these wireless nodes are connected to base stations so they are highly prone areas for hacking attacks. During data analysis there is need to secure cryptographic keys when the HMSN nodes are in working condition, for secure propagation of the sensitive information. An Efficient corporate key management and distribution scheme is required to maintain the data security in HMSNs. Existing cryptographic key management and distribution technique usually consume higher amount of energy and put larger computational overheads on Wireless Sensor Nodes. The cryptographic keys are used on different levels of HMSN communication i.e. neighbor nodes, cluster heads and base stations. In this paper we will present corporate improved key management architecture, called SECURE KEY EXCHANGE adaptable for the HMSNs, to enable comprehensive, trustworthy, user-verifiable, and cost-effective key management. It allows only authorized applications to use the keys and administrator can remotely issue authenticated commands and verify system output. In addition, it also has to be improved to work with HMSN nodes, which means it must use less computational power of the HMSN. The wireless sensor node should be energy efficient, increasing the life of wireless sensor network.
Paper PDF