6 CONCLUSIONS
 
We addressed the problematic of establishing secured
 
communication channels in the constrained environ-
 
ment of e-health applications.  In fact, we introduced
 
a new MIKEY mode that combines the pre-shared
 
key mode with the public key mode. In this mode,
 
heavy operations are offloaded to dedicated powerful
 
third parties. Doing so, the constrained entities are
 
only involved in the symmetric operations of the pre-
 
shared mode.  The public key mode is left to the un-
 
constrained part of the network. As a result, the con-
 
strained entities are able to establish a secured chan-
 
nel with any remote entity without having established
 
an initial shared knowledge. Indeed, through our dis-
 
tributed hybrid mode, we benefit from the advantages
 
of both pre-shared mode (resource preservation) and
 
public key mode (scalability), while mitigating their
 
disadvantages. The first preliminary results show that
 
our mode is secure, and resource preserving at the
 
same time.  In the future, we plan an implementation
 
on real test-beds to assess its energy consumption per-
 
formances under real conditions. 
REFERENCES 
Abdmeziem, M. and Tandjaoui, D. (2015).  An end-to-end
 
secure key management protocol for e-health applica-
 
tions. Computers & Electrical Engineering. 
Abdmeziem, M. R. and Tandjaoui, D. (2014). Tailoring
 
mikey-ticket to e-health applications in the context of
 
internet of things. In International Conference on Ad-
 
vanced Networking, Distributed Systems and Applica-
 
tions, pages 72–77. 
Abdmeziem, M. R., Tandjaoui, D., and Romdhani, I.
 
(2016). Architecting the internet of things:  State of
 
the art. In Robots and Sensor Clouds, pages 55–75.
 
Springer International Publishing. 
Arkko, J., Lindholm, F., Naslund, M., and Norrman, K.
 
(2004). Mikey: Multimedia internet keying. RFC
 
3830, IETF. 
Atzori, L., Iera, A., and Morabito, G. (2010).  The internet
 
of things: A survey. Computer Networks, pages 2787–
 
2805. 
Bonetto, R., Bui, N., Lakkundi, V., Olivereau, A., Serbanati,
 
A., and Rossi, M. (2012).  Secure communication for
 
smart iot objects: Protocol stacks, use cases and prac-
 
tical examples.  In Proc. of IEEE WoWMoM. 
Chang, V. and Ramachandran, M. (2016).  Towards achiev-
 
ing data security with the cloud computing adoption
 
framework.  IEEE Transactions on Services Comput-
 
ing, 9(1):138–151. 
Chevalier, Y., Compagna, L., Cuellar, J., Drielsma, P. H.,
 
Mantovani, J., and S. Modersheim, a. L. V. (2004).  A
 
high level protocol specification language for indus-
trial security sensitive protocols.  Proc. SAPS 04. Aus-
 
trian Computer Society, 2004. 
Dohr, A., Modre-Opsrian, R., Drobics, M., Hayn, D., and
 
Schreier, G. (2010).  The internet of things for ambi-
 
ent assisted living. In Information Technology: New
 
Generations (ITNG), pages 804–809. 
Dolev, D. and Yao, C. (1981). On the security of public key
 
protocols. FOCS, IEEE, pages 350–357. 
Dworkin, M. (2007). Recommendation for block cipher
 
modes of operation: The ccm mode for authentication
 
and confidentiality. SP-800-38c, NIST, US department
 
of 
commerce. 
Freeman, T., Housley, R., Malpani, A., Cooper, D., and
 
Polk, W. (2007). Server-based certificate validation
 
protocol(scvp). RFC 5055, IETF. 
Hui, J. and Thubert, P. (2011). Compression format for ipv6
 
datagrams over ieee 802.15.4-based networks. RFC
 
6282, IETF. 
Hummen, R., Hiller, J., Henze, M., and Wehrle, K. (2013).
 
Slimfit a hip dex compression layer for the ip-based
 
internet of things. WiMob, IEEE, pages 259–266. 
Li, M. and Lou, W. (2010).  Data security and privacy in
 
wireless body area networks. Wireless Technologies
 
for 
E-healthcare. 
Moedersheim, S. and Drielsma, P. (2003). Avispa project
 
deliverable d6.2: Specification of the problems in the
 
high-level specification language.  http://www.avispa-
 
project.org. 
Raza, S., Duquennoy, S., Chung, T., Yazar, D., Voigt, T.,
 
and Roedig, U. (2011). Securing communication in
 
6lowpan with compressed ipsec. in Proc. of IEEE
 
DCOSS. 
Raza, S., Trabalza, D., and Voigt, T. (2012a). 6lowpan com-
 
pressed dtls for coap. in Proc. of IEEE DCOSS. 
Raza, S., Voigt, T., and Jutvik, V. (2012b). Lightweight
 
ikev2: A key management solution for both com-
 
pressed ipsec and ieee 802.15.4 security. IETF/IAB
 
workshop on Smart Object Security. 
Reed, S. and Solomon, G. (1960). Polynomial codes over
 
certain finite fields.  Journal of the Society for Indus-
 
trial and Applied Mathematics, 8(2):300–304. 
Rivest, R. L., Shamir, A., and Adleman, L. (1978). A
 
method for obtaining digital signatures and public-
 
key cryptosystems. Communications of the ACM,
 
21(2):120–126. 
Roman, R., Alcaraz, C., Lopez, J., and Sklavos, N. (2011).
 
key management systems for sensor networks in the
 
context of internet of things.  Computers and Electric
 
Engineering, 37:147–159. 
Sahraoui, S. and Bilami, A. (2015). Efficient hip-based
 
approach to ensure lightweight end-to-end security in
 
the internet of things. Computer Networks, 91:26–45. 
Saied, Y. B. and Olivereau, A. (2012). Hip tiny exchange
 
(tex): A distributed key exchange scheme for hip-
 
based internet of things. in Proc. of ComNet. 
Tsiftes, N. and Dunkels, A. (2011). A database in every sen-
 
sor.  Proceedings of the 9th ACM Conference on Em-
 
bedded Networked Sensor Systems, pages 316–332.