Photo of Sanaz Rahimi Moosavi

Sanaz Rahimi Moosavi

Visitor Ph.D.2014 – 2019
Research Interests:
  • Lightweight cryptographic techniques
  • Information/Data security
  • Healthcare IoT
  • Security and privacy issues in healthcare IoT
  • IoT key management
Education:
  • 2013
    M.S. in Information Technology, Networked Systems Security
    University of Turku, Finland
  • 2006
    B.S. in Computer Software Engineering
    Imam Reza International University, Iran
Websites: PersonalLinkedIn

I receieved my M.Sc. (Tech.) degree is in Information Technology, from the Department of Information Technology and Communication Systems, University of Turku, Finland in 2013. My major was on “Networked Systems Security” and minor was on “Cryptography”.

I am currently working toward my Ph.D. degree at the Department of Future Technologies, University of Turku, Finland. Since December 2016, I am also a visiting research scholar at University of California, Irvine, Department of Comuter Science, Intelligence and Autonomous Systems Lab., under the direct supervison of Prof. Marco Levorato.

My technical abilities have been in the field of scalable and lightweight security for IoT systems. I have extensively worked on Peer Authentication and Authorization, Key Management Systems, and Secure End-to-End Communication on which I have received several research excellence awards including twice from Nokia foundation in Finland (2014 and 2016). The application domain to which I have been applying my techniques is e-health, however my proposed solutions are not limited to this application domain and are rather generic.

I have leaded several academic and industrial projects. I have been co-advising several M.Sc. theses as well as leading my own research in Finland and the USA. Before starting my MSc, I successfully leaded several computer network projects as the project manager where I was responsible for administration of network and server infrastructure within all departments, managing our team of IT professionals, implementing technology security and executing several technology-related tasks and initiatives. I am known to be disciplined and an excellent team worker.

Publications

No matches

Journal Articles

  • Sanaz Rahimi Moosavi
    Ethiopia Nigussie
    Marco Levorato
    Seppo Virtanen
    Jouni Isoaho
    S. Rahimi Moosavi, E. Nigussie, M. Levorato, S. Virtanen, and J. Isoaho, Low-Latency Approach for Secure ECG Feature Based Cryptographic Key Generation, IEEE Access, vol. 6, pp. 428 – 442, Oct. 2017. Release

    We propose a low-latency approach for generating secure electrocardiogram (ECG) feature-based cryptographic keys. This is done by taking advantage of the uniqueness and randomness properties of ECG’s main features. This approach achieves a low-latency since the key generation relies on four reference-free ECG’s main features that can be acquired in short time. We call the approach several ECG features (SEF)-based cryptographic key generation. SEF consists of: 1) detecting the arrival time of ECG’s fiducial points using Daubechies wavelet transform to compute ECG’s main features accordingly; 2) using a dynamic technique to specify the optimum number of bits that can be extracted from each main ECG feature, comprising of PR, RR, PP, QT, and ST intervals; 3) generating cryptographic keys by exploiting the above-mentioned ECG features; and 4) consolidating and strengthening the SEF approach with cryptographically secure pseudo-random number generators. Fibonacci linear feedback shift register and advanced encryption standard algorithms are implemented as the pseudo-random number generator to enhance the security level of the generated cryptographic keys. Our approach is applied to 239 subjects’ ECG signals comprising of normal sinus rhythm, arrhythmia, atrial fibrillation, and myocardial infraction. The security analyses of the proposed approach are carried out in terms of distinctiveness, test of randomness, temporal variance, and using National Institute of Standards and Technology benchmark. The analyses reveal that the normal ECG rhythms have slightly better randomness compared with the abnormal ones. The analyses also show that the strengthened SEF key generation approach provides a higher security level in comparison to existing approaches that rely only on singleton ECG features. For the normal ECG rhythms, the SEF approach has in average the entropy of about 0.98 while cryptographic keys which are generated utilizing the strengthened SEF approach offer the entropy of ∼1. The execution time required to generate the cryptographic keys on different processors is also examined. The results reveal that our SEF approach is in average 1.8 times faster than existing key generation approaches which only utilize the inter pulse interval feature of ECG.

    @article{moosavi-nigussie-2017-access,
      author = {Sanaz {Rahimi Moosavi} and Ethiopia Nigussie and Marco Levorato and Seppo Virtanen and Jouni Isoaho},
      title = {Low-Latency Approach for Secure {ECG} Feature Based Cryptographic Key Generation},
      journal = {IEEE Access},
      volume = {6},
      pages = {428--442},
      month = oct,
      year = {2017},
      doi = {10.1109/access.2017.2766523},
    }
  • Moreno Ambrosin
    Arman Anzanpour
    Mauro Conti
    Tooska Dargahi
    Sanaz Rahimi Moosavi
    Amir M. Rahmani
    Pasi Liljeberg
    M. Ambrosin, A. Anzanpour, et al.M. Conti, T. Dargahi, S. Rahimi Moosavi, A. M. Rahmani, and P. Liljeberg, On the Feasibility of Attribute-Based Encryption on Internet of Things Devices, IEEE Micro, vol. 36, no. 6, pp. 25 – 35, Nov. 2016. Release
    @article{ambrosin-anzanpour-2016-micro,
      author = {Moreno Ambrosin and Arman Anzanpour and Mauro Conti and Tooska Dargahi and Sanaz {Rahimi Moosavi} and Amir M. Rahmani and Pasi Liljeberg},
      title = {On the Feasibility of Attribute-Based Encryption on {Internet} of {Things} Devices},
      journal = {IEEE Micro},
      volume = {36},
      number = {6},
      pages = {25--35},
      month = nov,
      year = {2016},
      doi = {10.1109/mm.2016.101},
    }
  • Sanaz Rahimi Moosavi
    Tuan Nguyen Gia
    Ethiopia Nigussie
    Amir M. Rahmani
    Seppo Virtanen
    Hannu Tenhunen
    Jouni Isoaho
    S. Rahimi Moosavi, T. N. Gia, et al.E. Nigussie, A. M. Rahmani, S. Virtanen, H. Tenhunen, and J. Isoaho, End-to-End Security Scheme for Mobility Enabled Healthcare Internet of Things, Future Generation Computer Systems, vol. 64, pp. 108 – 124, Nov. 2016. Release
    @article{moosavi-gia-2016-fgcs,
      author = {Sanaz {Rahimi Moosavi} and Tuan Nguyen Gia and Ethiopia Nigussie and Amir M. Rahmani and Seppo Virtanen and Hannu Tenhunen and Jouni Isoaho},
      title = {End-to-End Security Scheme for Mobility Enabled Healthcare {Internet} of {Things}},
      journal = {Future Generation Computer Systems},
      volume = {64},
      pages = {108--124},
      publisher = {Elsevier},
      month = nov,
      year = {2016},
      doi = {10.1016/j.future.2016.02.020},
    }
  • Sanaz Rahimi Moosavi
    Antti Hakkala
    Jouni Isoaho
    Seppo Virtanen
    Jouni Isoaho
    S. Rahimi Moosavi, A. Hakkala, J. Isoaho, S. Virtanen, and J. Isoaho, Specification Analysis for Secure RFID Implant Systems, International Journal of Computer Theory and Engineering (IJCTE), vol. 6, no. 2, pp. 177 – 188, Apr. 2014. Release
    @article{moosavi-hakkala-2014-ijcte,
      author = {Sanaz {Rahimi Moosavi} and Antti Hakkala and Jouni Isoaho and Seppo Virtanen and Jouni Isoaho},
      title = {Specification Analysis for Secure {RFID} Implant Systems},
      journal = {International Journal of Computer Theory and Engineering (IJCTE)},
      volume = {6},
      number = {2},
      pages = {177--188},
      month = apr,
      year = {2014},
      doi = {10.7763/ijcte.2014.v6.858},
    }

Conference Proceedings

  • Sanaz Rahimi Moosavi
    Ethiopia Nigussie
    Marco Levorato
    Seppo Virtanen
    Jouni Isoaho
    S. Rahimi Moosavi, E. Nigussie, M. Levorato, S. Virtanen, and J. Isoaho, Performance Analysis of End-to-End Security Schemes in Healthcare IoT, Procedia Computer Science, vol. 130, pp. 432 – 439, May 2018, Proceedings of the International Conference on Ambient Systems, Networks and Technologies (ANT). Release

    In this paper, we analyze the performance of the state-of-the-art end-to-end security schemes in healthcare Internet of Things (IoT) systems. We identify that the essential requirements of robust security solutions for healthcare IoT systems comprise of (i) low-latency secure key generation approach using patients’ Electrocardiogram (ECG) signals, (ii) secure and efficient authentication and authorization for healthcare IoT devices based on the certificate-based datagram Transport Layer Security (DTLS), and (iii) robust and secure mobility-enabled end-to-end communication based on DTLS session resumption. The performance of the state-of-the-art security solutions including our end-to-end security scheme is tested by developing a prototype healthcare IoT system. The prototype is built of a Pandaboard, a TI SmartRF06 board and WiSMotes. The Pandaboard along with the CC2538 module acts as a smart gateway and the WisMotes act as medical sensor nodes. Based on the analysis, we found out that our solution has the most extensive set of performance features in comparison to related approaches found in the literature. The performance evaluation results show that compared to the existing approaches, the cryptographic key generation approach proposed in our end-to-end security scheme is on average 1.8 times faster than existing key generation approaches while being more energy-efficient. In addition, the scheme reduces the communication overhead by 26% and the communication latency between smart gateways and end users by 16%. Our scheme is also approximately 97% faster than certificate based and 10% faster that symmetric key-based DTLS. Certificate based DTLS requires about 2.9 times more ROM and 2.2 times more RAM resources. On the other hand, the ROM and RAM requirements of our scheme are almost as low as in symmetric key-based DTLS.

    @article{moosavi-nigussie-2018-ant,
      author = {Sanaz {Rahimi Moosavi} and Ethiopia Nigussie and Marco Levorato and Seppo Virtanen and Jouni Isoaho},
      title = {Performance Analysis of End-to-End Security Schemes in Healthcare {IoT}},
      journal = {Procedia Computer Science},
      volume = {130},
      pages = {432--439},
      note = {Proceedings of the International Conference on Ambient Systems, Networks and Technologies (ANT)},
      publisher = {Elsevier},
      month = may,
      year = {2018},
      doi = {10.1016/j.procs.2018.04.064},
    }
  • Sanaz Rahimi Moosavi
    Ethiopia Nigussie
    Seppo Virtanen
    Jouni Isoaho
    S. Rahimi Moosavi, E. Nigussie, S. Virtanen, and J. Isoaho, Cryptographic Key Generation Using ECG Signal, in Proceedings of the IEEE Annual Consumer Communications Networking Conference (CCNC), Las Vegas, Nevada, Jan. 2017, pp. 1024 – 1031. Release
    @inproceedings{moosavi-nigussie-2017-ccnc,
      author = {Sanaz {Rahimi Moosavi} and Ethiopia Nigussie and Seppo Virtanen and Jouni Isoaho},
      title = {Cryptographic Key Generation Using {ECG} Signal},
      booktitle = {Proceedings of the IEEE Annual Consumer Communications Networking Conference (CCNC)},
      pages = {1024--1031},
      address = {Las Vegas, Nevada},
      month = jan,
      year = {2017},
      doi = {10.1109/ccnc.2017.7983280},
    }
  • Antti Vikström
    Sanaz Rahimi Moosavi
    Hans Moen
    Tapio Salakoski
    Sanna Salanterä
    Hongxiu Li
    Pirkko Nykänen
    Reima Suomi
    Nilmini Wickramasinghe
    Gunilla Widén
    Ming Zhan
    A. Vikström, S. Rahimi Moosavi, H. Moen, T. Salakoski, and S. Salanterä, Factors Affecting the Availability of Electronic Patient Records for Secondary Purposes – A Case Study, in Building Sustainable Health Ecosystems, ser. Communications in Computer and Information Science, H. Li, P. Nykänen, et al.R. Suomi, N. Wickramasinghe, G. Widén, and M. Zhan, Eds., vol. 636. Springer, 2016, pp. 47 – 56, Proceedings of the International Conference on Well-Being in the Information Society (WIS). Release
    @inproceedings{vikstrom-moosavi-2016-wis,
      author = {Antti Vikstr{\"o}m and Sanaz {Rahimi Moosavi} and Hans Moen and Tapio Salakoski and Sanna Salanter{\"a}},
      title = {Factors Affecting the Availability of Electronic Patient Records for Secondary Purposes -- A Case Study},
      editor = {Hongxiu Li and Pirkko Nyk{\"a}nen and Reima Suomi and Nilmini Wickramasinghe and Gunilla Wid{\'e}n and Ming Zhan},
      booktitle = {Building Sustainable Health Ecosystems},
      volume = {636},
      series = {Communications in Computer and Information Science},
      pages = {47--56},
      note = {Proceedings of the International Conference on Well-Being in the Information Society (WIS)},
      publisher = {Springer},
      year = {2016},
      doi = {10.1007/978-3-319-44672-1_5},
    }
  • Sanaz Rahimi Moosavi
    Tuan Nguyen Gia
    Ethiopia Nigussie
    Amir M. Rahmani
    Seppo Virtanen
    Hannu Tenhunen
    Jouni Isoaho
    S. Rahimi Moosavi, T. N. Gia, et al.E. Nigussie, A. M. Rahmani, S. Virtanen, H. Tenhunen, and J. Isoaho, Session Resumption-Based End-to-End Security for Healthcare Internet-of-Things, in Proceedings of the IEEE International Conference on Computer and Information Technology (CIT), Liverpool, U.K., Oct. 2015, pp. 581 – 588. Release
    @inproceedings{moosavi-gia-2015-cit,
      author = {Sanaz {Rahimi Moosavi} and Tuan Nguyen Gia and Ethiopia Nigussie and Amir M. Rahmani and Seppo Virtanen and Hannu Tenhunen and Jouni Isoaho},
      title = {Session Resumption-Based End-to-End Security for Healthcare {Internet}-of-{Things}},
      booktitle = {Proceedings of the IEEE International Conference on Computer and Information Technology (CIT)},
      pages = {581--588},
      address = {Liverpool, U.K.},
      month = oct,
      year = {2015},
      doi = {10.1109/cit/iucc/dasc/picom.2015.83},
    }
  • Sanaz Rahimi Moosavi
    Tuan Nguyen Gia
    Amir M. Rahmani
    Ethiopia Nigussie
    Seppo Virtanen
    Jouni Isoaho
    Hannu Tenhunen
    S. Rahimi Moosavi, T. N. Gia, et al.A. M. Rahmani, E. Nigussie, S. Virtanen, J. Isoaho, and H. Tenhunen, SEA: A Secure and Efficient Authentication and Authorization Architecture for IoT-Based Healthcare Using Smart Gateways, Procedia Computer Science, vol. 52, pp. 452 – 459, Jun. 2015, Proceedings of the International Conference on Ambient Systems, Networks and Technologies (ANT). Release
    @article{moosavi-gia-2015-ant,
      author = {Sanaz {Rahimi Moosavi} and Tuan Nguyen Gia and Amir M. Rahmani and Ethiopia Nigussie and Seppo Virtanen and Jouni Isoaho and Hannu Tenhunen},
      title = {{SEA}: A Secure and Efficient Authentication and Authorization Architecture for {IoT}-Based Healthcare Using Smart Gateways},
      journal = {Procedia Computer Science},
      volume = {52},
      pages = {452--459},
      note = {Proceedings of the International Conference on Ambient Systems, Networks and Technologies (ANT)},
      publisher = {Elsevier},
      month = jun,
      year = {2015},
      doi = {10.1016/j.procs.2015.05.013},
    }
  • Anurag
    Sanaz Rahimi Moosavi
    Amir M. Rahmani
    Tomi Westerlund
    Geng Yang
    Pasi Liljeberg
    Hannu Tenhunen
    Anurag, S. Rahimi Moosavi, et al.A. M. Rahmani, T. Westerlund, G. Yang, P. Liljeberg, and H. Tenhunen, Pervasive Health Monitoring Based on Internet of Things: Two Case Studies, in Proceedings of the International Conference on Wireless Mobile Communication and Healthcare (MOBIHEALTH), Athens, Greece, Nov. 2014, pp. 275 – 278. Release
    @inproceedings{moosavi-rahmani-2014-mobihealth,
      author = {Anurag and Sanaz {Rahimi Moosavi} and Amir M. Rahmani and Tomi Westerlund and Geng Yang and Pasi Liljeberg and Hannu Tenhunen},
      title = {Pervasive Health Monitoring Based on {Internet} of {Things}: Two Case Studies},
      booktitle = {Proceedings of the International Conference on Wireless Mobile Communication and Healthcare (MOBIHEALTH)},
      pages = {275--278},
      address = {Athens, Greece},
      month = nov,
      year = {2014},
      doi = {10.1109/mobihealth.2014.7015964},
    }
  • Sanaz Rahimi Moosavi
    Ethiopia Nigussie
    Seppo Virtanen
    Jouni Isoaho
    S. Rahimi Moosavi, E. Nigussie, S. Virtanen, and J. Isoaho, An Elliptic Curve-Based Mutual Authentication Scheme for RFID Implant Systems, Procedia Computer Science, vol. 32, pp. 198 – 206, Jun. 2014, Proceedings of the International Conference on Ambient Systems, Networks and Technologies (ANT). Release
    @article{moosavi-nigussie-2014-ant,
      author = {Sanaz {Rahimi Moosavi} and Ethiopia Nigussie and Seppo Virtanen and Jouni Isoaho},
      title = {An Elliptic Curve-Based Mutual Authentication Scheme for {RFID} Implant Systems},
      journal = {Procedia Computer Science},
      volume = {32},
      pages = {198--206},
      note = {Proceedings of the International Conference on Ambient Systems, Networks and Technologies (ANT)},
      publisher = {Elsevier},
      month = jun,
      year = {2014},
      doi = {10.1016/j.procs.2014.05.415},
    }
  • Sanaz Rahimi Moosavi
    Amir M. Rahmani
    Pasi Liljeberg
    Juha Plosila
    Hannu Tenhunen
    S. Rahimi Moosavi, A. M. Rahmani, P. Liljeberg, J. Plosila, and H. Tenhunen, Enhancing Performance of 3D Interconnection Networks Using Efficient Multicast Communication Protocol, in Proceedings of the Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, Belfast, U.K., Feb. 2013, pp. 294 – 301. Release
    @inproceedings{moosavi-rahmani-2013-euromicro,
      author = {Sanaz {Rahimi Moosavi} and Amir M. Rahmani and Pasi Liljeberg and Juha Plosila and Hannu Tenhunen},
      title = {Enhancing Performance of {3D} Interconnection Networks Using Efficient Multicast Communication Protocol},
      booktitle = {Proceedings of the Euromicro International Conference on Parallel, Distributed, and Network-Based Processing},
      pages = {294--301},
      address = {Belfast, U.K.},
      month = feb,
      year = {2013},
      doi = {10.1109/pdp.2013.50},
    }
  • Sanaz Rahimi Moosavi
    Chia-Yuan Chang
    Amir M. Rahmani
    Juha Plosila
    Ka Lok Man
    Taikyeong T. Jeong
    Eng Gee Lim
    S. Rahimi Moosavi, C.-Y. Chang, et al.A. M. Rahmani, J. Plosila, K. L. Man, T. T. Jeong, and E. G. Lim, An Efficient History-Based Routing Algorithm for Interconnection Networks, in International SoC Design Conference (ISOCC), Jeju Island, South Korea, Nov. 2012, pp. 277 – 280. Release
    @inproceedings{moosavi-chang-2012-isocc,
      author = {Sanaz {Rahimi Moosavi} and Chia-Yuan Chang and Amir M. Rahmani and Juha Plosila and Ka Lok Man and Taikyeong T. Jeong and Eng Gee Lim},
      title = {An Efficient History-Based Routing Algorithm for Interconnection Networks},
      booktitle = {International SoC Design Conference (ISOCC)},
      pages = {277--280},
      address = {Jeju Island, South Korea},
      month = nov,
      year = {2012},
      doi = {10.1109/isocc.2012.6407094},
    }