Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

BACKM-EHA: A Novel Blockchain-enabled Security Solution for IoMT-based E-healthcare Applications

Published: 21 August 2023 Publication History

Abstract

E-health is the use of information and communication technology (ICT) for the healthcare-related services. It uses various types of digital technologies and telecommunications, such as computers, sensing devices, Internet, and mobile devices to deliver medical services. Internet of Medical Things (IoMT) is a communication environment optimized for low-power devices (for example, health sensors and actuators) and operation on, in, or around the human body (i.e., a patient). It can be used in various applications that are related to healthcare, such as “body automation,” “healthcare,” “medical monitoring,” “body interaction,” and “medical implants (i.e., pacemaker).” Most of the communications happen in IoMT-based e-healthcare system are wireless in nature. This may cause severe threats to the security of the system. Various information security-related attacks, i.e., replay, man-in-the-middle attack (MiTM), impersonation, privileged insider, unauthorised session key computation, credentials leakage, stolen verifier, malware injection are possible in IoMT-based e-healthcare system. These threats and attacks can create serious problems in the social life of an individual, as this may reveal their confidential healthcare information to other unauthorised parties. Therefore, it is essential to propose an access control and key management scheme to secure the communication of a IoMT-based e-healthcare system. Moreover, the security of such kind of scheme can also be enhanced through the deployment of a blockchain mechanism. Therefore, in this article, we propose a blockchain-enabled access control and key management protocol for IoMT-based e-healthcare system that is named as “BACKM-EHA” in short. The security analysis of proposed BACKM-EHA is also provided through the standard, i.e., “Real-Or-Random model.” The various conducted security analyses prove the security of BACKM-EHA against the different types of potential attacks. The performance of BACKM-EHA is better than the other existing schemes, as it requires less communication cost, computation cost, and provides more “security and functionality features.”

References

[1]
Quynh H. Dang. 1995. Secure Hash Standard. FIPS PUB 180-1, National Institute of Standards and Technology (NIST), U.S. Department of Commerce, NIST Publications. Retrieved from http://www.umich.edu/x509/ssleay/fip180/fip180-1.htm.
[2]
M. Abdalla, P. A. Fouque, and D. Pointcheval. 2005. Password-based authenticated key exchange in the three-party setting. In 8th International Workshop on Theory and Practice in Public Key Cryptography (PKC’05), Lecture Notes in Computer Science, Vol. 3386. Les Diablerets, Switzerland, 65–84.
[3]
Tejasvi Alladi, Vinay Chamola, and Naren. 2021. HARCI: A two-way authentication protocol for three entity healthcare IoT networks. IEEE J. Select. Areas Commun. 39, 2 (2021), 361–369.
[4]
Tejasvi Alladi, Vinay Chamola, Biplab Sikdar, and Kim-Kwang Raymond Choo. 2020. Consumer IoT: Security vulnerability case studies and solutions. IEEE Consum. Electron. Mag. 9, 2 (2020), 17–25.
[5]
M. Al Ameen, J. Liu, and K. Kwak. 2012. Security and privacy issues in wireless sensor networks for healthcare applications. J. Med. Syst. 36 (2012), 93–101.
[6]
E. Barker. 2020. Recommendation for Key Management. Special Publication 800-57 Part 1 Rev. 4, NIST, 01/2016.
[7]
B. Bera, D. Chattaraj, and A. K. Das. 2020. Designing secure blockchain-based access control scheme in IoT-enabled internet of drones deployment. Comput. Commun. 153 (2020), 229–249.
[8]
S. Biswas, K. Sharif, F. Li, and S. Mohanty. 2020. Blockchain for E-health-care systems: Easier said than done. Computer 53, 7 (2020), 57–67.
[9]
R. Canetti and H. Krawczyk. 2001. Analysis of key-exchange protocols and their use for building secure channels. In Advances in Cryptology—EUROCRYPT, Birgit Pfitzmann (Ed.). Springer Berlin, Innsbruck (Tyrol), Austria, 453–474.
[10]
R. Canetti and H. Krawczyk. 2002. Universally composable notions of key exchange and secure channels. In Advances in Cryptology—EUROCRYPT, Lars R. Knudsen (Ed.). Springer Berlin, Amsterdam, The Netherlands, 337–351.
[11]
Vinay Chamola, Vikas Hassija, Sakshi Gupta, Adit Goyal, Mohsen Guizani, and Biplab Sikdar. 2021. Disaster and pandemic management using machine learning: A survey. IEEE Internet Things J. 8, 21 (2021), 16047–16071.
[12]
A. K. Das, P. Sharma, S. Chatterjee, and J. K. Sing. 2012. A dynamic password-based user authentication scheme for hierarchical wireless sensor networks. J. Netw. Comput. Applic. 35, 5 (2012), 1646–1656.
[13]
A. K. Das, M. Wazid, N. Kumar, A. V. Vasilakos, and J. J. P. C. Rodrigues. 2018. Biometrics-based privacy-preserving user authentication scheme for cloud-based industrial internet of things deployment. IEEE Internet Things J. 5, 6 (2018), 4900–4913.
[14]
D. Dolev and A. Yao. 1983. On the security of public key protocols. IEEE Trans. Inf. Theor. 29, 2 (1983), 198–208.
[15]
M. Fan and X. Zhang. 2019. Consortium blockchain based data aggregation and regulation mechanism for smart grid. IEEE Access 7 (2019), 35929–35940.
[16]
M. Fotouhi, M. Bayat, A. K. Das, H. A. N. Far, S. M. Pournaghi, and M. A. Doostari. 2020. A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT. Comput. Netw. 177 (2020), 107333.
[17]
N. Garg, M. Wazid, A. K. Das, D. P. Singh, J. J. P. C. Rodrigues, and Y. Park. 2020. BAKMP-IoMT: Design of blockchain enabled authenticated key management protocol for internet of medical things deployment. IEEE Access (2020), 1–23. DOI:https://doi.org/10.1109/ACCESS.2020.2995917
[18]
P. Gope, Y. Gheraibia, S. Kabir, and B. Sikdar. 2021. A secure IoT-based modern healthcare system with fault-tolerant decision making process. IEEE J. Biomed. Health Inform. 25, 3 (2021), 862–873.
[19]
P. Gope and T. Hwang. 2016. BSN-care: A secure IoT-based modern healthcare system using body sensor network. IEEE Sensors J. 16, 5 (2016), 1368–1376.
[20]
P. Gope, J. Lee, and T. Q. S. Quek. 2017. Resilience of DoS attacks in designing anonymous user authentication protocol for wireless sensor networks. IEEE Sensors J. 17, 2 (2017), 498–503.
[21]
Vikas Hassija, Vinay Chamola, Balindam Chandra Bajpai, Naren, and Sherali Zeadally. 2021. Security issues in implantable medical devices: Fact or fiction? Sustain. Cities Societ 66 (2021), 102552.
[22]
D. Johnson, A. Menezes, and S. Vanstone. 2001. The elliptic curve digital signature algorithm (ECDSA). Int. J. Inf. Secur. 1, 1 (2001), 36–63.
[23]
Fagen Li, Yanan Han, and Chunhua Jin. 2016. Practical access control for sensor networks in the context of the internet of things. Comput. Commun. 89-90 (2016), 154–164.
[24]
F. Li, Y. Han, and C. Jin. 2018. Cost-effective and anonymous access control for wireless body area networks. IEEE Syst. J. 12, 1 (2018), 747–758.
[25]
F. Li and J. Hong. 2016. Efficient certificateless access control for wireless body area networks. IEEE Sensors J. 16, 13 (2016), 5389–5396.
[26]
M. Li, W. Lou, and K. Ren. 2010. Data security and privacy in wireless body area networks. IEEE Wirel. Commun. 17, 1 (2010), 51–58.
[27]
Ming Luo, Yi Luo, Yuwei Wan, and Ze Wang. 2018. Secure and efficient access control scheme for wireless sensor networks in the cross-domain context of the IoT. Secur. Commun. Netw. 2018 (2018), 1–10. DOI:
[28]
T. S. Messerges, E. A. Dabbish, and R. H. Sloan. 2002. Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51, 5 (2002), 541–552.
[29]
M. Patel and J. Wang. 2010. Applications, challenges, and prospective in emerging body area networking technologies. IEEE Wirel. Commun. 17, 1 (2010), 80–88.
[30]
M. Rath, B. Pati, and B. K. Pattanayak. 2019. An overview on social networking: Design, issues, emerging trends, and security. In Social Network Analytics, N. Dey and S. Borah and R. Babo and A. S. Ashour (Eds.). Academic Press, 21–47.
[31]
X. Wang, P. Zeng, N. Patterson, F. Jiang, and R. Doss. 2019. An improved authentication scheme for internet of vehicles based on blockchain technology. IEEE Access 7 (2019), 45061–45072.
[32]
Mohammad Wazid, Ashok Kumar Das, Vivekananda Bhat K., and Athanasios V. Vasilakos. 2020. LAM-CIoT: Lightweight authentication mechanism in cloud-based IoT environment. J. Netw. Comput. Applic. 150 (2020), 102496.
[33]
M. Wazid, A. K. Das, N. Kumar, M. Conti, and A. V. Vasilakos. 2018. A novel authentication and key agreement scheme for implantable medical devices deployment. IEEE J. Biomed. Health Inform. 22, 4 (2018), 1299–1309.
[34]
M. Wazid, A. K. Das, V. Odelu, N. Kumar, M. Conti, and M. Jo. 2018. Design of secure user authenticated key management protocol for generic IoT networks. IEEE Internet Things J. 5, 1 (2018), 269–282.
[35]
M. Wazid, A. K. Das, V. Odelu, N. Kumar, and W. Susilo. 2020. Secure remote user authenticated key establishment protocol for smart home environment. IEEE Trans. Depend. Secure Comput. 17, 2 (2020), 391–406.
[36]
M. Wazid, A. K. Das, J. J. P. C. Rodrigues, S. Shetty, and Y. Park. 2019. IoMT malware detection approaches: Analysis and research challenges. IEEE Access 7 (2019), 182459–182476.
[37]
M. Wazid, A. K. Das, S. Shetty, and M. Jo. 2020. A tutorial and future research for building a blockchain-based secure communication scheme for internet of intelligent things. IEEE Access 8 (2020), 88700–88716.
[38]
M. Wazid, A. K. Das, and A. V. Vasilakos. 2018. Authenticated key management protocol for cloud-assisted body area sensor networks. J. Netw. Comput. Applic. 123 (2018), 112–126.
[39]
L. Wu, J. Wang, K. K. R. Choo, and D. He. 2019. Secure key agreement and key protection for mobile device user authentication. IEEE Trans. Inf. Forens. Secur. 14, 2 (Feb.2019), 319–330.
[40]
H. Zhang, J. Wang, and Y. Ding. 2019. Blockchain-based decentralized and secure keyless signature scheme for smart grid. Energy 180 (2019), 955–967.
[41]
Hongwei Zhang, Jinsong Wang, and Yuemin Ding. 2019. Blockchain-based decentralized and secure keyless signature scheme for smart grid. Energy 180 (2019), 955–967.

Cited By

View all
  • (2025)Optimized Deep learning Frameworks for the Medical Image Transmission in IoMT EnvironmentJournal of Smart Internet of Things10.2478/jsiot-2024-00182024:2(148-165)Online publication date: 24-Feb-2025
  • (2025)Provably secure and lightweight blockchain based cross hospital authentication scheme for IoMT-based healthcareScientific Reports10.1038/s41598-025-90219-515:1Online publication date: 22-Feb-2025
  • (2025)A comprehensive survey on impact of applying various technologies on the internet of medical thingsArtificial Intelligence Review10.1007/s10462-024-11063-z58:3Online publication date: 8-Jan-2025
  • Show More Cited By

Index Terms

  1. BACKM-EHA: A Novel Blockchain-enabled Security Solution for IoMT-based E-healthcare Applications

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image ACM Transactions on Internet Technology
        ACM Transactions on Internet Technology  Volume 23, Issue 3
        August 2023
        303 pages
        ISSN:1533-5399
        EISSN:1557-6051
        DOI:10.1145/3615983
        • Editor:
        • Ling Liu
        Issue’s Table of Contents

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 21 August 2023
        Online AM: 24 March 2022
        Accepted: 17 January 2022
        Revised: 14 September 2021
        Received: 10 November 2020
        Published in TOIT Volume 23, Issue 3

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. E-healthcare
        2. internet of medical things (IoMT)
        3. blockchain
        4. security
        5. access control
        6. key agreement
        7. simulation

        Qualifiers

        • Research-article

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)387
        • Downloads (Last 6 weeks)12
        Reflects downloads up to 27 Feb 2025

        Other Metrics

        Citations

        Cited By

        View all
        • (2025)Optimized Deep learning Frameworks for the Medical Image Transmission in IoMT EnvironmentJournal of Smart Internet of Things10.2478/jsiot-2024-00182024:2(148-165)Online publication date: 24-Feb-2025
        • (2025)Provably secure and lightweight blockchain based cross hospital authentication scheme for IoMT-based healthcareScientific Reports10.1038/s41598-025-90219-515:1Online publication date: 22-Feb-2025
        • (2025)A comprehensive survey on impact of applying various technologies on the internet of medical thingsArtificial Intelligence Review10.1007/s10462-024-11063-z58:3Online publication date: 8-Jan-2025
        • (2024)Intermediary Decentralized Computing and Private Blockchain Mechanisms for Privacy Preservation in the Internet of Medical ThingsMesopotamian Journal of CyberSecurity10.58496/MJCS/2024/0204:3(152-165)Online publication date: 5-Dec-2024
        • (2024)Integrating IoMT and Block chain in Smart Healthcare: Challenges and SolutionsJournal of Machine and Computing10.53759/7669/jmc202404108(1170-1179)Online publication date: 5-Oct-2024
        • (2024)PUFchain 3.0: Hardware-Assisted Distributed Ledger for Robust Authentication in Healthcare Cyber–Physical SystemsSensors10.3390/s2403093824:3(938)Online publication date: 31-Jan-2024
        • (2024)A Secure Key Exchange and Authentication Scheme for Securing Communications in the Internet of Things EnvironmentFuture Internet10.3390/fi1610035716:10(357)Online publication date: 30-Sep-2024
        • (2024)Blockchain-Based Privacy Preservation for the Internet of Medical Things: A Literature ReviewElectronics10.3390/electronics1319383213:19(3832)Online publication date: 28-Sep-2024
        • (2024)Hybrid Ensemble Lightweight Cryptosystem for Internet of Medical Things SecurityInternational Journal of Computational and Experimental Science and Engineering10.22399/ijcesen.62510:4Online publication date: 21-Dec-2024
        • (2024)Design of a Formally Secure Generic Framework for Smart Health MonitoringProceedings of the 2024 6th International Electronics Communication Conference10.1145/3686625.3686639(92-98)Online publication date: 19-Jul-2024
        • Show More Cited By

        View Options

        Login options

        Full Access

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Full Text

        View this article in Full Text.

        Full Text

        Figures

        Tables

        Media

        Share

        Share

        Share this Publication link

        Share on social media