9 research outputs found
Recommended from our members
A Hyperledger fabric-based blockchain architecture to secure IoT-based health monitoring systems
Although blockchain is a promising technology that can bring significant benefits into current centralized IoTbased health monitoring systems in order to address security challenges, the resource-constrained IoT devices of these systems cannot afford complex and heavyweight operations due to their limited processing power, storage capacity, and battery life. Therefore, in this paper, we propose a Hyperledger Fabric-based blockchain architecture to: i) enhance security in IoT-based health monitoring systems, ii) achieve better storage handling due to the limited storage capacity of sensors and gateways, iii) facilitate decentralized accountability, and iv) eliminate single point of failure
Recommended from our members
A blockchain-based architecture for secure IoT-based health monitoring systems
Although IoT technology brings significant benefits to the healthcare sector and can play a noteworthy role in improving citizens’ quality of life by enabling IoT-based health monitoring systems, it also raises many security challenges. Conventional security mechanisms are inadequate to secure IoT-based health monitoring systems as they have high resource requirements, in terms of computational power and energy consumption, and thus they cannot be afforded by the resource-constrained IoT nodes of these systems. On the other hand, blockchain is a promising technology that can be used to enhance the security of IoT-based health monitoring systems due to its decentralized and autonomous nature. Therefore, in this paper, we propose a blockchain architecture, based on the Hyperledger Fabric platform, for securing IoTbased health monitoring systems in a more lightweight manner as Hyperledger Fabric does not apply the consensus protocol of Proof of Work (PoW) that cannot be afforded by IoT devices
Recommended from our members
A scalable approach of practical Byzantine fault tolerance algorithms for IoMT blockchains
Blockchain-based solutions for Internet of Things (IoT) networks constitutes a current trend in cybersecurity and brings significant benefits into current centralized IoT-based health monitoring systems by addressing security challenges. Complex and power intense blockchain solutions do not perform satisfactory in the resource-constrained IoT, and especially Internet of Medical Things (IoMT), devices of these systems due to the latter's limited processing power, storage capacity, and battery life. Therefore, in this paper, we propose a scalable Practical Byzantine Fault Tolerance (PBFT) consensus algorithm for IoMT blockchains to: i) enhance scalability in IoMT blockchains, ii) reduce communication overhead, iii) enhance security while reducing the computational cost for suitability to the resource constraint nature of IoMT devices, iv) facilitate decentralized accountability, and v) eliminate single point of failure
Recommended from our members
Blockchain-based security mechanisms for IoMT Edge networks in IoMT-based healthcare monitoring systems
Despite the significant benefits that the rise of Internet of Medical Things (IoMT) can bring into citizens’ quality of life by enabling IoMT-based healthcare monitoring systems, there is an urgent need for novel security mechanisms to address the pressing security challenges of IoMT edge networks in an effective and efficient manner before they gain the trust of all involved stakeholders and reach their full potential in the market of next generation IoMT-based healthcare monitoring systems. In this context, blockchain technology has been foreseen by the industry and research community as a disruptive technology that can be integrated into novel security solutions for IoMT edge networks, as it can play a significant role in securing IoMT devices and resisting unauthorized access during data transmission (i.e., tamper-proof transmission of medical data). However, despite the fact that several blockchain-based security mechanisms have already been proposed in the literature for different types of IoT edge networks, there is a lack of blockchain-based security mechanisms for IoMT edge networks, and thus more effort is required to be put on the design and development of security mechanisms relying on blockchain technology for such networks. Towards this direction, the first step is the comprehensive understanding of the following two types of blockchain-based security mechanisms: (a) the very few existing ones specifically designed for IoMT edge networks, and (b) those designed for other types of IoT networks but could be possibly adopted in IoMT edge networks due to similar capabilities and technical characteristics. Therefore, in this paper, we review the state-of-the-art of the above two types of blockchain-based security mechanisms in order to provide a foundation for organizing research efforts towards the design and development of reliable blockchain-based countermeasures, addressing the pressing security challenges of IoMT edge networks in an effective and efficient manner
Blockchain-Based Security Mechanisms for IoMT Edge Networks in IoMT-Based Healthcare Monitoring Systems
Despite the significant benefits that the rise of Internet of Medical Things (IoMT) can bring into citizens’ quality of life by enabling IoMT-based healthcare monitoring systems, there is an urgent need for novel security mechanisms to address the pressing security challenges of IoMT edge networks in an effective and efficient manner before they gain the trust of all involved stakeholders and reach their full potential in the market of next generation IoMT-based healthcare monitoring systems. In this context, blockchain technology has been foreseen by the industry and research community as a disruptive technology that can be integrated into novel security solutions for IoMT edge networks, as it can play a significant role in securing IoMT devices and resisting unauthorized access during data transmission (i.e., tamper-proof transmission of medical data). However, despite the fact that several blockchain-based security mechanisms have already been proposed in the literature for different types of IoT edge networks, there is a lack of blockchain-based security mechanisms for IoMT edge networks, and thus more effort is required to be put on the design and development of security mechanisms relying on blockchain technology for such networks. Towards this direction, the first step is the comprehensive understanding of the following two types of blockchain-based security mechanisms: (a) the very few existing ones specifically designed for IoMT edge networks, and (b) those designed for other types of IoT networks but could be possibly adopted in IoMT edge networks due to similar capabilities and technical characteristics. Therefore, in this paper, we review the state-of-the-art of the above two types of blockchain-based security mechanisms in order to provide a foundation for organizing research efforts towards the design and development of reliable blockchain-based countermeasures, addressing the pressing security challenges of IoMT edge networks in an effective and efficient manner
Recommended from our members
Prototyping a hyperledger fabric-based security architecture for IoMT-based health monitoring systems
The Internet of Medical Things (IoMT) has risen significantly in recent years and has provided better quality of life by enabling IoMT-based health monitoring systems. Despite that fact, innovative security mechanisms are required to meet the security concerns of such systems effectively and efficiently. Additionally, the industry and the research community have anticipated that blockchain technology will be a disruptive technology that will be able to be integrated into innovative security solutions for IoMT networks since it has the potential to play a big role in: (a) enabling secure data transmission, (b) ensuring IoMT device security, and (c) enabling tamper-proof data storage. Therefore, the purpose of this research work is to design a novel lightweight blockchain-based security architecture for IoMT-based health monitoring systems leveraging the features of the Hyperledger Fabric (HF) Platform, its utilities. and its lightweight blockchain nature in order to: (i) ensure entity authentication, (ii) ensure data confidentiality, and (iii) enable a more energy-efficient blockchain-based security architecture for IoMT-based health monitoring systems while considering the limited resources of IoMT gateways. While security mechanisms for IoT utilizing HF do exist, to the best of our knowledge there is no specific HF-based architecture for IoMT-based health monitoring systems
Recommended from our members
A tutorial on the implementation of a hyperledger fabric-based security architecture for IoMT
Internet of Medical Things (IoMT) have improved individuals' quality of life by enabling IoMT-based healthcare monitoring systems to grow dramatically in recent years. Therefore, cutting-edge security techniques are needed to address the security risks of IoMT networks effectively and in a timely manner. On the other hand, blockchain technology has the potential to play a significant role in both securing IoMT devices and preventing unauthorized access during data transmission and it has been anticipated by the industry and the research community to be a disruptive technology that can be incorporated into novel security solutions for IoMT networks. In this regard, the goal of this research work is to demonstrate the integration of blockchain technology into novel security solutions for IoMT networks and to deploy a Hyperledger Fabric-based blockchain security architecture for IoMT-based healthcare monitoring systems by utilizing the features of the Hyperledger Fabric Platform, its utilities, and its lightweight consensus nature in order to: i) improve security in IoMT-based healthcare monitoring systems, ii) provide secure data storage in a decentralized way, and iii) eliminate single point of failure
Recommended from our members
Design of a Blockchain-based Anomaly-based Intrusion Detection System (AIDS) for IoMT Networks
t—Over the past few years, the Internet of Things
(IoT) has been growing significantly, particularly in the
healthcare sector, leading to the introduction of the Internet of
Medical Things (IoMT) technology, whose aim is the
improvement of the patient’s quality of life. Nevertheless,
IoMT networks are still vulnerable to a wide range of threats
because of their heterogeneity and resource-constrained
characteristics. Thus, novel security mechanisms protecting
IoMT networks from adversaries are urgently needed. In this
context, the industry and research community currently view
Anomaly-based Intrusion Detection Systems (AIDSs) and
blockchain technology as innovative solutions that could
protect IoMT networks. However, so far, and to the best of our
knowledge, there is a scarcity of research focusing on
blockchain-based AIDSs, specifically designed for protecting
IoMT networks. Our aim is to fill this significant research gap
and thus, in this paper, we present the design of the system
architecture of an energy-efficient Hyperledger Fabric-based
AIDS (HF-AIDS) for IoMT networks
Recommended from our members
A survey on quantitative risk estimation approaches for secure and usable user authentication on smartphones
Mobile user authentication acts as the first line of defense, establishing confidence in the claimed identity of a mobile user, which it typically does as a precondition to allowing access to resources in a mobile device. NIST states that password schemes and/or biometrics comprise the most conventional user authentication mechanisms for mobile devices. Nevertheless, recent studies point out that nowadays password-based user authentication is imposing several limitations in terms of security and usability; thus, it is no longer considered secure and convenient for the mobile users. These limitations stress the need for the development and implementation of more secure and usable user authentication methods. Alternatively, biometric-based user authentication has gained attention as a promising solution for enhancing mobile security without sacrificing usability. This category encompasses methods that utilize human physical traits (physiological biometrics) or unconscious behaviors (behavioral biometrics). In particular, risk-based continuous user authentication, relying on behavioral biometrics, appears to have the potential to increase the reliability of authentication without sacrificing usability. In this context, we firstly present fundamentals on risk-based continuous user authentication, relying on behavioral biometrics on mobile devices. Additionally, we present an extensive overview of existing quantitative risk estimation approaches (QREA) found in the literature. We do so not only for risk-based user authentication on mobile devices, but also for other security applications such as user authentication in web/cloud services, intrusion detection systems, etc., that could be possibly adopted in risk-based continuous user authentication solutions for smartphones. The target of this study is to provide a foundation for organizing research efforts toward the design and development of proper quantitative risk estimation approaches for the development of risk-based continuous user authentication solutions for smartphones. The reviewed quantitative risk estimation approaches have been divided into the following five main categories: (i) probabilistic approaches, (ii) machine learning-based approaches, (iii) fuzzy logic models, (iv) non-graph-based models, and (v) Monte Carlo simulation models. Our main findings are summarized in the table in the end of the manuscript