Blockchain Enabled Anonymous Privacy-Preserving Authentication Scheme for Internet of Health Things

被引:11
|
作者
Rajasekaran, Arun Sekar [1 ]
Maria, Azees [2 ]
Rajagopal, Maheswar [3 ]
Lorincz, Josip [4 ]
机构
[1] KPR Inst Engn & Technol, Dept ECE, Coimbatore 641407, India
[2] VIT AP Univ, Sch Comp Sci & Engn, AP Secretariat, Amaravathi 522237, India
[3] KPR Inst Engn & Technol, Ctr IoT & AI CITI, Dept ECE, Coimbatore 641407, India
[4] Univ Split, Fac Elect Engn Mech Engn & Naval Architecture FESB, Split 21000, Croatia
关键词
wireless; IoT; health; private key; attack; secure; privacy; sensor; network; cryptography; BODY AREA NETWORKS; KEY AGREEMENT SCHEME; MUTUAL AUTHENTICATION; USER AUTHENTICATION; PROTOCOL; CRYPTANALYSIS; SECURITY; DESIGN;
D O I
10.3390/s23010240
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The Internet of Health Things (IoHT) has emerged as an attractive networking paradigm in wireless communications, integrated devices and embedded system technologies. In the IoHT, real-time health data are collected through smart healthcare sensors and, in recent years, the IoHT has started to have an important role in the Internet of Things technology. Although the IoHT provides comfort in health monitoring, it also imposes security challenges in maintaining patient data confidentiality and privacy. To overcome such security issues, in this paper, a novel blockchain-based privacy-preserving authentication scheme is proposed as an approach for achieving efficient authentication of the patient without the involvement of a trusted entity. Moreover, a secure handover authentication mechanism that ensures avoiding the patient re-authentication in multi-doctor communication scenarios and revoking the possible malicious misbehavior of medical professionals in the IoHT communication with the patient is developed. The performance of the proposed authentication and handover scheme is analyzed concerning the existing state-of-the-art authentication schemes. The results of the performance analyses reveal that the proposed authentication scheme is resistant to different types of security attacks. Moreover, the results of analyses show that the proposed authentication scheme outperforms similar state-of-the-art authentication schemes in terms of having lower computational, communication and storage costs. Therefore, the novel authentication and handover scheme has proven practical applicability and represents a valuable contribution to improving the security of communication in IoHT networks.
引用
收藏
页数:24
相关论文
共 50 条
  • [21] A Privacy-Preserving Authentication Scheme for VANETs based on Consortium Blockchain
    Zhang, Yujian
    Tong, Fei
    Xu, Yuwei
    Tao, Jun
    Cheng, Guang
    [J]. 2020 IEEE 92ND VEHICULAR TECHNOLOGY CONFERENCE (VTC2020-FALL), 2020,
  • [22] A Blockchain-Based Privacy-Preserving Authentication Scheme for VANETs
    Lu, Zhaojun
    Wang, Qian
    Qu, Gang
    Zhang, Haichun
    Liu, Zhenglin
    [J]. IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2019, 27 (12) : 2792 - 2801
  • [23] Privacy-preserving internet of things data filtering scheme
    Zhou R.
    Zhang X.
    Wang X.
    Li D.
    Chen T.
    Zhang X.
    [J]. Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2023, 50 (04): : 45 - 53
  • [24] A Privacy-Preserving Homomorphic Encryption Scheme for the Internet of Things
    Zouari, Jaweher
    Hamdi, Mohamed
    Kim, Tai-Hoon
    [J]. 2017 13TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2017, : 1939 - 1944
  • [25] Privacy-preserving ledger for blockchain and Internet of Things-enabled cyber-physical systems
    Singh, Rajani
    Dwivedi, Ashutosh Dhar
    Mukkamala, Raghava Rao
    Alnumay, Waleed S.
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2022, 103
  • [26] Privacy-Preserving Solutions in Blockchain-Enabled Internet of Vehicles
    Kaltakis, Konstantinos
    Polyzi, Panagiota
    Drosatos, George
    Rantos, Konstantinos
    [J]. APPLIED SCIENCES-BASEL, 2021, 11 (21):
  • [27] An Efficient and Privacy-Preserving Blockchain-Based Authentication Scheme for Low Earth Orbit Satellite-Assisted Internet of Things
    Wang, Biying
    Chang, Zheng
    Li, Shancang
    Hamalainen, Timo
    [J]. IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS, 2022, 58 (06) : 5153 - 5164
  • [28] Anonymous and Efficient Authentication Scheme for Privacy-Preserving Federated Cross Learning
    Li, Zeshuai
    Liang, Xiaoyan
    [J]. ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PT IX, ICIC 2024, 2024, 14870 : 281 - 293
  • [29] An improved efficient anonymous authentication with conditional privacy-preserving scheme for VANETs
    Cahyadi, Eko Fajar
    Hwang, Min-Shiang
    [J]. PLOS ONE, 2021, 16 (09):
  • [30] A Privacy Preserving Authentication Scheme for Heterogeneous Industrial Internet of Things
    Tan, Zuowen
    Jiao, Jintao
    Yu, Mengjiang
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2022, 2022