Article

A Blockchain-Based Secure Healthcare Scheme with the Assistance of Unmanned Aerial Vehicle in Internet of Things

Authors:
To read the full-text of this research, you can request a copy directly from the authors.

Abstract

This paper introduces a blockchain-based secure healthcare scheme in which health data (HD) are collected from users via an unmanned aerial vehicle (UAV) and stored on the nearest server. In the proposed scheme, a UAV first establishes a relation with body sensor hives (BSHs) via a token and then shares a shared key with BSHs to enable low-power secure communication. After retrieving the HD, the UAV decrypts the encrypted HD (encrypted by a BSH) using the shared key and exercises a two-phase authentication mechanism. Upon successful validation, the UAV transmits the HD to the nearest server to store it securely in blockchain. A security analysis is discussed to show the feasibility of the proposed secure healthcare scheme. Finally, the performance of the proposed scheme is investigated through simulation and implementation. The security and the performance analysis demonstrate that the proposed scheme supports better assistance to BSHs while maintaining security.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the authors.

... 14 34 The scheme proposed will first collect the data on patient health by aerial vehicle and store it on the server and provide secure communication by encryption and decryption using blockchain technology. ...
... It is a cryptocurrency that is native and employs the use of smart contracts. Previous studies 21,22,[26][27][28][29][30][31]33,34,37,38,43,45,49,55,57,58,[60][61][62][63]67,73,[75][76][77][78] used the Ethereum platform to implement blockchain technology to the proposed approach aspect. ...
... Jayaraman et al. 27 and Indumathi et al. 33 have mentioned in their proposed work that medical sensors will be incorporated to perform their research study. IoT body sensors, 34 IoT wireless sensors, 41,68 IoT fitness sensors, 48 and IoT sensors 46,55,57,75 were used to incorporate the IoT technology in approaches to integrate the IoT and blockchain technology in healthcare domain. Rahman et al. 22 use gesturetracking sensors like Kinect2, Leap Motion, and Myo sensors to contribute to the field of blockchain and IoT technology research work. ...
Article
Full-text available
Healthcare is a vitally important field in the industry and evolving day by day in the aspect of technology, services, computing, and management. Its potential significance can be increased by incorporating Internet of Things (IoT) technology to make it smart in the aspect of automating activities, which is then further reformed in the healthcare domain with the help of blockchain technology. Blockchain technology provides many features to IoT‐based healthcare domain applications such as restructuring by securing traditional practices, data management, data sharing, patient remote monitoring, and drug analysis. In this study, a systematic literature review has been carried out in which a total of 52 studies were selected to conduct systematic literature review from databases PubMed, IEEE Access, and Scopus; the study includes IoT technology and blockchain integration in healthcare domain‐related application areas. This study also includes taxonomy that mentions the aspects and areas in healthcare domain incorporating the traditional system with the integration of IoT and blockchain to provide transparency, security, privacy, and immutability. This study also includes the incorporation of related sensors, platforms of blockchain, the objective focus of selected studies, and future directions by incorporating IoT and blockchain in healthcare domain. This study will help researchers who want to work with IoT and blockchain technology integration in healthcare domain.
... A smart contract represents a computer program, which computerizes in blockchain by managing information based on the logic presented in the contract. Blockchain aids potential functionalities, like protected communication, distributed computing, and data integrity that can be highly helpful in alleviating the aforesaid security problems regarding data integrity and cyberattacks [22]. Blockchain presents a free as well as an autonomous system, recommending that every hub in the structure of Blockchain shows its ability to alter the traditional manner of exploiting applications to share e-health and biomedical data [23,24]. ...
... However, it failed to carry out an automatic data-sharing process. Anik Islam and Soo Young Shin [22] introduced a blockchain-based secure healthcare model in which Health Data (HD) were gathered from users through a UAV and saved on the adjacent server. Initially, an Unmanned Aerial Vehicle (UAV) set up an association with BSHs through a token. ...
... Rr indicates the rider. Substitute (22) in (19) x age m (t + 1) = V age m (t + 1) ...
Article
Currently, healthcare services are encountering challenges, particularly in developing countries wherein remote areas encounter a lack of highly developed hospitals and doctors. IoT devices produce enormous security-sensitive data; therefore, device security is considered an important concept. The main aim of this work is to formulate a secure key generation process in the data-sharing approach by exploiting the Rider Horse Herd Optimization Algorithm (RHHO). Here, eight phases, like the initialization phase, registration phase, key generation phase, login phase, data protection phase, authentication phase, verification phase, and data decryption phase are exploited for secure and efficient authentication and multimedia data sharing. The proposed RHHO model is the integration of the Rider Optimization Algorithm (ROA) and Horse herd Optimization Algorithm (HOA). The proposed RHHO model achieved enhanced performance with a computation cost of 0.235, an accuracy of 0.935and memory usage of 2.425 MB.
... Internet of things (IoT) [1,2] has a collection of network devices that are interconnected via near-field communication (NFC), Bluetooth, and Wi-Fi connections [3]. The IoT devices are widely utilized in smart appliances (thermostats, refrigerators, etc.), security systems, health care, computer peripherals, military, agriculture, etc. [4][5][6]. ...
... Element wise matrix defined in . 1 and . 2 . Based on the above discussion, the objective of the work is achieved that is, reliable and minimum computation complexity is achieved while detecting threats in IoT. ...
... Intelligent intrusion detection system in the Internet of Things (IoT)This study's main objective is to detect threat and intrusion activities from the data traffic presented in the network and host reliably. The goal is achieved according to eqn(1), that is, the output of convolution layer feature map O ...
Article
Full-text available
Internet of Things (IoT) played a crucial role in various sectors such as automobiles and the logistic tracking medical field because it consists of distributed nodes, servers, and software for effective communication. Although, this IoT paradigm suffered from intrusion threats and attacks that cause security and privacy issues. Existing intrusion detection techniques fail to maintain reliability against the attacks. Therefore, in this work, IoT intrusion threat has been analyzed by using the sparse convolute network to contest the threats and attacks. The network is trained using sets of intrusion data, characteristics, and suspicious activities, which helps identify and track the attacks, mainly Distributed Denial of Service (DDoS) attacks. Along with this, the network is optimized using evolutionary techniques that identify and detect the regular, error, and intrusion attempts under different conditions. The sparse network forms the complex hypotheses evaluated using neurons, and the obtained event stream outputs are propagated to further hidden layer processes. This process minimizes the intrusion involvement in IoT data transmission. The effective utilization of training patterns in the network classifies the standard and threat patterns successfully. Then the effectiveness of the system is evaluated using experimental results and discussion.
... For example, hybrid applications, such as [34] and [35] manage risk analysis and notifying solutions at the server side, which are prone to data leakage and are still suffering from high communication costs and high volume of the message exchange. There are other CT platforms developed by integration of blockchain and specified IoT networks such as Internet of Drones (IoDs) [36] to provide different services in healthcare [37] and for pandemic control [38]. In particular, Islam et al. [38] proposed a blockchain-enabled solution, which is an integration of IoT, artificial intelligence (AI), and blockchain, leveraging IoDs to automate a supervision scheme to monitor the crises. ...
... Almost all smartphones are now equipped with this technology, making BLE an ideal communication medium for providing different IoT-based services, such as indoor localization and CT. BLE spectrum has 40 frequency channels with 2-MHz channel spacing, 37 (0-36) of which are for data transmission, and three (37)(38)(39) are considered the advertising channels where frequency hopping is employed to diminish the interference effects. Communicationwise, BLE introduces two communication modes: 1) nonconnectable advertising and 2) connectable advertising [63]. ...
Article
Recently, as a consequence of the coronavirus disease (COVID-19) pandemic, dependence on contact tracing (CT) models has significantly increased to prevent the spread of this highly contagious virus and be prepared for the potential future ones. Since the spreading probability of the novel coronavirus in indoor environments is much higher than that of the outdoors , there is an urgent and unmet quest to develop/design efficient, autonomous, trustworthy, and secure indoor CT solutions. Despite such an urgency, this field is still in its infancy. This article addresses this gap and proposes the trustworthy blockchain-enabled system for an indoor CT (TB-ICT) framework. The TB-ICT framework is proposed to protect privacy and integrity of the underlying CT data from unauthorized access. More specifically, it is a fully distributed and innovative blockchain platform exploiting the proposed dynamic Proof-of-Work (dPoW) credit-based consensus algorithm coupled with randomized hash window (W-Hash) and dynamic Proof-of-Credit (dPoC) mechanisms to differentiate between honest and dishonest nodes. The TB-ICT not only provides a decentralization in data replication but also quantifies the node's behavior based on its underlying credit-based mechanism. For achieving a high local-ization performance, we capitalize on the availability of Internet of Things (IoT) indoor localization infrastructures, and develop a data-driven localization model based on bluetooth low-energy (BLE) sensor measurements. The simulation results show that the proposed TB-ICT prevents the COVID-19 from spreading by the implementation of a highly accurate CT model while improving the users' privacy and security. Index Terms-Blockchain, bluetooth low energy (BLE), contact tracing (CT), indoor localization.
... Furthermore, performance was evaluated in terms of processing time, expected transmission of data, validation time, and energy consumption using MAT-LAB and python. In line with that, in 2020, Islam et al. [232] proposed a BC-based secure healthcare scheme called BHEALTH in which health data is collected using UAVs. Uses consortium BC Ethereum BC platform with proof of authority (PoA) consensus algorithm, and time division multiple access (TDMA) protocols for communication. ...
... Islam et al. [232] Proposed a UAV-assisted healthcare scheme that collects health data from users through UAV. ...
Article
Full-text available
In recent times, IoT has emerged as a new paradigm for the interconnection of heterogeneous, resource-constrained, and communication-capable smart devices. It has been anticipated as a key enabler for various domains of applications such as health care, automotive, agriculture, industrial operations, automation , energy, and the next generation of living. However, the current IoT applications face significant challenges in terms of the huge amount of collected data, intensive data exchange, security, privacy, centralized processing, and interoperability. To mitigate many of these issues, blockchain has been identified as a promising innovative technology. Blockchain, in conjunction with smart contracts, has received significant attention both from the industry and academia and offers features such as irreversibility, non-repudiation, proof of provenance, fault tolerance, pseudonymity, decentralized operations and decision-making, and distributed ledger. The integration of blockchain with IoT requires essential insights concerning the application areas, scalability, security, privacy, data college and storage, performance, and governance. Thus, this paper intends to expound on the opportunities and key aspects of using blockchain in the IoT landscape. Specifically, this paper surveys the utilization of blockchain for various IoT applications. Besides, the paper distinguishes different technical aspects and presents the associated research challenges. At last, future research directions are discussed depending on the lessons learned.
... Blockchain technology can get around these problems with connectivity by creating a single place where everyone can store and share health data. This will make it easier for everyone involved in healthcare to talk to each other and work together [4]. By getting rid of middlemen and handling manual tasks, blockchain technology could also make routine tasks easier and lower the cost of healthcare. ...
Article
Full-text available
Healthcare information systems are going through a huge change that will make them more efficient, safe, and easy to use. As more persistent records are digitized and private therapeutic information is shared, it is more critical than ever to create beyond any doubt that security, security, and availability are well secured. Blockchain innovation can be a great way to bargain with these issues since it makes a decentralized, unchangeable record that can be utilized to securely store and send healthcare information whereas securing its security and security. This exposition looks at how blockchain innovation might offer assistance make wellbeing data frameworks more secure and more congruous with each other. Healthcare companies can set up a trusted and unchangeable way to oversee understanding information over different frameworks and parties by utilizing blockchain independent plan, cryptography, and voting instruments. One of the leading things approximately blockchain innovation is that it can make data more private. Cryptographic instruments, like encryption and computerized marks, make it conceivable to store and share private wellbeing information securely with individuals who are permitted to see it, without compromising persistent security. Moreover, since blockchain is unchangeable, once information is recorded, it can't be changed or eradicated. This makes the history of who gotten to and changed information clear and simple to check. In conjunction with ensuring protection, blockchain innovation moreover makes things more secure by bringing down the chances of information spills and unlawful get to. Blockchain-based wellbeing data frameworks make information keeping less centralized and use solid encryption strategies to lower the chances of single focuses of failure and unlawful changes. This makes information more secure and dependable. Keen contracts on blockchain stages can too mechanize and execute Panamerican Mathematical Journal
... Blockchain technology can get around these problems with connectivity by creating a single place where everyone can store and share health data. This will make it easier for everyone involved in healthcare to talk to each other and work together [4]. By getting rid of middlemen and handling manual tasks, blockchain technology could also make routine tasks easier and lower the cost of healthcare. ...
Article
Healthcare information systems are going through a huge change that will make them more efficient, safe, and easy to use. As more persistent records are digitized and private therapeutic information is shared, it is more critical than ever to create beyond any doubt that security, security, and availability are well secured. Blockchain innovation can be a great way to bargain with these issues since it makes a decentralized, unchangeable record that can be utilized to securely store and send healthcare information whereas securing its security and security. This exposition looks at how blockchain innovation might offer assistance make wellbeing data frameworks more secure and more congruous with each other. Healthcare companies can set up a trusted and unchangeable way to oversee understanding information over different frameworks and parties by utilizing blockchain independent plan, cryptography, and voting instruments. One of the leading things approximately blockchain innovation is that it can make data more private. Cryptographic instruments, like encryption and computerized marks, make it conceivable to store and share private wellbeing information securely with individuals who are permitted to see it, without compromising persistent security. Moreover, since blockchain is unchangeable, once information is recorded, it can't be changed or eradicated. This makes the history of who gotten to and changed information clear and simple to check. In conjunction with ensuring protection, blockchain innovation moreover makes things more secure by bringing down the chances of information spills and unlawful get to. Blockchain-based wellbeing data frameworks make information keeping less centralized and use solid encryption strategies to lower the chances of single focuses of failure and unlawful changes. This makes information more secure and dependable. Keen contracts on blockchain stages can too mechanize and execute get to control rules, making beyond any doubt that as it were individuals who are permitted to can see certain restorative data or do certain activities that have as of now been set up. Interoperability is another important part of modern healthcare information systems that lets different healthcare companies and systems work together and share data easily.
... In the first process, weight attributes are derived using an analytical hierarchical approach, and in the second process, security criteria are assessed using the TOPSIS methodology [15]. In [16], the blockchain-based technique is used to increase IoHT security. The health information of the user is obtained by an Unmanned Ariel Vehicle (UAV). ...
Article
Full-text available
The applications of IoHT have adapted a lot of contemplation as a result of recent IoT (Internet of Things) advancements. Irrespective of several fields in IoHT such as remote medical professional assistance, history of health-charting, integrated care management, decreased cost, disease management, disability management, home care management, individual healthcare assistance, health tracking, drug availability management, healthcare tracking management, and telesurgery. The evolvement in the field of the IoHT network has shown a drastic advancement in the standard of living. Despite the numerous fields of application in the IoHT network, the balance of security and privacy is one of the most pressing problems as far as life-critical solutions are concerned. There are several solutions to maintain security in the IoHT network. The most recent security enhancement schemes in the IoHT have been addressed in this paper. Furthermore, the latest possible challenges in the IoHT network are discussed. Moreover, an extensive survey on future research directions in the field of IoHT network security is illustrated. Additionally, we have proposed a security architecture based on trust assessment for IoHT systems to ameliorate the security of the network. The trust assessment is based on the artificial intelligence mechanism such that the security of the IoHT network is enhanced adaptively. This paper presents a novel IoHT security framework that integrates trust evaluation to dynamically address security challenges. It offers practical solutions for applications like telesurgery by adjusting measures based on real-time trust assessments, setting a new standard in IoHT security and guiding future research.
... Drones will be a major delivery element by 2040, addressing a constant need for services in the industry [6]. Similarly, in [7], researchers discuss a blockchain-based healthcare system that relies on the use of UAVs for health data collection. ...
Article
Full-text available
In recent years, the cost-effectiveness and versatility of Unmanned Aerial Vehicles (UAVs) have led to their widespread adoption in both military and civilian applications, particularly for operations in remote or hazardous environments where human intervention is impractical. The use of multi-agent UAV systems has notably increased for complex tasks such as surveying and monitoring, driving extensive research and development in control, communication, and coordination technologies. Evaluating and analysing these systems under dynamic flight conditions present significant challenges. This paper introduces a mathematical model for leader–follower structured Quadrotor UAVs that encapsulates their dynamic behaviour, incorporating a novel multi-agent ad hoc coordination network simulated via COOJA. Simulation results with a pipeline surveillance case study demonstrate the efficacy of the coordination network and show that the system offers various improvements over contemporary pipeline surveillance approaches.
... Additionally, a robust password transfer mechanism is implemented using the OTP cryptographic technique to decrypt the steganography image, and all data is securely encrypted before being stored on DSS. [127,130,137,139,141,145,146,154,157,[159][160][161][162][163][164][165][166] Falls short in ensuring patient privacy and may lack transparent mechanisms for data sharing and patient involvement Implements NFTs to provide optimal patient privacy and ownership representation, facilitating transparent and efficient data sharing between patients and other stakeholders. ...
... These functions can save you the customers from an eclipse assault. In particular, having a take a look at on the incoming and outgoing connections from the node can lessen the impact of an eclipse assault [21]. • Countermeasures against Sybil Attacks: Sybil assaults are prevented in Bitcoin through requiring block era potential to be proportional to computational energy to be had via the proof-of-paintings mechanism. ...
Conference Paper
Full-text available
Blockchain era produces a shape of statistics with inherent safety qualities. Its primarily based totally on concepts of cryptography, decentralization and consensus, which make sure accept as true with in transactions. In maximum blockchains or distributed ledger technology (DLT), the statistics is based into blocks and every block carries a transaction or package of transactions. Each new block connects to all of the blocks earlier than it in a cryptographic chain in this type of manner that it is almost not possible to tamper with. All transactions in the blocks are established and agreed upon through a consensus mechanism, making sure that every transaction is proper and correct. Blockchain era permits decentralization via the participation of individuals throughout a dispensed network. There isn't any single factor of failure and a single person cannot alternate the document of transactions. However, blockchain technology fluctuate in a few important safety facets. The research area of this work is to deep dive into security aspects of blockchain technology such as security issues and challenges, attacks and countermeasures related to security improvements in blockchain atmosphere.
... The seamless operation of IoT devices and their applications hinges on the effective management of these resources. To address these challenges, the previous studies proposed a lightweight encryption method predicated on blockchain technology, which is distinguished by minimal resource usage and reduced encryption overheads [1][2][3]. This innovative method achieves a diminutive block size and a shorter key length, utilizing straightforward key generation to mitigate computational complexity. ...
... A prototype has been designed by Tim Mackey and his team 27 to deploy blockchain technology for secure data storage and consensus methods that make the claims adjudication process more patient-centric with the goals to identifying and preventing healthcare fraud and abuse. A UAV enabled health data collection scheme is introduced by Islam et al. 28 where UAV perform two phase authentications with low powered shared key and securely stored it on blockchain before it transmits to the nearest server. The viability of the scheme is justified by security analysis and performance which results in excellent assistance support in addition to security maintenance. ...
Article
Full-text available
In today's smart applications, very frequently used data like electronic health records (EHR's) are highly sensitive and soft target to the unauthorized agencies. Data management, integrity, and security issues plague EHR systems. Insurance firms are prohibited by law and corporate privacy from sharing patient data, but because the data are not linked and synchronized among insurance providers, there has been a rise in healthcare fraud. A crucial component of an e‐health system is safe communication between patients, healthcare providers, and insurance companies. Building a system to securely manage and track insurance operations by combining data from all sources is required to combat health insurance fraud. Over time, blockchain grew in popularity, and the healthcare sector's interest in it led to the development of design concepts that addressed security issues. In this study, a blockchain‐based security architecture has been presented to protect the EHR and provide a secure method for patients, their caregivers, physicians, and insurance agents to access the clinical data of the patients. By using off‐chain storage and cryptographic key exchange through blockchain our approach also covers the scalability, integrity and access control issue that a healthcare system in general is facing. A crucial component of an e‐health system is safe communication between patients, healthcare providers, and insurance companies. A blockchain‐based security architecture has been presented to protect the EHR and provide a secure method for patients, caregivers, physicians, and insurance agents to access the clinical data of the patients.
... Drones will be a major delivery element by 2040, addressing a constant need for services in the industry [6]. Similarly, in [7], researchers discuss a blockchain-based healthcare system that relies on the use of UAVs for health data collection. One of the major factors driving an increase in UAV research interest are developments in miniature UAVs. ...
Preprint
Full-text available
In recent years, the cost-effectiveness of deploying and maintaining Unmanned Aerial Vehicles (UAVs), coupled with their capacity to operate in remote or hazardous environments inaccessible to human pilots, has garnered significant research attention in both military and civilian domains. The utilisation of multi-agent UAVs has experienced substantial growth, particularly for intricate tasks such as surveying and monitoring, necessitating extensive research and development efforts. This expansion demands more intricate control, communication, and coordination mechanisms. Assessing and analysing these multi-agent systems under flight dynamic conditions pose notable challenges. This paper proposes the development of a mathematical model for a leader-follower structured Quadrotor UAVs that accurately represents the dynamic behaviour while considering the ad-hoc networking system via COOJA. The aim is to construct a model that fulfils the need for a simulation environment, which researchers can employ to evaluate and analyse formation control mechanisms. Simulation results are presented from a case study to exemplify a potential application of this approach. A comparative assessment of performance between the proposed system and the traditional counterpart reveals enhanced leader-follower flight performance concerning attitude and position tracking while taking into consideration the ad-hoc networking infrastructure.
... The healthcare sector generates copious amounts of data, including patient records, data from clinical trials, billing, and research findings [5]. Securing all internet-connected medical devices is the biggest obstacle to universal electronic healthcare [6]. ...
Article
Full-text available
Utilizing the fundamental characteristics of the decentralization, immutability, and transparency of blockchain technology, the healthcare industry has made notable advancements in incorporating it over the past five years. This review examines the progress and challenges encountered in this critical study by assessing 124 articles published by MDPI between 2018 and the current date. Examining blockchain’s potential uses, like safe data exchange and interoperability in supply chain management and electronic health records, provides exciting new directions for the future of healthcare. Blockchain technology can greatly increase efficiency and cost-effectiveness by guaranteeing data integrity, protecting patient privacy, and reducing administrative procedures. This paper objectively evaluates blockchain’s advancement in healthcare through a thorough analysis of real-world applications and research projects. By highlighting both its advantages and disadvantages, this analysis seeks to add to the continuing conversation about how blockchain will influence the way healthcare is managed and delivered in the future.
... The proposed scheme is implemented on a variety of hardware in order to determine the impact of the security mechanism on real-world hardware performance. [22]. Ming et al. (2020) an efficient sign cryption technique based on certification was suggested, which guarantees anonymity, confidentiality, privacy, and unforgeability by combining certificate-based encryption and "ECC" [23]. ...
Article
As technology advances worldwide, several governments and health organizations develop or implement mobile health systems and applications to treat and monitor patients. Several health systems based on the Internet of Things (IoT) applications have been built to monitor patients remotely. Different mechanisms and techniques have been used in healthcare applications, such as centralized, decentralized, and hybrid. In addition, many communication technologies were used, such as Bluetooth, GPS, WiFi, and others. This systematic analysis discusses these aspects, focusing on user security, privacy, effective data extraction, and confidential handling. This review investigates all researches published between 2015 and 2021, where four databases (IEEE Xplore, ScienceDirect, Research Gate, and Springer) were considered. A detail of used exclusion criteria and selection procedure to assess the collected publications were presented. Only thirteen papers have matched the criteria thoroughly examined and included in this study. The findings are provided throughout the papers to highlight gaps and concerns in an IoT-based healthcare system that will be constructed to effectively decrease potential dangers during messaging while preserving total user privacy and security.
... Additionally, a fascinating smart city use case [41] by Islam and Shin examines Unmanned Aerial Vehicles (UAV) to facilitate data collection and communication with remote areas in the front-end of a blockchain system, focusing on healthcare. At the same time, Abualsauod [19] also theoretically considers using UAVs and integrating with blockchain. ...
Article
The Internet of Things (IoT) has demonstrated promising growth, as it is crucial to numerous application domains in smart ecosystems, such as the smart city. Decentralization can help achieve growth, with previous research proposing the use of decentralized blockchain technology in IoT ecosystems as, among others, it can offer cryptographically trustworthy interactions, non-repudiable smart contracts, and interoperability between stakeholders. However, proposals are often theoretical or very specific to IoT ecosystem sub-areas, for instance, healthcare. In both cases, implementation may not be feasible in a larger ecosystem. This paper investigates the performance, particularly throughput, aspect of feasibility. It proposes and demonstrates a platform that uses blockchain technology as a building block in an IoT ecosystem. A permissioned blockchain network is built, performance is measured, and the measurements are interpreted in a smart city context, thus providing valuable insights about real-world implementations and their degree of feasibility.
... The stakeholders responsible for the whole cultivation can themselves verify whether the distribution and management are on track or not. b) Decentralized: Since the network is decentralized, there is no central authority [27]. Since there is no need for a regulatory authority, anyone involved in the process can access the system directly from the web and access the data. ...
Article
Full-text available
Due to the warm and humid environment of Bangladesh, it is highly exposed to occurring perpetuation of various viruses which cause diseases in crops. A huge number of crops are wasted because of these occurring diseases and it directly hurts the production rate and forces import of crops in bulkier amount. Unmanned aerial vehicle usage is one of the smart agriculture technologies being researched for agricultural applications (UAVs) in these days. UAV technology allows farmers to quickly gather information on field conditions by providing overhead images of their agricultural fields or even allowing them to zoom in on a particular area. Using UAV technology, farmers may identify specific areas that need immediate attention and perform the necessary agricultural improvements. Drones collect data that farmers can use to detect crop disease by applying deep learning algorithms to make long-term decisions about planting, land mapping, damage control, and other things. This research uses blockchain technology to establish connection between suppliers and customers by enabling information to be tracked throughout the supply chain and enhances food supply chain safety. It offers a secure method of broadcasting data, focusing on enhancement of supply chain management and prediction of crops which makes it possible to implement and deploy data-driven technologies for smart farming. The research uses UAVs as a means of collecting crop images, implements a prediction model using AlexNet CNN and analyses how it performs with a real Bangladeshi crop disease dataset to help farmers from excessive crop damage. Furthermore, the overall process is carried out using the Blockchain technology to enhance the existing supply chain management process.
... That is, it refers to a technology that connects various objects through wireless communication [1]. Recently, IoT technology has provided great advantages in various fields, such as agriculture [2][3][4][5], medical care [6][7][8][9], smart grids [10,11], and smart homes [12][13][14]. Experts predict that by 2020, about 30 billion IoT devices will be connected to the internet [15]. ...
Article
Full-text available
This paper proposes a blockchain-based firmware update method using unmanned aerial vehicles (UAVs) to solve one of the security issues arising in the Internet of Things (IoT) environment, which is the firmware security problem. It has high scalability and transaction speed using private blockchains and solves the limitations of internet connections by updating the firmware using a UAV. The proposed firmware update system safely manages the IoT device and firmware information through four processes: participant registration, firmware registration/update, firmware update request, and firmware update. The verification of IoT devices and UAVs is performed using the IoT device's public key and Bloom Filter, and firmware updates can be safely performed using public-key encryption communication. To prove the security of the proposed method, a security analysis based on the STRIDE model was conducted, and the performance of the blockchain network was analyzed by simulation on the top of Hyperledger.
... Ali et al. [27] adopted the certificateless public key signature (CLS) technology to provide conditional privacy protection for vehicle-to-infrastructure (V2I), and used the blockchain to store the valid pseudonym and the revoked pseudonym on PID-BC and RPID-BC, respectively, so as to realize the revocation transparency of pseudonym. Islam et al. [28] designed a blockchainbased secure health scheme, the UAV performed mutual authentication with the sensor to obtain a communication token, and then assisted the sensor to transmit the health data to the nearest server. The server stored the health data in the blockchain to realize secure sharing. ...
Article
Full-text available
The unmanned aerial vehicle (UAV) self-organizing network is composed of multiple UAVs with autonomous capabilities according to a certain structure and scale, which can quickly and accurately complete complex tasks such as path planning, situational awareness, and information transmission. Due to the openness of the network, the UAV cluster is more vulnerable to passive eavesdropping, active interference, and other attacks, which makes the system face serious security threats. This paper proposes a Blockchain-Based Data Acquisition (BDA) scheme with privacy protection to address the data privacy and identity authentication problems in the UAV-assisted data acquisition scenario. Each UAV cluster has an aggregate unmanned aerial vehicle (AGV) that can batch-verify the acquisition reports within its administrative domain. After successful verification, AGV adds its signcrypted ciphertext to the aggregation and uploads it to the blockchain for storage. There are two chains in the blockchain that store the public key information of registered entities and the aggregated reports, respectively. The security analysis shows that the BDA construction can protect the privacy and authenticity of acquisition data, and effectively resist a malicious key generation center and the public-key substitution attack. It also provides unforgeability to acquisition reports under the Elliptic Curve Discrete Logarithm Problem (ECDLP) assumption. The performance analysis demonstrates that compared with other schemes, the proposed BDA construction has lower computational complexity and is more suitable for the UAV cluster network with limited computing power and storage capacity.
... To address this problem, recent studies have proposed edge computing (EC) solutions [32]. Instead of centralized data processing on the cloud, information is handled at the edge of networks [33]. As a result, it reduces response time, energy consumption, computing cost, and overall performance and realizes real-time applications. ...
... However, the challenges are such technologies are centralized computation, processing, and storage as there is a possibility of data manipulation, mistrust, privacy delusion, and failure at a single point. The other important challenge in electronic and all-pervasive healthcare is protecting the security of all internet-enabled equipment (Islam and Young Shin, 2020). Integrating blockchain with healthcare yields decentralization in computation, storage, and improved security. ...
... Since blockchain is not suitable for massive storage such in the case of IoT-based eHealth applications and introduces extra delay. The authors of references [6] and [7] introduced edge devices (smart phones and Unmanned Aerial Vehicles (UAV)) to preprocess collected data from IoT sensors in real-time. In the case of emergencies, the nearest concerned caregiver is alerted. ...
Article
Full-text available
Internet of things and smart medical applications are deeply changing the way healthcare is delivered worldwide. A typical Internet of Things (IoT)‐based eHealth system includes medical sensors for data collection, access network to transmit data, and Cloud servers for data processing and storage. Machine learning/deep learning (ML/DL) have proven to be a powerful tool for data classification, disease prognosis, and diagnosis and even medication prescription. ML/DL models need a large amount of data and significant computational and storage capacities especially for the training phase. Deploying ML/DL algorithms in the Cloud can be effectively done due to the processing and storage power of Cloud data centers. However, it raises many issues related to the availability, latency, energy consumption, bandwidth, security, and privacy. Recently, there is a growing interest to run as much processing as possible nearer the data sources, in the Edge, to compensate the Cloud‐based solutions limitations. In this paper, we propose to investigate the benefits of using IoT, ML/DL, and Edge Computing to enhance healthcare applications. Then, we are going to review the main approaches and trends for executing ML/DL in the Edge, to give their benefits and limitations, and draw finally conclusions about existing research issues.
... In [19], the authors proposed a data collection scheme by using blockchain where the UAVs' nodes securely collected the data related to healthcare. The collected data was related to the health of the users. ...
Article
Full-text available
New technologies and communication standards have changed traditional network processes. Internet of Things (IoT) is one of the emerging technologies where devices are connected to facilitate the users. When the networks are more congested due to a large number of users then the existing routing protocol and communication channels suffer from congestion, disconnection, overhead, and packet drop issues. Unmanned Aerial Vehicles (UAVs) are adopted to support the ground networks for more feasible data communication. These networks provide coverage facilities to IoT networks and provide smooth data dissemination services. Through the use of relay and cooperative communication technologies, UAVs could enlarge the communication space for IoT networks. Traditional network routing protocols have been adopted for data communication in these networks. However, the adopted protocols are not able to handle mobility and uncertain network conditions. This paper proposes a Decision-based Routing for Unmanned Aerial Vehicles and Internet of Things (DR-UAVIoT) network. The proposed protocol is useful for UAV-to-IoT and UAV-to-UAV data communication. The performance of the proposed solution is evaluated with the existing protocols in terms of data delivery, delay, and network overhead. The experimental results indicate the better performance of the proposed protocol in terms of less delay, less overhead, and better data delivery ratio as compared with existing routing protocols.
... Moreover, lightweight network access architectures are more efficient through security research and device optimization. In 2020, Islam and Shin [5] un-crewed aerial vehicles and the nearest storage portal were used to providing consumers with health data (HD) in a blockchain-based, secure healthcare system (UAV). The UAV initially created a partnership with the body sensor hives (BSH) using a token and a transfer key for small-power, safe communication. ...
Article
Full-text available
Preserving privacy and security plays a key role in allowing each component in the healthcare system to access control and gain privileges for services and resources. Over recent years, there have been several role-based access control and authentication schemes, but we noticed some drawbacks in target schemes such as failing to resist well-known attacks, leaking privacy-related information, and operational cost. To defeat the weakness, this paper proposes a secure electronic healthcare record scheme based on Schnorr Signcryption, crypto hash function, and Distributed Global Database (DGDB) for the healthcare system. Based on security theories and the Canetti-Krawczyk model (CK), we notice that the proposed scheme has suitable matrices such as scalability, privacy preservation, and mutual authentication. Furthermore, findings from comparisons with comparable schemes reveal that the suggested approach provides greater privacy and security characteristics than the other schemes and has enough efficiency in computational and communicational aspects.
... Since blockchain is not suitable for massive storage such in the case of IoT-based eHealth applications and introduces extra delay. The authors of references [6] and [7] introduced edge devices (smart phones and Unmanned Aerial Vehicles (UAV)) to preprocess collected data from IoT sensors in real-time. In the case of emergencies, the nearest concerned caregiver is alerted. ...
Article
Full-text available
In the expanding field of the Internet of Vehicles (IoV) where network communication meets technology there is a pressing need, for robust data management and security. This study introduces IoVBlockSecure a protocol based on technology that aims to ensure collection and validation of data within the dynamic and decentralized realm of vehicle networks. The primary objective of IoVBlockSecure is to enhance data security, integrity, efficiency, and scalability in IoV. It achieves this through the utilization of smart contracts advanced blockchain technology and consensus protocol. The framework tackles scalability challenges by integrating both off chain and on chain data storage solutions thereby boosting the security and reliability of data from roadside units (RSUs) and vehicles. Additionally IoVBlockSecure incorporates techniques, a unique consensus mechanism, and a sequential numbering system for data points to optimize data processing and validation. Furthermore, the framework demonstrates its adaptability and operational efficiency by implementing Layer 2 solutions for off chain activities. Comprehensive performance evaluations were conducted to assess aspects such as fault tolerance, data integrity, security measures effectiveness, transaction latency, system throughput, consensus efficacy, and block processing time, across node counts and operational loads. The evaluations conducted confirm that the model is robust and effective demonstrating capabilities, in processing blocks and achieving consensus when transaction latencies increase and system throughputs vary. The framework shows resilience and reliability achieving levels of data integrity, security, and fault tolerance. While these findings validate the potential of IoVBlockSecure in meeting the demands of IoV networks they also highlight areas for improvement in optimizing throughput and latency for optimal performance.
Article
Personalized medicine has been made possible by the development of genomic research, which has opened up previously unheard-of possibilities for the identification, management, and prevention of diseases based on unique genetic profiles. On the other hand, privacy, data integrity, and consent management pose serious obstacles to the transparent and safe exchange of genetic data. This study investigates how blockchain technology can help with these issues by providing a decentralized, transparent, and unchangeable platform for exchanging genetic data. With its strong security features, blockchain technology offers a viable answer to the privacy and integrity issues that come with sharing genomic data. Blockchain enables that genetic data can be shared safely and privately among researchers, healthcare professionals, and patients by utilizing decentralized consensus methods and cryptography techniques. Every transaction on the blockchain is connected to earlier transactions and encrypted, forming a tamper-proof record that ensures data integrity. Using a combination of frameworks, case studies, and literature reviews, this research project examined the body of material already available on the applicability of blockchain technology in this field. According to the results of the peer-reviewed literature, blockchain technology not only protects genetic data from manipulation and unwanted access, but it also helps to create a more cooperative and trustworthy environment for genomic research. This opens the door to more rapid progress in personalized treatment and emphasizes how crucial it is to include cutting-edge technical solutions to protect vital Keywords: Genomic, Data Integrity, Blockchain, Technology, Cryptography, Preservation, Security Journal Reference Format: Malasowe, B.O., Okpor, M.D., Aghware, F., Ako, R.E. & Edim, E.B. (2024): Assuraning Data Integrity, Preservation, Transparency and Privacy.of Genomic Data in the Sharing Process Using Blockchain Technology. Journal of Behavioural Informatics, Digital Humanities and Development Rese Vol. 10 No. 3. Pp 17-46. https://www.isteams.net/behavioralinformaticsjournal dx.doi.org/10.22624/AIMS/BHI/V10N3P2
Article
The Cenozoic era is the digital age where people, things, and any device with network capabilities can communicate with each other, and the Internet of Things (IoT) paves the way for it. Almost all domains are adopting IoT from smart home appliances, smart healthcare, smart transportation, Industrial IoT and many others. As the adoption of IoT increases, the accretion of data also grows. Furthermore, digital transformations have led to more security vulnerabilities, resulting in data breaches and cyber-attacks. One of the most prominent issues in smart environments is a delay in data processing while all IoT smart environments store their data in the cloud and retrieve them for every transaction. With increased data accumulations on the cloud, most smart applications face unprecedented delays. Thus, data security and low-latency response time are mandatory to deploy a robust IoT-based smart environment. Blockchain, a decentralized and immutable distributed ledger technology, is an essential candidate for ensuring secured data transactions, but it has a variety of challenges in accommodating resource-constrained IoT devices. Edge computing brings data storage and computation closer to the network’s edge and can be integrated with blockchain for low-latency response time in data processing. Integrating blockchain with edge computing will ensure faster and more secure data transactions, thus reducing the computational and communicational overhead concerning resource allocation, data transaction and decision-making. This paper discusses the seamless integration of blockchain and edge computing in IoT environments, various use cases, notable blockchain-enabled edge computing architectures in the literature, secured data transaction frameworks, opportunities, research challenges, and future directions.
Chapter
Full-text available
Blockchain technology is a new development that is being used in a variety of industries, including the healthcare industry. Blockchain networks are utilized in the systems in healthcare to safely store and transfer patient data across hospitals, pharmaceutical firms, diagnostic centers, and healthcare providers. The capacity of Blockchain apps to precisely identify both critical and potentially hazardous faults in the medical industry is one of the significant benefits of using them in healthcare. The transparency, efficiency, and security of shared medical records throughout the healthcare network could, therefore, be improved by this technology. Blockchain technology can help medical organizations learn important lessons and ensure better analysis of patient information. This paper explores Blockchain technology and its benefits when used in healthcare. It provides the need for blockchain in healthcare and facilitates a road map of Blockchain in global healthcare. Additionally, it lists and discusses important Blockchain applications for the healthcare industry.
Chapter
New technologies like blockchain and Internet of Things (IoT) are constantly improving the state-of-the-art in healthcare services. The trend of keeping medical records in digital formats is also increasing the reliance of modern healthcare service providers on these new technologies. This edited book brings a collection of reviews on blockchain and IoT technologies that are driving innovation in digital and smart healthcare systems. The editors bring an academic and practical approach to assist professionals and readers in understanding computerized healthcare solutions. 16 referenced chapters provide knowledge about fundamental framework, research insights, and empirical evidence for effective smart healthcare applications. The chapters also cover benefits and challenges of specific smart health frameworks, giving an informative overview of the subject. Key themes of the book include: 1. Technological Foundations for Smart Healthcare 2. Blockchain Applications in Healthcare 3. Internet of Things (IoT) in Healthcare 4. Artificial Intelligence (AI) Integration 5. Security, Privacy, and Authentication 6. Medical Imaging and Deep Learning 7. Telemedicine The content in the book is designed to help administrators and healthcare professionals to understand the basics of blockchain tech and IoT in smart healthcare systems and strengthen the competitive advantage of their clinics.
Article
The technology of Unmanned Aerial Vehicles (UAVs) has sparked a revolution in numerous Internet of Things (IoT) applications, such as flood monitoring, wildfire monitoring, coastal area surveillance, intelligent transportation, and classified military operations, etc. This technology offers several advantages when used as a flying base station to enhance the communication metrics of an employed IoT appplication. However, as an integrated technology (UAV-assisted IoT applications), it suffers from many challenges, and security is one of the foremost concerns. Considering that, in this paper, we proposed a hybrid lightweight key exchange authentication model for UAV-assisted IoT applications to resolve the device-to-device (D2D) authentication and data privacy issues in these networks. The proposed model employs five different security parameters named registration, authentication, authorization, accounting, and cache wash and update (R3ACWU) in coordination with a hash function. The network architecture consists of UAVs, IoT devices, and micro base stations, followed by base stations, authentication servers, and service providers (SP). In this framework, we introduce a concept known as ‘dead time’, a specific time period after which each device’s cache memory is cleared and updated. This practice not only enhances the security of the devices in use but also reduces computational and memory overhead by eliminating the records of devices that haven’t participated in the communication process within the specified time frame. Results statistics of our lightweight R3ACWU authentication scheme exhibit notable improvement corresponded to the present authentication schemes in terms of comparative parameters.
Article
Because of the abrupt increase in demand for security, researchers have developed immediate safety solutions that outperform state-of-the-art solutions. Data security was first sought for during the Spartan period. These days, efforts are being made to broaden this area of study by challenging the status quo and creating novel algorithms that outperform their weaker predecessors. Unmanned aerial vehicles, or UAVs, are widely used in a variety of industries, including agriculture, the military, healthcare, monitoring and surveillance, and many more, because of their svelte designs and adaptable mobility. In this post, we go over the significance of drone technology as well as its growth and demand. The study also discusses the current state of security concerns in real-time settings and how quantum cryptography outperforms conventional methods in protecting data. This inspires us to offer an overview of quantum cryptography's significance, function, and advantages in protecting UAV communications that go beyond 5G networks. Additionally, a unique layered architectural approach based on quantum cryptography is suggested to ensure excellent data security and effective transmission. A case study on the Internet of Military Things' implementation in the battlefield is also included in this presentation. The latency, security, and dependability of the suggested case study system are taken into account while assessing its performance.
Article
Blockchain's core attributes, including decentralization, transparency, and immutability, have positioned it as a pioneering technology in the realm of financial technology (fintech) and have rendered it highly applicable across diverse industries. The current enterprise ecosystem has faced setbacks primarily due to a lack of trust in the existing infrastructure. This issue can be traced back to the centralized management of healthcare data, making it vulnerable to tampering and fraudulent activities, resulting in financial losses. The existing enterprise ecosystem failed due to the lack of trust in the currently in-place infrastructure. This problem can be attributed to the centralized healthcare data management, which is prone to tampering and fraudulent activities leading to capital loss. The present study relates to a comprehensive survey conducted in timespan from 2018 to 2022 on the implementation of blockchain technology in the healthcare industry, identifying and discussing the key challenges facing the healthcare industry, such as fraud, and scams against healthcare data. It is found that there is an enormous inclination towards the decentralization of patient-centric data. However, a rapid decline is reported due to the privacy and security concerns of the confidential and sensitive data. Moreover, it is noticed that most of the implementations utilized either Ethereum or Hyperledger. Based on the survey's findings, the study proposed a blockchain-based healthcare framework that can address the identified challenges by providing a secure and transparent platform for collecting, storing, and sharing patient health data while prioritizing security and privacy.
Article
The integration of Internet of Things (IoT) technology into electronic health (eHealth) applications has revolutionized the healthcare landscape, enabling real‐time patient monitoring, personalized care, and improved patient outcomes. However, this convergence of IoT and healthcare also introduces critical security and privacy challenges, needing careful consideration. This survey comprehensively explores the multifaceted realm of security and privacy issues in IoT‐based eHealth applications. First, we taxonomize the diverse security threats that arise due to the interconnected nature of IoT medical devices. Additionally, we highlight privacy concerns stemming from the collection and sharing of personal health information, while reconciling them with the need for accessible and collaborative healthcare ecosystems. Second, we synthesize functional, ethical, and regulatory perspectives to pick up the major requirements needed in the context of eHealth data during their whole lifecycle, from creation to destruction. Third, we identify emerging research strategies employed to address security and privacy concerns, such as cloud‐based solutions, decentralized technologies such as blockchain technology and InterPlanetary File System (IPFS), cryptographic approaches, fine‐grained access control strategies, and so forth. Additionally, we examine the impact of these approaches on computational efficiency, latency, and energy consumption, critically evaluating their suitability in the healthcare context. Building upon this comprehensive assessment, we outline potential future research directions aimed at advancing security and privacy measures in IoT‐based eHealth applications.
Chapter
The main aim of this chapter is to propose a secure and transparent communication mechanism by reducing the communication delay and more accuracy while making the decisions among information transmissions. The chapter has used adaptive and comprehensive trust models in order to compute and maintain the trust while making the accurate decisions among intelligent devices in the network. In addition, the accurate decisions and transmission are vigilant continuously by the blockchain technique where each and every intelligent device is being recorded while maintaining the communication. The trusted models are further traced and get transparent using blockchain network where each block having device id, category (legitimate, moderate, malicious), size is being monitored and recorded by the network. The performance of the proposed solution is validated against existing approach over various measuring parameters such as communication delay, accuracy, and probability attack.
Book
This book discusses the potential of the Internet of Unmanned Things (IoUT), which is considered a promising paradigm resulting in numerous applications including shipment of goods, home package delivery, crop monitoring, agricultural surveillance, and rescue operations. The authors discuss how IoUT nodes collaborate with each other in ad hoc manner through a Line-of-Sight (LoS) link to exchange data packets. Also discussed is how Unmanned Arial Vehicles (UAVs) can communicate with fixed ground stations, with an air traffic controller, or through a Non-Line-of-Sight (NLoS) link with a satellite-aided controller, generally based on preloaded missions. The authors go on to cover how to tackle issues that arise with dissimilar communication technologies. They cover how various problems can appear in inter-UAV and UAV-to-X communications including energy management, lack of security and the unreliability of wireless communication links, and handover from LoS to NLoS, and vice versa. In this book, the editors invited front-line researchers and authors to submit research exploring emerging technologies for IoUT and mission-based networking and how to overcome challenges.
Article
Full-text available
Unmanned aerial vehicles (UAVs) have recently established their capacity to provide cost-effective and credible solutions for various real-world scenarios. UAVs provide an immense variety of services due to their autonomy, mobility, adaptability, and communications interoperability. Despite the expansive use of UAVs to support ground communications, data exchanges in those networks are susceptible to security threats because most communication is through radio or Wi-Fi signals, which are easy to hack. While several techniques exist to protect against cyberattacks. Recently emerging technology blockchain could be one of promising ways to enhance data security and user privacy in peer-to-peer UAV networks. Borrowing the superiorities of blockchain, multiple entities can communicate securely, decentralized, and equitably. This article comprehensively overviews privacy and security integration in blockchain-assisted UAV communication. For this goal, we present a set of fundamental analyses and critical requirements that can help build privacy and security models for blockchain and help manage and support decentralized data storage systems. The UAV communication system's security requirements and objectives, including availability, authentication, authorization, confidentiality, integrity, privacy, and non-repudiation, are thoroughly examined to provide a deeper insight. We wrap up with a discussion of open research challenges, the constraints of current UAV standards, and potential future research directions.
Chapter
People's failure to maintain a social distance is causing the COVID19 virus to spread. We have used the drone thermal images for a maximum of 10 km of coverage to detect temperature and reduce virus spread areas. The part of the work is based on utilizing disinfectant spraying drones, disinfectant testing with the guidance of doctors, setting the path planning of drones for surveying the temperature of people, and monitoring the infected place using GPS. When the thermal camera of the drone detects the temperature values using remote sensing images, the drone covers crowded places like hospitals, cinemas, and temples using remote sensing images. One drone model is designed to provide present results using thermal images. The Proposed drone can cover an affected area of up to 16,000 square meters per hour for capturing remote sensing images. It predicts affected areas using faster CNN algorithms with 2100 thermal images. Thermal mapping is used to monitor the social distance between people, alert people that a virus is spreading, and reduce the risk factor of people's movement. In this paper, remote sensing images are analysed and detect higher temperature areas using thermal mapping (Messina and Modica in Remote Sensing 12:1491, 2020).KeywordsThermal imageIoT droneRemote sensingBio-mass prediction theoremsPix4D mapper
Article
Full-text available
The use of unmanned aerial vehicles (UAVs) is growing rapidly across many civil application domains, including real-time monitoring, providing wireless coverage, remote sensing, search and rescue, delivery of goods, security and surveillance, precision agriculture, and civil infrastructure inspection. Smart UAVs are the next big revolution in the UAV technology promising to provide new opportunities in different applications, especially in civil infrastructure in terms of reduced risks and lower cost. Civil infrastructure is expected to dominate more than $45 Billion market value of UAV usage. In this paper, we present UAV civil applications and their challenges. We also discuss the current research trends and provide future insights for potential UAV uses. Furthermore, we present the key challenges for UAV civil applications, including charging challenges, collision avoidance and swarming challenges, and networking and security-related challenges. Based on our review of the recent literature, we discuss open research challenges and draw high-level insights on how these challenges might be approached.
Article
Full-text available
Blockchain technologies have recently come to the forefront of the research and industrial communities as they bring potential benefits for many industries. This is due to their practical capabilities in solving many issues currently inhibiting further advances in various industrial domains. Securely recording and sharing transactional data, establishing automated and efficient supply chain processes, and enhancing transparency across the whole value chain are some examples of these issues. Blockchain offers an effective way to tackle these issues using distributed, shared, secure, and permissioned transactional ledgers. The employment of blockchain technologies and the possibility of applying them in different situations enables many industrial applications through increased efficiency and security; enhanced traceability and transparency and reduced costs. In this paper, different industrial application domains where the use of blockchain technologies has been proposed are reviewed. The paper explores the opportunities, benefits, and challenges of incorporating blockchain in different industry applications. Furthermore, the paper attempts to identify the requirements that support the implementation of blockchain for different industry applications. The review reveals that several opportunities are available for utilizing blockchain in various industry sectors; however, there are still some challenges to be addressed to achieve better utilization of this technology.
Article
Full-text available
As an attractive business model of cloud computing, outsourcing services usually involve online payment and security issues. The mutual distrust between users and outsourcing service providers may severely impede the wide adoption of cloud computing. Nevertheless, most existing payment solutions only consider a specific type of outsourcing service and rely on a trusted third-party to realize fairness. In this paper, in order to realize secure and fair payment of outsourcing services in general without relying on any third-party, trusted or not, we introduce BCPay, a blockchain based fair payment framework for outsourcing services in cloud computing. We first present the system architecture, specifications and adversary model of BCPay, then describe in detail its design. Our security analysis indicates that BCPay achieves Soundness and what we call Robust Fairness, where the fairness is resilient to eavesdropping and malleability attacks. Furthermore, our performance evaluation shows that BCPay is very efficient in terms of the number of transactions and computation cost. As illustrative applications of BCPay, we further construct a blockchain-based provable data possession scheme in cloud computing and a blockchain-based outsourcing computation protocol in fog computing.
Preprint
Full-text available
The use of unmanned aerial vehicles (UAVs) is growing rapidly across many civil application domains including real-time monitoring, providing wireless coverage, remote sensing, search and rescue, delivery of goods, security and surveillance, precision agriculture, and civil infrastructure inspection. Smart UAVs are the next big revolution in UAV technology promising to provide new opportunities in different applications, especially in civil infrastructure in terms of reduced risks and lower cost. Civil infrastructure is expected to dominate the more that $45 Billion market value of UAV usage. In this survey, we present UAV civil applications and their challenges. We also discuss current research trends and provide future insights for potential UAV uses. Furthermore, we present the key challenges for UAV civil applications, including: charging challenges, collision avoidance and swarming challenges, and networking and security related challenges. Based on our review of the recent literature, we discuss open research challenges and draw high-level insights on how these challenges might be approached.
Article
Full-text available
Internet of Things (IoT) technology provides a competent and structured approach to handle service deliverance aspects of healthcare in terms of mobile health and remote patient monitoring. IoT generates an unprecedented amount of data that can be processed using cloud computing. But for real-time remote health monitoring applications, the delay caused by transferring data to the cloud and back to the application is unacceptable. Relative to this context, we proposed the remote patient health monitoring in smart homes by using the concept of fog computing at the smart gateway. The proposed model uses advanced techniques and services such as embedded data mining, distributed storage, and notification services at the edge of the network. Event triggering based data transmission methodology is adopted to process the patient’s real-time data at Fog Layer. Temporal mining concept is used to analyze the events adversity by calculating the temporal health index (THI) of the patient. In order to determine the validity of the system, health data of 67 patients in IoT based smart home environment was systematically generated for 30 days. Results depict that the proposed BBN classifier based model has high accuracy and response time in determining the state of an event when compared with other classification algorithms. Moreover, decision making based on real-time healthcare data further enhances the utility of the proposed system.
Article
Full-text available
Current developments in ICTs such as in Internet-of-Things (IoT) and Cyber-Physical Systems (CPS) allow us to develop healthcare solutions with more intelligent and prediction capabilities both for daily life (home/office) and in-hospitals. In most of IoT-based healthcare systems, especially at smart homes or hospitals, a bridging point (i.e., gateway) is needed between sensor infrastructure network and the Internet. The gateway at the edge of the network often just performs basic functions such as translating between the protocols used in the Internet and sensor networks. These gateways have beneficial knowledge and constructive control over both the sensor network and the data to be transmitted through the Internet. In this paper, we exploit the strategic position of such gateways at the edge of the network to offer several higher-level services such as local storage, real-time local data processing, embedded data mining, etc., presenting thus a Smart e-Health Gateway. We then propose to exploit the concept of Fog Computing in Healthcare IoT systems by forming a Geo-distributed intermediary layer of intelligence between sensor nodes and Cloud. By taking responsibility for handling some burdens of the sensor network and a remote healthcare center, our Fog-assisted system architecture can cope with many challenges in ubiquitous healthcare systems such as mobility, energy efficiency, scalability, and reliability issues. A successful implementation of Smart e-Health Gateways can enable massive deployment of ubiquitous health monitoring systems especially in clinical environments. We also present a prototype of a Smart e-Health Gateway called UT-GATE where some of the discussed higher-level features have been implemented. We also implement an IoT-based Early Warning Score (EWS) health monitoring to practically show the efficiency and relevance of our system on addressing a medical case study. Our proof-of-concept design demonstrates an IoT-based health monitoring system with enhanced overall system intelligence, energy efficiency, mobility, performance, interoperability, security, and reliability.
Article
Full-text available
Internet of Things (IoT) is an evolving architecture which connects multiple devices to Internet for communication or receiving updates from a cloud or a server. In future, the number of these connected devices will increase immensely making them an indistinguishable part of our daily lives. Although these devices make our lives more comfortable, they also put our personal information at risk. Therefore, security of these devices is also a major concern today. In this paper, we propose an ultra-lightweight mutual authentication protocol which uses only bitwise operation and thus is very efficient in terms of storage and communication cost. In addition, the computation overhead is very low. We have also compared our proposed work with the existing ones which verifies the strength of our protocol, as obtained results are promising. A brief cryptanalysis of our protocol that ensures untraceability is also presented.
Article
Millimeter-wave (mmWave) communication with multi-gigahertz bandwidth availability enables much higher capacity and transmission rate than conventional microwave communications. However, mmWave signals suffer from propagation-related shortcomings. The flexibility of UAV communication can compensate most of the deficiencies of mmWave signals, preserve its advantages, and provide more opportunities. In this article, we present the current state of the art, research opportunities, and challenges for UAV mmWave communication. We present channel characteristics and show its modeling issues. We further analyze how to achieve UAV mmWave channel acquisition and precoder design. Moreover, we discuss the challenges and possible solutions for UAV mmWave cellular networks, including UAV-to-base-station and UAV-to-user communications and spectrum sharing.
Article
Unmanned Aerial Vehicles (UAVs) have great potential to revolutionize the future of automotive, energy, and healthcare sectors by working as wireless relays to improve connectivity with ground networks. They are able to collect and process real-time information by connecting existing network infrastructures including Internet of Medical Things (e.g., Body Area Networks (BANs)) and Internet of Vehicles with clouds or remote servers. In this article, we advocate and promote the notion of employing UAVs as data collectors. To demonstrate practicality of the idea, we propose a UAV-based architecture to communicate with BANs in a reliable and power-efficient manner. The proposed architecture adopts the concept of wakeup-radio based communication between a UAV and multiple BANs. We analyze the performance of the proposed protocol in terms of throughput and delay by allocating different priorities to the hubs or gateways. The proposed architecture may be useful in remote or disaster areas, where BANs have poor or no access to conventional wireless communication infrastructure, and may even assist vehicular networks by monitoring driver's physiological conditions through BANs. We further highlight open research issues and challenges that are important for developing efficient protocols for UAV-based data collection in smart healthcare systems.
Article
Unmanned aerial vehicles (UAVs) can be deployed efficiently to provide high quality of service for Internet of Things (IoT). By using cooperative communication and relay technologies, a large swarm of UAVs can enlarge the effective coverage area of IoT services via multiple relay nodes. However, the low latency service requirement and the dynamic topology of UAV network bring in new challenges for the effective routing optimization among UAVs. In this paper, a layered UAV swarm network architecture is proposed and an optimal number of UAVs is analyzed. Furthermore, a low latency routing algorithm (LLRA) is designed based on the partial location information and the connectivity of the network architecture. Finally, the performance of the proposed LLRA is verified by numerical results, which can decrease the link average delay and improve the packet delivery ratio in contrast to traditional routing algorithms without layered architecture.
Article
Pervasive healthcare services with smart decision making capability and ubiquitous communication technologies can forge future smart communities. Real-time health surveillance for early detection of life-threatening diseases through advanced sensing and communication technology can provide better treatment, reduce medical expenses and save lives of community residents (i.e., patients). However, the assurance of data privacy is the prime concern for such smart health technologies. This research aims to describe a privacy-preserving cloud-based system for real-time health surveillance through change detection of multiple vital health signs of smart community members. Vital signs data generated from IoT-enabled wearable devices are processed in real-time in a cloud environment. This article focuses on the development of a predictive model for the smart community considering the sensitivity of data processing in a third-party environment (e.g., cloud computing). We developed a vital sign change detection system using Holt's linear trend method (to enable prediction of data with trends) where fully homomorphic encryption is adapted to perform computations on an encrypted domain that can ensure data privacy. Moreover, to reduce the overhead of the fully homomorphic encryption method over large medical data we introduced a parallel approach for encrypted computations using a MapReduce algorithm of Apache Hadoop. We demonstrated the proposed model by evaluating some case studies for different vital signs of patients. The accuracy and efficiency of the implementation demonstrate the effectiveness of the proposed model for building a smart community.
Book
This is a monumental reference for the theory and practice of computer security. Comprehensive in scope, this text covers applied and practical elements, theory, and the reasons for the design of applications and security techniques. It covers both the management and the engineering issues of computer security. It provides excellent examples of ideas and mechanisms that demonstrate how disparate techniques and principles are combined in widely-used systems. This book is acclaimed for its scope, clear and lucid writing, and its combination of formal and theoretical aspects with real systems, technologies, techniques, and policies.
Article
The unmanned aerial vehicle (UAV) is a promising enabler of the Internet of Things (IoT) vision, due to its agile maneuverability. In this paper, we explore the potential gain of UAV-aided data collection in a generalized IoT scenario. Particularly, a composite channel model including both large-scale and small-scale fading is used to depict typical propagation environments. Moreover, rigorous energy constraints are considered to characterize IoT devices as practically as possible. A multi-antenna UAV is employed, which can communicate with a cluster of single-antenna IoT devices to form a virtual MIMO link. We formulate a whole-trajectory-oriented optimization problem, where the transmission duration and the transmit power of all devices are jointly designed to maximize the data collection efficiency for the whole flight. Different from previous studies, only the slowly-varying large-scale channel state information (CSI) is assumed available, to coincide with the fact that practically it is quite difficult to predictively acquire the random small-scale channel fading prior to the UAV flight. We propose an iterative scheme to overcome the non-convexity of the formulated problem. The presented scheme can provide a significant performance gain over traditional schemes and converges quickly.
Article
Understanding of any computing environment requires familiarity with its underlying technologies. Internet of Things (IoT), being a new era of computing in the digital world, aims for the development of large number of smart devices that would support a variety of applications and services. These devices are resource‐constrained, and the services they would provide are going to impose specific requirements, among which security is the most prominent one. Therefore, in order to comprehend and conform these requirements, there is a need to illuminate the underlying architecture of IoT and its associated elements. This comprehensive survey focuses on the security architecture of IoT and provides a detailed taxonomy of major challenges associated with the field and the key technologies, including Radio Frequency Identification (RFID) and Wireless Sensor Networks (WSN), that are enabling factors in the development of IoT. The paper also discusses some of the protocols suitable for IoT infrastructure and open source tools and platforms for its development. Finally, a brief outline of major open issues, along with their potential solutions and future research directions, is given.
Article
Mobile Cloud Computing is a new technology which refers to an infrastructure where both data storage and data processing operate outside of the mobile device. Another recent technology is Internet of Things. Internet of Things is a new technology which is growing rapidly in the field of telecommunications. More specifically, IoT related with wireless telecommunications. The main goal of the interaction and cooperation between things and objects which sent through the wireless networks is to fulfill the objective set to them as a combined entity. In addition, there is a rapid development of both technologies, Cloud Computing and Internet of Things, regard the field of wireless communications. In this paper, we present a survey of IoT and Cloud Computing with a focus on the security issues of both technologies. Specifically, we combine the two aforementioned technologies (i.e Cloud Computing and IoT) in order to examine the common features, and in order to discover the benefits of their integration. Concluding, we present the contribution of Cloud Computing to the IoT technology. Thus, it shows how the Cloud Computing technology improves the function of the IoT. Finally, we survey the security challenges of the integration of IoT and Cloud Computing.
Book
Internet usage has become a facet of everyday life, especially as more technological advances have made it easier to connect to the web from virtually anywhere in the developed world. However, with this increased usage comes heightened threats to security within digital environments. The Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security identifies emergent research and techniques being utilized in the field of cryptology and cyber threat prevention. Featuring theoretical perspectives, best practices, and future research directions, this handbook of research is a vital resource for professionals, researchers, faculty members, scientists, graduate students, scholars, and software developers interested in threat identification and prevention.
Real-time secure health surveillance for smarter health communities
  • A Alabdulatif
  • I Khalil
  • Arm Forkan
  • M Atiquzzaman
Alabdulatif A, Khalil I, Forkan ARM, Atiquzzaman M. Real-time secure health surveillance for smarter health communities. IEEE Commun Mag 2019;57(1):122-9. doi: 10.1109/MCOM.2017.1700547.