Article

A Blockchain-Based Secure Healthcare Scheme with the Assistance of Unmanned Aerial Vehicle in Internet of Things

Authors:
To read the full-text of this research, you can request a copy directly from the authors.

Abstract

This paper introduces a blockchain-based secure healthcare scheme in which health data (HD) are collected from users via an unmanned aerial vehicle (UAV) and stored on the nearest server. In the proposed scheme, a UAV first establishes a relation with body sensor hives (BSHs) via a token and then shares a shared key with BSHs to enable low-power secure communication. After retrieving the HD, the UAV decrypts the encrypted HD (encrypted by a BSH) using the shared key and exercises a two-phase authentication mechanism. Upon successful validation, the UAV transmits the HD to the nearest server to store it securely in blockchain. A security analysis is discussed to show the feasibility of the proposed secure healthcare scheme. Finally, the performance of the proposed scheme is investigated through simulation and implementation. The security and the performance analysis demonstrate that the proposed scheme supports better assistance to BSHs while maintaining security.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the authors.

... 14 34 The scheme proposed will first collect the data on patient health by aerial vehicle and store it on the server and provide secure communication by encryption and decryption using blockchain technology. ...
... It is a cryptocurrency that is native and employs the use of smart contracts. Previous studies 21,22,[26][27][28][29][30][31]33,34,37,38,43,45,49,55,57,58,[60][61][62][63]67,73,[75][76][77][78] used the Ethereum platform to implement blockchain technology to the proposed approach aspect. ...
... Jayaraman et al. 27 and Indumathi et al. 33 have mentioned in their proposed work that medical sensors will be incorporated to perform their research study. IoT body sensors, 34 IoT wireless sensors, 41,68 IoT fitness sensors, 48 and IoT sensors 46,55,57,75 were used to incorporate the IoT technology in approaches to integrate the IoT and blockchain technology in healthcare domain. Rahman et al. 22 use gesturetracking sensors like Kinect2, Leap Motion, and Myo sensors to contribute to the field of blockchain and IoT technology research work. ...
Article
Full-text available
Healthcare is a vitally important field in the industry and evolving day by day in the aspect of technology, services, computing, and management. Its potential significance can be increased by incorporating Internet of Things (IoT) technology to make it smart in the aspect of automating activities, which is then further reformed in the healthcare domain with the help of blockchain technology. Blockchain technology provides many features to IoT‐based healthcare domain applications such as restructuring by securing traditional practices, data management, data sharing, patient remote monitoring, and drug analysis. In this study, a systematic literature review has been carried out in which a total of 52 studies were selected to conduct systematic literature review from databases PubMed, IEEE Access, and Scopus; the study includes IoT technology and blockchain integration in healthcare domain‐related application areas. This study also includes taxonomy that mentions the aspects and areas in healthcare domain incorporating the traditional system with the integration of IoT and blockchain to provide transparency, security, privacy, and immutability. This study also includes the incorporation of related sensors, platforms of blockchain, the objective focus of selected studies, and future directions by incorporating IoT and blockchain in healthcare domain. This study will help researchers who want to work with IoT and blockchain technology integration in healthcare domain.
... A smart contract represents a computer program, which computerizes in blockchain by managing information based on the logic presented in the contract. Blockchain aids potential functionalities, like protected communication, distributed computing, and data integrity that can be highly helpful in alleviating the aforesaid security problems regarding data integrity and cyberattacks [22]. Blockchain presents a free as well as an autonomous system, recommending that every hub in the structure of Blockchain shows its ability to alter the traditional manner of exploiting applications to share e-health and biomedical data [23,24]. ...
... However, it failed to carry out an automatic data-sharing process. Anik Islam and Soo Young Shin [22] introduced a blockchain-based secure healthcare model in which Health Data (HD) were gathered from users through a UAV and saved on the adjacent server. Initially, an Unmanned Aerial Vehicle (UAV) set up an association with BSHs through a token. ...
... Rr indicates the rider. Substitute (22) in (19) x age m (t + 1) = V age m (t + 1) ...
Article
Currently, healthcare services are encountering challenges, particularly in developing countries wherein remote areas encounter a lack of highly developed hospitals and doctors. IoT devices produce enormous security-sensitive data; therefore, device security is considered an important concept. The main aim of this work is to formulate a secure key generation process in the data-sharing approach by exploiting the Rider Horse Herd Optimization Algorithm (RHHO). Here, eight phases, like the initialization phase, registration phase, key generation phase, login phase, data protection phase, authentication phase, verification phase, and data decryption phase are exploited for secure and efficient authentication and multimedia data sharing. The proposed RHHO model is the integration of the Rider Optimization Algorithm (ROA) and Horse herd Optimization Algorithm (HOA). The proposed RHHO model achieved enhanced performance with a computation cost of 0.235, an accuracy of 0.935and memory usage of 2.425 MB.
... Internet of things (IoT) [1,2] has a collection of network devices that are interconnected via near-field communication (NFC), Bluetooth, and Wi-Fi connections [3]. The IoT devices are widely utilized in smart appliances (thermostats, refrigerators, etc.), security systems, health care, computer peripherals, military, agriculture, etc. [4][5][6]. ...
... Element wise matrix defined in . 1 and . 2 . Based on the above discussion, the objective of the work is achieved that is, reliable and minimum computation complexity is achieved while detecting threats in IoT. ...
... Intelligent intrusion detection system in the Internet of Things (IoT)This study's main objective is to detect threat and intrusion activities from the data traffic presented in the network and host reliably. The goal is achieved according to eqn(1), that is, the output of convolution layer feature map O ...
Article
Full-text available
Internet of Things (IoT) played a crucial role in various sectors such as automobiles and the logistic tracking medical field because it consists of distributed nodes, servers, and software for effective communication. Although, this IoT paradigm suffered from intrusion threats and attacks that cause security and privacy issues. Existing intrusion detection techniques fail to maintain reliability against the attacks. Therefore, in this work, IoT intrusion threat has been analyzed by using the sparse convolute network to contest the threats and attacks. The network is trained using sets of intrusion data, characteristics, and suspicious activities, which helps identify and track the attacks, mainly Distributed Denial of Service (DDoS) attacks. Along with this, the network is optimized using evolutionary techniques that identify and detect the regular, error, and intrusion attempts under different conditions. The sparse network forms the complex hypotheses evaluated using neurons, and the obtained event stream outputs are propagated to further hidden layer processes. This process minimizes the intrusion involvement in IoT data transmission. The effective utilization of training patterns in the network classifies the standard and threat patterns successfully. Then the effectiveness of the system is evaluated using experimental results and discussion.
... Security vulnerability and eavesdropping [35] , [36] , [37] Security realization by Blockchain [38] , [39] , [40] Secure trajectory and secure communication link [41] , [10] Authentication and privacy approaches [42] , [43] , [8] , [44] Security-enhanced resource allocation that when UAVs aid base stations in conveying information to the relevant IoT nodes, significant increases in channel secrecy rates may be achieved. Wang et al. [37] developed a noise-aided security data transmission system in UAV-assisted IoT and integrated it into Wireless Power Transfer (WPT). ...
... The GSSs were formed into transactions and Ripple Protocol Consensus Algorithm (RPCA) was utilized to make those transactions into blocks. Islam et al. [40] proposed a secure scheme for reducing the power transmission and improving connectivity. In the proposed scheme, a UAV communicates with body sensor hives (BSHs) via a token and for securing this communication, shares a key with BSHs. ...
... AVISPA and Simulation [40] Introducing a secure healthcare scheme based on Blockchain (termed as BHEALTH) ...
Article
Today, with the growth of the Internet of Things (IoT), Unmanned Aerial Vehicles (UAVs) can play a significant role in terms of stability, reliability, connectivity, and coverage. The integration of UAVs and IoT led to the Internet of Flying Things (IoFT). Internet of drones (IoD) is an infrastructure that provides access and control over the Internet between users and drones. One of the most critical challenges in IoFT and IoD is security. In this article, a systematic review is proposed to analyze the existing literature in the field of IoFT and IoD security. We explain the research methodology including the article selection process and the search queries. Thirteen articles were selected out of 166 articles that were published between 2019 and September 2021. Furthermore, the security approaches in the selected articles are classified into five main categories: security vulnerability and eavesdropping, security realization by Blockchain, secure trajectory and secure communication link, authentication and privacy approaches, and security‐enhanced resource allocation. The main ideas, advantages, disadvantages, the employed tools, and evaluation parameters of each selected article are also discussed in detail. Finally, we point out the open issues and orientations of future researches.
... To bridge this gap, a blockchain-based secure data sharing framework needs to be designed. Researchers from both industry and academia proposed several data sharing frameworks for SDNs [4][5][6][7][8][9]. However, there are several limitations in those proposed systems such as follows: (i) Scalability-Most of the frameworks are designed to share data only within the organization or a certain location and thus, are not scalable beyond the boundary [5,8]; (ii) Access control-Most of the solutions focus on authenticity, confidentiality and integrity of the systems [4][5][6] whereas permitting or restricting access to the information (authorization) based on the type of users and their roles is also critical for secure data communication; (iii) Application specific-The frameworks are designed either to defend against particular attacks [5,9] or to facilitate data sharing for a particular group of entities (e.g. ...
... Researchers from both industry and academia proposed several data sharing frameworks for SDNs [4][5][6][7][8][9]. However, there are several limitations in those proposed systems such as follows: (i) Scalability-Most of the frameworks are designed to share data only within the organization or a certain location and thus, are not scalable beyond the boundary [5,8]; (ii) Access control-Most of the solutions focus on authenticity, confidentiality and integrity of the systems [4][5][6] whereas permitting or restricting access to the information (authorization) based on the type of users and their roles is also critical for secure data communication; (iii) Application specific-The frameworks are designed either to defend against particular attacks [5,9] or to facilitate data sharing for a particular group of entities (e.g. researchers) [7] and thus, failed to a provide a holistic solution for data sharing among different entities such as patients, health professionals, researchers and health insurers; (iv) Formal Security Analysis-Most of the papers provide an informal security analysis [6,8], however, it is important to formally analyze the protocols to discover flaws that failed to be detected by informal approaches. ...
... However, there are several limitations in those proposed systems such as follows: (i) Scalability-Most of the frameworks are designed to share data only within the organization or a certain location and thus, are not scalable beyond the boundary [5,8]; (ii) Access control-Most of the solutions focus on authenticity, confidentiality and integrity of the systems [4][5][6] whereas permitting or restricting access to the information (authorization) based on the type of users and their roles is also critical for secure data communication; (iii) Application specific-The frameworks are designed either to defend against particular attacks [5,9] or to facilitate data sharing for a particular group of entities (e.g. researchers) [7] and thus, failed to a provide a holistic solution for data sharing among different entities such as patients, health professionals, researchers and health insurers; (iv) Formal Security Analysis-Most of the papers provide an informal security analysis [6,8], however, it is important to formally analyze the protocols to discover flaws that failed to be detected by informal approaches. ...
Article
In the past few years, blockchain has proven its necessity and unprecedented prospects in providing a secure environment for information exchange between two parties. The integration of the Internet of Things (IoT) with blockchain has enabled a digital transformation in many areas such as healthcare, supply chain, and financial services. Like blockchain, the programmable Software-Defined Network (SDN) is also achieving popularity due to its ability to reduce network management complexity. It is evident that incorporating SDNs with IoT-based healthcare systems can significantly improve healthcare management services. However, there are a number of challenges such as data confidentiality, user-centric design, integrity and privacy that makes it difficult to share sensitive information among different parties in a healthcare system. To overcome these challenges, we propose an architectural framework that incorporates blockchain with Software-Defined Wireless Body Area Networks (SDWBANs) to facilitate secure data sharing. We have also designed and integrated a smart contract based fine-grained access control policy to ensure that only data owners will have full control over their health data. The experimental outcomes show that the proposed model achieves good throughput and incurs a very low overhead in terms of latency compared to traditional cloud-based systems.
... For example, hybrid applications, such as [34] and [35] manage risk analysis and notifying solutions at the server side, which are prone to data leakage and are still suffering from high communication costs and high volume of the message exchange. There are other CT platforms developed by integration of blockchain and specified IoT networks such as Internet of Drones (IoDs) [36] to provide different services in healthcare [37] and for pandemic control [38]. In particular, Islam et al. [38] proposed a blockchain-enabled solution, which is an integration of IoT, artificial intelligence (AI), and blockchain, leveraging IoDs to automate a supervision scheme to monitor the crises. ...
... Almost all smartphones are now equipped with this technology, making BLE an ideal communication medium for providing different IoT-based services, such as indoor localization and CT. BLE spectrum has 40 frequency channels with 2-MHz channel spacing, 37 (0-36) of which are for data transmission, and three (37)(38)(39) are considered the advertising channels where frequency hopping is employed to diminish the interference effects. Communicationwise, BLE introduces two communication modes: 1) nonconnectable advertising and 2) connectable advertising [63]. ...
Article
Recently, as a consequence of the coronavirus disease (COVID-19) pandemic, dependence on contact tracing (CT) models has significantly increased to prevent the spread of this highly contagious virus and be prepared for the potential future ones. Since the spreading probability of the novel coronavirus in indoor environments is much higher than that of the outdoors , there is an urgent and unmet quest to develop/design efficient, autonomous, trustworthy, and secure indoor CT solutions. Despite such an urgency, this field is still in its infancy. This article addresses this gap and proposes the trustworthy blockchain-enabled system for an indoor CT (TB-ICT) framework. The TB-ICT framework is proposed to protect privacy and integrity of the underlying CT data from unauthorized access. More specifically, it is a fully distributed and innovative blockchain platform exploiting the proposed dynamic Proof-of-Work (dPoW) credit-based consensus algorithm coupled with randomized hash window (W-Hash) and dynamic Proof-of-Credit (dPoC) mechanisms to differentiate between honest and dishonest nodes. The TB-ICT not only provides a decentralization in data replication but also quantifies the node's behavior based on its underlying credit-based mechanism. For achieving a high local-ization performance, we capitalize on the availability of Internet of Things (IoT) indoor localization infrastructures, and develop a data-driven localization model based on bluetooth low-energy (BLE) sensor measurements. The simulation results show that the proposed TB-ICT prevents the COVID-19 from spreading by the implementation of a highly accurate CT model while improving the users' privacy and security. Index Terms-Blockchain, bluetooth low energy (BLE), contact tracing (CT), indoor localization.
... Furthermore, performance was evaluated in terms of processing time, expected transmission of data, validation time, and energy consumption using MAT-LAB and python. In line with that, in 2020, Islam et al. [232] proposed a BC-based secure healthcare scheme called BHEALTH in which health data is collected using UAVs. Uses consortium BC Ethereum BC platform with proof of authority (PoA) consensus algorithm, and time division multiple access (TDMA) protocols for communication. ...
... Islam et al. [232] Proposed a UAV-assisted healthcare scheme that collects health data from users through UAV. ...
Article
Full-text available
In recent times, IoT has emerged as a new paradigm for the interconnection of heterogeneous, resource-constrained, and communication-capable smart devices. It has been anticipated as a key enabler for various domains of applications such as health care, automotive, agriculture, industrial operations, automation , energy, and the next generation of living. However, the current IoT applications face significant challenges in terms of the huge amount of collected data, intensive data exchange, security, privacy, centralized processing, and interoperability. To mitigate many of these issues, blockchain has been identified as a promising innovative technology. Blockchain, in conjunction with smart contracts, has received significant attention both from the industry and academia and offers features such as irreversibility, non-repudiation, proof of provenance, fault tolerance, pseudonymity, decentralized operations and decision-making, and distributed ledger. The integration of blockchain with IoT requires essential insights concerning the application areas, scalability, security, privacy, data college and storage, performance, and governance. Thus, this paper intends to expound on the opportunities and key aspects of using blockchain in the IoT landscape. Specifically, this paper surveys the utilization of blockchain for various IoT applications. Besides, the paper distinguishes different technical aspects and presents the associated research challenges. At last, future research directions are discussed depending on the lessons learned.
... The authors in [81] introduced a new blockchain-based secure healthcare scheme in which HD are collected from users via UAVs. In the presented scheme, the UAV shares a generated key with body sensor hives (BSHs) to provide low-power secure communication. ...
... Other studies [45,48,60,62,66,69,70] add the collected data by drones in the distributed ledger, while in [54,58,59], the big data analytic is required to classify the collected data before the creation of the block. Some research articles [68,80,81,83] store personal data such as health and biometric data in the public/consortium blockchain. On the other hand, the exchanged and shared messages among drones and other entities in [47,50,51,53,57,63] are recorded in the decentralized blockchain. ...
Article
Internet of Drones (IoD) plays a crucial role in the future Internet of Things due to its important features such as low cost, high flexibility, and mobility. The number of IoD applications is drastically increasing from military to civilian fields. Nevertheless, drones are resource-constrained and highly vulnerable to several security threats and attacks. The use of blockchain technology for securing IoD networks has gained growing attention. To this end, this paper presents a systematic literature review to analyze the current research area regarding the security of IoD environments using the emerging blockchain technology. Forty relevant studies were selected from 129 published articles to answer the identified research questions. The selected studies were classified into three main classes based on blockchain type. Furthermore, a comparison of the reviewed articles in terms of different factors is provided. The research findings show that the blockchain can guarantee fundamental security requirements such as authentication, privacy-preserving, confidentiality, integrity, and access control. Finally, open issues and challenges related to the combination of blockchain and IoD technologies are discussed.
... Additionally, a fascinating smart city use case [41] by Islam and Shin examines Unmanned Aerial Vehicles (UAV) to facilitate data collection and communication with remote areas in the front-end of a blockchain system, focusing on healthcare. At the same time, Abualsauod [19] also theoretically considers using UAVs and integrating with blockchain. ...
Article
The Internet of Things (IoT) has demonstrated promising growth, as it is crucial to numerous application domains in smart ecosystems, such as the smart city. Decentralization can help achieve growth, with previous research proposing the use of decentralized blockchain technology in IoT ecosystems as, among others, it can offer cryptographically trustworthy interactions, non-repudiable smart contracts, and interoperability between stakeholders. However, proposals are often theoretical or very specific to IoT ecosystem sub-areas, for instance, healthcare. In both cases, implementation may not be feasible in a larger ecosystem. This paper investigates the performance, particularly throughput, aspect of feasibility. It proposes and demonstrates a platform that uses blockchain technology as a building block in an IoT ecosystem. A permissioned blockchain network is built, performance is measured, and the measurements are interpreted in a smart city context, thus providing valuable insights about real-world implementations and their degree of feasibility.
... The stakeholders responsible for the whole cultivation can themselves verify whether the distribution and management are on track or not. b) Decentralized: Since the network is decentralized, there is no central authority [27]. Since there is no need for a regulatory authority, anyone involved in the process can access the system directly from the web and access the data. ...
Article
Full-text available
Due to the warm and humid environment of Bangladesh, it is highly exposed to occurring perpetuation of various viruses which cause diseases in crops. A huge number of crops are wasted because of these occurring diseases and it directly hurts the production rate and forces import of crops in bulkier amount. Unmanned aerial vehicle usage is one of the smart agriculture technologies being researched for agricultural applications (UAVs) in these days. UAV technology allows farmers to quickly gather information on field conditions by providing overhead images of their agricultural fields or even allowing them to zoom in on a particular area. Using UAV technology, farmers may identify specific areas that need immediate attention and perform the necessary agricultural improvements. Drones collect data that farmers can use to detect crop disease by applying deep learning algorithms to make long-term decisions about planting, land mapping, damage control, and other things. This research uses blockchain technology to establish connection between suppliers and customers by enabling information to be tracked throughout the supply chain and enhances food supply chain safety. It offers a secure method of broadcasting data, focusing on enhancement of supply chain management and prediction of crops which makes it possible to implement and deploy data-driven technologies for smart farming. The research uses UAVs as a means of collecting crop images, implements a prediction model using AlexNet CNN and analyses how it performs with a real Bangladeshi crop disease dataset to help farmers from excessive crop damage. Furthermore, the overall process is carried out using the Blockchain technology to enhance the existing supply chain management process.
... That is, it refers to a technology that connects various objects through wireless communication [1]. Recently, IoT technology has provided great advantages in various fields, such as agriculture [2][3][4][5], medical care [6][7][8][9], smart grids [10,11], and smart homes [12][13][14]. Experts predict that by 2020, about 30 billion IoT devices will be connected to the internet [15]. ...
Article
Full-text available
This paper proposes a blockchain-based firmware update method using unmanned aerial vehicles (UAVs) to solve one of the security issues arising in the Internet of Things (IoT) environment, which is the firmware security problem. It has high scalability and transaction speed using private blockchains and solves the limitations of internet connections by updating the firmware using a UAV. The proposed firmware update system safely manages the IoT device and firmware information through four processes: participant registration, firmware registration/update, firmware update request, and firmware update. The verification of IoT devices and UAVs is performed using the IoT device's public key and Bloom Filter, and firmware updates can be safely performed using public-key encryption communication. To prove the security of the proposed method, a security analysis based on the STRIDE model was conducted, and the performance of the blockchain network was analyzed by simulation on the top of Hyperledger.
... Ali et al. [27] adopted the certificateless public key signature (CLS) technology to provide conditional privacy protection for vehicle-to-infrastructure (V2I), and used the blockchain to store the valid pseudonym and the revoked pseudonym on PID-BC and RPID-BC, respectively, so as to realize the revocation transparency of pseudonym. Islam et al. [28] designed a blockchainbased secure health scheme, the UAV performed mutual authentication with the sensor to obtain a communication token, and then assisted the sensor to transmit the health data to the nearest server. The server stored the health data in the blockchain to realize secure sharing. ...
... To address this problem, recent studies have proposed edge computing (EC) solutions [32]. Instead of centralized data processing on the cloud, information is handled at the edge of networks [33]. As a result, it reduces response time, energy consumption, computing cost, and overall performance and realizes real-time applications. ...
... However, the challenges are such technologies are centralized computation, processing, and storage as there is a possibility of data manipulation, mistrust, privacy delusion, and failure at a single point. The other important challenge in electronic and all-pervasive healthcare is protecting the security of all internet-enabled equipment (Islam and Young Shin, 2020). Integrating blockchain with healthcare yields decentralization in computation, storage, and improved security. ...
... Since blockchain is not suitable for massive storage such in the case of IoT-based eHealth applications and introduces extra delay. The authors of references [6] and [7] introduced edge devices (smart phones and Unmanned Aerial Vehicles (UAV)) to preprocess collected data from IoT sensors in real-time. In the case of emergencies, the nearest concerned caregiver is alerted. ...
Article
Full-text available
Internet of things and smart medical applications are deeply changing the way healthcare is delivered worldwide. A typical Internet of Things (IoT)‐based eHealth system includes medical sensors for data collection, access network to transmit data, and Cloud servers for data processing and storage. Machine learning/deep learning (ML/DL) have proven to be a powerful tool for data classification, disease prognosis, and diagnosis and even medication prescription. ML/DL models need a large amount of data and significant computational and storage capacities especially for the training phase. Deploying ML/DL algorithms in the Cloud can be effectively done due to the processing and storage power of Cloud data centers. However, it raises many issues related to the availability, latency, energy consumption, bandwidth, security, and privacy. Recently, there is a growing interest to run as much processing as possible nearer the data sources, in the Edge, to compensate the Cloud‐based solutions limitations. In this paper, we propose to investigate the benefits of using IoT, ML/DL, and Edge Computing to enhance healthcare applications. Then, we are going to review the main approaches and trends for executing ML/DL in the Edge, to give their benefits and limitations, and draw finally conclusions about existing research issues.
... In [19], the authors proposed a data collection scheme by using blockchain where the UAVs' nodes securely collected the data related to healthcare. The collected data was related to the health of the users. ...
Article
Full-text available
New technologies and communication standards have changed traditional network processes. Internet of Things (IoT) is one of the emerging technologies where devices are connected to facilitate the users. When the networks are more congested due to a large number of users then the existing routing protocol and communication channels suffer from congestion, disconnection, overhead, and packet drop issues. Unmanned Aerial Vehicles (UAVs) are adopted to support the ground networks for more feasible data communication. These networks provide coverage facilities to IoT networks and provide smooth data dissemination services. Through the use of relay and cooperative communication technologies, UAVs could enlarge the communication space for IoT networks. Traditional network routing protocols have been adopted for data communication in these networks. However, the adopted protocols are not able to handle mobility and uncertain network conditions. This paper proposes a Decision-based Routing for Unmanned Aerial Vehicles and Internet of Things (DR-UAVIoT) network. The proposed protocol is useful for UAV-to-IoT and UAV-to-UAV data communication. The performance of the proposed solution is evaluated with the existing protocols in terms of data delivery, delay, and network overhead. The experimental results indicate the better performance of the proposed protocol in terms of less delay, less overhead, and better data delivery ratio as compared with existing routing protocols.
... Moreover, lightweight network access architectures are more efficient through security research and device optimization. In 2020, Islam and Shin [5] un-crewed aerial vehicles and the nearest storage portal were used to providing consumers with health data (HD) in a blockchain-based, secure healthcare system (UAV). The UAV initially created a partnership with the body sensor hives (BSH) using a token and a transfer key for small-power, safe communication. ...
Article
Full-text available
Preserving privacy and security plays a key role in allowing each component in the healthcare system to access control and gain privileges for services and resources. Over recent years, there have been several role-based access control and authentication schemes, but we noticed some drawbacks in target schemes such as failing to resist well-known attacks, leaking privacy-related information, and operational cost. To defeat the weakness, this paper proposes a secure electronic healthcare record scheme based on Schnorr Signcryption, crypto hash function, and Distributed Global Database (DGDB) for the healthcare system. Based on security theories and the Canetti-Krawczyk model (CK), we notice that the proposed scheme has suitable matrices such as scalability, privacy preservation, and mutual authentication. Furthermore, findings from comparisons with comparable schemes reveal that the suggested approach provides greater privacy and security characteristics than the other schemes and has enough efficiency in computational and communicational aspects.
... Since blockchain is not suitable for massive storage such in the case of IoT-based eHealth applications and introduces extra delay. The authors of references [6] and [7] introduced edge devices (smart phones and Unmanned Aerial Vehicles (UAV)) to preprocess collected data from IoT sensors in real-time. In the case of emergencies, the nearest concerned caregiver is alerted. ...
... The first process involves the derivation of weight attributes using an analytical hierarchical process, and the second process involves the evaluation of security criteria using TOPSIS methodology. Islam et al. in [284] improved the security in IoHT by using the mechanism of blockchain. The health data is attained by the users through the unmanned ariel vehicle (UAV) such that the data is stored at the nearest server. ...
... The article [130] does a comparison between 11 Computational and Mathematical Methods in Medicine the traditional EHR systems using client-server architecture and the blockchain enabled systems. The authors of paper [131] propose a secure healthcare scheme using a blockchain technology where health data is collected from users using unmanned aerial vehicle (UAV). The data is then stored in the nearest server [132], discusses the blockchain applications in the radiology field. ...
Article
Full-text available
Deployment of secured healthcare information is a major challenge in a web-based environment. eHealth services are subjected to same security threats as other services. The purpose of blockchain is to provide a structure and security to the organization data. Healthcare data deals with confidential information. The medical records can be well organized and empower their propagation in a secured manner through the usage of blockchain technology. The study throws light on providing security of health services through blockchain technology. The authors have analyzed the various aspects of role of blockchain in healthcare through an extensive literature review. The application of blockchain in COVID-19 has also been analyzed and discussed in the study. Further application of blockchain in Indian healthcare has been highlighted in the paper. The study provides suggestions for strengthening the healthcare system by blending machine learning, artificial intelligence, big data, and IoT with blockchain.
... Those arrangements expected that the information expected for preparing could be acquired safely from different information suppliers to characterize and examine. Issues of proprietorship and information trustworthiness were centered around inconsequentially [9]. Nonetheless, arrangements are invalid because of expected assaults, for most cases, as a general rule. ...
Article
Nowadays, the internet of things (IoT) has become increasingly common and finds application in various fields, particularly in the health care industry. However, the development and design of IoT data analysis methods face some problems such as lack of adequate training data, resource constraints, centralized framework, security, and privacy. In contrast, the increase in blockchain techniques provides a decentralized framework. It is promoted to remove centralized control and resolve the problem of AI as well as allow secured distribution of data and resources to the diverse nodes of IoT system. This paper devises a new IoT with Blockchain based Secure Image Encryption with Disease Classification model.
... 14 In an IoMT healthcare system, the main objective is to secure the distributed data over an organization, which blockchain controls. Healthcare comprises various entities like providers, patients, medical data, and treatment details. 15,16 Moreover, blockchain is a simple data structure that provides unchangeable and irremovable transactions by generating a digital ledger. Currently, the blockchain concept is attracted by researchers due to its various features. ...
Article
Full-text available
Handling electronic health records from the Internet of Medical Things is one of the most challenging research areas as it consists of sensitive information, which targets attackers. Also, dealing with modern healthcare systems is highly complex and expensive, requiring much secured storage space. However, blockchain technology can mitigate these problems through improved health record management. The proposed work develops a scalable, lightweight framework based on blockchain technology to improve COVID‐19 data security, scalability and patient privacy. Initially, the COVID‐19 related data records are hashed using the enhanced Merkle tree data structure. The hashed values are encrypted by lattice based cryptography with a Homomorphic proxy re‐encryption scheme in which the input data are secured. After completing the encryption process, the blockchain uses inter planetary file system to store secured information. Finally, the Proof of Work concept is utilized to validate the security of the input COVID based data records. The proposed work's experimental setup is performed using the Python tool. The performance metrics like encryption time, re‐encryption time, decryption time, overall processing time, and latency prove the efficacy of the proposed schemes.
... The authentication framework, which depends on distributed blockchain platforms, mainly allocates a separate blockchain platform for a group of fog nodes, each of them managing a cluster of IoT devices [33], [34]. Fog nodes are trusted entities in the network and are used for authentication. ...
Conference Paper
Full-text available
IoT paradigm has laid the foundation to interconnect billions of objects for gathering, storing, and analyzing data. In an IoT complex ecosystem, maintaining the security and privacy of objects as well as data becomes a critical issue. Efficient authentication of IoT objects to each other is restricted by resource-constrained IoT objects. A recent approach to au-thentication is to integrate blockchain technology, fog computing to develop a lightweight, robust authentication framework for IoT systems. Several works have adopted this integration to improve their authentication solutions for IoT systems. This paper aims to present a review of the authentication frameworks that integrate blockchain and fog computing technologies. In light of the review conclusions, the paper proposes a fogging-based authentication framework using blockchain to enhance IoT system's security, and scalability. The proposed framework employs fog nodes to support IoT devices with close computation and storage resources. Moreover, it adopts multi-level blockchain platforms to support cross-domain authentication among IoT systems. Finally, the paper discusses the trade-offs of adopting blockchain and fogging-based authentication frameworks in IoT and shows how the proposed framework could balance those trade-offs.
... Blockchain employed an asymmetric encryption technique, in which a private key is used for validating data and the public is considered as an identity in the network [10]. Blockchain adopted a consensus mechanism in which to adjust change or new data, consent from all participants (named as "miners") is required [11]. Thus, data is immutable in the blockchain [12]. ...
Conference Paper
New diseases (e.g., monkeypox) are showing up and taking the form of a pandemic within a short time. Early detection can assist in reducing the spread. However, because of privacy-sensitive data, users do not share it continually. Thus, it becomes challenging to employ modern technologies (e.g., deep learning). Moreover, cyber threats encircle both communication and data. This paper introduces a blockchain-based data acquisition scheme during the pandemic in which federated learning (FL) is employed to assemble privacy-sensitive data as a form of the trained model instead of raw data. A secure training scheme is designed to mitigate cyber threats (e.g., man-in-the-middle-attack). An experimental environment is formulated based on a recent pandemic (i.e., monkeypox) to illustrate the feasibility of the proposed scheme.
... Blockchain systems can be used to transmit data in a secure way, collecting data from body sensors. Unauthorized access can be prevented in that system by a digital signature algorithm (Islam & Shin, 2020). ...
Chapter
The COVID-19 pandemic has had significant changes in all aspects of life having economic, social and physiological consequences that the healthcare sector is in the priority of agile changes for the surveillance of humanity and saving the life of people. The global collaboration is a very prominent necessity at this fight and the new technologies and innovations have been developed based on current digital technologies for self-monitoring, contact tracking, remote care, hand-free measurements, increased security and consistency, vaccine developments and home working needs during the pandemic. The currents urgent developments will be part of our new normal life, improvingthe life people. In this Chapter, emergingwidely technologies in health will be explained with their practical usages and purposes. Later, some applications of these technologies are mentioned. The pandemic started in China but, it has shown great developments in the usage of smart technologies to decrease the effects of the pandemic. Technologies used by some other countries have mentioned that South Korea, Japan and China have shown exemplarymanagement againstthe COVID-19 with their smart developed capabilities and technologies. Every development has advantages and at the same time, they have disadvantages that challenges of these new technologies are explained with some solutions to overcome these challenges. Infodemi, bias and inconsistencies and wearable devices accuracy and validation are new challenges besides privacy concerns of current technologies. It is clear that the new bad (COVID-19) will bring new goods by improving self-healthcare management, increasing awareness, creating social distancing, increasing security and mostly bringing new more cost-effective treatment methods in healthcare.
... AI-powered blockchain for supporting decentralized Internet of Vehicles [36] and IoT sustainable computing [37]. Also, the authors of [38] introduced a blockchainbased secure healthcare scheme in which health data was collected from users via drones and stored on the nearest server. Moreover, [39] presented a blockchain-based data acquisition process in which information was gathered from loTs using drones as a relay and was securely kept at the mobile edge computing. ...
Article
The Internet of Drones (IoD) allows drones to collaborate safely while operating in a restricted airspace for numerous applications in the Industry 4.0 world. Energy efficiency and sharing sensing data are the main challenges in swarm-drone collaboration for performing complex tasks effectively and efficiently in real-time. Information security of consensus achievement is required for multi-drone collaboration in the presence of Byzantine drones. Byzantine drones may be enough to cause present swarm coordination techniques to collapse, resulting in unpredictable or calamitous results. One or more Byzantine drones may lead to failure in consensus while exploring the environment. Moreover, Blockchain technology is in the early stage for swarm drone collaboration. Therefore, We introduce a novel blockchain-based approach to managing multi-drone collaboration during a swarm operation. Within drone swarms, blockchain technology is utilized as a communication tool to broadcast instructions to the swarm. The paper aims to improve the security of the consensus achievement process of multi-drone collaboration, energy efficiency, and connectivity during environment exploration while maintaining consensus achievement effectiveness. Improving the security of consensus achievement among drones will increase the possibility and stability of multi-drone applications by improving connectivity and energy efficiency in the smart world and solving real environmental issues.
... Abou-Nassar et al. [169] implemented DITrust chain using Ethereum and Ripple for securing trust in IoT healthcare systems. Islam and Young Shin [170] propounded a blockchain-based healthcare scheme for assisting unmanned aerial vehicles (UAV) in providing security to health data collected from users using UAV and stored on the nearest server in the UAV path. Miyachi and Mackey [171] presented hOCBS, a privacy-preserving blockchain-based framework for leveraging healthcare using on-chain and off-chain system design. ...
Article
Full-text available
There is a massive transformation in the traditional healthcare system from the specialist-centric approach to the patient-centric approach by adopting modern and intelligent healthcare solutions to build a smart healthcare system. It permits patients to directly share their medical data with the specialist for remote diagnosis without any human intervention. Furthermore, the remote monitoring of patients utilizing wearable sensors, Internet of Things (IoT) technologies, and Artificial Intelligence (AI) has made the treatment readily accessible and affordable. However, the advancement also brings several security and privacy concerns that poorly maneuvered the effective performance of the smart healthcare system. An attacker can exploit the IoT infrastructure, perform an adversarial attack on AI models, and proliferate resource starvation attacks in a smart healthcare system. To overcome the aforementioned issues, in this survey, we extensively reviewed and created a comprehensive taxonomy of various smart healthcare technologies such as wearable devices, digital healthcare, and Body Area Networks (BANs), along with their security aspects and solutions for the smart healthcare system. ore-over, we propose an AI-based architecture with the 6G
... Abou-Nassar et al. [169] implemented DITrust chain using Ethereum and Ripple for securing trust in IoT healthcare systems. Islam and Young Shin [170] propounded a blockchain-based healthcare scheme for assisting unmanned aerial vehicles (UAV) in providing security to health data collected from users using UAV and stored on the nearest server in the UAV path. Miyachi and Mackey [171] presented hOCBS, a privacy-preserving blockchain-based framework for leveraging healthcare using on-chain and off-chain system design. ...
... The most critical process is to convert the data into meaningful information. UAV can be used to detect vehicles using a deep learning (DL) model, but it requires considerable computational capability that reduces the operation time of UAV because of battery consumption [19]. ...
Article
In this paper, an automated real-time traffic management scheme is proposed by using unmanned aerial vehicles (UAV) in an effective and secured way. However, owing to the low computational capability and limited battery capacity of a UAV, multi-access edge computing (MEC) is applied to enhance the performance of an automated UAV-based traffic management scheme. Additionally, blockchain technology is introduced in the automated traffic management scheme to store the traffic record for providing network repudiation and avoiding any third-party interference with the network. An algorithm is developed based on the concept of a pairwise compatibility graph for the UAV-assisted automated traffic management scheme wherein a deep learning (DL) model is used for vehicle detection. Moreover, a two-phase authentication mechanism is proposed for a faster and secure verification process of the registered devices in the proposed scheme. Finally, a result analysis is conducted based on the security analysis and performance analysis to verify the effectiveness of the proposed scheme.
... In order to improve the surgical treatment effect of nerve block patients and promote the rehabilitation process of patients, nerve block anesthesia patients are given routine care and psychological care based on routine care, respectively. Ultrasound-guided peripheral nerve block anesthesia types of subclavian brachial plexus block should be performed using a frequency of 4-7 MHz arc probe [18], and the probe is placed in the downward depressed position of the clavicle 1 cm away from the rostral prominence position of the patient. e patient's brachial plexus nerve is clearly observed to show a grape-like shape of low-density ring-shaped hyperechoic, and the phenomenon of anesthetic drug wrapping the nerve is visible after performing the block. ...
Article
Full-text available
In the process of surgical treatment, the introduction of ultrasound technology to implement nerve block anesthesia can make the operations of patients with fractures under visualization and it can also significantly improve the anesthesia effect. With this technology, it is possible to minimize the anesthesia operation causing accidental injury and lay a good foundation for the smooth operation of surgical treatment. Blockchain technology is a new decentralized infrastructure and distributed computing paradigm. This technology has great development opportunities in the medical field and is expected to play an important role in the construction of Internet medical ecology. This study aims to investigate the effect of ultrasound-guided nerve block anesthesia on fracture treatment in the context of blockchain. This method has high application value and potential in medical data sharing, reducing treatment costs, improving the medical claims system, strengthening medical management, and optimizing medical decision-making using blockchain technology. This study also addresses the uniqueness and complexity of ultrasound-guided nerve block anesthesia itself and analyzes the effect of the proposed method. The analysis shows that using the internet-based blockchain ultrasound-guided subacromial nerve block anesthesia for fracture patients is effective, and the patient's vital signs are stable, and the block is effective.
... IoT technologies lead the modern world into tremendous technological growth in terms of data management, communication, and information sharing [1]. With these developments, the modern world has gained massive advantages by utilizing technological equipment especially Bluetooth devices, WSN technology, Wi-Fi, Li-Fi, and RFID. ...
Article
Full-text available
The health system in today’s real world is significant but difficult and overcrowded. These hurdles can be diminished using improved health record management and blockchain technology. These technologies can handle medical data to provide security by monitoring and maintaining patient records. The processing of medical data and patient records is essential to analyze the earlier prescribed medicines and to understand the severity of diseases. Blockchain technology can improve the security, performance, and transparency of sharing the medical records of the current healthcare system. This paper proposed a novel framework for personal health record (PHR) management using IBM cloud data lake and blockchain platform for an effective healthcare management process. The problem in the blockchain-based healthcare management system can be minimized with the utilization of the proposed technique. Significantly, the traditional blockchain system usually decreases the latency. Therefore, the proposed technique focuses on improving latency and throughput. The result of the proposed system is calculated based on various matrices, such as F1 Score, Recall, and Confusion matrices. Therefore, the proposed work scored high accuracy and provided better results than existing techniques.
... The authentication framework, which depends on distributed blockchain platforms, mainly allocates a separate blockchain platform for a group of fog nodes, each of them managing a cluster of IoT devices [33], [34]. Fog nodes are trusted entities in the network and are used for authentication. ...
... This scheme was designed to help control the spread of viruses by ensuring that people follow the guidelines and performing surveillance checks (e.g., face coverings, temperature measurements, and social distancing). Similarly, the work by [21] proposed the use of blockchain technology along with unmanned aerial vehicles (UAVs) for patient data collection within healthcare. It uses UAVs to collect data and a blockchain to store the collected data. ...
Article
Full-text available
In this study, a new blockchain protocol and a novel architecture that integrate the advantages offered by edge computing, artificial intelligence (AI), IoT end-devices, and blockchain were designed, developed, and validated. This new architecture has the ability to monitor the environment, collect data, analyze it, process it using an AI-expert engine, provide predictions and actionable outcomes, and finally share it on a public blockchain platform. For the use-case implementation, the pandemic caused by the wide and rapid spread of the novel coronavirus COVID-19 was used to test and evaluate the proposed system. Recently, various authors traced the spread of viruses in sewage water and studied how it can be used as a tracking system. Early warning notifications can allow governments and organizations to take appropriate actions at the earliest stages possible. The system was validated experimentally using 14 Raspberry Pis, and the results and analyses proved that the system is able to utilize low-cost and low-power flexible IoT hardware at the processing layer to detect COVID-19 and predict its spread using the AI engine, with an accuracy of 95%, and share the outcome over the blockchain platform. This is accomplished when the platform is secured by the honesty-based distributed proof of authority (HDPoA) and without any substantial impact on the devices’ power sources, as there was only a power consumption increase of 7% when the Raspberry Pi was used for blockchain mining and 14% when used to produce an AI prediction.
... Blockchain is a network in which every participant holds the same copy of the data [15]. Blockchain promises properties such as pseudonymity, security, immutability, and distributed [16]. Blockchain adopted asymmetric encryption in which the public is used as an identity and the private key is used to verify the data [17]. ...
Conference Paper
In the modern era, the internet of vehicles (IoV) is being utilized in commercial applications and extensively explored in research. However, internal fault in IoV can cause accidents on the road. Moreover, privacy concerns can hamper the internal data sharing to build a model to detect the anomaly. Federated learning (FL) and blockchain are emerging technologies that can assist in mitigating these challenges. FL-based anomaly detection is introduced to prevent road accidents with the help of blockchain. An environment is built to conduct experiments to prove the feasibility of the proposed scheme. The performance analysis demonstrates that our presented scheme outperforms the traditional scheme while having privacy concerns.
Chapter
The main aim of this chapter is to propose a secure and transparent communication mechanism by reducing the communication delay and more accuracy while making the decisions among information transmissions. The chapter has used adaptive and comprehensive trust models in order to compute and maintain the trust while making the accurate decisions among intelligent devices in the network. In addition, the accurate decisions and transmission are vigilant continuously by the blockchain technique where each and every intelligent device is being recorded while maintaining the communication. The trusted models are further traced and get transparent using blockchain network where each block having device id, category (legitimate, moderate, malicious), size is being monitored and recorded by the network. The performance of the proposed solution is validated against existing approach over various measuring parameters such as communication delay, accuracy, and probability attack.
Book
This book discusses the potential of the Internet of Unmanned Things (IoUT), which is considered a promising paradigm resulting in numerous applications including shipment of goods, home package delivery, crop monitoring, agricultural surveillance, and rescue operations. The authors discuss how IoUT nodes collaborate with each other in ad hoc manner through a Line-of-Sight (LoS) link to exchange data packets. Also discussed is how Unmanned Arial Vehicles (UAVs) can communicate with fixed ground stations, with an air traffic controller, or through a Non-Line-of-Sight (NLoS) link with a satellite-aided controller, generally based on preloaded missions. The authors go on to cover how to tackle issues that arise with dissimilar communication technologies. They cover how various problems can appear in inter-UAV and UAV-to-X communications including energy management, lack of security and the unreliability of wireless communication links, and handover from LoS to NLoS, and vice versa. In this book, the editors invited front-line researchers and authors to submit research exploring emerging technologies for IoUT and mission-based networking and how to overcome challenges.
Article
Full-text available
Unmanned aerial vehicles (UAVs) have recently established their capacity to provide cost-effective and credible solutions for various real-world scenarios. UAVs provide an immense variety of services due to their autonomy, mobility, adaptability, and communications interoperability. Despite the expansive use of UAVs to support ground communications, data exchanges in those networks are susceptible to security threats because most communication is through radio or Wi-Fi signals, which are easy to hack. While several techniques exist to protect against cyberattacks. Recently emerging technology blockchain could be one of promising ways to enhance data security and user privacy in peer-to-peer UAV networks. Borrowing the superiorities of blockchain, multiple entities can communicate securely, decentralized, and equitably. This article comprehensively overviews privacy and security integration in blockchain-assisted UAV communication. For this goal, we present a set of fundamental analyses and critical requirements that can help build privacy and security models for blockchain and help manage and support decentralized data storage systems. The UAV communication system's security requirements and objectives, including availability, authentication, authorization, confidentiality, integrity, privacy, and non-repudiation, are thoroughly examined to provide a deeper insight. We wrap up with a discussion of open research challenges, the constraints of current UAV standards, and potential future research directions.
Chapter
People's failure to maintain a social distance is causing the COVID19 virus to spread. We have used the drone thermal images for a maximum of 10 km of coverage to detect temperature and reduce virus spread areas. The part of the work is based on utilizing disinfectant spraying drones, disinfectant testing with the guidance of doctors, setting the path planning of drones for surveying the temperature of people, and monitoring the infected place using GPS. When the thermal camera of the drone detects the temperature values using remote sensing images, the drone covers crowded places like hospitals, cinemas, and temples using remote sensing images. One drone model is designed to provide present results using thermal images. The Proposed drone can cover an affected area of up to 16,000 square meters per hour for capturing remote sensing images. It predicts affected areas using faster CNN algorithms with 2100 thermal images. Thermal mapping is used to monitor the social distance between people, alert people that a virus is spreading, and reduce the risk factor of people's movement. In this paper, remote sensing images are analysed and detect higher temperature areas using thermal mapping (Messina and Modica in Remote Sensing 12:1491, 2020).KeywordsThermal imageIoT droneRemote sensingBio-mass prediction theoremsPix4D mapper
Article
Recently, as a consequence of the COVID-19 pandemic, dependence on Contact Tracing (CT) models has significantly increased to prevent spread of this highly contagious virus and be prepared for the potential future ones. Since the spreading probability of the novel coronavirus in indoor environments is much higher than that of the outdoors, there is an urgent and unmet quest to develop/design efficient, autonomous, trustworthy, and secure indoor CT solutions. Despite such an urgency, this field is still in its infancy. The paper addresses this gap and proposes the Trustworthy Blockchain-enabled system for Indoor Contact Tracing (TB-ICT) framework. The TB-ICT framework is proposed to protect privacy and integrity of the underlying CT data from unauthorized access. More specifically, it is a fully distributed and innovative blockchain platform exploiting the proposed dynamic Proof of Work (dPoW) credit-based consensus algorithm coupled with Randomized Hash Window (W-Hash) and dynamic Proof of Credit (dPoC) mechanisms to differentiate between honest and dishonest nodes. The TB-ICT not only provides a decentralization in data replication but also quantifies the node’s behavior based on its underlying credit-based mechanism. For achieving high localization performance, we capitalize on availability of Internet of Things (IoT) indoor localization infrastructures, and develop a data driven localization model based on Bluetooth Low Energy (BLE) sensor measurements. The simulation results show that the proposed TB-ICT prevents the COVID-19 from spreading by implementation of a highly accurate contact tracing model while improving the users’ privacy and security.
Chapter
In recent years, Cyber-Physical Systems (CPS) have been adopted in various sectors such as smart cities, smart industries etc. These types of systems continuously generate a huge amount of data which increasingly attract cyber-crimes. There are several existing approaches produced to overcome these issues by using Blockchain Technology (BT) such as Public, Private, Construme, Hybrid Blockchain-based on CPS applications and Machine Learning (ML) such as Support Vector Machine (SVM), Linear Regression, and Decision Tree etc. With the rapid increase in data size affix with cyber-crimes, such approaches become less effective and therefore necessitate the invention of a more robust and self-trainable approach. In this paper, we presented brief details on ML and BT and how they can be adopted in CPS applications to solve security issues concerning cyber-crimes. The architecture was also presented to depict the proposed method. Moreover, technologies/techniques which can be implemented in CPS applications are discovered such as industrial automation, smart buildings, medical systems, and vehicular systems. We also have some future scope and conclusion.KeywordsCyber-physical system (CPS)Machine learning (ML)Blockchain technology (BT)SecurityPrivacy
Chapter
The IoT is a vast technology that allows communication between billions of devices worldwide. The massive amount of data produced by these sensors must be controlled in a secure manner. The centralized solutions are not suitable for these concerns due to security challenges and scalability problems. Thus, blockchain technology is an effective solution, and the “distributed” method has been engaged to overcome these issues to allow for entirely secure communication among devices. Blockchain is an encrypted, distributed, and immutable ledger technology. The main objective of this chapter is to present the state of art of blockchain technology in IoT environment. Integration of Blockchain technology with IoT also produces some challenges like scalability, throughput, and power consumption. The search terms like IoT, Blockchain, Blockchain and IoT issues, Blockchain and IoT applications has been used. After exclusion 40 papers were included for this study. The ramifications of this study is that it will absolutely help the scholars and academician to understand the approach of Blockchain in IoT environment and gives useful insights for improvements of blockchain based IoT ecosystem by integrating other technologies such as artificial intelligence, big data and cloud computing.
Chapter
With the advancement of technology, security of data needs to be coped up in the field of Healthcare. Blockchain technology ensures trust, immutability and accountability which has a huge impact in the managing of patient data. Since data needs to be secured and privacy concerns arise, Self-Sovereign Identity management is employed to hand over the data to its respective individual and let them manage their data. This paper focuses on various works carried out in the field of healthcare using blockchain technology and points out the motivation for securing patient data with blockchain, smart contracts being the principal base in the cost analysis of Ganache and Ropstein network. It then presents future scope in integrating and making Electronic Health Records along with the application decentralized using a peer to peer network such as IPFS.
Article
Full-text available
Evidence of the IoT is expanding the number of connected devices, including UAVs. UAVs overcome the flaws in the physical IoT infrastructure already in place. Low-altitude views are expected to be dominant swiftly in urban areas. In a short period of time, they are able to cover a large area and distribute goods and information around the globe. Additionally, how to provide a safe and secure UAV operation in high-level traffic circumstances is also a topic of investigation. When operating an UAV in a limited area, the IoLoUA system is used to maintain order. Additionally, it aids with node exploration. Basic principles that can be used to create new structural designs are analysed for both networks (IoLoUA). There has been an explanation of the IoLoUA strategy’s approach to implementation so far. Among the issues covered in this article are UAV-generated IoT data collection and delivery, security threats, and typical workflow approaches. This work presents a theoretical model of future design evolution.
Thesis
Full-text available
Le concept de villes intelligentes gagne de plus en plus en importance dans les métropoles modernes en raison de l’émergence et de la diffusion d’appareils, de systèmes et de technologies intelligents embarqués et connectés dans la vie quotidienne, qui ont créé l’opportunité de connecter chaque “chose" à Internet. Dans l'ère à venir de l'Internet des objets, l'Internet des véhicules (IoV) jouera un rôle crucial dans la construction d'une ville intelligente. En fait, l'IoV a le potentiel de résoudre efficacement divers problèmes de trafic. Il est essentiel pour améliorer l'utilisation des routes, réduire la consommation d'énergie et la pollution et améliorer la sécurité routière. Néanmoins, le principal problème concernant l'IoV, et en particulier le Véhicule-à-Véhicule (V2V) et le Véhicule-à-infrastructure (V2I), est l'établissement de paiements et de communications sécurisés et instantanés. Pour répondre à ce défi, ce travail propose une solution basée sur la Blockchain pour mettre en place un paiement et une communication sécurisés afin d'étudier l'utilisation de la Blockchain comme middleware entre différents acteurs des systèmes de transport intelligents.Dans cette étude, nous avons évalué les propriétés les plus importantes de la solution développée, à savoir la consommation de la mémoire et de l’énergie, l’immutabilité, la confidentialité, la cohérence, l’intégrité, le temps d’exécution et le coût. L’objet de cette évaluation est de vérifier la capacité de la plateforme basée sur la Blockchain à assurer une communication efficace et un paiement sécurisé avec l’IoV. Selon les résultats, cette plateforme peut contribuer à résoudre les défis les plus critiques de la communication véhicule-à-tout (V2X) en améliorant la sécurité et l’évolutivité.
Article
This paper focuses on the major challenges that organizations and sectors face, such as cyber-attacks and crimes. With the advancement of technology for applications and services in businesses, homes, healthcare, and other areas, there has been an increase in cyber-crime. The quality and security of information have been compromised as a result of the attacks, and space optimization of these applications and services has become more challenging as a result of the migration to Unmanned Aerial Vehicles (UAVs). The UAVs are gaining popularity to provide civilian and military applications, but due to the current Internet environment, it is more vulnerable to malicious attacks. Forensics is the practice of gathering evidence to identify attacks. Cyber forensics collects evidence from cyber-attacks. Digital footprints are particularly significant in cyber forensics. UAVs contain real-time data, and users access it directly, exposing the solution to cyber-attacks. This study focuses on the function of UAVs in various applications and the issues faced in terms of cyber security and privacy. The current research also examines several security models for controlling quality and reliability in UAV applications, with the results discussed. The current research describes future challenges and research prospects in UAVs.
Thesis
Full-text available
The concept of smart cities is increasingly gaining prominence in modern metropolises due to the emergence and spread of embedded and connected smart devices, systems, and technologies in everyday lives, which have created an opportunity to connect every ‘thing’ to the Internet. In the upcoming era of the Internet of Things, the Internet of Vehicles (IOV) will play a crucial role in constructing a smart city. In fact, the IOV has a potential to solve various traffic problems effectively. It is critical for enhancing road utilization, reducing energy consumption and pollution, and improving road safety. Nevertheless, the primary issue regarding the IoV, and in particular to Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I), is establishing secure and instant payments and communications. To respond to this challenge, this work proposes a Blockchain-based solution for establishing secure payment and communication in order to study the use of Blockchain as middle-ware between different participants of intelligent transportation systems. The proposed framework employs Ethereum to develop a solution aimed at facilitating Vehicle-to-Everything (V2X) communications and payments. Moreover, this work qualitatively test the performance and resilience of the proposed systems against common security attacks. Computational tests showed that the proposed solution solved the main challenges of Vehicle-to-X (V2X) communications such as security and centralization.
Article
Full-text available
The use of unmanned aerial vehicles (UAVs) is growing rapidly across many civil application domains, including real-time monitoring, providing wireless coverage, remote sensing, search and rescue, delivery of goods, security and surveillance, precision agriculture, and civil infrastructure inspection. Smart UAVs are the next big revolution in the UAV technology promising to provide new opportunities in different applications, especially in civil infrastructure in terms of reduced risks and lower cost. Civil infrastructure is expected to dominate more than $45 Billion market value of UAV usage. In this paper, we present UAV civil applications and their challenges. We also discuss the current research trends and provide future insights for potential UAV uses. Furthermore, we present the key challenges for UAV civil applications, including charging challenges, collision avoidance and swarming challenges, and networking and security-related challenges. Based on our review of the recent literature, we discuss open research challenges and draw high-level insights on how these challenges might be approached.
Article
Full-text available
Blockchain technologies have recently come to the forefront of the research and industrial communities as they bring potential benefits for many industries. This is due to their practical capabilities in solving many issues currently inhibiting further advances in various industrial domains. Securely recording and sharing transactional data, establishing automated and efficient supply chain processes, and enhancing transparency across the whole value chain are some examples of these issues. Blockchain offers an effective way to tackle these issues using distributed, shared, secure, and permissioned transactional ledgers. The employment of blockchain technologies and the possibility of applying them in different situations enables many industrial applications through increased efficiency and security; enhanced traceability and transparency and reduced costs. In this paper, different industrial application domains where the use of blockchain technologies has been proposed are reviewed. The paper explores the opportunities, benefits, and challenges of incorporating blockchain in different industry applications. Furthermore, the paper attempts to identify the requirements that support the implementation of blockchain for different industry applications. The review reveals that several opportunities are available for utilizing blockchain in various industry sectors; however, there are still some challenges to be addressed to achieve better utilization of this technology.
Article
Full-text available
As an attractive business model of cloud computing, outsourcing services usually involve online payment and security issues. The mutual distrust between users and outsourcing service providers may severely impede the wide adoption of cloud computing. Nevertheless, most existing payment solutions only consider a specific type of outsourcing service and rely on a trusted third-party to realize fairness. In this paper, in order to realize secure and fair payment of outsourcing services in general without relying on any third-party, trusted or not, we introduce BCPay, a blockchain based fair payment framework for outsourcing services in cloud computing. We first present the system architecture, specifications and adversary model of BCPay, then describe in detail its design. Our security analysis indicates that BCPay achieves Soundness and what we call Robust Fairness, where the fairness is resilient to eavesdropping and malleability attacks. Furthermore, our performance evaluation shows that BCPay is very efficient in terms of the number of transactions and computation cost. As illustrative applications of BCPay, we further construct a blockchain-based provable data possession scheme in cloud computing and a blockchain-based outsourcing computation protocol in fog computing.
Preprint
Full-text available
The use of unmanned aerial vehicles (UAVs) is growing rapidly across many civil application domains including real-time monitoring, providing wireless coverage, remote sensing, search and rescue, delivery of goods, security and surveillance, precision agriculture, and civil infrastructure inspection. Smart UAVs are the next big revolution in UAV technology promising to provide new opportunities in different applications, especially in civil infrastructure in terms of reduced risks and lower cost. Civil infrastructure is expected to dominate the more that $45 Billion market value of UAV usage. In this survey, we present UAV civil applications and their challenges. We also discuss current research trends and provide future insights for potential UAV uses. Furthermore, we present the key challenges for UAV civil applications, including: charging challenges, collision avoidance and swarming challenges, and networking and security related challenges. Based on our review of the recent literature, we discuss open research challenges and draw high-level insights on how these challenges might be approached.
Article
Full-text available
Internet of Things (IoT) technology provides a competent and structured approach to handle service deliverance aspects of healthcare in terms of mobile health and remote patient monitoring. IoT generates an unprecedented amount of data that can be processed using cloud computing. But for real-time remote health monitoring applications, the delay caused by transferring data to the cloud and back to the application is unacceptable. Relative to this context, we proposed the remote patient health monitoring in smart homes by using the concept of fog computing at the smart gateway. The proposed model uses advanced techniques and services such as embedded data mining, distributed storage, and notification services at the edge of the network. Event triggering based data transmission methodology is adopted to process the patient’s real-time data at Fog Layer. Temporal mining concept is used to analyze the events adversity by calculating the temporal health index (THI) of the patient. In order to determine the validity of the system, health data of 67 patients in IoT based smart home environment was systematically generated for 30 days. Results depict that the proposed BBN classifier based model has high accuracy and response time in determining the state of an event when compared with other classification algorithms. Moreover, decision making based on real-time healthcare data further enhances the utility of the proposed system.
Article
Full-text available
Current developments in ICTs such as in Internet-of-Things (IoT) and Cyber-Physical Systems (CPS) allow us to develop healthcare solutions with more intelligent and prediction capabilities both for daily life (home/office) and in-hospitals. In most of IoT-based healthcare systems, especially at smart homes or hospitals, a bridging point (i.e., gateway) is needed between sensor infrastructure network and the Internet. The gateway at the edge of the network often just performs basic functions such as translating between the protocols used in the Internet and sensor networks. These gateways have beneficial knowledge and constructive control over both the sensor network and the data to be transmitted through the Internet. In this paper, we exploit the strategic position of such gateways at the edge of the network to offer several higher-level services such as local storage, real-time local data processing, embedded data mining, etc., presenting thus a Smart e-Health Gateway. We then propose to exploit the concept of Fog Computing in Healthcare IoT systems by forming a Geo-distributed intermediary layer of intelligence between sensor nodes and Cloud. By taking responsibility for handling some burdens of the sensor network and a remote healthcare center, our Fog-assisted system architecture can cope with many challenges in ubiquitous healthcare systems such as mobility, energy efficiency, scalability, and reliability issues. A successful implementation of Smart e-Health Gateways can enable massive deployment of ubiquitous health monitoring systems especially in clinical environments. We also present a prototype of a Smart e-Health Gateway called UT-GATE where some of the discussed higher-level features have been implemented. We also implement an IoT-based Early Warning Score (EWS) health monitoring to practically show the efficiency and relevance of our system on addressing a medical case study. Our proof-of-concept design demonstrates an IoT-based health monitoring system with enhanced overall system intelligence, energy efficiency, mobility, performance, interoperability, security, and reliability.
Article
Full-text available
Internet of Things (IoT) is an evolving architecture which connects multiple devices to Internet for communication or receiving updates from a cloud or a server. In future, the number of these connected devices will increase immensely making them an indistinguishable part of our daily lives. Although these devices make our lives more comfortable, they also put our personal information at risk. Therefore, security of these devices is also a major concern today. In this paper, we propose an ultra-lightweight mutual authentication protocol which uses only bitwise operation and thus is very efficient in terms of storage and communication cost. In addition, the computation overhead is very low. We have also compared our proposed work with the existing ones which verifies the strength of our protocol, as obtained results are promising. A brief cryptanalysis of our protocol that ensures untraceability is also presented.
Article
Millimeter-wave (mmWave) communication with multi-gigahertz bandwidth availability enables much higher capacity and transmission rate than conventional microwave communications. However, mmWave signals suffer from propagation-related shortcomings. The flexibility of UAV communication can compensate most of the deficiencies of mmWave signals, preserve its advantages, and provide more opportunities. In this article, we present the current state of the art, research opportunities, and challenges for UAV mmWave communication. We present channel characteristics and show its modeling issues. We further analyze how to achieve UAV mmWave channel acquisition and precoder design. Moreover, we discuss the challenges and possible solutions for UAV mmWave cellular networks, including UAV-to-base-station and UAV-to-user communications and spectrum sharing.
Article
Unmanned Aerial Vehicles (UAVs) have great potential to revolutionize the future of automotive, energy, and healthcare sectors by working as wireless relays to improve connectivity with ground networks. They are able to collect and process real-time information by connecting existing network infrastructures including Internet of Medical Things (e.g., Body Area Networks (BANs)) and Internet of Vehicles with clouds or remote servers. In this article, we advocate and promote the notion of employing UAVs as data collectors. To demonstrate practicality of the idea, we propose a UAV-based architecture to communicate with BANs in a reliable and power-efficient manner. The proposed architecture adopts the concept of wakeup-radio based communication between a UAV and multiple BANs. We analyze the performance of the proposed protocol in terms of throughput and delay by allocating different priorities to the hubs or gateways. The proposed architecture may be useful in remote or disaster areas, where BANs have poor or no access to conventional wireless communication infrastructure, and may even assist vehicular networks by monitoring driver's physiological conditions through BANs. We further highlight open research issues and challenges that are important for developing efficient protocols for UAV-based data collection in smart healthcare systems.
Article
Unmanned aerial vehicles (UAVs) can be deployed efficiently to provide high quality of service for Internet of Things (IoT). By using cooperative communication and relay technologies, a large swarm of UAVs can enlarge the effective coverage area of IoT services via multiple relay nodes. However, the low latency service requirement and the dynamic topology of UAV network bring in new challenges for the effective routing optimization among UAVs. In this paper, a layered UAV swarm network architecture is proposed and an optimal number of UAVs is analyzed. Furthermore, a low latency routing algorithm (LLRA) is designed based on the partial location information and the connectivity of the network architecture. Finally, the performance of the proposed LLRA is verified by numerical results, which can decrease the link average delay and improve the packet delivery ratio in contrast to traditional routing algorithms without layered architecture.
Article
Pervasive healthcare services with smart decision making capability and ubiquitous communication technologies can forge future smart communities. Real-time health surveillance for early detection of life-threatening diseases through advanced sensing and communication technology can provide better treatment, reduce medical expenses and save lives of community residents (i.e., patients). However, the assurance of data privacy is the prime concern for such smart health technologies. This research aims to describe a privacy-preserving cloud-based system for real-time health surveillance through change detection of multiple vital health signs of smart community members. Vital signs data generated from IoT-enabled wearable devices are processed in real-time in a cloud environment. This article focuses on the development of a predictive model for the smart community considering the sensitivity of data processing in a third-party environment (e.g., cloud computing). We developed a vital sign change detection system using Holt's linear trend method (to enable prediction of data with trends) where fully homomorphic encryption is adapted to perform computations on an encrypted domain that can ensure data privacy. Moreover, to reduce the overhead of the fully homomorphic encryption method over large medical data we introduced a parallel approach for encrypted computations using a MapReduce algorithm of Apache Hadoop. We demonstrated the proposed model by evaluating some case studies for different vital signs of patients. The accuracy and efficiency of the implementation demonstrate the effectiveness of the proposed model for building a smart community.
Book
This is a monumental reference for the theory and practice of computer security. Comprehensive in scope, this text covers applied and practical elements, theory, and the reasons for the design of applications and security techniques. It covers both the management and the engineering issues of computer security. It provides excellent examples of ideas and mechanisms that demonstrate how disparate techniques and principles are combined in widely-used systems. This book is acclaimed for its scope, clear and lucid writing, and its combination of formal and theoretical aspects with real systems, technologies, techniques, and policies.
Article
The unmanned aerial vehicle (UAV) is a promising enabler of the Internet of Things (IoT) vision, due to its agile maneuverability. In this paper, we explore the potential gain of UAV-aided data collection in a generalized IoT scenario. Particularly, a composite channel model including both large-scale and small-scale fading is used to depict typical propagation environments. Moreover, rigorous energy constraints are considered to characterize IoT devices as practically as possible. A multi-antenna UAV is employed, which can communicate with a cluster of single-antenna IoT devices to form a virtual MIMO link. We formulate a whole-trajectory-oriented optimization problem, where the transmission duration and the transmit power of all devices are jointly designed to maximize the data collection efficiency for the whole flight. Different from previous studies, only the slowly-varying large-scale channel state information (CSI) is assumed available, to coincide with the fact that practically it is quite difficult to predictively acquire the random small-scale channel fading prior to the UAV flight. We propose an iterative scheme to overcome the non-convexity of the formulated problem. The presented scheme can provide a significant performance gain over traditional schemes and converges quickly.
Article
Understanding of any computing environment requires familiarity with its underlying technologies. Internet of Things (IoT), being a new era of computing in the digital world, aims for the development of large number of smart devices that would support a variety of applications and services. These devices are resource‐constrained, and the services they would provide are going to impose specific requirements, among which security is the most prominent one. Therefore, in order to comprehend and conform these requirements, there is a need to illuminate the underlying architecture of IoT and its associated elements. This comprehensive survey focuses on the security architecture of IoT and provides a detailed taxonomy of major challenges associated with the field and the key technologies, including Radio Frequency Identification (RFID) and Wireless Sensor Networks (WSN), that are enabling factors in the development of IoT. The paper also discusses some of the protocols suitable for IoT infrastructure and open source tools and platforms for its development. Finally, a brief outline of major open issues, along with their potential solutions and future research directions, is given.
Article
Mobile Cloud Computing is a new technology which refers to an infrastructure where both data storage and data processing operate outside of the mobile device. Another recent technology is Internet of Things. Internet of Things is a new technology which is growing rapidly in the field of telecommunications. More specifically, IoT related with wireless telecommunications. The main goal of the interaction and cooperation between things and objects which sent through the wireless networks is to fulfill the objective set to them as a combined entity. In addition, there is a rapid development of both technologies, Cloud Computing and Internet of Things, regard the field of wireless communications. In this paper, we present a survey of IoT and Cloud Computing with a focus on the security issues of both technologies. Specifically, we combine the two aforementioned technologies (i.e Cloud Computing and IoT) in order to examine the common features, and in order to discover the benefits of their integration. Concluding, we present the contribution of Cloud Computing to the IoT technology. Thus, it shows how the Cloud Computing technology improves the function of the IoT. Finally, we survey the security challenges of the integration of IoT and Cloud Computing.
Book
Internet usage has become a facet of everyday life, especially as more technological advances have made it easier to connect to the web from virtually anywhere in the developed world. However, with this increased usage comes heightened threats to security within digital environments. The Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security identifies emergent research and techniques being utilized in the field of cryptology and cyber threat prevention. Featuring theoretical perspectives, best practices, and future research directions, this handbook of research is a vital resource for professionals, researchers, faculty members, scientists, graduate students, scholars, and software developers interested in threat identification and prevention.
Real-time secure health surveillance for smarter health communities
  • A Alabdulatif
  • I Khalil
  • Arm Forkan
  • M Atiquzzaman
Alabdulatif A, Khalil I, Forkan ARM, Atiquzzaman M. Real-time secure health surveillance for smarter health communities. IEEE Commun Mag 2019;57(1):122-9. doi: 10.1109/MCOM.2017.1700547.