Abstract

Blockchain and IoT are being deployed at a large scale in various fields including healthcare for applications such as secure storage, transactions, and process automation. IoT devices are resource-constrained, have no capability of security and self-protection, and can easily be hacked or compromised. Furthermore, Blockchain is an emerging technology with immutability features which provide secure management, authentication, and guaranteed access control to IoT devices. IoT is a cloud-based internet service in which processing and collection of user’s data are accomplished remotely. Smart healthcare also requires the facility to provide the diagnosis of patients located remotely. The smart health framework faces critical issues such as data security, costs, memory, scalability, trust, and transparency between different platforms. Therefore, it is important to handle data integrity and privacy as the user’s authenticity is in question due to an open internet environment. Several techniques are available that primarily focus on resolving security issues i.e., forgery, timing, denial of service and stolen smartcard attacks, etc. Blockchain technology follows the rules of absolute privacy to identify the users associated with transactions. The motivation behind the use of Blockchain in health informatics is the removal of the centralized third party, immutability, improved data sharing, enhanced security, and reduced overhead costs in distributed applications. Healthcare informatics has some specific requirements associated with the security and privacy along with the additional legal requirements. This paper presents a novel authentication and authorization framework for Blockchain-enabled IoT networks using a probabilistic model. The proposed framework makes use of random numbers in the authentication process which is further connected through joint conditional probability. Hence, it establishes a secure connection among IoT devices for further data acquisition. The proposed model is validated and evaluated through extensive simulations using the AVISPA tool and the Cooja simulator, respectively. Experimental results analyses show that the proposed framework provides robust mutual authenticity, enhanced access control, and lowers both the communication and computational overhead cost as compared to others.

Highlights

  • The Blockchain is a decentralized and distributed database system i.e., computing machines are geographically distributed [1]

  • This paper presents a lightweight authentication and authorization framework for the Blockchain-enabled IoT network to ensure the privacy and integrity of user’s data

  • We propose a lightweight authentication and authorization framework for the Blockchain-enabled IoT network in health informatics based on joint conditional probability

Read more

Summary

Introduction

The Blockchain is a decentralized and distributed database system i.e., computing machines are geographically distributed [1]. Blockchain gives the free and autonomous system, suggesting that each hub on the Blockchain structure allows the data to be transferred, stored, and updated securely. Mutual authentication required to make the connection more secure to protect people in the dangerous world [17,23,24]. The internet is the backbone and data sharing that produces large amounts of data for various services like storage, of modern knowledge and data sharing that produces large amounts of data for various processing, analysis, and management, etc. IoT uses these services for processing and handling the user’s data to allow framework consists of two services i.e., applications and networks. The data are stored continuously and available all the time for each network entity such as gateway cloud designed and attached withintegrity, a public-key certificate multiple operations under the services. Blockchain is a novel trend toward the digitization of clinical records and managing such

Literature
Literature Review
Materials and Methods
Random Number Generation
Heterogeneous IoT Devices
Proposed Authentication Framework
Experimental Setup
Results and Discussion
Mutual Authentication Robustness
Communication Overhead
Computational
Results analysis
Resistance against Attacks
Resistance Table
Conclusions
No Clock Synchronization and Independence of Session Key
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call