Improved blockchain-based user authentication protocol with ring signature for internet of medical things

被引:2
作者
Priya, J. Chandra [1 ]
Praveen, R. [2 ]
Nivitha, K. [3 ]
Sudhakar, T. [4 ]
机构
[1] Mepco Schlenk Engn Coll, Dept Comp Sci & Engn, Sivakasi 626005, Tamil Nadu, India
[2] ICU Med India LLP, Chennai 600006, Tamil Nadu, India
[3] Vellore Inst Technol, Sch Comp Sci & Engn SCOPE, Vellore 632014, India
[4] Anna Univ, Dept Comp Technol, Madras Inst Technol Campus, Chennai 600044, Tamil Nadu, India
关键词
Medical internet of things; SM9-based secure threshold ring signature (SM9-STRS); Trust equity score; Improved PBFT voting protocol; Chain code; Ethereum network; SECURE; SCHEME;
D O I
10.1007/s12083-024-01716-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the field of e-healthcare, smart medical sensors are responsible for consistently collecting, transmitting, and communicating real-time data to support immediate decision-making, both within and between healthcare organizations. Privacy-preserving authentication is required, even when the sensors roam between different networks. Existing authentication protocols rely on centralized authentication servers and pose a number of challenges, including a single point of failure, performance bottlenecks, scalability challenges, and privacy concerns. Hence, a secure mutual authentication mechanism using Blockchain is essential in preventing attacks. In this paper, an Improved Chain Code Blockchain-based Key Agreement Authentication Mechanism (CCBKAAM) using the merits of SM9-based Secure Threshold Ring Signature (SM9-STRS) is proposed for achieving privacy and security. This proposed mechanism uses multiple key generation-based cipher identification algorithms for parameter maintenance. The integrated threshold ring signature prevents the limitations of the single key generation scheme. It uses Chain Codes over the Ethereum network for constructing the blocks during the process of mutual user authentication with trust equity score-based Improved PBFT Voting protocol for reaching consensus during authentication. This authentication protocol adopted blockchain for the objective of storing the identities and associated parameters to support the entities under communication during the process of authentication. The formal and informal verification of the proposed CCBKAAM confirmed its potentiality in resisting most of the possible attacks the IoMT is vulnerable to. The communication and computation overhead during the implementation are determined to be significantly lowered by 32.19% and 28.94%, better than the compared baseline blockchain-based mutual authentication. The performance analysis proved that this proposed CCBKAAM scheme is also potent in minimizing the storage overhead up to maximized level of 35.42%.
引用
收藏
页码:2415 / 2434
页数:20
相关论文
共 35 条
[1]   BSAPM: BlockChain based secured authentication protocol for large scale WSN with FPGA implementation [J].
Abdussami, Mohammad ;
Amin, Ruhul ;
Saravanan, P. ;
Vollala, Satyanarayana .
COMPUTER COMMUNICATIONS, 2023, 209 :63-77
[2]   On the designing a secure biometric-based remote patient authentication scheme for mobile healthcare environments [J].
Adeli, Morteza ;
Bagheri, Nasour ;
Meimani, Hamid Reza .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (02) :3075-3089
[3]   Authentication-Chains: Blockchain-Inspired Lightweight Authentication Protocol for IoT Networks [J].
Al Ahmed, Mahmoud Tayseer ;
Hashim, Fazirulhisyam ;
Hashim, Shaiful Jahari ;
Abdullah, Azizol .
ELECTRONICS, 2023, 12 (04)
[4]   MetaInfoChain: Bi-layered blockchain consensus for metadata aggregation in IoT and cloud environments [J].
Bhama, Ponsy R. K. Sathia ;
Jayabal, Chandra Priya .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (12)
[5]   Blockchain-Based Key Management Scheme in Fog-Enabled IoT Systems [J].
Chen, Tong ;
Zhang, Lei ;
Choo, Kim-Kwang Raymond ;
Zhang, Rui ;
Meng, Xinyu .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (13) :10766-10778
[6]   Non-transferable blockchain-based identity authentication [J].
Fu, Yuxia ;
Shao, Jun ;
Huang, Qingjia ;
Zhou, Qihang ;
Feng, Huamin ;
Jia, Xiaoqi ;
Wang, Ruiyi ;
Feng, Wenzhi .
PEER-TO-PEER NETWORKING AND APPLICATIONS, 2023, 16 (03) :1354-1364
[7]   Achieving data utility-privacy tradeoff in Internet of Medical Things: A machine learning approach [J].
Guan, Zhitao ;
Lv, Zefang ;
Du, Xiaojiang ;
Wu, Longfei ;
Guizani, Mohsen .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 98 :60-68
[8]   A review on security threats, vulnerabilities, and counter measures of 5G enabled Internet-of-Medical-Things [J].
Hasan, Mohammad Kamrul ;
Ghazel, Taher M. ;
Saeed, Rashid A. ;
Pandey, Bishwajeet ;
Gohel, Hardik ;
Eshmawi, Ala' A. ;
Abdel-Khalek, S. ;
Alkhassawneh, Hula Mahmoud .
IET COMMUNICATIONS, 2022, 16 (05) :421-432
[9]   Evaluating Security of Internet of Medical Things Using the Analytic Network Process Method [J].
Huang, Xucheng ;
Nazir, Shah .
SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
[10]   Secure Patient Authentication Framework in the Healthcare System Using Wireless Medical Sensor Networks [J].
Jan, Saeed Ullah ;
Ali, Sikandar ;
Abbasi, Irshad Ahmed ;
Mosleh, Mogeeb A. A. ;
Alsanad, Ahmed ;
Khattak, Hizbullah .
JOURNAL OF HEALTHCARE ENGINEERING, 2021, 2021