Blockchain-Based Mutual Authentication Protocol for IoT-Enabled Decentralized Healthcare Environment

被引:13
作者
Chen, Chien-Ming [1 ]
Chen, Zhaoting [2 ]
Kumari, Saru [3 ]
Obaidat, Mohammad S. [4 ,5 ,6 ,7 ]
Rodrigues, Joel J. P. C. [8 ,9 ]
Khan, Muhammad Khurram [10 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Sch Artificial Intelligence, Sch Future Technol, Nanjing 211544, Peoples R China
[2] Shandong Univ Sci & Technol, Coll Comp Sci & Engn, Qingdao 266590, Peoples R China
[3] Chaudhary Charan Singh Univ, Dept Math, Meerut 250004, India
[4] Univ Jordan, King Abdullah Sch Informat Technol 2, Amman 11942, Jordan
[5] Univ Sci & Technol Beijing, Sch Comp & Commun Engn, Beijing 100083, Peoples R China
[6] SRM Univ, Sch Comp, Dept Computat Intelligence, Kattankulathur 603203, India
[7] Amity Univ, Sch Engn, Noida 201301, India
[8] Amazonas State Univ, BR-69050020 Manaus, Brazil
[9] Lusofona Univ, P-1749024 Lisbon, Portugal
[10] King Saud Univ, Riyadh 11653, Saudi Arabia
关键词
Protocols; Medical services; Cloud computing; Authentication; Security; Servers; blockchain; healthcare; Internet of Things (IoT); KEY EXCHANGE; SCHEME; EFFICIENT; DESIGN;
D O I
10.1109/JIOT.2024.3396488
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the ever-evolving landscape of technology, healthcare continuously harnesses its benefits, propelling advancements in medical practices. Within intelligent healthcare, medical robots play a pivotal role, providing integral support to healthcare professionals, streamlining processes, and delivering efficient services. These robots securely transmit patient treatment plans, transferring them to cloud storage and subsequently storing them in blockchain systems. This innovative approach ensures the integrity and accessibility of patient data, introducing novel avenues for seamless interaction with medical information for hospitals and patients' families. Despite these advantages, the looming privacy risks associated with sensitive patient data transmission pose a compelling challenge, demanding a comprehensive solution. In response to this challenge, we propose a mutual authentication and key agreement protocol designed to optimize healthcare services while prioritizing data security and patient privacy. To validate the robustness of our authentication protocol, we conduct thorough analyses based on both formal and informal models, establishing a foundational framework for evaluating the protocol's security. Additionally, we perform a comprehensive comparative analysis, assessing the proposed protocol against existing counterparts across various dimensions. This comparative scrutiny reveals the superiority of our protocol in terms of security, as well as its efficiency in communication cost and computational overhead. These findings affirm the efficacy of our proposed solution in navigating the intricate interplay between medical robotics, blockchain, and data security.
引用
收藏
页码:25394 / 25412
页数:19
相关论文
共 61 条
[1]  
Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
[2]   Security-enhanced three-party pairwise secret key agreement protocol for fog-based vehicular ad-hoc communications [J].
AbdolrezaEftekhari, Seyed ;
Nikooghadam, Morteza ;
Rafighi, Masoud .
VEHICULAR COMMUNICATIONS, 2021, 28
[3]   Key Wearable Device Technologies Parameters for Innovative Healthcare Delivery in B5G Network: A Review [J].
Ajakwe, Simeon Okechukwu ;
Nwakanma, Cosmas Ifeanyi ;
Kim, Dong-Seong ;
Lee, Jae-Min .
IEEE ACCESS, 2022, 10 :49956-49974
[4]   Secure and Efficient Cloud-based IoT Authenticated Key Agreement scheme for e-Health Wireless Sensor Networks [J].
Alzahrani, Bander A. .
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2021, 46 (04) :3017-3032
[5]  
Canetti R, 2002, LECT NOTES COMPUT SC, V2332, P337
[6]   The random oracle methodology, revisited [J].
Canetti, R ;
Goldreich, O ;
Halevi, S .
JOURNAL OF THE ACM, 2004, 51 (04) :557-594
[7]   A Security-Enhanced and Ultralightweight Communication Protocol for Internet of Medical Things [J].
Chen, Chien-Ming ;
Chen, Zhaoting ;
Das, Ashok Kumar ;
Chaudhry, Shehzad Ashraf .
IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (06) :10168-10182
[8]   A secure authenticated and key exchange scheme for fog computing [J].
Chen, Chien-Ming ;
Huang, Yanyu ;
Wang, King-Hang ;
Kumari, Saru ;
Wu, Mu-En .
ENTERPRISE INFORMATION SYSTEMS, 2021, 15 (09) :1200-1215
[9]   A Privacy Authentication Scheme Based on Cloud for Medical Environment [J].
Chen, Chin-Ling ;
Yang, Tsai-Tung ;
Chiang, Mao-Lun ;
Shih, Tzay-Farn .
JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (11)
[10]   A blockchain-based signature exchange protocol for metaverse [J].
Chen, Jiahui ;
Xiao, Hang ;
Hu, Muchuang ;
Chen, Chien-Ming .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2023, 142 :237-247