Enhancing Trust-based Medical Smartphone Networks via Blockchain-based Traffic Sampling

被引:7
作者
Li, Wenjuan [1 ,2 ]
Meng, Weizhi [3 ]
Yang, Laurence T. [4 ]
机构
[1] Guangzhou Univ, Inst Artificial Intelligence & Blockchain, Guangzhou, Peoples R China
[2] Hong Kong Polytech Univ, Dept Elect & Informat Engn, Hong Kong, Peoples R China
[3] Tech Univ Denmark, Dept Appl Math & Comp Sci, Lyngby, Denmark
[4] St Francis Xavier Univ, Antigonish, NS, Canada
来源
2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021) | 2021年
基金
中国国家自然科学基金;
关键词
Internet of Medieal Things; Medieal Smartphone Networks; Insider Threat; Blockchain; Traffic Sampling; INTRUSION DETECTION; MANAGEMENT;
D O I
10.1109/TrustCom53373.2021.00034
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With more devices being inter- or intra-connected, Internet of Things (IoT) has gradually been adopted in many disciplines, such as healthcare industry, coined as Internet of Medical Things (IoMT). The purpose of IoMT is to facilitate the efficiency and effectiveness of medical operations, i.e., remotely monitoring the status of patients. In such healthcare environments, smartphones have become an important device to communicate with others and update the information of patients, resulting in a special type of IoMT called Medical Smartphone Networks (MSNs). To reinforce the distributed architecture, trust management schemes are often implemented to defend against insider attacks. However, how to maintain the robustness of trust management in heavy traffic networks still remains a challenge, i.e., COVID-19 incident would cause excessive traffic for healthcare organizations and increase the difficulty of validating trustworthiness among MSN nodes. In this work, we focus on this issue and propose a blockchain-enabled adaptive traffic sampling method to help enhance the robustness of trust management under high traffic environments. The use of blockchain technology aims to build a verified database of malicious traffic among all nodes. The evaluation in a real healthcare environment demonstrates the viability and effectiveness of our approach.
引用
收藏
页码:122 / 129
页数:8
相关论文
共 39 条
  • [1] Aranca, 2016, ARANCA INTERNET MED
  • [2] COLIDE: a collaborative intrusion detection framework for Internet of Things
    Arshad, Junaid
    Azad, Muhammad Ajmal
    Abdellatif, Mohammad Mahmoud
    Rehman, Muhammad Habib Ur
    Salah, Khaled
    [J]. IET NETWORKS, 2019, 8 (01) : 3 - 14
  • [3] Blockchain-Based Distributed Trust and Reputation Management Systems: A Survey
    Bellini, Emanuele
    Iraqi, Youssef
    Damiani, Ernesto
    [J]. IEEE ACCESS, 2020, 8 (08): : 21127 - 21151
  • [4] Event-based trust framework model in wireless sensor networks
    Chen, Haiguang
    Wu, Huafeng
    Hu, Jinchu
    Gao, Chuanshan
    [J]. PROCEEDINGS OF THE 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE, AND STORAGE, 2008, : 359 - +
  • [5] Deloitte, 2018, IOT INN REP
  • [6] Fenye Bao, 2012, IEEE Transactions on Network and Service Management, V9, P169, DOI 10.1109/TCOMM.2012.031912.110179
  • [7] FUNG CJ, 2008, P DSOM 2008, V5273, P109
  • [8] Golomb T., 2018, Proceedings of the First Workshop on Decentralized IoT Security and Standards (DISS'18), San Diego, CA, USA, February 18, DOI DOI 10.14722/DISS.2018.23003
  • [9] Gonzalez JM, 2011, ANN CONF PRIV SECUR, P63
  • [10] A New Trust Management Framework for Detecting Malicious and Selfish Behaviour for Mobile Ad hoc Networks
    Guo, Ji
    Marshall, Alan
    Zhou, Bosheng
    [J]. TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 142 - 149