Enhancing Medical Smartphone Networks via Blockchain-Based Trust Management Against Insider Attacks

被引:89
作者
Meng, Weizhi [1 ]
Li, Wenjuan [1 ,2 ]
Zhu, Liqiu [3 ]
机构
[1] Tech Univ Denmark, Dept Appl Math & Comp Sci, DK-2800 Lyngby, Denmark
[2] City Univ Hong Kong, Dept Comp Sci, Hong Kong, Peoples R China
[3] FinTech Startup, Macau 999078, Peoples R China
关键词
Medical services; Trust management; Blockchain; Peer-to-peer computing; Organizations; Intrusion detection; Industries; Bayesian inference; blockchain technology; insider attack; Internet of Things (IoT); intrusion detection; medical smartphone network (MSN); trust management; INTRUSION DETECTION; AWARE; FRAMEWORK; MECHANISM;
D O I
10.1109/TEM.2019.2921736
中图分类号
F [经济];
学科分类号
02 ;
摘要
Internet of Things (IoT) has gradually become one of the most important platforms across different disciplines, by enabling dedicated physical objects to communicate with other Internet-enabled things. With this trend, more devices in medical environments are capable of connecting with each other, named Internet of Medical Things (IoMT). It aims for improving efficiency and reducing communication delay, e.g., monitoring the status of patients and notifying abnormal events. However, due to the distributed nature, insider attacks are still one of the major threats to such IoT environment. How to improve the trust management in IoMT remains a challenge. Motivated by the popularity of blockchain technology, in this paper, our general goal is to investigate the performance of blockchain-based trust management. In particular, we focus on a particular type of IoMT, named medical smartphone networks (MSNs), because of the wide adoption of smartphones in the medical domain. Then, we apply blockchains for enhancing the effectiveness of Bayesian inference-based trust management to detect malicious nodes in MSNs. In the evaluation, we explore the performance of our approach in two different healthcare environments, and experimental results demonstrate that blockchain technology can help improve the detection efficiency of detecting malicious nodes with reasonable workload.
引用
收藏
页码:1377 / 1386
页数:10
相关论文
共 57 条
[1]  
[Anonymous], 2018, SINGAPORE SUFFERS MO
[2]   Zerocash: Decentralized Anonymous Payments from Bitcoin [J].
Ben-Sasson, Eli ;
Chiesa, Alessandro ;
Garmant, Christina ;
Green, Matthew ;
Miers, Ian ;
Tromer, Eran ;
Virza, Madars .
2014 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2014), 2014, :459-474
[3]   Event-based trust framework model in wireless sensor networks [J].
Chen, Haiguang ;
Wu, Huafeng ;
Hu, Jinchu ;
Gao, Chuanshan .
PROCEEDINGS OF THE 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE, AND STORAGE, 2008, :359-+
[4]   Blockchain based searchable encryption for electronic health record sharing [J].
Chen, Lanxiang ;
Lee, Wai-Kong ;
Chang, Chin-Chen ;
Choo, Kim-Kwang Raymond ;
Zhang, Nan .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 95 (420-429) :420-429
[5]   A Survey on Trust Management for Mobile Ad Hoc Networks [J].
Cho, Jin-Hee ;
Swami, Ananthram ;
Chen, Ing-Ray .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2011, 13 (04) :562-583
[6]  
Deloitte, 2015, DIG TECHN TRANF HLTH
[7]  
Deloitte, 2018, IOT INN REP
[8]   A trust-aware, P2P-based overlay for intrusion detection [J].
Duma, Claudiu ;
Karresand, Martin ;
Shahmehri, Nahid ;
Caronni, Germano .
SEVENTEENTH INTERNATIONAL CONFERENCE ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2006, :692-+
[9]   Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection [J].
Bao, Fenye ;
Chen, Ing-Ray ;
Chang, MoonJeong ;
Cho, Jin-Hee .
IEEE Transactions on Network and Service Management, 2012, 9 (02) :169-183
[10]  
Filkins B., 2014, Health Care Cyberthreat Report: Widespread Compromises Detected, Compliance Nightmare on Horizon, V42, P1