Optimal Witnessing of Healthcare IoT Data Using Blockchain Logging Contract

被引:26
作者
Chinaei, Mohammad Hossein [1 ]
Gharakheili, Hassan Habibi [1 ]
Sivaraman, Vijay [1 ]
机构
[1] Univ New South Wales, Sch Elect Engn & Telecommun, Sydney, NSW 2052, Australia
关键词
Blockchain; data witnessing; Internet of Things (IoT); optimization; DEVICES; CHALLENGES; FRAMEWORK; SECURITY; INTERNET;
D O I
10.1109/JIOT.2021.3051433
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Verification of data generated by wearable sensors is increasingly becoming of concern to health service providers and insurance companies. These devices are typically vulnerable to a wide range of cybersecurity attacks, attempting to manipulate sensing data. Most of these disastrous attacks would remain undetected since neither healthcare servers nor Internet-of-Things (IoT) sensors are aware of the existence of attackers in the middle of communication. Thus, there is a need for a verification framework that various authorities can request a verification service for the local network data of a target IoT device. In this article, we leverage blockchain as a distributed platform to realize an on-demand verification scheme. This allows authorities to automatically transact with connected devices for witnessing services. A public request is made for witness statements on the data of a target IoT that is transmitted on its local network, and subsequently, devices (in close vicinity of the target IoT) offer witnessing service. Our contributions are threefold: 1) we develop a system architecture based on blockchain and smart contract that enables authorities to dynamically avail a verification service for data of a subject device from a distributed set of witnesses which are willing to provide (in a privacy-preserving manner) their local wireless measurement in exchange of monetary return; 2) we then develop a method to optimally select witnesses in such a way that the verification error is minimized subject to monetary cost constraints; and 3) finally, we evaluate the efficacy of our scheme using real Wi-Fi session traces collected from a five-storeyed building with more than thirty access points, representative of a hospital. According to the current pricing schedule of the Ethereum public blockchain, our scheme enables healthcare authorities to verify data transmitted from a typical wearable device with the verification error of the order 0.01% at cost of less than $2 for 1-hr witnessing service.
引用
收藏
页码:10117 / 10130
页数:14
相关论文
共 50 条
[21]  
Capkun S, 2005, IEEE INFOCOM SER, P1917
[22]  
Celler B., 2016, AUSTR HLTH RES CTR A
[23]   Toward Secure Data Sharing for the IoV: A Quality-Driven Incentive Mechanism With On-Chain and Off-Chain Guarantees [J].
Chen, Wuhui ;
Chen, Yufei ;
Chen, Xu ;
Zheng, Zibin .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (03) :1625-1640
[24]  
Chinaei M. H., 2020, WITNESSING SMART CON
[25]   AN INTRUSION-DETECTION MODEL [J].
DENNING, DE .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) :222-232
[26]   Towards fog-driven IoT eHealth: Promises and challenges of loT in medicine and healthcare [J].
Farahani, Bahar ;
Firouzi, Farshad ;
Chang, Victor ;
Badaroglu, Mustafa ;
Constant, Nicholas ;
Mankodiya, Kunal .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 :659-676
[27]   Combining MUD Policies with SDN for IoT Intrusion Detection [J].
Hamza, Ayyoob ;
Gharakheili, Hassan Habibi ;
Sivaraman, Vijay .
PROCEEDINGS OF THE 2018 WORKSHOP ON IOT SECURITY AND PRIVACY (IOT S&P '18), 2018, :1-7
[28]   Detecting Volumetric Attacks on IoT Devices via SDN-Based Monitoring of MUD Activity [J].
Hamza, Ayyoob ;
Gharakheili, Hassan Habibi ;
Benson, Theophilus A. ;
Sivaraman, Vijay .
SOSR '19: PROCEEDINGS OF THE 2019 ACM SYMPOSIUM ON SDN RESEARCH, 2019, :36-48
[29]   WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices [J].
Hasan, Ragib ;
Khan, Rasib ;
Zawoad, Shams ;
Haque, Md Munirul .
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2016, 4 (01) :128-141
[30]   A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures [J].
Hassija, Vikas ;
Chamola, Vinay ;
Saxena, Vikas ;
Jain, Divyansh ;
Goyal, Pranav ;
Sikdar, Biplab .
IEEE ACCESS, 2019, 7 :82721-82743