FBASHI: Fuzzy and Blockchain-Based Adaptive Security for Healthcare IoTs (original) (raw)

Abstract

Internet of Things (IoT) is a system of interconnected devices that have the ability to monitor and transfer data to peers without human intervention. Authentication, Authorization and Audit Logs (AAA) are prime features of Network Security and easily attained in legacy systems, however, remains unachieved in IoT. The IoTs require due security considerations as the conventional security mechanisms are not optimized for such devices due to various aspects such as heterogeneity, resource constrained processing, storage and multiple factors. Additionally, the legacy systems are mostly centralized and thus introduce a single point of failure. In this research, a novel framework, FBASHI is presented that is based on fuzzy logic and blockchain technology to achieve AAA services. The proposed system is developed using Hyperledger that is a blockchain platform providing privacy and fast response capability, therefore, it is best suited for the healthcare IoT environments. This work proposes behavior driven adaptive security mechanism for healthcare IoTs and networks based on blockchain by utilizing fuzzy logic and presents a heuristic approach towards behavior driven adaptive security providing AAA services. FBASHI is implemented to analyze its security and practicality. Furthermore, a comparison is drawn with other blockchain-based solutions. INDEX TERMS Hyperledger, trust management, authentication, contextual access control, MFA. DECLARATIONS CONFLICT OF INTERESTS

Loading...

Loading Preview

Sorry, preview is currently unavailable. You can download the paper by clicking the button above.

References (43)

  1. F. Paul. (Mar. 28, 2018). Network World. Accessed: Dec. 25, 2021. [Online]. Available: https://www.networkworld.com/ article/3267065/people-are-really-worried-about-iot-data-privacy-and- securityand-they-should-be.html#nww-fsb
  2. F. Paul. (Jan. 14, 2019). Network World. Accessed: Dec. 29, 2021. [Online]. Available: https://www.networkworld.com/article/3332032/top- 10-iot-vulnerabilities.html
  3. F. Dai, Y. Shi, N. Meng, L. Wei, and Z. Ye, ''From bitcoin to cybersecurity: A comparative study of blockchain application and security issues,'' in Proc. 4th Int. Conf. Syst. Informat. (ICSAI), Nov. 2017, pp. 975-979.
  4. Journal, HIPAA. (Jul. 10, 2019). HIPAA JOURNAL. Accessed: Aug. 1, 2021. [Online]. Available: https://www.hipaajournal.com/ vulnerability-identified-in-ge-aestiva-and-aespire-anesthesia-machines/
  5. HIPAA. (2018). HIPAA Guide. Accessed: Aug. 1, 2021. [Online]. Avail- able: https://www.hipaaguide.net/hipaa-for-dummies/
  6. HIPAA. (2018). HIPAA Guide. Accessed: Aug. 1, 2021. [Online]. Avail- able: https://www.hipaaguide.net/gdpr-for-dummies/
  7. J.-L. Hou and K.-H. Yeh, ''Novel authentication schemes for IoT based Healthcare systems,'' Int. J. Distrib. Sensor Netw., vol. 2015, pp. 1-9, Nov. 2015.
  8. G. Manogaran, R. Varatharajan, D. Lopez, P. M. Kumar, R. Sundarasekar, and C. Thota, ''A new architecture of Internet of Things and big data ecosystem for secured smart healthcare monitoring and alerting system,'' Future Gener. Comput. Syst., vol. 82, pp. 375-387, May 2018.
  9. Q. Jiang, J. Ma, C. Yang, X. Ma, J. Shen, and A. C. Shehzad, ''Efficient end-to-end authentication protocol for wearable health monitoring sys- tems,'' Comput. Elect. Eng., vol. 63, pp. 182-195, Oct. 2017.
  10. R. Amin, S. H. Islam, G. P. Biswas, M. K. Khan, and N. Kumar, ''A robust and anonymous patient monitoring system using wireless medical sensor networks,'' Future Gener. Comput. Syst., vol. 80, pp. 483-495, Mar. 2018.
  11. M. A. Ferrag, L. A. Maglaras, H. Janicke, J. Jiang, and L. Shu, ''Authen- tication protocols for Internet of Things: A comprehensive survey,'' Secur. Commun. Netw., vol. 2017, pp. 1-41, Nov. 2017.
  12. D. Rivera, L. Cruz-Piris, G. Lopez-Civera, E. de la Hoz, and I. Marsa-Maestre, ''Applying an unified access control for IoT-based intel- ligent agent systems,'' in Proc. IEEE 8th Int. Conf. Service-Oriented Comput. Appl. (SOCA), Oct. 2015.
  13. H. Ning, H. Liu, and L. T. Yang, ''Aggregated-proof based hierarchical authentication scheme for the Internet of Things,'' IEEE Trans. Parallel Distrib. Syst., vol. 26, no. 3, pp. 657-667, Mar. 2015.
  14. A. Singh and K. Chatterjee, ''A secure multi-tier authentication scheme in cloud computing environment,'' in Proc. Int. Conf. Circuits, Power Comput. Technol. (ICCPCT), Mar. 2015, pp. 1-7.
  15. C. Hu, J. Zhang, and Q. Wen, ''An identity-based personal location system with protected privacy in IoT,'' in Proc. 4th IEEE Int. Conf. Broadband Netw. Multimedia Technol., Oct. 2011, pp. 192-195.
  16. J. H. Yang and P. Y. Lin, ''An ID-based user authentication scheme for cloud computing,'' in Proc. 10th Int. Conf. Intell. Inf. Hiding Multimedia Signal Process., Aug. 2014, pp. 98-101.
  17. C. Lai, H. Li, X. Liang, R. Lu, K. Zhang, and X. Shen, ''CPAL: A conditional privacy-preserving authentication with access linkability for roaming service,'' IEEE Internet Things J., vol. 1, no. 1, pp. 46-57, Feb. 2014.
  18. M. Ali, M. ElTabakh, and C. Nita-Rotaru, ''FT-RC4: A robust security mechanism for data stream systems,'' Purdue Univ., West Lafayette, IN, USA, Tech. Rep. 05-024, 2005.
  19. T. Kothmayr, C. Schmitt, W. Hu, M. BrĂ¼nig, and G. Carle, ''DTLS based security and two-way authentication for the Internet of Things,'' Ad Hoc Netw., vol. 11, no. 8, pp. 2710-2723, Nov. 2013.
  20. S. R. Moosavi, T. N. Gia, E. Nigussie, A. M. Rahmani, S. Virtanen, H. Tenhunen, and J. Isoaho, ''End-to-end security scheme for mobility enabled healthcare Internet of Things,'' Future Gener. Comput. Syst., vol. 64, pp. 108-124, Nov. 2016.
  21. S. R. Moosavi, E. Nigussie, S. Virtanen, and J. Isoaho, ''Cryptographic key generation using ECG signal,'' in Proc. 14th IEEE Annu. Consum. Commun. Netw. Conf. (CCNC), Jan. 2017, pp. 1024-1031.
  22. P. M. Kumar and U. D. Gandhi, ''Enhanced DTLS with CoAP-based authentication scheme for the Internet of Things in healthcare application,'' J. Supercomput., vol. 76, no. 6, pp. 3963-3983, Jun. 2020.
  23. M. A. Khan and K. Salah, ''IoT security: Review, blockchain solutions, and open challenges,'' Future Gener. Comput. Syst., vol. 82, pp. 395-411, May 2018.
  24. K. Zile and R. Strazdiia, ''Blockchain use cases and their feasibility,'' Appl. Comput. Syst., vol. 23, no. 1, pp. 12-20, May 2018.
  25. G. Zyskind, O. Nathan, and A. Pentland, ''Decentralizing privacy: Using blockchain to protect personal data,'' in Proc. IEEE Secur. Privacy Work- shops, May 2015, pp. 180-184.
  26. A. Dorri, S. S. Kanhere, R. Jurdak, and P. Gauravaram, ''Blockchain for IoT security and privacy: The case study of a smart home,'' in Proc. IEEE Int. Conf. Pervasive Comput. Commun. Workshops (PerCom Workshops), Mar. 2017, pp. 618-623.
  27. A. Ouaddah, A. A. Elkalam, and A. A. Ouahman, ''FairAccess: A new blockchain-based access control framework for the Internet of Things,'' Secur. Commun. Netw., vol. 9, no. 18, pp. 5943-5964, 2017.
  28. Y. Zhang, S. Kasahara, Y. Shen, X. Jiang, and J. Wan, ''Smart contract- based access control for the Internet of Things,'' IEEE Internet Things J., vol. 6, no. 2, pp. 1594-1605, Apr. 2019.
  29. A. Ramachandran and D. M. Kantarcioglu, ''Using blockchain and smart contracts for secure data provenance management,'' 2017, arXiv:1709.10000.
  30. C. Qu, M. Tao, J. Zhang, X. Hong, and R. Yuan, ''Blockchain based credibility verification method for IoT entities,'' Secur. Commun. Netw., vol. 2018, pp. 1-11, Jun. 2018.
  31. A. Azaria, A. Ekblaw, T. Vieira, and A. Lippman, ''MedRec: Using blockchain for medical data access and permission management,'' in Proc. 2nd Int. Conf. Open Big Data (OBD), Aug. 2016, pp. 25-30.
  32. C. H. Lee and K.-H. Kim, ''Implementation of IoT system using block chain with authentication and data protection,'' in Proc. Int. Conf. Inf. Netw. (ICOIN), Jan. 2018, pp. 936-940.
  33. M. Banerjee, J. Lee, and K.-K. R. Choo, ''A blockchain future for Internet of Things security: A position paper,'' Digit. Commun. Netw., vol. 4, no. 3, pp. 149-160, Aug. 2018.
  34. S. Huh, S. Cho, and S. Kim, ''Managing IoT devices using blockchain platform,'' in Proc. 19th Int. Conf. Adv. Commun. Technol. (ICACT), Feb. 2017, pp. 464-467.
  35. V. Shermin and K. Valentin. (2017). Blockchain A Beginners Guide. [Online]. Available: https://blockchainhub.net/
  36. Z. Hintzman, ''Comparing blockchain implementations,'' in Proc. SCTE- ISBE and NCTA, 2017, pp. 1-29.
  37. S. Pongnumkul, C. Siripanpornchana, and S. Thajchayapong, ''Perfor- mance analysis of private blockchain platforms in varying workloads,'' in Proc. 26th Int. Conf. Comput. Commun. Netw. (ICCCN), 2017, pp. 1-6.
  38. J. Lei, G. Cui, and G. Xing, ''Trust calculation and delivery control in trust-based access control,'' Wuhan Univ. J. Natural Sci., vol. 13, no. 6, pp. 765-768, Dec. 2008.
  39. P. N. Mahalle, P. A. Thakre, N. R. Prasad, and R. Prasad, ''A fuzzy approach to trust based access control in Internet of Things,'' in Proc. Wireless VITAE, Jun. 2013, pp. 1-5.
  40. A. Walker. (Jan. 18, 2018). Risk-Based Authentication: The Future of Workplace Security. G2. Accessed: Dec. 31, 2021. [Online]. Available: https://learn.g2.com/trends/risk-based-authentication
  41. R. W. Ahmad, K. Salah, R. Jayaraman, I. Yaqoob, S. Ellahham, and M. Omar, ''The role of blockchain technology in telehealth and telemedicine,'' Int. J. Med. Informat., vol. 148, Apr. 2021, Art. no. 104399.
  42. I. Abu-Elezz, A. Hassan, A. Nazeemudeen, M. Househ, and A. Abd-Alrazaq, ''The benefits and threats of blockchain technology in healthcare: A scoping review,'' Int. J. Med. Informat., vol. 142, Oct. 2020, Art. no. 104246. ZEESHAN ZULKIFL received the B.E. degree in telecommunication engineering from NUST, Pakistan, in 2014, and the M.S. degree in informa- tion security from NUST. He is currently a part of teaching faculty with NUST. His research interests include blockchain, the IoT security, cyber foren- sics, and data security and privacy.
  43. FAWAD KHAN (Senior Member, IEEE) received the B.S. degree in electrical engineering from UET Peshawar, in 2010, the M.S. degree in electrical engineering from CECOS University, in 2014, and the Ph.D. degree from the School of Cyber Engi- neering, Xidian University, in 2018. Currently, he is working with the National University of Science and Technology, Pakistan. His research interests include cryptography, information secu- rity, blockchain, and access control.