Nalazite se na CroRIS probnoj okolini. Ovdje evidentirani podaci neće biti pohranjeni u Informacijskom sustavu znanosti RH. Ako je ovo greška, CroRIS produkcijskoj okolini moguće je pristupi putem poveznice www.croris.hr
izvor podataka: crosbi

Blockchain Enabled Anonymous Privacy‐Preserving Authentication Scheme for Internet of Health Things (CROSBI ID 318217)

Prilog u časopisu | izvorni znanstveni rad | međunarodna recenzija

Rajasekaran, Arun Sekar ; Maria, Azees ; Rajagopal, Maheswar ; Lorincz, Josip Blockchain Enabled Anonymous Privacy‐Preserving Authentication Scheme for Internet of Health Things // Sensors, 23 (2023), 1; 240, 26. doi: 10.3390/s23010240

Podaci o odgovornosti

Rajasekaran, Arun Sekar ; Maria, Azees ; Rajagopal, Maheswar ; Lorincz, Josip

engleski

Blockchain Enabled Anonymous Privacy‐Preserving Authentication Scheme for Internet of Health Things

The Internet of Health Things (IoHT) has emerged as an attractive networking paradigm in wireless communications, integrated devices and embedded system technologies. In the IoHT, real‐time health data are collected through smart healthcare sensors and, in recent years, the IoHT has started to have an important role in the Internet of Things technology. Although the IoHT provides comfort in health monitoring, it also imposes security challenges in maintaining patient data confidentiality and privacy. To overcome such security issues, in this paper, a novel blockchainbased privacy‐preserving authentication scheme is proposed as an approach for achieving efficient authentication of the patient without the involvement of a trusted entity. Moreover, a secure handover authentication mechanism that ensures avoiding the patient re‐authentication in multi‐doctor communication scenarios and revoking the possible malicious misbehavior of medical professionals in the IoHT communication with the patient is developed. The performance of the proposed authentication and handover scheme is analyzed concerning the existing state‐of‐the‐art authentication schemes. The results of the performance analyses reveal that the proposed authentication scheme is resistant to different types of security attacks. Moreover, the results of analyses show that the proposed authentication scheme outperforms similar state‐of‐the‐art authentication schemes in terms of having lower computational, communication and storage costs. Therefore, the novel authentication and handover scheme has proven practical applicability and represents a valuable contribution to improving the security of communication in IoHT networks.

wireless ; IoT ; health ; private key ; attack ; secure ; privacy ; sensor ; network ; cryptography

nije evidentirano

nije evidentirano

nije evidentirano

nije evidentirano

nije evidentirano

nije evidentirano

Podaci o izdanju

23 (1)

2023.

240

26

objavljeno

1424-8220

10.3390/s23010240

Povezanost rada

Elektrotehnika, Informacijske i komunikacijske znanosti, Računarstvo

Poveznice
Indeksiranost