scholarly journals A Multi-Message Multi-Receiver Signcryption Scheme with Edge Computing for Secure and Reliable Wireless Internet of Medical Things Communications

2021 ◽  
Vol 13 (23) ◽  
pp. 13184
Author(s):  
Insaf Ullah ◽  
Muhammad Asghar Khan ◽  
Ali Alkhalifah ◽  
Rosdiadee Nordin ◽  
Mohammed H. Alsharif ◽  
...  

Thanks to recent advancements in biomedical sensors, wireless networking technologies, and information networks, traditional healthcare methods are evolving into a new healthcare infrastructure known as the Internet of Medical Things (IoMT). It enables patients in remote areas to obtain preventative or proactive healthcare services at a cheaper cost through the ease of time-independent interaction. Despite the many benefits of IoMT, the ubiquitously linked devices offer significant security and privacy concerns for patient data. In the literature, several multi-message and multi-receiver signcryption schemes have been proposed that use traditional public-key cryptography, identity-based cryptography, or certificateless cryptography methods to securely transfer patient health-related data from a variety of biomedical sensors to healthcare professionals. However, certificate management, key escrow, and key distribution are all complications with these methods. Furthermore, in terms of IoMT performance and privacy requirements, they are impractical. This article aims to include edge computing into an IoMT with secure deployment employing a multi-message and multi-receiver signcryption scheme to address these issues. In the proposed method, certificate-based signcryption and hyperelliptic curve cryptography (HECC) have been coupled for excellent performance and security. The cost study confirms that the proposed scheme is better than the existing schemes in terms of computational and communication costs.

2020 ◽  
Vol 2020 ◽  
pp. 1-9 ◽  
Author(s):  
Maria-Dolores Cano ◽  
Antonio Cañavate-Sanchez

The disclosure of personal and private information is one of the main challenges of the Internet of Medical Things (IoMT). Most IoMT-based services, applications, and platforms follow a common architecture where wearables or other medical devices capture data that are forwarded to the cloud. In this scenario, edge computing brings new opportunities to enhance the operation of IoMT. However, despite the benefits, the inherent characteristics of edge computing require countermeasures to address the security and privacy issues that IoMT gives rise to. The restrictions of IoT devices in terms of battery, memory, hardware resources, or computing capabilities have led to a common agreement for the use of elliptic curve cryptography (ECC) with hardware or software implementations. As an example, the elliptic curve digital signature algorithm (ECDSA) is widely used by IoT devices to compute digital signatures. On the other hand, it is well known that dual signature has been an effective method to provide consumer privacy in classic e-commerce services. This article joins both approaches. It presents a novel solution to enhanced security and the preservation of data privacy in communications between IoMT devices and the cloud via edge computing devices. While data source anonymity is achieved from the cloud perspective, integrity and origin authentication of the collected data is also provided. In addition, computational requirements and complexity are kept to a minimum.


2021 ◽  
Author(s):  
Jinyong Chang ◽  
Qiaochuan Ren ◽  
Anling Zhang

Abstract The interconnecting of the biomedical sensors (in healthcare system) with cloud for the internet-of-medical-things (IoMT) technology has great potential to ameliorate people's living conditions. The privacy-preserving of personal health information (PHI) and the mutual authentication between the sensors and other entities are two main factors that affect the further applications of cloud-centric IoMT technology. In the recent work [IEEE IoT Journal, vol. 7(10), 10650-10659, 2020], Kumar and Chand applied identity-based aggregate signcryption scheme to the smart healthcare system (KC-system, for short), which provides privacy-preserving of PHI and the mutual authentication function, simultaneously. However, in this paper, we carefully analyze the security of KCsystem and find out that the critical authentication keys of entities can be easily recovered from their communication contents. In other words, the mutual authentication function of KC-system can be easily broken. Moreover, the recovering of the keys will lead to the tedious processes, including obtaining partial private key (from network manager) and requesting for key-protection (from key-protection servers), become completely useless. Finally, we remark that it seems to be hard to remedy the current KC-system so that it is immune to our attack.


2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Aroosa ◽  
Syed Sajid Ullah ◽  
Saddam Hussain ◽  
Roobaea Alroobaea ◽  
Ihsan Ali

The Internet of Health Things (IoHT) is an extended version of the Internet of Things that is acting a starring role in data sharing remotely. These remote data sources consist of physiological processes, such as treatment progress, patient monitoring, and consultation. The main purpose of IoHT platform is to intervene independently from geographically remote areas by providing low-cost preventive or active healthcare services. Several low-power biomedical sensors with limited computing capabilities provide IoHT’s communication, integration, computation, and interoperability. However, IoHT transfers IoT data via IP-centric Internet, which has implications for security and privacy. To address this issue, in this paper, we suggest using named data networking (NDN), a future Internet model that is well suited for mobile patients and caregivers. As the IoHT contains a lot of personal information about a user’s physical condition, which can be detrimental to users’ finances and health if leaked, therefore, data protection is important in the IoHT. Experts and scholars have researched this area, but the reconstruction of existing schemes could be further improved. Also, doing computing-intensive tasks leads to slower response times, which further worsens the performance of IoHT. We are trying to resolve such an error, so a new NDN-based certificateless signcryption scheme is proposed for IoHT using the security hardness of the hyperelliptic curve cryptosystem. Security analysis and comparisons with existing schemes show the viability of the designed scheme. The final results confirm that the designed scheme provides better security with minimal computational and communicational resources. Finally, we validate the security of the designed scheme against man-in-the-middle attacks and replay attacks using the AVISPA tool.


Author(s):  
Pijush Kanti Dutta Pramanik ◽  
Saurabh Pal ◽  
Moutan Mukhopadhyay

Like other fields, the healthcare sector has also been greatly impacted by big data. A huge volume of healthcare data and other related data are being continually generated from diverse sources. Tapping and analysing these data, suitably, would open up new avenues and opportunities for healthcare services. In view of that, this paper aims to present a systematic overview of big data and big data analytics, applicable to modern-day healthcare. Acknowledging the massive upsurge in healthcare data generation, various ‘V's, specific to healthcare big data, are identified. Different types of data analytics, applicable to healthcare, are discussed. Along with presenting the technological backbone of healthcare big data and analytics, the advantages and challenges of healthcare big data are meticulously explained. A brief report on the present and future market of healthcare big data and analytics is also presented. Besides, several applications and use cases are discussed with sufficient details.


Author(s):  
Muhammad Elsayeh ◽  
Kadry Ali Ezzat ◽  
Hany El-Nashar ◽  
Lamia Nabil Omran

The internet of medical things (IoMT) has a great role in improving the health around the world. IoMT is having a great impact in our life in which the clinical data of the patient is observed and checked and then can be transferred to the third party for using in the future such as the cloud. IoMT is a huge data system with a continuous developing rate, which implies that we should keep a lot of data secure. We propose a combined security architecture that fuses the standard architecture and new blockchain technology. Blockchain is a temper digital ledger which gives peer-to-peer communication and provides communication between non-trust individuals. Using standard in-depth strategy and blockchain, we are able to develop a method to collect vital signs data from IoMT and connected devices and use blockchain to store and retrieve the collected data in a secure and decentralized fashion within a closed system, suitable for healthcare providers such as private clinics, hospitals, and healthcare organizations were sharing data with each other is required. Right now initially examine the innovation behind Blockchain then propose IoMT-based security architecture utilizing Blockchain to guarantee the security of information transmission between associated nodes. Experimental analysis shows that the proposed scheme presents a non-significant overhead; yet it brings major advantages to meet the standard security and privacy requirements in IoMT.


Author(s):  
Jelena Mirkovic ◽  
Haakon Bryhni

The use of mobile and wireless technologies has great potential to improve the efficiency and quality of healthcare delivery. The main goal of this chapter is to describe the current state of the art in the research field of development and integration of mobile services in the healthcare sector by addressing the two main challenges: usability and security. The authors investigate the main requirements and approaches for developing highly usable, user-friendly, and well-accepted mobile healthcare services. In addition, they identify various ways of addressing security and privacy issues in mobile healthcare services and discuss the advantages and shortcomings of each approach. Finally, the chapter presents the CONNECT (Care Online: Novel Networks to Enhance Communication and Treatment) project and describes how security and usability issues can be addressed during the development of mobile access to a multi-modal Internet-based patient support system.


Author(s):  
Manoranjini J. ◽  
Anbuchelian S.

The rapid massive growth of IoT and the explosive increase in the data used and created in the edge networks led to several complications in the cloud technology. Edge computing is an emerging technology which is ensuring itself as a promising technology. The authors mainly focus on the security and privacy issues and their solutions. There are a lot of important features which make edge computing the most promising technology. In this chapter, they emphasize the security and privacy issues. They also discuss various architectures that enable us to ensure safe technologies and also provide an analysis on various designs that enable strong security models. Next, they make a detailed study on different cryptographic techniques and trust management systems. This study helps us to identify the pros and cons that led us to promising implementations of edge computing in the current scenario. At the end of the chapter, the authors discuss on various open research areas which could be the thrust areas for the next era.


Sign in / Sign up

Export Citation Format

Share Document