2021
DOI: 10.1109/jsac.2020.3020655
|View full text |Cite
|
Sign up to set email alerts
|

A Decoupled Blockchain Approach for Edge-Envisioned IoT-Based Healthcare Monitoring

Abstract: The in-house health monitoring sensors form a large network of Internet of things (IoT) that continuously monitors and sends the data to the nearby devices or server. However, the connectivity of these IoT-based sensors with different entities leads to security loopholes wherein the adversary can exploit the vulnerabilities due to the openness of the data. This is a major concern especially in the healthcare sector where the change in data values from sensors can change the course of diagnosis which can cause … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
64
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 131 publications
(64 citation statements)
references
References 30 publications
0
64
0
Order By: Relevance
“…Hence, the proposed framework is secured against the 51% attack and selfish mining attack. [58], and Islam and Shin [59] do not provide required security and functionality features like "provides session-key agreement," "provides session key security under CK adversary model," "availability of password update phase," "availability of biometric update phase," "availability of dynamic controller node (personal server) addition phase," "availability of dynamic smart healthcare device addition," "provides formal security verification using AVISPA/ SCYTHER tool," and "provides formal security analysis under Real-or-Random (RoR) model." Moreover, Garg et al' scheme [23] does not support feature like AI-based data analysis.…”
Section: Prevention Of 51% Attack and Selfishmentioning
confidence: 99%
See 1 more Smart Citation
“…Hence, the proposed framework is secured against the 51% attack and selfish mining attack. [58], and Islam and Shin [59] do not provide required security and functionality features like "provides session-key agreement," "provides session key security under CK adversary model," "availability of password update phase," "availability of biometric update phase," "availability of dynamic controller node (personal server) addition phase," "availability of dynamic smart healthcare device addition," "provides formal security verification using AVISPA/ SCYTHER tool," and "provides formal security analysis under Real-or-Random (RoR) model." Moreover, Garg et al' scheme [23] does not support feature like AI-based data analysis.…”
Section: Prevention Of 51% Attack and Selfishmentioning
confidence: 99%
“…A comparative study of the proposed framework and other closely related frameworks is conducted. Various frameworks, for example,Liu et al's framework [54], Garg et al's framework [23], Saha et al's framework [55], Xiang et al's framework [56], Xu et al's framework[57], Aujla and Jindal's framework[58], and Islam and Shin's framework[59] are analysed and compared. The details of comparisons are given in Table2.…”
mentioning
confidence: 99%
“…For instance, Volkswagen is building a Blockchain-based tracking system to avoid the manipulation of odometer done by the sellers to increase the price of their cars [7]. With the introduction of edge computing in intelligent driving, the vehicle movement, the time-sensitivity at which data is processed, and the allocation of the resource of the EC server have become an essential factor in intelligent driving [56,57]. To remove dependencies on third-party platforms, the authors of [37] have resource transaction architecture that is based on Blockchain.…”
Section: Blockchainmentioning
confidence: 99%
“…Such systems can be highly useful for early screening and monitoring of easily transmitted diseases such as COVID-19. Block-chain based approaches have also been proposed for edge based healthcare monitoring [7]. Use of deep learning based image analysis has shown tremendous impact in classic medical problems like brain tumor classification [66] and endoscopy [67].…”
Section: Introductionmentioning
confidence: 99%