Abstract:Telecare medical information system (TMIS) implemented in wireless body area network (WBAN) is convenient and time-saving for patients and doctors. TMIS is realized using wearable devices worn by a patient, and wearable devices generate patient health data and transmit them to a server through a public channel. Unfortunately, a malicious attacker can attempt performing various attacks through such a channel. Therefore, establishing a secure authentication process between a patient and a server is essential. Mo… Show more
“…1) We show that the proposed protocol by Son et al [21] suffers from secret disclosure attack and also insider attack. 2) We present an off-line password guessing by an insider attacker against the proposed protocol by Yu et al [22], IoV-SMAP.…”
Section: A Our Contributionsmentioning
confidence: 82%
“…Content may change prior to final publication. [21]. The proposed protocol is based on bilinear pairings as the main source of the security.…”
Section: Questioning the Security Of Son Et Al's Protocolmentioning
confidence: 99%
“…While EGP aims to ensure the security of the communication between the protocol's parties with ultra-lightweight components, some other protocols employed more promising components. Among them, Son et al recently used blockchain to propose an authentication protocol for cloudbased telecare medical information system (TMIS) [21]. The proposed protocol is based on bilinear pairings as the main source of the security.…”
The result was created in solving the standard project no. 7429/2020/02 "System approach to selected ICT trends" using institutional support for long-term conceptual development of research of the University of Finance and Administration, Prague.
“…1) We show that the proposed protocol by Son et al [21] suffers from secret disclosure attack and also insider attack. 2) We present an off-line password guessing by an insider attacker against the proposed protocol by Yu et al [22], IoV-SMAP.…”
Section: A Our Contributionsmentioning
confidence: 82%
“…Content may change prior to final publication. [21]. The proposed protocol is based on bilinear pairings as the main source of the security.…”
Section: Questioning the Security Of Son Et Al's Protocolmentioning
confidence: 99%
“…While EGP aims to ensure the security of the communication between the protocol's parties with ultra-lightweight components, some other protocols employed more promising components. Among them, Son et al recently used blockchain to propose an authentication protocol for cloudbased telecare medical information system (TMIS) [21]. The proposed protocol is based on bilinear pairings as the main source of the security.…”
The result was created in solving the standard project no. 7429/2020/02 "System approach to selected ICT trends" using institutional support for long-term conceptual development of research of the University of Finance and Administration, Prague.
“…Considering the limitation of the storage capability of blockchain and the massive amount of physiological data collected from patients, the integration of cloud-assisted wireless body area network (WBAN) with blockchain in the smart medical system is investigated in studies [20] , [21] , [22] . In [20] , a blockchain-enabled storage mechanism in the cloud-assisted WBAN is proposed.…”
Section: Related Workmentioning
confidence: 99%
“…In [20] , a blockchain-enabled storage mechanism in the cloud-assisted WBAN is proposed. Meanwhile, the authors in [21] investigate a telecare medical information system, which is implemented in the cloud-assisted WBAN. To guarantee the security of patient health data, they also design the blockchain-based authentication protocol for this system.…”
The outbreak of the COVID-19 pandemic has deeply influenced the lifestyle of the general public and the healthcare system of the society. As a promising approach to address the emerging challenges caused by the epidemic of infectious diseases like COVID-19, Internet of Medical Things (IoMT) deployed in hospitals, clinics, and healthcare centers can save the diagnosis time and improve the efficiency of medical resources though privacy and security concerns of IoMT stall the wide adoption. In order to tackle the privacy, security, and interoperability issues of IoMT, we propose a framework of blockchain-enabled IoMT by introducing blockchain to incumbent IoMT systems. In this paper, we review the benefits of this architecture and illustrate the opportunities brought by blockchain-enabled IoMT. We also provide use cases of blockchain-enabled IoMT on fighting against the COVID-19 pandemic, including the prevention of infectious diseases, location sharing and contact tracing, and the supply chain of injectable medicines. We also outline future work in this area.
Cloud computing is an emerging paradigm for hosting and delivering Internet services. This technological trend is increasingly attracting individuals and organizations in different disciplines. Healthcare is at the top of fields where cloud becomes widely adopted to provide remote services and real‐time monitoring for patients and medical stakeholders. However, as sensitive health data are sent over insecure cloud networks and stored in the cloud anywhere across the globe, a reliable system meeting security requirements is of utmost importance, particularity in terms of authentication, access control and traceability. In this article, we propose an innovative security‐aware framework typically dedicated for cloud‐assisted healthcare environments. Our framework is mainly based on three efficient mechanisms. First, we introduce an anonymous authentication process based on mobile agents and elliptic curve cryptography to ensure a secure and flexible communication between the cloud and users. The second mechanism designs a fine‐grained data access control model, which beneficially associates the notions of attribute, role, task, constraint, and session. Moreover, we integrate a user behavior analysis performed by mobile agents, which perceive and trace users behaviors to depict potential vulnerabilities and anomalous activities on sensitive resources. The security analysis and the experiments being conducted demonstrate that our contribution is provably secure and shows very promising features.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.