1. Introduction
Allied Market Research published research [1] that shows the IoMT global market was USD 41.17 billion in 2020 and is projected to grow to USD 187.6 billion in 2028. It is predicted that the blockchain-based IoMT will proliferate in providing security, privacy, and effective insurance processing in the present era [2,3,4,5,6,7,8,9]. IoMT offers a connected environment of sensors along with related devices, which function in capturing and measuring, recognizing and classifying, assessing risk, informing, making decisions, and taking actions. In the hospital environment, the use of the IoMT contributes to the use of smart and connected equipment for better inventory management, real-time location services, resource utilization, and patient/personnel flow tools [2,3,6]. With the modern technological evolutions in the IoMT, without the need of visiting a hospital, patients’ clinical data can be remotely monitored and processed with real-time data systems. At any moment, these data can be relocated to the cloud for future use [10,11,12,13].
One of the main challenges that is faced by the designers of the IoMT is especially related to the protection of the system and real-time communication between the connected devices [14,15]. The IoMT systems are very often crucial for human life (especially in the area of healthcare and monitoring systems); thus, they should be extremely trustworthy and secure, preventing unauthorized access. One possible solution to this problem relies on Blockchain technology [16,17,18]. This technique is a tamper-proof digital ledger with a secure Peer-to-Peer (P2P) communication feature [5,7,8,9], and has already been successfully utilized both in business and personal applications [19,20,21]. The initial “chain of blocks” idea appeared in 1991 [22] when this technology was used to mark documents with timestamps. In recent years, Blockchain has become very popular due to its application in cryptocurrencies (formerly Bitcoin [23] in 2009). However, its architecture offers wide possibilities for applications in other areas of human life, including healthcare systems [24,25,26,27,28], and trusted and secure durable medium e-services [29]. Besides the security aspect, blockchain can also be used in trusted transactions, by the introduction of the TTP to the applied system. This solution is very often applied in modern blockchain-based techniques in order to prevent tampering with the blockchain database [30,31,32,33]. Moreover, it permits immutability and transparency of the data stored within the system [34,35]. Conversely, TTP can be problematic because each user of the system should agree on its use. Nevertheless, let us point out that it is possible to apply blockchain technology to empower communication among non-trusting members devoid of the third party [11].
When it comes to the application of Blockchain technology to the IoMT, such a combination may bring several measurable benefits, mainly in the healthcare area. It seems that IoMT architecture employing Blockchain technology is much better than cloud-based IoMT architecture because it enables a global view of the patient’s medical records in an efficient, verifiable, and permanent way. The security of the information in cloud-based IoMT architecture is the foremost problem in real-time data communication in connected networks [10,11,12,13]. Nevertheless, the scientific problem relates to the reliance of IoMT architectures on the centralized cloud, resulting in vulnerability. Therefore, this paper deals with the above problems, in particular, those related to the drawbacks of cloud-based IoMT architecture and current centralized IoMT systems (e.g., in hospitals).
The main contribution proposed of this paper can be summarized as follows:
-. A holistic overview of the currently applied Blockchain-based methods oriented on IoMT;
-. proposition of a novel trusted and secure Blockchain-based architecture for Internet-of-Medical-Things (BIoMT architecture);
-. analysis and discussion of the security aspects of the proposed solution with the application of the Elliptic Curve Digital Signature Algorithm (ECDSA);
-. implementation and experimental verification of the proposed BIoMT architecture with the use of the MultiChain platform.
The remainder of the paper is structured as follows. Section 2 presents Blockchain technology’s unique benefits for IoMT architectures. Section 3 describes in detail the proposed BIoMT architecture. The implementation and experimental verification of the proposed approach are presented in Section 4, and Section 5 concludes the paper. Table 1 gives the abbreviations used in the paper.
2. Blockchain Technology’s Unique Benefits for IoMT Architectures
This section presents the most important unique Blockchain technology advantages regarding its application in present IoMT systems [5,6,7,8,9]. It seems that BIoMT can underpin a revolution in the field of IoMT. The following capabilities of the Blockchain make it very suitable as a foundational element of IoMT solutions (each of these are discussed later in this section):
trustworthy and secure solution;
decentralized, trustless nodes;
autonomous functioning.
Blockchain technology has the unique ability to maintain the trusted ledger of all transactions that are taking place in real-time in the network. Therefore, trustworthiness is the main advantage of the huge scalability in the IoT and IoMT networks of billions of connected devices. To build trustworthiness in IoMT, Blockchain features such as trust, immutability, and verifiability can be applied [36,37,38,39].
Blockchain is usually implemented as a public network. This means that all participating members can see transactions stored within Blockchain; however, the actual content of the personal transaction (block content) is secured by the user’s private key. Moreover, Blockchain can be treated as a public ledger of all transactions maintained by the different decentralized nodes. Due to decentralization, no single authority is responsible for approving the transactions or setting specific rules for accepting them. In other words, its distributed and consensus mechanism plays an important role in this process of acceptance. Moreover, trust in the solution is a key factor here because, to accept the transaction by all connected nodes, a consensus is needed between them. Consequently, the resulting system is a more resilient ecosystem for connected devices. All the real-time transactions are linked with cryptographic keys and immutable ledgers; therefore, tampering with or removing the stored information is very difficult. Such a tamper-proof system meets several compliance and regulatory necessities of industrial IoT (IIoT) applications and will be useful for IoMT systems too [36,37,38,39].
Blockchain is, by definition, secure. Moreover, the cryptographic algorithms used by Blockchain can make the user data more private. The public audit, consensus mechanisms, and timestamps are used for storing the data in an immutable manner. This enables the architecture to maintain the CIA (Confidentiality, Integrity, and Availability) triad. Conventional information security practices impose the enactment of the principles of the CIA triad. Blockchain technology uses the unique operational distributed database, which is the form of data storage for all the nodes. An excellent feature is that this structural distributed database stores the data in an encrypted form, which is validated using various checks such as Merkle Hash Tree (MHT) and Elliptic Curve Cryptography (ECC). Moreover, researchers continue to implement Public Key Infrastructure (PKI). Such solutions are usually based on the ECC or on the techniques that involve primes (e.g., RSA cryptosystem [40,41]). In the case of Blockchain-based systems, PKI increases the security of data management. Furthermore, it is worth mentioning that Man-in-the-Middle (MITM) attacks are less possible if Blockchain technology is used, because the Blockchain is tamper-proof and no malicious actor can alter or manipulate the data. This is due to the fact that data is stored in multiple locations, rather than a single location [36,37,38,39]. Moreover, the potential interception of a single thread of communication poses no danger [42].
Regarding the IoMT, data produced by such systems (including smart medical devices) can be maintained and kept secure by the Blockchain. This means that IoMT devices may be able to work independently without the need for a centralized authority. Blockchain enables a decentralized P2P network where all the transactions are verified and validated by a consensus among peers. Therefore, in principle, this network is also trust-free, as there is no requirement for trusting each other, which can be beneficial for IoMT systems.
Furthermore, Blockchain makes trust-free P2P messaging possible, which is also required for IoMT. The Blockchain network is resilient to failures due to its decentralized P2P network. It is indeed an immutable and durable ledger, so after consensus among the peers, when all the real-time transactions are recorded in the Blockchain, then no alterations or deletions are possible.
Finally, Blockchain technology can be very useful for tracking connected medical devices, resulting in a quicker distribution of transactions along with the coordination between the connected devices. In other words, it can contribute to major savings for hospitals and the whole healthcare sector.
In conclusion, the main advantages of using Blockchain technology in IoMT can be summarized as:
Trustworthiness in IoMT.
Blockchain features such as trust, immutability, and verifiability can be applied in present IoMT systems.
Due to decentralization, no single authority will be responsible for approving the transactions or setting specific rules for accepting them in the IoMT system with this technology.
The distributed and consensus mechanism plays an important role in this process of acceptance.
The tamper-proof system of the Blockchain technology meets several compliance and regulatory necessities of both industrial IoT and IoMT systems.
Security is enhanced by Blockchain technology in IoMT systems via the use of cryptographic algorithms.
The validation process in Blockchain uses various checks such as MHT and ECC, and is another reason for more security.
The CIA triad is maintained using Blockchain technology in IoMT.
Dangerous MITM attacks are less possible with the use of Blockchain technology, due to features such as being tamper-proof and malicious actors being unable to alter or manipulate the data. We know that the data is stored in multiple locations.
Blockchain’s decentralized P2P network is highly advantageous as all the transactions are verified and validated by a consensus among peers; as a result, there is no requirement for trusting each other, thus enabling trust-free networks in IoMT.
Feature such as tracking by use of Blockchain technology results in faster transactions in IoMT systems. Significant economic benefits exist for hospitals and allied industries.
Clearly, it is very well understood that the use of Blockchain technology may enhance many aspects such as security, efficiency, trustworthiness, and privacy due to the maintenance of P2P networking.
3. The Proposed Blockchain-Based IoMT Architecture
Here we present the proposed IoMT architecture. The technique is based on Blockchain technology. As discussed earlier, in the healthcare area the contribution of IoMT can be the development of real-time connected and smart equipment, which can be used for better inventory management and resource utilization, along with location services and patient and personnel flow tools [7]. It is well understood that patient use of IoMT devices reduces hospital visits to a minimum, and patients’ clinical data can be remotely monitored, analyzed, and gathered with real-time data systems [2,3,4,6]. These data can also be stored in the cloud for future use. Of course, such a huge amount of sensitive data must be protected against unauthorized access or tampering.
Figure 1 shows an exemplary cloud-based hospital application architecture in the present IoMT system [7,10,11,12,13]. The IoMT network is able to incorporate all smart connected things as a part of the IoMT system. However, it is a well-known fact that, in a centralized cloud-based system, single-point failure (especially key points) is a major weakness.
At present, these cloud-based architectures manage threats such as Distributed Denial-of-Service (DDoS) attacks, Address Resolution Protocol (ARP) spoofing attacks, various phishing and configuration threats, and network congestion. The weak point of the centralized, client-server-based architecture with a centralized control system is that, if the centralized system collapses, then the whole system (with connected devices) will stop functioning properly. Thus, there is a need for a new kind of secure distributed communication. Blockchain technology’s advantages can help to resolve these problems as discussed in the previous section.
Figure 2 shows the proposed IoMT architecture with the use of Blockchain technology. To uphold accountability and auditability of the network, a private Blockchain can be used in the proposed BIoMT architecture, which will help provide authentic users with access to the network. The data kept on the Blockchain are signed, so the responsibility lies on the users—anyone who gains access to the data is responsible for their actions taken on it.
According to Figure 2, it is clear how the Blockchain technology’s advantages discussed earlier can be implemented in BIoMT to maintain data of the patient, monitor reports and the patient’s condition in real-time systems, and securely maintain medical test reports. The IoMT architecture with the use of Blockchain technology (BIoMT) is a unique and novel approach for the protected transmission of all patient health reports to safeguard medical data. It is well understood that, being a decentralized architecture, the Blockchain-based methodology can resolve several problems of the centralized cloud architectures. Figure 3 is a micro-detailed diagram to show how the Proof-of-Work (PoW) consensus protocol is used in the proposed model, starting from adding a new report in the patient medical file to the formation stored in the chain.
The proposed BIoMT architecture shown in Figure 3 is a unique and novel solution for the protected transmission of all patients’ health reports, with the ultimate goal of securing medical data. It is well understood that, being a decentralized architecture, the Blockchain-based methodology can resolve several problems with centralized cloud architectures.
The proposed Blockchain-based IoMT architecture is able to handle highly sensitive security and privacy concerns due to the principles of the Blockchain technology’s inherent security features. Hence, the use of the Blockchain will ensure the security of patients’ clinical records in practice and will be able to grant tamper-free open access to all nodes in the IoMT network.
The possibility of using enhanced security is another goal of the proposed BIoMT architecture. ECDSA [43] is already in use in several Blockchain-based architectures and Bitcoin [44,45] (see Section 4.2 for more details). Nonetheless, some security aspects and efficiency are a challenge for these solutions [46,47].
4. Experimental Verification of the Proposed Solution
The proposed trusted and secure blockchain architecture was verified experimentally. To achieve this, a real-world case of the IoMT database was prototyped. This section describes the performed experimental verification. Firstly, the structure of the used blockchain is shown. Next, the applied signing technique is described in detail. Finally, the results achieved are presented and discussed.
4.1. The Blockchain Structure
The proposed blockchain structure is presented in Figure 4. Several fields of the presented database ( “index”, “timestamp”, etc.) are enforced by the blockchain structure itself, whereas the others are explained in this subsection.
It is assumed that the network can keep many types of blocks (specified with a numeric field “block_type”), e.g., the value “1” means that the block contains data generated by the IoMT device, the value “2” means that data comes from hospital patient monitoring system, and the value “3” denotes the data contains the medical report. It should be noted that the proposed approach is not limited to these three types of blocks and can be freely extended to any number of block types.
The subsequent field “data_provider” denotes the source of the data, e.g., the identification number of the IoMT device and the department name (in the case of a medical report).
Medical data can be provided by specialized medical devices (e.g., blood pressure monitors, glucometers) and smart bands or IoT/IoMT sensors, which have become very popular in recent years. The latter are not certified medical devices, which means that the medical data collected by them are uncertain and not reliable for health staff; nonetheless, such devices may be useful in the overall assessment of the patient’s health and should be kept in the blockchain. Therefore, the field “data_reliability” can be very useful to assess the reliability of the data.
The next field, “patient_id”, specifies the patient or indicates (the value “0”) that the data do not relate to a single patient (e.g., in the case of medical reports). The last field is intended for the actual medical records, patient data, healthcare reports, etc.
4.2. Signing Data with ECDSA
It is well known that cybersecurity attacks occur, such as DDoS, ARP spoofing attacks, various phishing and configuration threats, and network congestion, on the present CPS, IoT, and IoMT architectures used in Industry 4.0 applications [36,37,38,39]. These attacks are very dangerous to the security of the CIA triad of data. Moreover, as a whole, these attacks can have significant impacts on the efficient functioning of these systems. Industry 4.0 applications are struggling to deal with the CIA triad, along with access control and authorization. One of the reasons for this could be the increasing automation of these systems, resulting in new kinds of cyberattacks and consequently increasing substantial financial losses. Therefore, many cryptocurrencies and Blockchain-based systems use ECDSA [43,44,45]. In this section, we propose the ECDSA, which is used in many Blockchain-based systems and can be successfully applied as a part of the proposed BIoMT architecture, especially for the signing of medical records and patient medical data.
Let us start with the general analysis of the Elliptic Curve (EC) technique. According to [48], the Elliptic Curve method consists of the following steps:
Let GF(f) be a prime field.
Then let s, t ∈ GF(f) be constant such that 4s3 + 27t2 ≠ 0.
An EC E(s, t), over GF(f), is considered the set of points (x, y) ∈ GF(f) which fulfil Equation (1), called the “short Weierstrass form” [49]:
y2 = x3 + Sx + T(1)
where S and T are constant.Furthermore, it is well known that if G is a group, then the Elliptic Curve Discrete Logarithm Problem (ECDLP) is used to find the integer a for group elements S and T in such a way that T = aS [50].
There is a constant need to search for faster and more computationally efficient cryptographic algorithms, of which ECDSA [43,44,45] is one. ECDSA was invented in 1992 by Scott Vanstone [43]. As an ANSI standard, it was released in 1999.
The proposed use of ECDSA for signing the medical records (kept in the block in the blockchain) consists of the following steps:
Generation of the Key:
(a). the required chosen EC is well defined over a finite field Fc with the characteristic c, and with a base point G ∈ Ec(s, t) with an order of n;
(b). select a random integer h such that 1 ≤ h ≤ n − 1;
(c). compute T = h × G and finally, the public key pair is (T, h).
(d). the public key pair is (T, h).
Generation of the Signature (let m be medical records to be signed):
(a). select an integer k in such a way that 1 ≤ k ≤ n − 1,
(b). compute k × G = (x1, y1),
(c). compute r = x1 mod n:
if r = 0 then select new k.
(d). compute k − 1 mod n and e = h(m).
(e). compute s = p−1(e + kr):
if s = 0 then go to step (2a).
(f). pair (r, s) is the generated signature for the medical records m.
Verification of the signature (r, s) of medical records m signed by verifier V:
(a). verify (by V) whether r, s ϵ [1, n − 1],
(b). compute e = h(m) and s−1,
(c). compute u = es−1 mod n and v = rs−1 mod n,
(d). compute w = (x2, y2) = uG + vT:
if w = 0 then stop
else compute t = x2 mod n.
The signature is valid only if t ≡ r. Proof of the verification process is in Equation (2):
kG = s−1(e + kr)G mod n = s−1eG + s−1rkG mod n = uG + vQ mod n(2)
Therefore, uG + vT = kG and so t = r, which is requisite.
Finally, it is a well-known fact that the cryptographic security of Public Key Cryptography (PKC) based on EC relies on an intractable mathematical problem known as the Discrete Logarithm Problem (DLP) [43,48,51]. Because the EC does not have a sub-exponential-time algorithm to solve ECDLP [43,44,45], ECDSA can be used to encrypt and sign the data from the IoMT devices before adding it to the blockchain.
There are several threats to present IoMT systems [52], but BIoMT is able to solve MITM and DOS attacks by maintaining the CIA triad or implementing special intrusion detection and prevention systems, as proposed in [52]. Such a solution is capable of discriminating between and automatically mitigating selected cyberattacks by applying machine learning and software-defined networking technologies. Another e-health technique analyzed in [53] proves that using Blockchain technology in electronic health record systems makes health care data more secure and sustainable. It is worth noting that any BIoMT architecture ensures the utmost security and handles privacy threats by applying the Blockchain principles mentioned in Section 2. Therefore, using the Blockchain with ECDSA assures that, in practice, the security of patient clinical records will be able to be openly accessed and remain tamper-free. Moreover, the BIoMT architecture using Blockchain technology together with ECDSA will be able to meet the requirements of the CIA triad regarding data communication in BIoMT systems.
4.3. The Experimental Verification
The proposed BIoMT architecture was implemented using the MultiChain platform [54] and verified experimentally. In our research, the private version of the blockchain is used. This means that access to the blocks stored in the blockchain is possible only with the appropriate access permissions. Moreover, due to security reasons, only one blockchain is generated (data stored in one blockchain decrease the possibility of blockchain manipulation). The blockchain was created on one computer (Intel i7 processor, 16 GB RAM, 250 GB SSD, Windows 10), and a second (with similar technical parameters) was used to access and manage the blockchain. The selected, most important blockchain parameters used in the implementation of the BIoMT architecture are presented in Table 2.
The implemented blockchain consists of 218 blocks, and more than 10k transactions. A snapshot of 21 examples is presented in the screenshot in Figure 5. As can be seen, there are 17 transactions (marked in blue) that refer to the medical data. Furthermore, there are three transactions (marked in red) that are used to grant permissions. Moreover, there is an additional transaction (marked in grey) that refers to the empty round, and thus it contains no data.
The example content of one selected block is presented in Figure 6. As can be seen, block number 208 contains as many as 14 transactions.
In the implemented BIoMT architecture, five streams are created, and the appropriate numbers of publishers (addresses) for each. Selections are shown in the screenshot in Figure 7.
Finally, there was a need to grant adequate permission to the previously created publishers (addresses). In our implementation we use, among other addresses:
two addresses with permission “mine”, which are assigned to two miners responsible for confirming transactions in the blockchain;
seven addresses with permission “send”, which represent the patient’s IoMT devices; one address for one patient’s device (e.g., smartphone) with access to the blockchain;
two addresses with permission “send”, which represent the hospital patient monitoring system;
one address with permission “connect”, which represents the hospital diagnostic center (this center has access to all blocks in the blockchain).
Summarizing the performed experimental verification of the proposed BIoMT architecture, the implementation of blockchain works properly and effectively thanks to the use of the MultiChain platform and specially dedicated scripts created by the authors.
4.4. Performance Evaluation
To estimate the performance of the implemented BIoMT architecture, additional research was undertaken. Three selected types of blockchain transactions were chosen, which correspond to typical medical data stored on the blockchain in BIoMT architecture:
Transaction with data stored in text form. This is a typical transaction to keep information about the patient personal data or simple test results, such as heart rate and pressure measurements. In the research, we use a CSV file that collects data from the National Lung Screening Trial [55].
Transaction with data stored in PDF format. This kind of transaction is most often used for storing data from various patient examinations such as blood tests and urine tests. These files also contain small pictures such as the company’s logo. Moreover, most often there is also a need for digital signing of the document, and the PDF format is effective for this purpose. In the research, a signed PDF file was used, which contained example outcomes of the patient’s blood test.
Transaction with data stored in graphical format. This type of transaction is often used for storing, for example, x-ray or computed tomography photos, as well as magnetic resonance images or electrocardiograms. In the research, we used an example x-ray image of the patient’s chest (the resolution of the image was 2048 × 2048 pixels).
Subsequently, 101 transactions for each type were created. Note that, before storing data in the blockchain, there was a need to convert the files to binary tables. Next, based on the obtained results, the time of creating one transaction was estimated. The estimation was made using the arithmetic mean and the median; the latter is more resistant to erroneous measurements that differ significantly from typical values. The performance evaluation results are presented in Table 3, and the script in Java for this performance evaluation is presented in Appendix A.
4.5. Discussion of the Obtained Results
Here we discuss the obtained results. As mentioned in Section 4.3, the practical implementation of the proposed solution was performed with the use of the MultiChain platform. Moreover, a performance evaluation regarding the creation of selected types of blockchain transactions was conducted and is presented in Section 4.4. The obtained results show the great potential of the proposed approach, and the wide selection of potential applications ranging from healthcare and related industries (such as the biomedical or paramedical industries), to the existing and new areas of IoMT and IoT systems (such as the wireless body field, the automotive industry, and the wide range of smart systems that are present in our daily life, e.g., smart homes, smart buildings, and smart cities).
Of course, the proposed approach has several limitations. First, it should be noted that the implementation results were obtained in a laboratory environment rather than in real conditions; thus, not all potential limitations were considered in the research. Moreover, several popular cyberattacks (e.g., tampering, sniffing, unauthorized access, MITM, DDoS, and ransomware [56]) have not been analyzed and tested on the proposed solution.
Furthermore, the implemented blockchain is rather small—it contains “only” 10 thousand transactions (e.g., in the Bitcoin blockchain, from 3.3 to 7 new transactions are created every second, which results in over 10 million new transactions per month [57]). Nonetheless, even such a small size of the blockchain allowed for experimental verification of the proposed approach and the evaluation of its usefulness. The validation of the implemented BIoMT architecture included a manual analysis of several dozen randomly selected transactions and blocks. All analyzed blocks and transactions turned out to be correctly generated. Moreover, during the performance evaluation, a comparison of the original PDF file with the one downloaded from the blockchain was performed. The signature verification for both files was also successful.
Finally, the used implementation platform (MultiChain) has also several limitations, such as limiting the size of stored data in one blockchain transaction to 2 MB. If there is a need to store larger data, off-chain technology must be used, e.g., external databases or distributed storage systems such as Interplanetary File System (IPFS) technology [58].
To summarize the above, it should be noted that the performed experiments confirmed the advantages of applying Blockchain technology to the IoMT systems. Moreover, the presented blockchain structure can be treated as a template, which may be adapted and adjusted to the real solutions based on the real requirements (which often result from the unique and specific requirements of a given hospital or other medical institution).
5. Conclusions
In this paper, a novel BIoMT architecture is proposed. The advantages of Blockchain technology in IoMT architectures are also analyzed and discussed. The presented BIoMT architecture can be used to address problems occurring in current cloud-based IoMT solutions. Decentralized BIoMT architecture may be a response to the problem of failure of the main server or other single-point failures. Moreover, the trust and secure Blockchain technology makes the BIoMT architecture tamper-proof, and the presented PoW consensus mechanism increases the security level of patients’ clinical records and enables tamper-free open access to all nodes in the BIoMT network.
The proposed Blockchain-based IoMT architecture can be applied to other areas of IoMT, for example, smart hospitals, nursing homes, and allied industries such as biomedical or paramedical industries, in addition to new and existing areas of IoT such as wearable sensors, thew automotive industry, or smart systems.
It seems that ECDSA is now one of the most prominent solutions for use in cryptocurrencies and Blockchain-based architectures. It is well known that the cryptographic security of PKC based on EC depends on an intractable mathematical problem called DLP. However, EC does not have a sub-exponential-time algorithm to solve ECDLP. As a result, the security of the BIoMT is stronger than that of the normal cloud-based IoMT architecture. Only the backdoors in EC are a major problem; thus, in the near future, a research direction may be solving this issue and making ECDSA more efficient and secure. Moreover, in the proposed approach, the latter security stage can be enhanced with new variants of ECDSA.
Another limitation of the proposed approach may be the lack of a “prize” for the completed PoW. This solution can be observed in cryptocurrency architectures. Without a “prize”, the number of nodes that want to make the PoW may be insufficient to ensure a high level of security of the BIoMT network. Therefore, the author’s research is focused on the use of TTP, where one of the selected nodes (e.g., a hospital) can play the role of TTP, especially since the data from the BIoMT network will contain medical records and will mostly be processed by devices and real-time hospital systems.
The proposed solution was implemented with the use of the MultiChain platform and experimentally verified. The created blockchain consists of 10k blocks; however, even with such a large number of blocks, the network functioned properly and efficiently. Future work of the authors will focus on the implementation of the blockchain with forks, Although this approach id rarely used, in the authors’ opinion, it can be an interesting solution for some issues encountered in Blockchain implementations.
Conceptualization, A.B. and G.B.; methodology, A.B.; validation, A.B. and K.K.; formal analysis, A.B., K.K., G.B. and R.W.; investigation, A.B.; resources, A.B.; data curation, A.B.; implementation, K.K.; expereminental verification, K.K. and G.B.; writing—original draft preparation, A.B., K.K., G.B. and R.W.; writing—review and editing, A.B., K.K., G.B. and R.W.; visualization, A.B.; supervision, A.B. and R.W.; project administration, A.B., G.B. and R.W.; funding acquisition, R.W. All authors have read and agreed to the published version of the manuscript.
This work is supported by the Ministry of Education and Science, Poland, “Industrial doctorate”, under the grant number DWD/4/90/2020. The work is partially supported by Koneru Lakshmaiah Education Foundation, Vaddeswaram, Guntur 522502, Andhra Pradesh, India.
The authors declare no conflict of interest.
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Figure 1. Cloud-based hospital application architecture in the present IoMT system.
Figure 5. The screenshot of exemplary 21 transactions from the implemented blockchain.
Figure 7. Selected streams with publishers (addresses) from the implemented blockchain.
Abbreviations used in the paper.
Name | Abbreviation |
---|---|
Address Resolution Protocol | ARP |
Blockchain-based Internet-of-Medical-Things | BIoMT |
Blockchain-based architecture for Internet-of-Medical-Things | BIoMT architecture |
Confidentiality, Integrity, and Availability | CIA triad |
Discrete Logarithm Problem | DLP |
Distributed Denial-of-Service | DDoS |
Elliptic Curve | EC |
Elliptic Curve Cryptography | ECC |
Elliptic Curve Digital Signature Algorithm | ECDSA |
Elliptic Curve Discrete Logarithm Problem | ECDLP |
Industrial Internet-of-Things | IIoT |
Internet-of-Medical-Things | IoMT |
Internet-of-Things | IoT |
Interplanetary File System | IPFS |
Man-in-the-Middle | MITM |
Merkle Hash Tree | MHT |
Proof-of-Work | PoW |
Public Key Cryptography | PKC |
Public Key Infrastructure | PKI |
Peer-to-Peer | P2P |
Trusted Third Party | TTP |
Selected blockchain parameters used in the implementation of the BIoMT architecture.
Parameter | Value | Meaning |
---|---|---|
Chain name | BIoMT | The name of the blockchain. |
Blockchain type | Private | The blockchain could be public or private; in the proposed approach the blockchain should not be public, so the chosen type is private. |
Chain protocol | Multichain | The protocol could be multichain or bitcoin-style; to use streams, the multichain should be chosen. |
Consensus type | Proof-of-Work | Type of consensus used in the blockchain. |
Mining diversity | 0.3 | Determines how many required miners (with the permission “mine”) must participate in the transaction confirmation (0.0 means no constraint, while 1.0 means that every miner must participate). |
Mine empty rounds | 10 | If there are no new transactions, the parameter defines how many empty rounds will be generated (these empty rounds have a positive impact on building a reliable and resilient blockchain). |
Number of streams | 5 | The number of generated streams. |
Number of addresses | 10 | The number of generated addresses (each of the streams can have several publishers/addresses). |
Number of blocks | 218 | The number of generated blocks in the blockchain. |
Number of transactions | 10,383 | The number of generated transactions kept in all blocks. |
The performance evaluation results of the selected BIoMT transactions.
Parameter | Transactions with Text Data | Transactions with Signed Mixed (Text and Graphics) Data | Transactions with JPG Data |
---|---|---|---|
File format to store data | CSV | JPG | |
The size of the file | 1,392,133 bytes | 516,510 bytes | 342,303 bytes |
Number of generated transactions | 101 | 101 | 101 |
Total time of all generated transactions | 21.7924 s | 10.5303 s | 6.5877 s |
Arithmetic mean of 1 transaction generation time | 0.2158 s | 0.1043 s | 0.0652 s |
Median of 1 transaction generation time | 0.2046 s | 0.0906 s | 0.0606 s |
Number of used blocks used to store all generated transactions | 18 | 7 | 5 |
The average number of transactions per block | 5.61 | 14.43 | 20.20 |
Appendix A
The appendix contains a script in Java language that was used in performance evaluation, as described in detail in
References
1. Fortune Business Insights, Internet of Medical Things (IoMT) Market, October 2021. Available online: https://www.fortunebusinessinsights.com/industry-reports/internet-of-medical-things-iomt-market-101844 (accessed on 26 June 2022).
2. Esposito, C.; De Santis, A.; Tortora, G.; Chang, H.; Choo, K.-K.R. Blockchain: A Panacea for Healthcare Cloud-Based Data Security and Privacy?. IEEE Cloud Comput.; 2018; 5, pp. 31-37. [DOI: https://dx.doi.org/10.1109/MCC.2018.011791712]
3. Rodrigues, J.J.P.C.; Segundo, D.B.D.R.; Junqueira, H.A.; Sabino, M.H.; Prince, R.M.; Al-Muhtadi, J.; De Albuquerque, V.H.C. Enabling Technologies for the Internet of Health Things. IEEE Access; 2018; 6, pp. 13129-13141. [DOI: https://dx.doi.org/10.1109/ACCESS.2017.2789329]
4. Sun, W.; Cai, Z.; Li, Y.; Liu, F.; Fang, S.; Wang, G. Security and Privacy in the Medical Internet of Things: A Review. Secur. Commun. Netw.; 2018; 2018, 5978636. [DOI: https://dx.doi.org/10.1155/2018/5978636]
5. Hölbl, M.; Kompara, M.; Kamišalić, A.; Nemec Zlatolas, L. A Systematic Review of the Use of Blockchain in Healthcare. Symmetry; 2018; 10, 470. [DOI: https://dx.doi.org/10.3390/sym10100470]
6. Sundaravadivel, P.; Kougianos, E.; Mohanty, S.P.; Ganapathiraju, M.K. Everything You Wanted to Know about Smart Health Care: Evaluating the Different Technologies and Components of the Internet of Things for Better Health. IEEE Consum. Electron. Mag.; 2018; 7, pp. 18-28. [DOI: https://dx.doi.org/10.1109/MCE.2017.2755378]
7. Zhang, J.; Xue, N.; Huang, X. A Secure System For Pervasive Social Network-Based Healthcare. IEEE Access; 2016; 4, pp. 9239-9250. [DOI: https://dx.doi.org/10.1109/ACCESS.2016.2645904]
8. Ahram, T.; Sargolzaei, A.; Sargolzaei, S.; Daniels, J.; Amaba, B. Blockchain technology innovations. Proceedings of the IEEE Technology & Engineering Management Conference (TEMSCON); Santa Clara, CA, USA, 8–10 June 2017; pp. 137-141. [DOI: https://dx.doi.org/10.1109/TEMSCON.2017.7998367]
9. Bhattacharjya, A.; Zhong, X.; Li, X. A Lightweight and Efficient Secure Hybrid RSA (SHRSA) Messaging Scheme with Four-Layered Authentication Stack. IEEE Access; 2019; 7, pp. 30487-30506. [DOI: https://dx.doi.org/10.1109/ACCESS.2019.2900300]
10. Li, M.; Yu, S.; Zheng, Y.; Ren, K.; Lou, W. Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption. IEEE Trans. Parallel Distrib. Syst.; 2013; 24, pp. 131-143. [DOI: https://dx.doi.org/10.1109/TPDS.2012.97]
11. More, S.; Chaudhari, S. Third Party Public Auditing Scheme for Cloud Storage. Procedia Comput. Sci.; 2016; 79, pp. 69-76. [DOI: https://dx.doi.org/10.1016/j.procs.2016.03.010]
12. Li, C.-T.; Lee, C.-C.; Weng, C.-Y. A Secure Cloud-Assisted Wireless Body Area Network in Mobile Emergency Medical Care System. J. Med. Syst.; 2016; 40, 117. [DOI: https://dx.doi.org/10.1007/s10916-016-0474-9]
13. Lounis, A.; Hadjidj, A.; Bouabdallah, A.; Challal, Y. Healing on the cloud: Secure cloud architecture for medical wireless sensor networks. Future Gener. Comput. Syst.; 2016; 55, pp. 266-277. [DOI: https://dx.doi.org/10.1016/j.future.2015.01.009]
14. Kowalski, M.; Wiśniewski, R. Security Analysis of One-Time Pad Secure Algorithm Based on the Double Memory Technique, 2018. Proceedings of the International Conference of Computational Methods in Sciences and Engineering-ICCMSE 2018; Thessaloniki, Greece, 14–18 March 2018; AIP Publishing: Melville, NY, USA, 2018; AIP Conference Proceedings Volume 2040, [DOI: https://dx.doi.org/10.1063/1.5079139]
15. Wiśniewski, R.; Grobelny, M.; Grobelna, I.; Bazydło, G. IoT Security with One-Time Pad Secure Algorithm Based on the Double Memory Technique, 2017. Proceedings of the International Conference of Computational Methods in Sciences and Engineering-ICCMSE 2017; Thessaloniki, Greece, 21–25 April 2017; AIP Publishing: Melville, NY, USA, 2017; AIP Conference Proceedings Volume 1906, ISBN 9780735415966 [DOI: https://dx.doi.org/10.1063/1.5012401]
16. Di Pierro, M. What Is the Blockchain?. Comput. Sci. Eng.; 2017; 19, pp. 92-95. [DOI: https://dx.doi.org/10.1109/MCSE.2017.3421554]
17. Samaniego, M.; Jamsrandorj, U.; Deters, R. Blockchain as a Service for IoT. Proceedings of the 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData); Chengdu, China, 15–18 December 2016; pp. 433-436. [DOI: https://dx.doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2016.102]
18. Zubaydi, H.D.; Chong, Y.-W.; Ko, K.; Hanshi, S.M.; Karuppayah, S. A Review on the Role of Blockchain Technology in the Healthcare Domain. Electronics; 2019; 8, 679. [DOI: https://dx.doi.org/10.3390/electronics8060679]
19. Viriyasitavat, W.; Xu, L.D.; Bi, Z.; Pungpapong, V. Blockchain and Internet of Things for Modern Business Process in Digital Economy—The State of the Art. IEEE Trans. Comput. Soc. Syst.; 2019; 6, pp. 1420-1432. [DOI: https://dx.doi.org/10.1109/TCSS.2019.2919325]
20. Johng, H.; Kim, D.; Hill, T.; Chung, L. Using Blockchain to Enhance the Trustworthiness of Business Processes: A Goal-Oriented Approach. Proceedings of the 2018 IEEE International Conference on Services Computing (SCC); San Francisco, CA, USA, 2–7 July 2018; pp. 249-252. [DOI: https://dx.doi.org/10.1109/SCC.2018.00041]
21. Truong, N.B.; Sun, K.; Lee, G.M.; Guo, Y. GDPR-Compliant Personal Data Management: A Blockchain-Based Solution. IEEE Trans. Inf. Forensics Secur.; 2020; 15, pp. 1746-1761. [DOI: https://dx.doi.org/10.1109/TIFS.2019.2948287]
22. Haber, S.; Stornetta, W.S. How to time-stamp a digital document. J. Cryptol.; 1991; 3, pp. 99-111. [DOI: https://dx.doi.org/10.1007/BF00196791]
23. Nakamoto, S. Bitcoin: A Peer-To-Peer Electronic Cash System; Decentralized Business Review HN Publishing: Amsterdam, The Netherlands, 2008; 21260.
24. Zaman, U.; Imran,; Mehmood, F.; Iqbal, N.; Kim, J.; Ibrahim, M. Towards Secure and Intelligent Internet of Health Things: A Survey of Enabling Technologies and Applications. Electronics; 2022; 11, 1893. [DOI: https://dx.doi.org/10.3390/electronics11121893]
25. Abdelmaboud, A.; Ahmed, A.I.A.; Abaker, M.; Eisa, T.A.E.; Albasheer, H.; Ghorashi, S.A.; Karim, F.K. Blockchain for IoT Applications: Taxonomy, Platforms, Recent Advances, Challenges and Future Research Directions. Electronics; 2022; 11, 630. [DOI: https://dx.doi.org/10.3390/electronics11040630]
26. Khan, A.A.; Shaikh, Z.A.; Baitenova, L.; Mutaliyeva, L.; Moiseev, N.; Mikhaylov, A.; Laghari, A.A.; Idris, S.A.; Alshazly, H. QoS-Ledger: Smart Contracts and Metaheuristic for Secure Quality-of-Service and Cost-Efficient Scheduling of Medical-Data Processing. Electronics; 2021; 10, 3083. [DOI: https://dx.doi.org/10.3390/electronics10243083]
27. Mani, V.; Manickam, P.; Alotaibi, Y.; Alghamdi, S.; Khalaf, O.I. Hyperledger Healthchain: Patient-Centric IPFS-Based Storage of Health Records. Electronics; 2021; 10, 3003. [DOI: https://dx.doi.org/10.3390/electronics10233003]
28. Imran, M.; Zaman, U.; Imran,; Imtiaz, J.; Fayaz, M.; Gwak, J. Comprehensive Survey of IoT, Machine Learning, and Blockchain for Health Care Applications: A Topical Assessment for Pandemic Preparedness, Challenges, and Solutions. Electronics; 2021; 10, 2501. [DOI: https://dx.doi.org/10.3390/electronics10202501]
29. Bazydło, G.; Wiśniewski, R.; Kozdrój, K. Trusted and Secure Blockchain-Based Durable Medium Electronic Service. Cryptography; 2022; 6, 10. [DOI: https://dx.doi.org/10.3390/cryptography6010010]
30. Ichikawa, D.; Kashiyama, M.; Ueno, T. Tamper-Resistant Mobile Health Using Blockchain Technology. JMIR Mhealth Uhealth; 2017; 5, e111. [DOI: https://dx.doi.org/10.2196/mhealth.7938]
31. Ahmad, L.; Khanji, S.; Iqbal, F.; Kamoun, F. 2020. Blockchain-based chain of custody: Towards real-time tamper-proof evidence management. Proceedings of the 15th International Conference on Availability, Reliability and Security (ARES ‘20); Dublin, Ireland, 25–28 August 2020; Association for Computing Machinery: New York, NY, USA, 2020; Article 48 pp. 1-8. [DOI: https://dx.doi.org/10.1145/3407023.3409199]
32. Nayak, A.; Dutta, K. Blockchain: The perfect data protection tool. Proceedings of the 2017 International Conference on Intelligent Computing and Control (I2C2); Coimbatore, India, 23–24 June 2017; pp. 1-3. [DOI: https://dx.doi.org/10.1109/I2C2.2017.8321932]
33. Zhang, R.; Xue, R.; Liu, L. Security and Privacy on Blockchain. ACM Comput. Surv.; 2019; 52, pp. 1-34. [DOI: https://dx.doi.org/10.1145/3158369]
34. Wang, Z.; Lin, J.; Cai, Q.; Wang, Q.; Zha, D.; Jing, J. Blockchain-Based Certificate Transparency and Revocation Transparency. IEEE Trans. Dependable Secur. Comput.; 2022; 19, pp. 681-697. [DOI: https://dx.doi.org/10.1109/TDSC.2020.2983022]
35. Abe, R.; Watanabe, H.; Ohashi, S.; Fujimura, S.; Nakadaira, A. Storage Protocol for Securing Blockchain Transparency. Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC); Tokyo, Japan, 23–27 July 2018; pp. 577-581. [DOI: https://dx.doi.org/10.1109/COMPSAC.2018.10298]
36. Bhattacharjya, A.; Zhong, X.; Wang, J.; Li, X. Security Challenges and Concerns of Internet of Things (IoT). Cyber-Physical Systems: Architecture, Security and Application, EAI/Springer Innovations in Communication and Computing; Guo, S.; Zeng, D. Springer: Cham, Switzerland, 2018; pp. 153-185. [DOI: https://dx.doi.org/10.1007/978-3-319-92564-6_7]
37. Bhattacharjya, A.; Zhong, X.; Wang, J.; Li, X. Secure IoT Structural Design for Smart Homes, Chapter 13. Smart Cities Cybersecurity and Privacy; Elsevier: Amsterdam, The Netherlands, 2019; pp. 187-201. [DOI: https://dx.doi.org/10.1016/B978-0-12-815032-0.00013-5] ISBN 9780128150320
38. Bhattacharjya, A.; Zhong, X.; Wang, J.; Li, X. Present Scenarios of IoT Projects with Security Aspects Focused. Digital Twin Technologies and Smart Cities. Internet of Things; Farsi, M.; Daneshkhah, A.; Hosseinian-Far, A.; Jahankhani, H. Springer: Cham, Switzerland, 2020; [DOI: https://dx.doi.org/10.1007/978-3-030-18732-3_7]
39. Bhattacharjya, A.; Zhong, X.; Wang, J.; Li, X. CoAP—Application Layer Connection-Less Lightweight Protocol for the Internet of Things (IoT) and CoAP-IPSEC Security with DTLS Supporting CoAP. Digital Twin Technologies and Smart Cities; Farsi, M.; Daneshkhah, A.; Hosseinian-Far, A.; Jahankhani, H. Internet of Things Springer: Cham, Switzerland, 2020; [DOI: https://dx.doi.org/10.1007/978-3-030-18732-3_9]
40. Wiśniewski, R.; Wiśniewski, R. Representation of Primes in the Form p = 6 “ x=1 and its Application to the RSA Prime Factorization, 2018. Proceedings of the International Conference of Computational Methods in Sciences and Engineering-ICCMSE 2018; Thessaloniki, Greece, 14–18 March 2018; AIP Publishing: New York, NY, USA, 2018; AIP Conference Proceedings Volume 2040, [DOI: https://dx.doi.org/10.1063/1.5079140]
41. Rivest, R.; Shamir, A.; Adleman, L. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Commun. ACM; 1978; 21, pp. 120-126. [DOI: https://dx.doi.org/10.1145/359340.359342]
42. Ekparinya, P.; Gramoli, V.; Jourjon, G. Impact of Man-In-The-Middle Attacks on Ethereum. Proceedings of the 2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS); Salvador, Brazil, 2–5 October 2018; pp. 11-20. [DOI: https://dx.doi.org/10.1109/SRDS.2018.00012]
43. Vanstone, S.A. Responses to NIST’s proposal. Commun. ACM; 1992; 35, pp. 41-54. [DOI: https://dx.doi.org/10.1145/129902.129905]
44. Long, T.; Liu, X. Two Improvements to Digital Signature Scheme Based on the Elliptic Curve Cryptosystem. Proceedings of the International Workshop on Information Security and Application (IWISA 2009); Toyama, Japan, 25–27 August 2009; Academy Publisher: Bengaluru, India, 2009.
45. Bi, W.; Jia, X.; Zheng, M. A Secure Multiple Elliptic Curves Digital Signature Algorithm for Blockchain. arXiv; 2018; [DOI: https://dx.doi.org/10.48550/arXiv.1808.02988]
46. Cano, M.; Cañavate-Sanchez, A. Preserving Data Privacy in the Internet of Medical Things Using Dual Signature ECDSA. Secur. Commun. Netw.; 2020; 2020, 4960964. [DOI: https://dx.doi.org/10.1155/2020/4960964]
47. Salim, M.M.; Kim, I.; Doniyor, U.; Lee, C.; Park, J.H. Homomorphic Encryption Based Privacy-Preservation for IoMT. Appl. Sci.; 2021; 11, 8757. [DOI: https://dx.doi.org/10.3390/app11188757]
48. Blake, I.; Seroussi, G.; Smart, N.P. Advances in Elliptic Curve Cryptography; London Mathematical Society Lecture Note Series; Cambridge University Press: Cambridge, UK, 2005; [DOI: https://dx.doi.org/10.1017/CBO9780511546570]
49. Bekyel, E. The density of elliptic curves having a global minimal Weierstrass equation. J. Number Theory; 2004; 109, pp. 41-58. [DOI: https://dx.doi.org/10.1016/j.jnt.2004.06.003]
50. Hankerson, D.; Menezes, A. Elliptic Curve Discrete Logarithm Problem. Encyclopedia of Cryptography and Security; van Tilborg, H.C.A.; Jajodia, S. Springer: Boston, MA, USA, 2011; [DOI: https://dx.doi.org/10.1007/978-1-4419-5906-5_246]
51. Caelli, W.J.; Dawson, E.P.; Rea, S.A. PKI, elliptic curve cryptography, and digital signatures. Comput. Secur.; 1999; 18, pp. 47-66. [DOI: https://dx.doi.org/10.1016/S0167-4048(99)80008-X]
52. Radoglou-Grammatikis, P.; Rompolos, K.; Sarigiannidis, P.; Argyriou, V.; Lagkas, T.; Sarigiannidis, A.; Goudos, S.K.; Wan, S. Modeling, Detecting, and Mitigating Threats Against Industrial Healthcare Systems: A Combined Software Defined Networking and Reinforcement Learning Approach. IEEE Trans. Ind. Inform.; 2022; 18, pp. 2041-2052. [DOI: https://dx.doi.org/10.1109/TII.2021.3093905]
53. Chenthara, S.; Ahmed, K.; Wang, H.; Whittaker, F. Security and Privacy-Preserving Challenges of e-Health Solutions in Cloud Computing. IEEE Access; 2019; 7, pp. 74361-74382. [DOI: https://dx.doi.org/10.1109/ACCESS.2019.2919982]
54. MultiChain Project Website. Available online: https://www.multichain.com/ (accessed on 26 June 2022).
55. National Lung Screening Trial (Cancer Imaging Archive) Website. Available online: https://wiki.cancerimagingarchive.net/display/NLST/ (accessed on 9 August 2022).
56. Yaqoob, T.; Abbas, H.; Atiquzzaman, M. Security Vulnerabilities, Attacks, Countermeasures, and Regulations of Networked Medical Devices—A Review. IEEE Commun. Surv. Tutor.; 2019; 21, pp. 3723-3768. [DOI: https://dx.doi.org/10.1109/COMST.2019.2914094]
57. Croman, K.; Eyal, I. On Scaling Decentralized Blockchains (PDF). Financial Cryptography and Data Security. Lect. Notes Comput. Sci.; 2016; 9604, pp. 106-125. [DOI: https://dx.doi.org/10.1007/978-3-662-53357-4_8]
58. IPFS Project Website. Available online: https://ipfs.tech/ (accessed on 9 August 2022).
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Abstract
The Internet of Medical Things (IoMT) global market has grown and developed significantly in recent years, and the number of IoMT devices is increasing every year. IoMT systems are now very popular and have become part of our everyday life. However, such systems should be properly protected to preventing unauthorized access to the devices. One of the most popular security methods that additionally relies on real-time communication is Blockchain. Moreover, such a technique can be supported by the Trusted Third Party (TTP), which guarantees data immutability and transparency. The research and industrial community has predicted the proliferation of Blockchain-based IoMT (BIoMT), for providing security, privacy, and effective insurance processing. A connected environment comprises some of the unique features of the IoMT in the form of sensors and devices that capture and measure, recognize and classify, assess risk, notify, make conclusions, and take action. Distributed communication is also unique due to the combination of the fact that the Blockchain cannot be tampered with and the Peer-to-Peer (P2P) technique, especially compared to the traditional cloud-based techniques where the reliance of IoMT systems on the centralized cloud makes it somewhat vulnerable. This paper proposes a Blockchain-based technique oriented on IoMT applications with a focus on maintaining Confidentiality, Integrity, and Availability (the CIA triad) of data communication in the system. The proposed solution is oriented toward trusted and secure real-time communication. The presented method is illustrated by an example of a cloud-based hospital application. Finally, the security aspects of the proposed approach are studied and analyzed in detail.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Details



1 Department of CSE, Koneru Lakshmaiah Education Foundation, Vaddeswaram, Guntur 522502, Andhra Pradesh, India
2 Perceptus Sp. z o.o., 66-002 Zielona Góra, Poland
3 Division of Information Systems and Cybersecurity, Institute of Control & Computation Engineering, University of Zielona Góra, 65-417 Zielona Góra, Poland