Search Paper
  • Home
  • Login
  • Categories
  • Post URL
  • Academic Resources
  • Contact Us

 

Blockchain-based Security Mechanisms for Internet of Medical Things (IOMT)

google+
Views: 10                 

Author :  JAMAL Elhachmi and ABDELLATIF Kobbane

Affiliation :  National High School for Computer Science and Systems Analysis (ENSIAS), Mohammed V University in Rabat, Morocco

Country :  Morocco

Category :  Networks & Communications

Volume, Issue, Month, Year :  14, 6, November, 2022

Abstract :


Traditional standards and security protocols are recognized as unable to solve the security, privacy, and availability of services of the Internet of Medical Things (IoMT) ecosystem, especially during the Coronavirus (COVID-19) pandemic. Blockchain technology has then emerged as a distributed ledger technology that can manage many intelligent transactions and ensure greater security in data management. The Blockchain-based security mechanisms with specific adaptation and additional layers of authentication and verification can offer a complete resources' management system. It has demonstrated it’s superlatively as the core component of the Bitcoin cryptocurrency. In this paper, we propose a ThreeTier Blockchain Architecture in a hierarchical clustering network, with a lightweight authentication system-based API Gateway model that provides network and communication security. Reasonable implementation is proposed and the obtained results demonstrate that our approach shows satisfactory performances in terms of transfer time, energy consumption, and CPU impacts. The traffic analysis also shows that the proposed model can meet the requested security, integrity, and confidentiality of user data.

Keyword :  Internet of things, Blockchain, Internet of Medical Things, IoT Security, Data Privacy

Journal/ Proceedings Name :  International Journal of Computer Networks & Communications (IJCNC)

URL :  https://aircconline.com/ijcnc/V14N6/14622cnc08.pdf

User Name : steve price
Posted 25-01-2023 on 15:28:49 AEDT



Related Research Work

  • Collaborative Defence For Distributed Attacks (case Study Of Palestinian Information Systems)
  • Twin-node Neighbour Attack On Aodv Based Wireless Ad Hoc Network
  • Web Attack Prediction Using Stepwise Conditional Parameter Tuning In Machine Learning Algorithms With Usage Data
  • Rtl-dl: A Hybrid Deep Learning Framework For Ddos Attack Detection In A Big Data Environment

About Us | Post Cfp | Share URL Main | Share URL category | Post URL
All Rights Reserved @ Call for Papers - Conference & Journals