Proceedings ArticleDOI
Private blockchain-envisioned security framework for AI-enabled IoT-based drone-aided healthcare services
Mohammad Wazid,Basudeb Bera,Ankush Mitra,Ashok Kumar Das,Rashid Ali +4 more
- pp 37-42
Reads0
Chats0
TLDR
A private-blockchain based framework for secure communication in an IoT-enabled drone-aided healthcare environment is proposed and the blockchain-based simulation of the proposed framework has been carried out to measure its impact on various performance parameters.Abstract:
Internet of Drones (IoD) architecture is designed to support a co-ordinated access for the airspace using the unmanned aerial vehicles (UAVs) known as drones. Recently, IoD communication environment is extremely useful for various applications in our daily activities. Artificial intelligence (AI)-enabled Internet of Things (IoT)-based drone-aided healthcare service is a specialized environment which can be used for different types of tasks, for instance, blood and urine samples collections, medicine delivery and for the delivery of other medical needs including the current pandemic of COVID-19. Due to wireless nature of communication among the deployed drones and their ground station server, several attacks (for example, replay, man-in-the-middle, impersonation and privileged-insider attacks) can be easily mounted by malicious attackers. To protect such attacks, the deployment of effective authentication, access control and key management schemes are extremely important in the IoD environment. Furthermore, combining the blockchain mechanism with deployed authentication make it more robust against various types of attacks. To mitigate such issues, we propose a private-blockchain based framework for secure communication in an IoT-enabled drone-aided healthcare environment. The blockchain-based simulation of the proposed framework has been carried out to measure its impact on various performance parameters.read more
Citations
More filters
Journal ArticleDOI
A Review on the Role of Machine Learning in Enabling IoT Based Healthcare Applications
Hemantha Krishna Bharadwaj,Aayush Agarwal,Vinay Chamola,Naga Rajiv Lakkaniga,Vikas Hassija,Mohsen Guizani,Biplab Sikdar +6 more
TL;DR: In this paper, a review of state-of-the-art machine learning (ML) algorithms for healthcare Internet of Things (H-IoT) applications is presented.
Journal ArticleDOI
Fighting COVID-19 and Future Pandemics With the Internet of Things: Security and Privacy Perspectives
TL;DR: This paper comprehensively survey existing IoT-related solutions, potential security and privacy risks and their requirements, and identifies a number of recommendations to inform future research.
Journal ArticleDOI
Blockchain state-of-the-art: architecture, use cases, consensus, challenges and opportunities
Bela Shrimali,Hiren Patel +1 more
TL;DR: In this article, the authors discuss the opportunities, benefits, and challenges of blockchain technology and to assist the research community in understanding the same, and also discuss the taxonomy, application/use-cases, consensus mechanisms, prospective research, future directions, and related technologies.
Journal ArticleDOI
Security in IoT-enabled smart agriculture: architecture, security solutions and challenges
Journal ArticleDOI
ASCP-IoMT: AI-Enabled Lightweight Secure Communication Protocol for Internet of Medical Things
Mohammad Wazid,Jaskaran Singh,Ashok Kumar Das,Sachin K Shetty,Muhammad Khurram Khan,Joel J. P. C. Rodrigues +5 more
TL;DR: A new AI-enabled lightweight, secure communication scheme for an IoMT environment designed and named as ASCP-IoMT, which performs better than other similar schemes and provides superior security with extra functionality features as compared those for the existing state of art solutions.
References
More filters
Journal ArticleDOI
On the security of public key protocols
Danny Dolev,Andrew Chi-Chih Yao +1 more
TL;DR: Several models are formulated in which the security of protocols can be discussed precisely, and algorithms and characterizations that can be used to determine protocol security in these models are given.
Journal ArticleDOI
Practical byzantine fault tolerance and proactive recovery
Miguel Castro,Barbara Liskov +1 more
TL;DR: A new replication algorithm, BFT, is described that can be used to build highly available systems that tolerate Byzantine faults and is used to implement the first Byzantine-fault-tolerant NFS file system, BFS.
Journal ArticleDOI
The Elliptic Curve Digital Signature Algorithm (ECDSA)
TL;DR: The ANSI X9.62 ECDSA is described and related security, implementation, and interoperability issues are discussed, and the strength-per-key-bit is substantially greater in an algorithm that uses elliptic curves.
Journal ArticleDOI
Examining smart-card security under the threat of power analysis attacks
TL;DR: In this paper, the authors examined the noise characteristics of the power signals and developed an approach to model the signal-to-noise ratio (SNR) using a multiple-bit attack.
Posted Content
Targeted Backdoor Attacks on Deep Learning Systems Using Data Poisoning
TL;DR: This work considers a new type of attacks, called backdoor attacks, where the attacker's goal is to create a backdoor into a learning-based authentication system, so that he can easily circumvent the system by leveraging the backdoor.