scispace - formally typeset
Proceedings ArticleDOI

Private blockchain-envisioned security framework for AI-enabled IoT-based drone-aided healthcare services

Reads0
Chats0
TLDR
A private-blockchain based framework for secure communication in an IoT-enabled drone-aided healthcare environment is proposed and the blockchain-based simulation of the proposed framework has been carried out to measure its impact on various performance parameters.
Abstract
Internet of Drones (IoD) architecture is designed to support a co-ordinated access for the airspace using the unmanned aerial vehicles (UAVs) known as drones. Recently, IoD communication environment is extremely useful for various applications in our daily activities. Artificial intelligence (AI)-enabled Internet of Things (IoT)-based drone-aided healthcare service is a specialized environment which can be used for different types of tasks, for instance, blood and urine samples collections, medicine delivery and for the delivery of other medical needs including the current pandemic of COVID-19. Due to wireless nature of communication among the deployed drones and their ground station server, several attacks (for example, replay, man-in-the-middle, impersonation and privileged-insider attacks) can be easily mounted by malicious attackers. To protect such attacks, the deployment of effective authentication, access control and key management schemes are extremely important in the IoD environment. Furthermore, combining the blockchain mechanism with deployed authentication make it more robust against various types of attacks. To mitigate such issues, we propose a private-blockchain based framework for secure communication in an IoT-enabled drone-aided healthcare environment. The blockchain-based simulation of the proposed framework has been carried out to measure its impact on various performance parameters.

read more

Citations
More filters
Journal ArticleDOI

Fighting COVID-19 and Future Pandemics With the Internet of Things: Security and Privacy Perspectives

TL;DR: This paper comprehensively survey existing IoT-related solutions, potential security and privacy risks and their requirements, and identifies a number of recommendations to inform future research.
Journal ArticleDOI

Blockchain state-of-the-art: architecture, use cases, consensus, challenges and opportunities

TL;DR: In this article, the authors discuss the opportunities, benefits, and challenges of blockchain technology and to assist the research community in understanding the same, and also discuss the taxonomy, application/use-cases, consensus mechanisms, prospective research, future directions, and related technologies.
Journal ArticleDOI

ASCP-IoMT: AI-Enabled Lightweight Secure Communication Protocol for Internet of Medical Things

TL;DR: A new AI-enabled lightweight, secure communication scheme for an IoMT environment designed and named as ASCP-IoMT, which performs better than other similar schemes and provides superior security with extra functionality features as compared those for the existing state of art solutions.
References
More filters
Journal ArticleDOI

On the security of public key protocols

TL;DR: Several models are formulated in which the security of protocols can be discussed precisely, and algorithms and characterizations that can be used to determine protocol security in these models are given.
Journal ArticleDOI

Practical byzantine fault tolerance and proactive recovery

TL;DR: A new replication algorithm, BFT, is described that can be used to build highly available systems that tolerate Byzantine faults and is used to implement the first Byzantine-fault-tolerant NFS file system, BFS.
Journal ArticleDOI

The Elliptic Curve Digital Signature Algorithm (ECDSA)

TL;DR: The ANSI X9.62 ECDSA is described and related security, implementation, and interoperability issues are discussed, and the strength-per-key-bit is substantially greater in an algorithm that uses elliptic curves.
Journal ArticleDOI

Examining smart-card security under the threat of power analysis attacks

TL;DR: In this paper, the authors examined the noise characteristics of the power signals and developed an approach to model the signal-to-noise ratio (SNR) using a multiple-bit attack.
Posted Content

Targeted Backdoor Attacks on Deep Learning Systems Using Data Poisoning

TL;DR: This work considers a new type of attacks, called backdoor attacks, where the attacker's goal is to create a backdoor into a learning-based authentication system, so that he can easily circumvent the system by leveraging the backdoor.
Related Papers (5)