Forth Coming Papers

Blockchain-based Security Mechanisms for Internet of Medical Things (IOMT)
JAMAL Elhachmi and JAMAL Elhachimi, National High School for Computer Science and Systems Analysis (ENSIAS), Mohammed V University in Rabat, Morocco

Today, the world has gone digital with a growing number of smart devices, especially with the industrialization of the Internet of Things (IoT). These devices can cooperate among themselves and collect, process, and exchange data over a network without requiring human-to-human or human-to-computer interaction. Further, the emergence of the practical IoT, taking in all domains, was forced to open the way to a strong practice domain such as the Internet of Medical Things (IoMT), as a result of the increasing number of connected Medical smart devices, the emergence of new healthcare user requirements, and the trend to new medical products and services. It is a daily obligation to preserve Good Health, improve and Accelerates Clinician Workflow, and keep and protect Personal Health Records. However, the availability of services, security, and privacy of this IoMT ecosystem remains a defect. Traditional standards and security protocols are recognized as unable to solve this type of security issue of the interconnected diverse resource-constrained IoMT devices, especially during the Coronavirus (COVID-19) pandemic. Blockchain technology has emerged as a distributed ledger technology that can manage many intelligent transactions and ensure greater security in data management. Blockchain-based security mechanisms with specific adaptation and additional layers of authentication and verification can offer a complete resources management system. It has demonstrated its superlatively as the core component for the Bitcoin cryptocurrency. In this paper, we propose a Three-Tier Blockchain Architecture in a hierarchical clustering network, with a lightweight authentication system-based API Gateway model that provides network and communication security. Reasonable implementation is proposed and the obtained results demonstrate that our approach shows satisfactory performances in terms of transfer time, energy consumption, and CPU impacts. The traffic analysis also shows that the proposed model can meet the requested security, integrity, and confidentiality of user data.

Internet of things, Blockchain, Internet of Medical things, IoT Security, Data privacy