Skip to main content
Log in

Improved blockchain-based user authentication protocol with ring signature for internet of medical things

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

In the field of e-healthcare, smart medical sensors are responsible for consistently collecting, transmitting, and communicating real-time data to support immediate decision-making, both within and between healthcare organizations. Privacy-preserving authentication is required, even when the sensors roam between different networks. Existing authentication protocols rely on centralized authentication servers and pose a number of challenges, including a single point of failure, performance bottlenecks, scalability challenges, and privacy concerns. Hence, a secure mutual authentication mechanism using Blockchain is essential in preventing attacks. In this paper, an Improved Chain Code Blockchain-based Key Agreement Authentication Mechanism (CCBKAAM) using the merits of SM9-based Secure Threshold Ring Signature (SM9-STRS) is proposed for achieving privacy and security. This proposed mechanism uses multiple key generation-based cipher identification algorithms for parameter maintenance. The integrated threshold ring signature prevents the limitations of the single key generation scheme. It uses Chain Codes over the Ethereum network for constructing the blocks during the process of mutual user authentication with trust equity score-based Improved PBFT Voting protocol for reaching consensus during authentication. This authentication protocol adopted blockchain for the objective of storing the identities and associated parameters to support the entities under communication during the process of authentication. The formal and informal verification of the proposed CCBKAAM confirmed its potentiality in resisting most of the possible attacks the IoMT is vulnerable to. The communication and computation overhead during the implementation are determined to be significantly lowered by 32.19% and 28.94%, better than the compared baseline blockchain-based mutual authentication. The performance analysis proved that this proposed CCBKAAM scheme is also potent in minimizing the storage overhead up to maximized level of 35.42%.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Algorithm 1
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Data availability

Not Applicable.

References

  1. Priya JC, Choudhury T, Khanna A, Preethi R (2022) Blockchain-based transfer learning for health screening with digital anthropometry from body images. Netw Model Anal Health Inf Bioinf 11(1):1–18

    Google Scholar 

  2. Pabitha P, Priya JC, Praveen R, Jagatheswari S (2023) ModChain: a hybridized secure and scaling blockchain framework for IoT environment. Int J Inform Technol 15(3):1741–1754

    Google Scholar 

  3. Ramalingam P, Pabitha P (2023) ASK-RAM-IMOT: Autonomous Shared Keys based Remote Authentication Method for internet of medical things applications. Wireless Pers Commun 131:273–293

    Article  Google Scholar 

  4. Chen T, Zhang L, Choo KR, Zhang R, Meng X (2021) Blockchain-based key management scheme in fog-enabled IoT systems. IEEE Internet Things J 8(13):10766–10778

    Article  Google Scholar 

  5. Jan SU, Ali S, Abbasi IA, Mosleh MA, Alsanad A, Khattak H (2021) Secure patient authentication framework in the healthcare system using wireless medical sensor networks. J Healthc Eng 2021(2):1–20

    Article  Google Scholar 

  6. Sharma G, Kalra S (2018) A lightweight multi-factor secure smart card based remote user authentication scheme for cloud-IoT applications. J Inform Secur Appl 42(2):95–106

    Google Scholar 

  7. Praveen Ramalingam, Pabitha Parameswaran (2023) A secure lightweight fuzzy embedder based user authentication scheme for internet of medical things applications. Journal of Intelligent & Fuzzy Systems 44(5):7523–7542

    Article  Google Scholar 

  8. Ramalingam P, Pabitha P (2022) Cryptanalysis of biometric based secure user authentication protocol for IoT applications. In: 2022 3rd International Conference on Communication, Computing and Industry 4.0 (C2I4). IEEE, pp 1–6

    Google Scholar 

  9. Praveen Ramalingam, Pabitha Parameswaran (2023) Improved Gentry–Halevi’s fully homomorphic encryption-based lightweight privacy preserving scheme for securing medical Internet of Things. Transactions on Emerging Telecommunications Technologies 34(4):e4732

    Article  Google Scholar 

  10. Madhavi S, Praveen R, Kumar J, Udhaya Sankar SM (2023) Hybrid Grey PIPRECIA and Grey OCRA method-based dynamic multi-criteria decision-making model for mitigating non-cooperating node attacks in WSNs. Peer-to-Peer Netw Appl 16(5):2607–2629

    Article  Google Scholar 

  11. Pabitha P, Praveen R, Chandana KCJ, Ponlibarnaa S, Aparnaa A S (2023) A Comparative Study of Deep Learning Models for ECG Signal-based User Classification. 2023 12th International Conference on Advanced Computing (ICoAC). IEEE, 2023: 1-8

  12. Nasiri S, Sadoughi F, Tadayon M, Dehnad A (2019) Security requirements of internet of things-based healthcare system: a survey study. Acta Informatica Med 27(4):253

    Article  Google Scholar 

  13. Hasan MK, Ghazal TM, Saeed RA, Pandey B, Gohel H, Eshmawi AA, Abdel-Khalek S, Alkhassawneh HM (2021) A review on security threats, vulnerabilities, and counter measures of 5G enabled internet‐of‐Medical‐things. IET Commun 16(5):421–432

    Article  Google Scholar 

  14. Huang X, Nazir S (2020) Evaluating security of internet of medical things using the analytic network process method. Secur Commun Netw 2020(4):1–14

    Google Scholar 

  15. Guan Z, Lv Z, Du X, Wu L, Guizani M (2019) Achieving data utility-privacy tradeoff in internet of Medical things: a machine learning approach. Future Gener Comput Syst 98(4):60–68

    Article  Google Scholar 

  16. Yu K, Tan L, Aloqaily M, Yang H, Jararweh Y (2021) Blockchain-enhanced data sharing with traceable and direct revocation in IIoT. IEEE Trans Industr Inf 17(11):7669–7678

    Article  Google Scholar 

  17. Sun Z, Han D, Li D, Wang X, Chang C, Wu Z (2022) A blockchain-based secure storage scheme for medical information. EURASIP J Wirel Commun Netw 3(4):1–13

    Google Scholar 

  18. Sudhakar T, Natarajan V (2020) A new three-factor authentication and key agreement protocol for multi-server environment. Wireless Networks 26(7):4909–4920. https://doi.org/10.1007/s11276-018-01922-3

    Article  Google Scholar 

  19. Ponsy RK, Priya Sathia Bhama Chandra, Jayabal, (2021) MetaInfoChain: Bi-layered blockchain consensus for metadata aggregation in IoT and cloud environments. Abstract Trans Emerg Telecommun Technol 32(12):e4362

    Article  Google Scholar 

  20. Jayabal CP, Sathia Bhama PR (2021) Performance analysis on Diversity Mining-based Proof of Work in bifolded consortium blockchain for Internet of Things consensus Summary Concurrency and Computation. Pract Exp 33(16):85

    Google Scholar 

  21. Mohammedi M, Omar M, Bouabdallah A (2017) Secure and lightweight remote patient authentication scheme with biometric inputs for mobile healthcare environments. J Ambient Intell Humaniz Comput 9(5):1527–1539

    Article  Google Scholar 

  22. Shukla S, Thakur S, Hussain S, Breslin JG, Jameel SM (2021) Identification and authentication in healthcare internet-of-things using integrated fog computing based blockchain model. Internet Things 15(2):100422

    Article  Google Scholar 

  23. Parah SA et al (2021) Efficient Security and Authentication for Edge-Based Internet of Medical Things. IEEE Internet of Things Journal 8(21):15652–15662

    Article  Google Scholar 

  24. Ying B, Mohsen NR, Nayak A (2021) Efficient authentication protocol for continuous monitoring in medical sensor networks. IEEE Open J Comput Soc 2(2):130–138

    Article  Google Scholar 

  25. Adeli M, Bagheri N, Meimani HR (2020) On the designing a secure biometric-based remote patient authentication scheme for mobile healthcare environments. J Ambient Intell Humaniz Comput 12(2):3075–3089

    Article  Google Scholar 

  26. Vangala A, Sutrala AK, Das AK, Jo M (2021) Chain Code-based blockchain-envisioned authentication scheme for smart farming. IEEE Internet Things J 8(13):10792–10806

    Article  Google Scholar 

  27. Tan L, Yu K, Shi N, Yang C, Wei W, Lu H (2022) Towards secure and privacy-preserving data sharing for COVID-19 medical records: a blockchain-empowered approach. IEEE Trans Netw Sci Eng 9(1):271–281

    Article  MathSciNet  Google Scholar 

  28. Yang X, Yang X, Yi X, Khalil I, Zhou X, He D, Huang X, Nepal S (2022) Blockchain-based secure and lightweight authentication for internet of things. IEEE Internet Things J 9(5):3321–3332

    Article  Google Scholar 

  29. Zhaofeng M, Jialin M, Jihui W, Zhiguang S (2021) Blockchain-based decentralized authentication modeling scheme in edge and IoT environment. IEEE Internet Things J 8(4):2116–2123

    Article  Google Scholar 

  30. Wang W, Chen Q, Yin Z, Srivastava G, Gadekallu TR, Alsolami F, Su C (2022) Blockchain and PUF-based lightweight authentication protocol for wireless medical sensor networks. IEEE Internet Things J 9(11):8883–8891

    Article  Google Scholar 

  31. Abdussami M, Amin R, Saravanan P, Vollala S (2023) BSAPM: BlockChain based secured authentication protocol for large scale WSN with FPGA implementation. Comput Commun 209:63–77

    Article  Google Scholar 

  32. Fu Y, Shao J, Huang Q, Zhou Q, Feng H, Jia X, Feng W (2023) Non-transferable blockchain-based identity authentication. Peer-to-Peer Netw Appl 16:1354–1364

    Article  Google Scholar 

  33. Al Ahmed MT, Hashim F, Hashim SJ, Abdullah A (2023) Authentication-Chains: Blockchain-inspired Lightweight Authentication Protocol for IoT Networks. Electronics 12(4):867

    Article  Google Scholar 

  34. Liu S, Chen K, Liu Z, Wang T (2021) Secure threshold ring signature based on SM9. IEEE Access 9(2):95507–95516

    Article  Google Scholar 

  35. Tang S, Wang Z, Jiang J, Ge S, Tan G (2022) Improved PBFT algorithm for high-frequency trading scenarios of alliance blockchain. Sci Rep 3(4):1–13

    Google Scholar 

Download references

Funding

None.

Author information

Authors and Affiliations

Authors

Contributions

All the authors are equally contributed to the paper.

Corresponding author

Correspondence to R. Praveen.

Ethics declarations

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Competing interests

The authors declare no competing interests.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Priya, J.C., Praveen, R., Nivitha, K. et al. Improved blockchain-based user authentication protocol with ring signature for internet of medical things. Peer-to-Peer Netw. Appl. (2024). https://doi.org/10.1007/s12083-024-01716-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s12083-024-01716-9

Keywords

Navigation