The Future of Blockchain Technology in Healthcare Internet of Things Security

  • Gautam SrivastavaEmail author
  • Reza M. Parizi
  • Ali Dehghantanha
Part of the Advances in Information Security book series (ADIS, volume 79)


The recent emergence of Internet of Things (IoT) brings a whole new class of applications and higher efficiency for existing areas of services. One such popular service that is trying to reap the benefits of IoT is the Healthcare sector. Application-specific requirements, as well as connectivity and communication ability of devices have introduced new challenges for these Healthcare IoT applications. Specifically, we have seen a surge of healthcare IoT applications that have manifested in recent years. Almost simultaneously to the surge in IoT, there has been potential venues for Blockchain Technology to find a home outside of the financial sector in many different applicable scenarios, including those in Healthcare. This chapter provides an overview of IoT health technologies with a specific emphasis on those proposed making use of Blockchain Technology. We investigate both the positive aspects of such implementations for the future, as well the shortcomings of known designs and tackle future challenges of this novel area of research. This chapter surveys the latest works in this very specific field, and gives an unbiased vantage point to assist researchers navigate this new horizon for Healthcare, IoT, and Blockchain Technology towards the future.


  1. 1.
    D. Andersen, H. Balakrishnan, F. Kaashoek, R. Morris, Resilient Overlay Networks, vol. 35 (ACM, New York, 2001)Google Scholar
  2. 2.
    M. Antonakakis, T. April, M. Bailey, M. Bernhard, E. Bursztein, J. Cochran, Z. Durumeric, J.A. Halderman, L. Invernizzi, M. Kallitsis et al., Understanding the Mirai Botnet, in 26th {USENIX} Security Symposium ({USENIX} Security 17), pp. 1093–1110 (2017)Google Scholar
  3. 3.
    A. Azaria, A. Ekblaw, T. Vieira, A. Lippman, MedRec: Using blockchain for medical data access and permission management, in 2016 2nd International Conference on Open and Big Data (OBD) (IEEE, New York, 2016), pp. 25–30Google Scholar
  4. 4.
    M. Bartoletti, L. Pompianu, An empirical analysis of smart contracts: platforms, applications, and design patterns, in International Conference on Financial Cryptography and Data Security (Springer, Cham, 2017), pp. 494–509Google Scholar
  5. 5.
    C. Cachin, Architecture of the hyperledger blockchain fabric, in Workshop on Distributed Cryptocurrencies and Consensus Ledgers, vol. 310, p. 4 (2016)Google Scholar
  6. 6.
    T. Dimitriou, K. Ioannis, Security issues in biomedical wireless sensor networks, in 2008 First International Symposium on Applied Sciences on Biomedical and Communication Technologies (IEEE, New York, 2008), pp. 1–5Google Scholar
  7. 7.
    A. Dorri, S.S. Kanhere, R. Jurdak, Towards an optimized blockchain for IoT, in Proceedings of the Second International Conference on Internet-of-Things Design and Implementation (ACM, New York, 2017), pp. 173–178Google Scholar
  8. 8.
    A.D. Dwivedi, L. Malina, P. Dzurenda, G. Srivastava, Optimized blockchain model for internet of things based healthcare applications. arXiv preprint. arXiv:1906.06517 (2019)Google Scholar
  9. 9.
    A.D. Dwivedi, G. Srivastava, S. Dhar, R. Singh, A decentralized privacy-preserving healthcare blockchain for IoT.Sensors 19(2), 326 (2019)CrossRefGoogle Scholar
  10. 10.
    S. Edwards, I. Profetis, Hajime: Analysis of a decentralized internet worm for IoT devices, in Rapidity Networks, Oct 16, 2016Google Scholar
  11. 11.
    J.P. Farwell, R. Rohozinski, Stuxnet and the future of cyber war. Survival 53(1), 23–40 (2011)CrossRefGoogle Scholar
  12. 12.
    K.N. Griggs, O. Ossipova, C.P. Kohlios, A.N. Baccarini, E.A. Howson, T. Hayajneh, Healthcare blockchain system using smart contracts for secure automated remote patient monitoring. J. Med. Syst. 42(7), 130 (2018)Google Scholar
  13. 13.
    D. Johnson, A. Menezes, S. Vanstone, The elliptic curve digital signature algorithm (ECDSA). Int. J. Inf. Secur. 1(1), 36–63 (2001)CrossRefGoogle Scholar
  14. 14.
    A. Josang, R. Ismail, The beta reputation system, in Proceedings of the 15th Bled Electronic Commerce Conference, vol. 5, pp. 2502–2511 (2002)Google Scholar
  15. 15.
    M.A. Khan, K. Salah, IoT security: Review, blockchain solutions, and open challenges. Futur. Gener. Comput. Syst. 82, 395–411 (2018, May 1)CrossRefGoogle Scholar
  16. 16.
    M. Kim, W. Jo, J. Kim, T. Shon, Visualization for internet of things: power system and financial network cases. Multimed. Tools Appl. 78(3), 3241–3265 (2019)CrossRefGoogle Scholar
  17. 17.
    P. Kumar, H.-J. Lee, Security issues in healthcare applications using wireless medical sensor networks: a survey. Sensors 12(1), 55–91 (2012)CrossRefGoogle Scholar
  18. 18.
    P. Kumar, S.-G. Lee, H.-J. Lee, E-SAP: efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks. Sensors 12(2), 1625–1647 (2012)CrossRefGoogle Scholar
  19. 19.
    C. Lamb, Future potential attack patterns against nuclear power I&C systems. Technical report, Sandia National Lab. (SNL-NM), Albuquerque, NM (United States), 2018Google Scholar
  20. 20.
    X. Lin, R. Lu, X. Shen, Y. Nemoto, N. Kato, Sage: a strong privacy-preserving scheme against global eavesdropping for ehealth systems. IEEE J. Sel. Areas Commun. 27(4), 365–378 (2009)CrossRefGoogle Scholar
  21. 21.
    L. Malina, G. Srivastava, P. Dzurenda, J. Hajny, and R. Fujdiak. A secure publish/subscribe protocol for internet of things.Google Scholar
  22. 22.
    D. McGinn, D. Birch, D. Akroyd, M. Molina-Solana, Y. Guo, W.J. Knottenbelt, Visualizing dynamic bitcoin transaction patterns. Big Data 4(2), 109–119 (2016)CrossRefGoogle Scholar
  23. 23.
    H. Ng, M. Sim, C. Tan, Security issues of wireless sensor networks in healthcare applications. BT Technol. J. 24(2), 138–144 (2006)CrossRefGoogle Scholar
  24. 24.
    J.-T.C. Ngo, J.T. Webb, Managing the status of documents in a distributed storage system, US Patent 9,020,887, 28 Apr 2015Google Scholar
  25. 25.
    R.M. Parizi, A. Dehghantanha, K.-K.R. Choo, A. Singh, Empirical vulnerability analysis of automated smart contracts security testing on blockchains, in Proceedings of the 28th Annual International Conference on Computer Science and Software Engineering, pp. 103–113. IBM Corp. (2018)Google Scholar
  26. 26.
    R.M. Parizi, A. Dehghantanha et al., Smart contract programming languages on blockchains: an empirical evaluation of usability and security, in International Conference on Blockchain (Springer, Cham, 2018), pp. 75–91Google Scholar
  27. 27.
    Y. Rahulamathavan, R.C.-W. Phan, M. Rajarajan, S. Misra, A. Kondoz, Privacy-preserving blockchain based IoT ecosystem using attribute-based encryption, in 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS) (IEEE, New York, 2017), pp. 1–6Google Scholar
  28. 28.
    L.G.A. Rodriguez, J.S. Trazzi, V. Fossaluza, R. Campiolo, D.M. Batista, Analysis of vulnerability disclosure delays from the national vulnerability database, in Anais do Workshop de Segurança Cibernética em Dispositivos Conectados (WSCDC-SBRC 2018), vol. 1. SBC (2018)Google Scholar
  29. 29.
    G. Srivastava, A.D. Dwivedi, R. Singh, Automated remote patient monitoring: data sharing and privacy using blockchain. arXiv preprint. arXiv:1811.03417 (2018)Google Scholar
  30. 30.
    G. Srivastava, A.D. Dwivedi, R. Singh, Crypto-democracy: a decentralized voting scheme using blockchain technology, in ICETE (2), pp. 674–679 (2018)Google Scholar
  31. 31.
    G. Srivastava, A.D. Dwivedi, R. Singh, Phantom protocol as the new crypto-democracy, in IFIP International Conference on Computer Information Systems and Industrial Management (Springer, Cham, 2018), pp. 499–509Google Scholar
  32. 32.
    M. Stemm, R.H. Katz, Vertical handoffs in wireless overlay networks. Mobile Netw. Appl. 3(4), 335–350 (1998)CrossRefGoogle Scholar
  33. 33.
    P.J. Taylor, T. Dargahi, A. Dehghantanha, R.M. Parizi, K.-K.R. Choo, A systematic literature review of blockchain cyber security, in Digital Communications and Networks (2019)Google Scholar
  34. 34.
    K.K. Venkatasubramanian, S.K. Gupta, Security for pervasive health monitoring sensor applications, in 2006 Fourth International Conference on Intelligent Sensing and Information Processing (IEEE, New York, 2006), pp. 197–202Google Scholar
  35. 35.
    F. Wu, L. Xu, S. Kumari, X. Li, An improved and anonymous two-factor authentication protocol for health-care applications with wireless medical sensor networks. Multimedia Syst. 23(2) ,195–205 (2017)CrossRefGoogle Scholar
  36. 36.
    Y. Xiao, X. Shen, B. Sun, L. Cai, Security and privacy in RFID and applications in telemedicine. IEEE Commun. Mag. 44(4), 64–72 (2006)CrossRefGoogle Scholar
  37. 37.
    J. Yoo, J.H. Yi, Code-based authentication scheme for lightweight integrity checking of smart vehicles. IEEE Access 6, 46731–46741 (2018)CrossRefGoogle Scholar
  38. 38.
    Q. Zhang, R.M. Parizi, K.K.R. Choo, A pentagon of considerations towards more secure blockchains, in IEEE Blockchain Technical Briefs (2018)Google Scholar
  39. 39.
    Z. Zheng, S. Xie, H. Dai, X. Chen, H. Wang, An overview of blockchain technology: architecture, consensus, and future trends, in 2017 IEEE International Congress on Big Data (BigData Congress), pp. 557–564, June 2017Google Scholar
  40. 40.
    Z. Zheng, S. Xie, H.-N. Dai, X. Chen, H. Wang, Blockchain challenges and opportunities: a survey. Int. J. Web Grid Serv. 14(4), 352–375 (2018)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Department of Mathematics and StatisticsBrandon UniversityBrandonCanada
  2. 2.Research Center for Interneural ComputingChina Medical UniversityTaichungRepublic of China
  3. 3.College of Computing and Software EngineeringKennesaw State UniversityMariettaUSA
  4. 4.Cyber Science LabSchool of Computer Science, University of GuelphGuelphCanada

Personalised recommendations