Fig 3 - uploaded by Nian Xue
Content may be subject to copyright.
C broadcasts T x 1 in the PSN area. Smart phones forward T x 1 to their neighbors. Laptops and personal computers verify T x 1 .  

C broadcasts T x 1 in the PSN area. Smart phones forward T x 1 to their neighbors. Laptops and personal computers verify T x 1 .  

Source publication
Article
Full-text available
Modern technologies of mobile computing and wireless sensing prompt the concept of pervasive social network (PSN)-based healthcare. To realize the concept, the core problem is how a PSN node can securely share health data with other nodes in the network. In this paper, we propose a secure system for PSN-based healthcare. Two protocols are designed...

Context in source publication

Context 1
... elliptic curve E and the base point G Input: The received data U S , P K S Input: The secret random value B. Protocol II: Adding Data to The Blockchain 1) Protocol Description: Protocol II realizes the second phases of our system. As shown in Fig. 3, in this protocol, the coordinator C works as a user node of PSN area and broadcasts a transaction to the neighbor nodes. The protocol is described as ...

Similar publications

Conference Paper
Full-text available
Location-Based Services (LBS) are currently attracting many research efforts due to the pervasiveness of mobile devices in our daily life. Mechanisms to monitor distributedly the remote (and sometimes huge or dynamic) geographic areas referenced from location-based constraints are needed in order to retrieve the required data. In some cases (e.g.,...
Article
Full-text available
Wireless data broadcast is an efficient way of delivering data of common interest to a large population of mobile devices within a proximate area, such as smart cities, battle fields, etc. In this work, we focus ourselves on studying the data placement problem of periodic XML data broadcast in mobile and wireless environments. This is an important...
Article
Full-text available
For the problem that mobile devices that are far away from the base station obtain limited wireless resources, which causes high transmission delays, the study proposes a multi-hop path to assist users who are far away from the base station to use edge computing resources. And it combines cloud radio access network and wireless self-organising netw...

Citations

... Therefore, the PHR systems have attempted to solve the problem of data management. In [106], the authors designed WBAN that includes wireless radio channels to harden the situation on attackers to spoof or block messages. ...
... It stores data only on nodes participating in data generation. A few of the papers surveyed just settle for mathematical models without verifying them with an implementation [106], [122], [112], [113], [121], [120], and [119], so healthcare blockchains are still in the early stages of adoption due to the lack of implementation. Most papers also don't integrate SC into their proposed architecture and only settle for the first generation of blockchain-based just on consensus algorithms [114] and [115]. ...
... Some research studied blockchain-based WBAN, taking into account their focus on energy to achieve stability, efficiency, [126] and [127], continuous real-time [116], energy consumption management, [128], [129], [130], and [106], time management [110], [131], [132], and [133]. Some papers concentrate on the power-aware constraints while trying to ensure reliability [134], confidentiality, availability, and improving data collection [111]. ...
Thesis
Full-text available
The advent of Wireless Body Area Networks (WBAN) and Internet of Things (IoT) have revolutionized healthcare sector, enabling continuous and remote monitoring of patients’ vital signs. In resource-constrained networks like WBAN, maintaining uninterrupted service is a critical challenge. To address this, this thesis aims to enhance the IoT enabled WBAN operational longevity for sustainable and high-quality Electronic health (E-health) services. The primary focus lies in harnessing energy harvesting-enabled sensor nodes to achieve an extended network lifetime and ensure uninterrupted service. This thesis is first centered around a dynamic strategy for time resource allocation, intricately designed to balance energy efficiency and service availability. The solution involves capturing energy harvesting process within sensor nodes through a Discrete Time Markov Chain (DTMC) model, enabling precise assessment of instantaneous energy budget. This model forms the basis for prioritizing nodes based on their net energy levels. The proposed algorithm manages time slot allocation, giving precedence to nodes with lower net energy levels. Moreover, the solution formulates an optimization problem to minimize collective energy consumption across nodes by optimizing packet transmission scheduling while adhering to energy availability criteria. To tackle this, a heuristic algorithm is proposed, effectively addressing the optimization challenge and augmenting uninterrupted network operation through Resource Allocation (RA) based on nodes’ energy dynamics. This solution enhances the overall performance of the network, ensuring continuous functionality without interruptions. Furthermore, we propose a novel solution to tackle the lifetime maximization problem based on game theory, specifically utilizing the First Price Sealed Bid Auction (FPSBA) mechanism. This mechanism facilitates efficient energy utilization and sustains service durability. Using FPSBA, sensor nodes compete for time slices within each superframe. At the start of each superframe, sensor nodes aim to calculate the maximum instantaneous energy of each sensor node to participate in the auction bidding process. The proposed solution’s efficiency is evaluated through simulations. The outcomes unveil significantly extended network lifetime and a noticeable reduction in packet loss, underscoring its superiority over existing benchmarks. The culmination of this part of the thesis is a comprehensive architecture that maximizes network performance, uses energy resources effectively and increases WBAN’s network lifetime. The conclusions drawn from this solution have the potential to impact the course of sustainable E-health services as the healthcare landscape continues to change. The last part of this thesis explores the role of blockchain in E-health, focusing on its potential to enhance remote patient monitoring. It highlights challenges such as scalability, energy efficiency, and real-time processing in traditional blockchain architectures. To address these challenges, we introduce a permissioned blockchainbased smart contract framework and sharding for an energy harvesting model for E-health-based WBAN. This framework incorporates shard chains and a novel consensus mechanism, promoting scalability and energy efficiency. It supports sharding on the blockchain and energy sharing, enhancing transaction efficiency and power management. Moreover, adopting a Proof-of-Stake (PoS) consensus mechanism and off-chain/on-chain principles results in substantial energy savings. For handling urgent data, our framework employs a priority queue mechanism to ensure timely transaction processing. A threshold-based sharing for energy harvesting is proposed. The combined utilization of low-power mode and scheduling techniques serves to extend the sensor nodes’ lifespan and optimize energy utilization. KEYWORDS: IoT, E-health, WBAN, energy harvesting, energy efficiency, game theory, resource allocation, blockchain.
... Blockchain solutions have garnered widespread attention in recent years. In 2017, Zhang et al. [35] introduced a blockchain data sharing scheme for the healthcare sector. This system utilizes blockchain to store addresses (instead of actual health data) to maintain privacy and efficiency, allowing nodes to securely access and share health data. ...
Article
Full-text available
The access control system is a critical element in intelligent buildings. In this paper, we present SPCL, an innovative access control system designed to facilitate building entry through the use of mobile phones. Our system aims to provide a secure and convenient solution for building access, capitalizing on the widespread availability and capabilities of mobile devices. Additionally, we propose a lightweight authentication protocol to enhance security. The performance of the protocol is measured for different curves at different frequencies, proving that the protocol is more suitable for door lock systems than the benchmark protocol. In addition, we investigated the security and usability of SPCL. Finally, a comparison of the security of human-lock interfaces for smart locks and blockchain-based payment methods are discussed.
... The system offers benefits in security, transparency, privacy, data analytics, and interoperability, but faces challenges in scalability, adoption, regulatory compliance, data ownership, and technical complexity. In [5], Zhang, J., Xue, N., & Huang, X. propose a secure system for pervasive social network-based healthcare, as detailed in their paper published in IEEE Access. The system aims to integrate social networking aspects into healthcare management, ensuring security and privacy. ...
Article
In recent years, the integration of blockchain technology with healthcare systems has garnered considerable attention due to its potential to enhance security, privacy, and interoperability in managing patient medical records. This paper proposes a novel approach to patient medical record management by leveraging Ethereum blockchain and InterPlanetary File System (IPFS) for storage, within a government-controlled framework. The system ensures secure and immutable storage of patients' medical records, accessible only by verified medical professionals, thus facilitating informed diagnosis and treatment. Additionally, the platform provides mechanisms for patient recourse in case of inaccuracies, as well as potential integration with insurance agencies. Furthermore, the proposed system envisages a future extension to facilitate anonymized data sharing with the scientific community, thereby contributing to advancements in medical research. This paper provides a comprehensive academic description of the proposed approach, discussing its technical architecture, security measures, regulatory framework, and potential impact on healthcare delivery and research.
... A lot of IoMT information is gathered, moved, and conveyed among various gatherings. The exchanges ought to be done in a protected manner [23][24][25]. ...
Chapter
The Internet of Medical Things (IoMT) is the collection of clinical contraptions as well as projects with the intention of attaching caring medical information structures all the way through online PC organizations. IoMT gadgets hook up with cloud systems which include Amazon Web Services, in which captured facts may be saved and analyzed. Different benefits of IoMT consist of diminished wellness care costs, bearing the cost of all-around coordinated logical reactions, fast decision-making, and progressing top-of-the-line logical treatment. By and by, billions of contraptions are connected with the Internet of Things (IoT) for different verticals of bundles alongside medical services. With this outstanding development, buyers’ privateness and security will turn into the most difficult issues in IoMT and require basic thought. A few possibilities for security and protection that could emerge inside the medical services frameworks are unapproved to get admission to colossal victim’s tricky records (i.e., private and logical records) that empower in settling on fundamental important choices. Creating a blockchain is the posting of records, known as blocks, which are associated with the use of cryptography. It is a temperament-demonstrated virtual record that gives us distributed reports. Blockchain licenses dispatch among non-confiding people with no mediator. This chapter discusses the privacy analyses of IoT-based health records using blockchain technology.
... The framework upholds revocation of consent as a fundamental right; patients can withdraw their previously granted consent at any time, effectively halting any further usage of their health data. Intelligent contracts embedded within the blockchain infrastructure ensure these actions are recorded indelibly and enforced rigorously within the network [27] (Figure 1). ...
... Permissions will be customizable, allowing patients to specify which institutions, clinicians, researchers, or third-party entities (if any) can access specific segments of their data. Such granular control, linked to the immutable consent records on the blockchain, serves as a bulwark against unauthorized actions and contributes to system accountability [27]. Alignment with regulatory frameworks such as HIPAA and GDPR constitutes a fundamental design principle of the proposed framework. ...
... Scaling the framework to support millions of patients demands innovative solutions. Investigating transaction throughput optimization through methods like sharding is crucial to prevent slowdowns under high loads [27]. Further, exploring hybrid storage solutions emerges as a compelling option for sensitive metadata kept in the blockchain alongside larger datasets stored off-chain, linked by cryptographic hashes, which could alleviate strain on the core blockchain network. ...
Article
Full-text available
This paper explores the development and evaluation of a blockchain-powered consent management system designed to enhance patient autonomy and security in healthcare predictive analytics. By leveraging blockchain technology, the proposed system introduces a robust framework for managing patient consent in a transparent, immutable, and secure manner. The system architecture prioritizes patient privacy, incorporating a permissioned blockchain model, Proof-of-Authority consensus mechanism, and smart contracts with detailed consent logic. These elements facilitate a dynamic and user-centric approach to consent management, allowing patients to grant, revoke, or modify their consent in real time. A pilot study and simulated environment are proposed to evaluate the system's usability, security, and timeliness of consent updates. The anticipated outcomes suggest significant improvements in patient control over health data, compliance with regulatory standards, and auditability of consent actions. This research underscores the potential of blockchain technology to revolutionize consent management in healthcare, promising a future where patient data is managed with unparalleled integrity and respect.
... Blockchain additionally guarantees the client's obscurity, and the client's record can be securely eliminated from the framework to forestall outsider admittance to the client's data. The combination of the cloud with blockchain will likewise guarantee that numerous organizations have certainty, and it would turn into an on-request service [11]. ...
... 9. Installed MetaMask browser extension.10. Connected MetaMask to the local Ethereum blockchain from Ganache.11. Interacted with the access control system's smart contract using MetaMask. ...
Article
Full-text available
Access control is a pivotal aspect of modern computing systems, ensuring that only authorized entities can interact with sensitive data and resources. Traditional access control methods, while effective, face challenges in terms of security, transparency, and scalability. Blockchain technology has emerged as a promising solution to enhance access control in cloud computing environments. Blockchain's inherent features, such as decentralization, immutability, and cryptographic security, offer a unique framework for addressing the limitations of traditional access control systems. In this paper, we explore the integration of blockchain technology with cloud computing to establish a more secure and transparent access control mechanism. By utilizing blockchain, access control policies and permissions can be stored in a tamper-proof and transparent ledger. Scalability is an issue since processing many access control transactions on the blockchain might cause network congestion and sluggish processing. Transactions take time to upload to the blockchain, which can delay real-time access choices. It takes skill to integrate and manage blockchain and cloud technologies together. Choosing the correct consensus mechanism affects system efficiency and security. Consider the costs of establishing and maintaining such a system and the difficulty of fixing faults owing to blockchain immutability. In conclusion, this paper underscores the significance of access control in cloud computing and the limitations of traditional approaches. By harnessing the power of blockchain technology, a more secure, transparent, and scalable access control framework can be established, revolutionizing the way we manage access to sensitive data and resources in complex digital ecosystems.
... The BC-based MedRec model used in this deployment ensured the privacy, authenticity, and traceability of patient data by keeping a detailed log; HER, also, includes a BC-based Patient Health Record (PHR) functionality assisting the patient and their numerous clinicians in compiling a comprehensive, lifelong medical history. Using a number of various protocols, Pervasive Social Network (PSN) provides dependable medical treatment [17]. The original protocol was a revamped form of the IEEE 802.15.6 standard for mutual authentication via a shared display. ...
Conference Paper
Full-text available
The academia and industry have thoroughly examined the prospective applications of blockchain technology (BCT), particularly in the domains of banking and payment systems. A contemporary development is the utilization of BCT at the enterprise level, wherein it functions as the foundational framework for ensuring internet security and immutability. Consequently, this has led to the emergence of new application areas such as the Industrial Internet of Things (IIoT) and Industry 4.0 (I4.0). This article provides an overview of IIoT and I4.0, as well as the fundamental properties of BCT. Subsequently, the paper delves into the practical applications of BCT in seven key areas, in commercial contexts. Subsequently, an analysis will be conducted to explore the ten emerging domains where BCT is being applied. This article incorporates academic implementations, startups, and real-world implementations to enhance comprehension.
... Blockchain has evolved into a major research area. It has revolutionized finance [5][6][7], Internet of Things (IoT) [8][9][10][11][12][13], health care [14][15][16] and supply chain management [17][18][19]. In recent years, blockchain technology has opened up many research avenues, and plenty of research gaps have been identified in the area. ...
Article
Full-text available
Blockchain is a technology that collects data in a blockchain and allows transactions securely and transparently. It is used in many fields. Bibliometric publications examining detailed research trends in blockchain and cryptocurrency are still rare, but one bibliometric report did include research on the topic. The present work is filling in the void that eludes the study of research in the blockchain area. In the current work, we have included a wide range of blockchain and cryptocurrency research efforts to date. This study used the Scopus database to extract 2,045 articles from 2014 to 2021. The goal was to examine blockchain and cryptocurrency growth in volume, trend, global distribution, significant journals, pioneering authors, leading nations, and dominant sectors. This study highlights many aspects of worldwide blockchain and cryptocurrency research by researchers from all over the world. This research also studies how consensus decision-making and its processes are used. This study highlights many aspects of global blockchain and cryptocurrency research. This study also examines their use and consensus methods.
... While Medrec can ensure the data interoperability between patients and doctors, it is also faced with data privacy leakage issue. Zhang et al. [30] adopted mobile computing and wireless sensor network to design a PSN-based (Pervasive Social Network) EMR management system. This PSN-based system can reduce the computation cost of IoT devices such as blood pressure detector, but which still leaves the malicious spreading issue after EMRs sharing. ...
Article
Full-text available
Electronic Medical Records (EMRs) sharing enhances healthcare and biomedical discoveries but faces challenges: data provider centralization and limited interoperability. Blockchain can address these issues, but existing systems struggle with malicious EMR propagation due to challenges concerning the authenticity, non-repudiation, and integrity of the digital signatures they employ. Universal Designated Verifier Signature Proof (UDVSP) may be an intuitive solution, but existing UDVSP schemes are inefficient due to time-consuming bilinear pairing operations. In this article, we first adopt the Elliptic Curve Digital Signature Algorithm (ECDSA) to propose a more efficient and blockchain-friendly UDVSP scheme, following by a blockchain-based EMR sharing system (EMRChain). To our best knowledge, our proposed UDVSP scheme is the first bilinear pairing-free solution, and EMRChain is the first blockchain-based EMR sharing system to possess the anti-malicious propagation. Furthermore, we proceed to provide a thorough security analysis and performance evaluation of both our UDVSP scheme and EMRChain. Our UDVSP scheme is provably secure within the security model and offers significant computational cost savings (at least 86.76%) and reduced communication overhead (at least 59.37%) compared to existing UDVSP schemes. These results, along with the EMRChain prototype, effectively showcase the utility and effectiveness of EMRChain, which is built upon our UDVSP scheme.
... Diferentes políticas estão sujeitas a inconsistências, dificultando a rastreabilidade e fragilizando a auditoria do processo judicial. Blockchainé adequado para o desenvolvimento de soluções relacionadasà rastreabilidade, pois as transações são imutáveis, os dados trafegam de forma segura e descentralizada e oferecem auditoria confiável [Zhang et al. 2016]. ...
Conference Paper
Full-text available
Demanda judicial de medicamentos sobrecarrega o Sistema Único de Saúde, podendo ocorrer pedidos duplicados devido às diferentes possibilidades no fluxo de atendimento. A natureza da atividade é descentralizada e distribuída, funcionando como um consórcio entre organizações públicas envolvidas e blockchain pode exercer a integração com melhor rastreabilidade e gerenciar as solicitações com segurança, resiliência e auditabilidade, proporcionando a economia e a transparência necessárias ao processo. O sistema proposto funciona por meio de um contrato inteligente que fará o gerenciamento dos tokens associados aos processos em tela. Fornecemos uma prova de conceito simulando todo um cenário validado com especialistas da Secretaria de Saúde de Salvador. Esses especialistas indicam que o uso do sistema pode proporcionar melhor controle da movimentação e gerenciamento da solicitação de medicamentos com ganhos significativos para o processo do Sistema Único de Saúde.