TOWARDS SECURE IOT AUTHENTICATION SYSTEM BASED ON FOG COMPUTING AND BLOCKCHAIN TECHNOLOGIES TO RESIST 51% AND HIJACKING CYBER-ATTACKS.

Uloženo v:
Podrobná bibliografie
Název: TOWARDS SECURE IOT AUTHENTICATION SYSTEM BASED ON FOG COMPUTING AND BLOCKCHAIN TECHNOLOGIES TO RESIST 51% AND HIJACKING CYBER-ATTACKS.
Autoři: Jawad, Muwafaq, Yassin, Ali A., Abed AL-Asadi, Hamid Ali, Abduljabbar, Zaid Ameen, Nyangaresi, Vincent Omollo, Hussien, Zaid Alaa, Neamah, Husam A.
Zdroj: Jordanian Journal of Computers & Information Technology; Jun2025, Vol. 11 Issue 2, p238-259, 22p
Témata: ELLIPTIC curve cryptography, COMPUTER performance, BLOCKCHAINS, INTERNET of things, SYSTEMS software
Abstract (English): The Internet of Health Things (IoHT) is a network of healthcare devices, software and systems that enable remote monitoring and healthcare services by gathering real-time health data through sensors. Despite its significant benefits for modern smart healthcare, IoHT faces growing security challenges due to the limited processing power, storage capacity and self-defense capabilities of its devices. While blockchain-based authentication solutions have been developed to leverage tamper-resistant decentralized designs for enhanced security, they often require substantial computational resources, increased storage and longer authentication times, hindering scalability and time efficiency in large-scale, time-critical IoHT systems. To address these challenges, we propose a novel four-phase authentication scheme comprising setup, registration, authentication and secret-construction phases. Our scheme integrates chaotic-based public-key cryptosystems, a Light Encryption Device (LED) with a 3-D Lorenz chaotic map algorithm and blockchain-based fog computing technologies to enhance both efficiency and scalability. Simulated on the Ethereum platform using Solidity and evaluated with the JMeter tool, the proposed scheme demonstrates superior performance, with a computationalcost reduction of 40% compared to traditional methods like Elliptic Curve Cryptography (ECC). The average latency for registration is 1.25 ms, while the authentication phase completes in just 1.50 ms, making it highly suitable for time-critical IoHT applications. Security analysis using the Scyther tool confirms that the scheme is resistant to modern cyberattacks, including 51% attacks and hijacking, while ensuring data integrity and confidentiality. Additionally, the scheme minimizes communication costs and supports the scalability of largescale IoHT systems. These results highlight the proposed scheme's potential to revolutionize secure and efficient healthcare monitoring, enabling real-time, tamper-proof data management in IoHT environments. [ABSTRACT FROM AUTHOR]
Abstract (Arabic): ملخص البحث: إنّ إنترنتتتتتي ء اتتتتتية ءارّتتتتتبّي منتتتتتة ا متتتتت اتتتتتن ا بتتتتت تتتتت ا ءارّمة تتتتت ءارّتتتتتبّي ءانرب يتتتتتة ء نظمتتتتت ءاّتتتتتت لم تتتتت بتتتتت ءارّمتتتتتر متتتتت حّ تّتتتتر لعتتتتتر تتتتتربة ءارّمة تتتتت ءارّتتتتتبّي منتتتتتر متتتتت يّةنتتتتتتة ا لت تتتتتت ةّارّتتتتتتبّ تّتتتتت ءاتتتتتت ب ءابعيعتتتتتت بتتتتتت تتتتتت ءام تتتتتتة م تتتتتت ءاتتتتتترّ بتتتتتت وّءئتتتتترمة ءا مّتتتتتت ا رّمة تتتتت ءارّتتتتتتبّي ءابر لأتتتتت ءا ةّّيتتتتتت تّتتتتت ن إنترنتتتتتتي ء اتتتتتية ءارّتتتتتتبّي لوء تتتتتت لبتتتتتترّ ة ا لتتتتتترلنع ةّ بتتتتتتةن لر تتتتتت إاتتتتتت ءاعتتتتتتر ا ءامبتتتتتتر ا م تتتتتت ءام ةّا تتتتتت تتتتتت ءاتّ تتتتتت إب ةنيتتتتتة ءاتتتتترّ ةّس متتتتت ءاتتتتت ل تتتتتة يّ متتتتتة لتتتتت لمتتتتتو ر م تتتتتو برتتتتتة ةئمتتتتت م تتتتت تتتتت ءا ح تتتتتت ب تتتتتت را إاتتتتت لب تتتتتي بتتتتت ءانيةنتتتتتة ن تتتتتة لتم تتتتت برتتتتتة مو تتتتتن مر تتتتترا ز تتتتتة ا تّتتتتت إب ةنتتتتتة ءاتّ تتتتت لبتتتتتتة إاتتتتت زبتتتتتةن و تتتتت بتتتتت تتتتت إن تتتتتةز ءامرتتتتتة ء بتتتتتر ءاّتتتتت اّ يّتتتتت إب ةنيتتتتت لو تتتتتي ة ز تتتتتة ا ةّم يت تتتتتة تّتتتت نظمتتتتت إنترنتتتتتي ء اتتتتتية ءارّتتتتتبّيٍ ءامو ءاّت ءا ب يّ ة ءً مة مة ا ت ةّبتتتتت بتتتتت متتتتت قّ ءاتّبتتتتترّ ة نعتتتتتترق تّتتتت متتتتت قّ ءاو تتتتت نظتتتتتة برتتتتتة ا ب وّنتتتتتة بتتتتت تّتتتت برءمتتتتت لعتتتتتم ءسمتتتتترء ءاتّ تتتتت ي ءامرتتتتتة إنعتتتتتة ءا تتتتترّ تتتتترب ءا ظتتتتتة ءامعتتتتتترق تّتتتتي نظمتتتتت لربيتتتتت ءام تتتتتةلي ءا ةّبّتتتتت تتتتتة م تتتتت وءا و تتتتت و تتتتتةز لربيتتتتت بتتتتت وء زبيتتتتتٍ ر متتتتتت اتتتتتتو ن ءا و تتتتتتو يتتتتتت ء تّّتتتتتتة لع يتتتتتتة ءابو تتتتتتن ءا تتتتتتنة يّ ءاعةئمتتتتتت م تتتتتت ءا ح ت ؛ُ ب لب ي ة اّ ب ءا ةم ي إب ةني ءاتّو ي تّعيتتتتتتتي ءا ظتتتتتتتة ءامعتتتتتتتترق منتتتتتتتر بعة نتتتتتتتت اّنظمتتتتتتت برتتتتتتتة ا لع ير تتتتتتت ا تّتتتتتت يّتتتتتتتة ءامو تتتتتوس تّتتتترا ءا ظتتتتتة ءامعتتتتتترق ء بت وّ تتتتتة بتتتتت ل تتتتتي تّتتتت ل تتتتت ءابو تتتتتن تتتتتر تتتتت 1(بي تتتتت ةنيتتتتت يّ متتتتتة ل تمتتتتت مم يتتتتت ءامرتتتتتة ب تّتتتترّ زبتتتتت ءاتّتتتتتا ير ءاتتتتت ز ا تّ تتتتت ي 25 1(بي تتتتتت ةنيتتتتتت ء بتتتتتتر ءاتتتتتت اّ تّتتتتت ءا ظتتتتتتة ءامعتتتتتتترق ب ئمتتتتتتة اتمنيعتتتتتتة إنترنتتتتتتي تّتتتتت 50 ء اتتتتتية ا رّمة تتتتت ءارّتتتتتبي ءاّتتتتتت ح تّتتتترّ يّ تتتتتة ءاتتتتت ب متتتتتةب مة تتتتتمة نتتتتتي لب يتتتتت ء بتتتتتةن ن ءا ظتتتتتتتتة ءامعتتتتتتتتترق بعتتتتتتتتة ا متتتتتتتتة ءسا تر نيتتتتتتتت مّتتتتتتتتة يّ تتتتتتتتة م متتتتتتتتة 51 % م متتتتتتتتة ءلا تمتتتتتةم يّ متتتتتة تتتتتت ءاب تتتتتة م تتتتت ل ةبتتتتت ءانيةنتتتتتة تتتتترّ ت ة متتتتت ا م تتتتت اتتتتت تّتتتتت نّ ءا ظتتتتتة ءامعتتتتتترق تتتتت ل تتتتت ءلالّرتتتتتة تتتتترم إب ةنيتتتتت لو تتتتتي نظمتتتتت إنترنتتتتتي ء اتتتتتية ءارّبّي ء ءاب ءا نير ءا تتتتتر ر ةّاتتتتت ةّّر نّ متتتتت قّ ءا تتتتتتةئ لنتتتتتي نّ ءا ظتتتتتة ءامعتتتتتترق مت تتتتت ءسب ةنيتتتتت سمتتتتترء تتتتتو اا تّتتتت ب تتتتتة ءارّمتتتتتر ءيبتتتتت ءا تّّتتتتة انيةنتتتتتة نظمتتتتت إنترنتتتتتي ء اتتتتتية ءارّتتتتتبّي ء بتتتتتر ءاّتتتتت اّ م تتتتت بتتتتت إ ء ا ءانيةنتتتتتة تّتتتت ءاتتتتت ب ءابعيعتتتتت تّتتتت يّ تتتتتة إنترنتتتتتي ء اتتتتتية ءارّتتتتتبّي اّبتتتتتة ا ن ةّم ي. [ABSTRACT FROM AUTHOR]
Copyright of Jordanian Journal of Computers & Information Technology is the property of Jordanian Journal of Computers & Information Technology and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
Databáze: Complementary Index
FullText Text:
  Availability: 0
CustomLinks:
  – Url: https://resolver.ebscohost.com/openurl?sid=EBSCO:edb&genre=article&issn=24139351&ISBN=&volume=11&issue=2&date=20250601&spage=238&pages=238-259&title=Jordanian Journal of Computers & Information Technology&atitle=TOWARDS%20SECURE%20IOT%20AUTHENTICATION%20SYSTEM%20BASED%20ON%20FOG%20COMPUTING%20AND%20BLOCKCHAIN%20TECHNOLOGIES%20TO%20RESIST%2051%25%20AND%20HIJACKING%20CYBER-ATTACKS.&aulast=Jawad%2C%20Muwafaq&id=DOI:
    Name: Full Text Finder
    Category: fullText
    Text: Full Text Finder
    Icon: https://imageserver.ebscohost.com/branding/images/FTF.gif
    MouseOverText: Full Text Finder
  – Url: https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=EBSCO&SrcAuth=EBSCO&DestApp=WOS&ServiceName=TransferToWoS&DestLinkType=GeneralSearchSummary&Func=Links&author=Jawad%20M
    Name: ISI
    Category: fullText
    Text: Nájsť tento článok vo Web of Science
    Icon: https://imagesrvr.epnet.com/ls/20docs.gif
    MouseOverText: Nájsť tento článok vo Web of Science
Header DbId: edb
DbLabel: Complementary Index
An: 187049177
RelevancyScore: 1041
AccessLevel: 6
PubType: Academic Journal
PubTypeId: academicJournal
PreciseRelevancyScore: 1040.79553222656
IllustrationInfo
Items – Name: Title
  Label: Title
  Group: Ti
  Data: TOWARDS SECURE IOT AUTHENTICATION SYSTEM BASED ON FOG COMPUTING AND BLOCKCHAIN TECHNOLOGIES TO RESIST 51% AND HIJACKING CYBER-ATTACKS.
– Name: Author
  Label: Authors
  Group: Au
  Data: <searchLink fieldCode="AR" term="%22Jawad%2C+Muwafaq%22">Jawad, Muwafaq</searchLink><br /><searchLink fieldCode="AR" term="%22Yassin%2C+Ali+A%2E%22">Yassin, Ali A.</searchLink><br /><searchLink fieldCode="AR" term="%22Abed+AL-Asadi%2C+Hamid+Ali%22">Abed AL-Asadi, Hamid Ali</searchLink><br /><searchLink fieldCode="AR" term="%22Abduljabbar%2C+Zaid+Ameen%22">Abduljabbar, Zaid Ameen</searchLink><br /><searchLink fieldCode="AR" term="%22Nyangaresi%2C+Vincent+Omollo%22">Nyangaresi, Vincent Omollo</searchLink><br /><searchLink fieldCode="AR" term="%22Hussien%2C+Zaid+Alaa%22">Hussien, Zaid Alaa</searchLink><br /><searchLink fieldCode="AR" term="%22Neamah%2C+Husam+A%2E%22">Neamah, Husam A.</searchLink>
– Name: TitleSource
  Label: Source
  Group: Src
  Data: Jordanian Journal of Computers & Information Technology; Jun2025, Vol. 11 Issue 2, p238-259, 22p
– Name: Subject
  Label: Subject Terms
  Group: Su
  Data: <searchLink fieldCode="DE" term="%22ELLIPTIC+curve+cryptography%22">ELLIPTIC curve cryptography</searchLink><br /><searchLink fieldCode="DE" term="%22COMPUTER+performance%22">COMPUTER performance</searchLink><br /><searchLink fieldCode="DE" term="%22BLOCKCHAINS%22">BLOCKCHAINS</searchLink><br /><searchLink fieldCode="DE" term="%22INTERNET+of+things%22">INTERNET of things</searchLink><br /><searchLink fieldCode="DE" term="%22SYSTEMS+software%22">SYSTEMS software</searchLink>
– Name: AbstractNonEng
  Label: Abstract (English)
  Group: Ab
  Data: The Internet of Health Things (IoHT) is a network of healthcare devices, software and systems that enable remote monitoring and healthcare services by gathering real-time health data through sensors. Despite its significant benefits for modern smart healthcare, IoHT faces growing security challenges due to the limited processing power, storage capacity and self-defense capabilities of its devices. While blockchain-based authentication solutions have been developed to leverage tamper-resistant decentralized designs for enhanced security, they often require substantial computational resources, increased storage and longer authentication times, hindering scalability and time efficiency in large-scale, time-critical IoHT systems. To address these challenges, we propose a novel four-phase authentication scheme comprising setup, registration, authentication and secret-construction phases. Our scheme integrates chaotic-based public-key cryptosystems, a Light Encryption Device (LED) with a 3-D Lorenz chaotic map algorithm and blockchain-based fog computing technologies to enhance both efficiency and scalability. Simulated on the Ethereum platform using Solidity and evaluated with the JMeter tool, the proposed scheme demonstrates superior performance, with a computationalcost reduction of 40% compared to traditional methods like Elliptic Curve Cryptography (ECC). The average latency for registration is 1.25 ms, while the authentication phase completes in just 1.50 ms, making it highly suitable for time-critical IoHT applications. Security analysis using the Scyther tool confirms that the scheme is resistant to modern cyberattacks, including 51% attacks and hijacking, while ensuring data integrity and confidentiality. Additionally, the scheme minimizes communication costs and supports the scalability of largescale IoHT systems. These results highlight the proposed scheme's potential to revolutionize secure and efficient healthcare monitoring, enabling real-time, tamper-proof data management in IoHT environments. [ABSTRACT FROM AUTHOR]
– Name: AbstractNonEng
  Label: Abstract (Arabic)
  Group: Ab
  Data: ملخص البحث: إنّ إنترنتتتتتي ء اتتتتتية ءارّتتتتتبّي منتتتتتة ا متتتتت اتتتتتن ا بتتتتت تتتتت ا ءارّمة تتتتت ءارّتتتتتبّي ءانرب يتتتتتة ء نظمتتتتت ءاّتتتتتت لم تتتتت بتتتتت ءارّمتتتتتر متتتتت حّ تّتتتتر لعتتتتتر تتتتتربة ءارّمة تتتتت ءارّتتتتتبّي منتتتتتر متتتتت يّةنتتتتتتة ا لت تتتتتت ةّارّتتتتتتبّ تّتتتتت ءاتتتتتت ب ءابعيعتتتتتت بتتتتتت تتتتتت ءام تتتتتتة م تتتتتت ءاتتتتتترّ بتتتتتت وّءئتتتتترمة ءا مّتتتتتت ا رّمة تتتتت ءارّتتتتتتبّي ءابر لأتتتتت ءا ةّّيتتتتتت تّتتتتت ن إنترنتتتتتتي ء اتتتتتية ءارّتتتتتتبّي لوء تتتتتت لبتتتتتترّ ة ا لتتتتتترلنع ةّ بتتتتتتةن لر تتتتتت إاتتتتتت ءاعتتتتتتر ا ءامبتتتتتتر ا م تتتتتت ءام ةّا تتتتتت تتتتتت ءاتّ تتتتتت إب ةنيتتتتتة ءاتتتتترّ ةّس متتتتت ءاتتتتت ل تتتتتة يّ متتتتتة لتتتتت لمتتتتتو ر م تتتتتو برتتتتتة ةئمتتتتت م تتتتت تتتتت ءا ح تتتتتت ب تتتتتت را إاتتتتت لب تتتتتي بتتتتت ءانيةنتتتتتة ن تتتتتة لتم تتتتت برتتتتتة مو تتتتتن مر تتتتترا ز تتتتتة ا تّتتتتت إب ةنتتتتتة ءاتّ تتتتت لبتتتتتتة إاتتتتت زبتتتتتةن و تتتتت بتتتتت تتتتت إن تتتتتةز ءامرتتتتتة ء بتتتتتر ءاّتتتتت اّ يّتتتتت إب ةنيتتتتت لو تتتتتي ة ز تتتتتة ا ةّم يت تتتتتة تّتتتت نظمتتتتت إنترنتتتتتي ء اتتتتتية ءارّتتتتتبّيٍ ءامو ءاّت ءا ب يّ ة ءً مة مة ا ت ةّبتتتتت بتتتتت متتتتت قّ ءاتّبتتتتترّ ة نعتتتتتترق تّتتتت متتتتت قّ ءاو تتتتت نظتتتتتة برتتتتتة ا ب وّنتتتتتة بتتتتت تّتتتت برءمتتتتت لعتتتتتم ءسمتتتتترء ءاتّ تتتتت ي ءامرتتتتتة إنعتتتتتة ءا تتتتترّ تتتتترب ءا ظتتتتتة ءامعتتتتتترق تّتتتتي نظمتتتتت لربيتتتتت ءام تتتتتةلي ءا ةّبّتتتتت تتتتتة م تتتتت وءا و تتتتت و تتتتتةز لربيتتتتت بتتتتت وء زبيتتتتتٍ ر متتتتتت اتتتتتتو ن ءا و تتتتتتو يتتتتتت ء تّّتتتتتتة لع يتتتتتتة ءابو تتتتتتن ءا تتتتتتنة يّ ءاعةئمتتتتتت م تتتتتت ءا ح ت ؛ُ ب لب ي ة اّ ب ءا ةم ي إب ةني ءاتّو ي تّعيتتتتتتتي ءا ظتتتتتتتة ءامعتتتتتتتترق منتتتتتتتر بعة نتتتتتتتت اّنظمتتتتتتت برتتتتتتتة ا لع ير تتتتتتت ا تّتتتتتت يّتتتتتتتة ءامو تتتتتوس تّتتتترا ءا ظتتتتتة ءامعتتتتتترق ء بت وّ تتتتتة بتتتتت ل تتتتتي تّتتتت ل تتتتت ءابو تتتتتن تتتتتر تتتتت 1(بي تتتتت ةنيتتتتت يّ متتتتتة ل تمتتتتت مم يتتتتت ءامرتتتتتة ب تّتتتترّ زبتتتتت ءاتّتتتتتا ير ءاتتتتت ز ا تّ تتتتت ي 25 1(بي تتتتتت ةنيتتتتتت ء بتتتتتتر ءاتتتتتت اّ تّتتتتت ءا ظتتتتتتة ءامعتتتتتتترق ب ئمتتتتتتة اتمنيعتتتتتتة إنترنتتتتتتي تّتتتتت 50 ء اتتتتتية ا رّمة تتتتت ءارّتتتتتبي ءاّتتتتتت ح تّتتتترّ يّ تتتتتة ءاتتتتت ب متتتتتةب مة تتتتتمة نتتتتتي لب يتتتتت ء بتتتتتةن ن ءا ظتتتتتتتتة ءامعتتتتتتتتترق بعتتتتتتتتة ا متتتتتتتتة ءسا تر نيتتتتتتتت مّتتتتتتتتة يّ تتتتتتتتة م متتتتتتتتة 51 % م متتتتتتتتة ءلا تمتتتتتةم يّ متتتتتة تتتتتت ءاب تتتتتة م تتتتت ل ةبتتتتت ءانيةنتتتتتة تتتتترّ ت ة متتتتت ا م تتتتت اتتتتت تّتتتتت نّ ءا ظتتتتتة ءامعتتتتتترق تتتتت ل تتتتت ءلالّرتتتتتة تتتتترم إب ةنيتتتتت لو تتتتتي نظمتتتتت إنترنتتتتتي ء اتتتتتية ءارّبّي ء ءاب ءا نير ءا تتتتتر ر ةّاتتتتت ةّّر نّ متتتتت قّ ءا تتتتتتةئ لنتتتتتي نّ ءا ظتتتتتة ءامعتتتتتترق مت تتتتت ءسب ةنيتتتتت سمتتتتترء تتتتتو اا تّتتتت ب تتتتتة ءارّمتتتتتر ءيبتتتتت ءا تّّتتتتة انيةنتتتتتة نظمتتتتت إنترنتتتتتي ء اتتتتتية ءارّتتتتتبّي ء بتتتتتر ءاّتتتتت اّ م تتتتت بتتتتت إ ء ا ءانيةنتتتتتة تّتتتت ءاتتتتت ب ءابعيعتتتتت تّتتتت يّ تتتتتة إنترنتتتتتي ء اتتتتتية ءارّتتتتتبّي اّبتتتتتة ا ن ةّم ي. [ABSTRACT FROM AUTHOR]
– Name: Abstract
  Label:
  Group: Ab
  Data: <i>Copyright of Jordanian Journal of Computers & Information Technology is the property of Jordanian Journal of Computers & Information Technology and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract.</i> (Copyright applies to all Abstracts.)
PLink https://erproxy.cvtisr.sk/sfx/access?url=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edb&AN=187049177
RecordInfo BibRecord:
  BibEntity:
    Languages:
      – Code: eng
        Text: English
    PhysicalDescription:
      Pagination:
        PageCount: 22
        StartPage: 238
    Subjects:
      – SubjectFull: ELLIPTIC curve cryptography
        Type: general
      – SubjectFull: COMPUTER performance
        Type: general
      – SubjectFull: BLOCKCHAINS
        Type: general
      – SubjectFull: INTERNET of things
        Type: general
      – SubjectFull: SYSTEMS software
        Type: general
    Titles:
      – TitleFull: TOWARDS SECURE IOT AUTHENTICATION SYSTEM BASED ON FOG COMPUTING AND BLOCKCHAIN TECHNOLOGIES TO RESIST 51% AND HIJACKING CYBER-ATTACKS.
        Type: main
  BibRelationships:
    HasContributorRelationships:
      – PersonEntity:
          Name:
            NameFull: Jawad, Muwafaq
      – PersonEntity:
          Name:
            NameFull: Yassin, Ali A.
      – PersonEntity:
          Name:
            NameFull: Abed AL-Asadi, Hamid Ali
      – PersonEntity:
          Name:
            NameFull: Abduljabbar, Zaid Ameen
      – PersonEntity:
          Name:
            NameFull: Nyangaresi, Vincent Omollo
      – PersonEntity:
          Name:
            NameFull: Hussien, Zaid Alaa
      – PersonEntity:
          Name:
            NameFull: Neamah, Husam A.
    IsPartOfRelationships:
      – BibEntity:
          Dates:
            – D: 01
              M: 06
              Text: Jun2025
              Type: published
              Y: 2025
          Identifiers:
            – Type: issn-print
              Value: 24139351
          Numbering:
            – Type: volume
              Value: 11
            – Type: issue
              Value: 2
          Titles:
            – TitleFull: Jordanian Journal of Computers & Information Technology
              Type: main
ResultId 1