TOWARDS SECURE IOT AUTHENTICATION SYSTEM BASED ON FOG COMPUTING AND BLOCKCHAIN TECHNOLOGIES TO RESIST 51% AND HIJACKING CYBER-ATTACKS.
Saved in:
| Title: | TOWARDS SECURE IOT AUTHENTICATION SYSTEM BASED ON FOG COMPUTING AND BLOCKCHAIN TECHNOLOGIES TO RESIST 51% AND HIJACKING CYBER-ATTACKS. |
|---|---|
| Authors: | Jawad, Muwafaq, Yassin, Ali A., Abed AL-Asadi, Hamid Ali, Abduljabbar, Zaid Ameen, Nyangaresi, Vincent Omollo, Hussien, Zaid Alaa, Neamah, Husam A. |
| Source: | Jordanian Journal of Computers & Information Technology; Jun2025, Vol. 11 Issue 2, p238-259, 22p |
| Subject Terms: | ELLIPTIC curve cryptography, COMPUTER performance, BLOCKCHAINS, INTERNET of things, SYSTEMS software |
| Abstract (English): | The Internet of Health Things (IoHT) is a network of healthcare devices, software and systems that enable remote monitoring and healthcare services by gathering real-time health data through sensors. Despite its significant benefits for modern smart healthcare, IoHT faces growing security challenges due to the limited processing power, storage capacity and self-defense capabilities of its devices. While blockchain-based authentication solutions have been developed to leverage tamper-resistant decentralized designs for enhanced security, they often require substantial computational resources, increased storage and longer authentication times, hindering scalability and time efficiency in large-scale, time-critical IoHT systems. To address these challenges, we propose a novel four-phase authentication scheme comprising setup, registration, authentication and secret-construction phases. Our scheme integrates chaotic-based public-key cryptosystems, a Light Encryption Device (LED) with a 3-D Lorenz chaotic map algorithm and blockchain-based fog computing technologies to enhance both efficiency and scalability. Simulated on the Ethereum platform using Solidity and evaluated with the JMeter tool, the proposed scheme demonstrates superior performance, with a computationalcost reduction of 40% compared to traditional methods like Elliptic Curve Cryptography (ECC). The average latency for registration is 1.25 ms, while the authentication phase completes in just 1.50 ms, making it highly suitable for time-critical IoHT applications. Security analysis using the Scyther tool confirms that the scheme is resistant to modern cyberattacks, including 51% attacks and hijacking, while ensuring data integrity and confidentiality. Additionally, the scheme minimizes communication costs and supports the scalability of largescale IoHT systems. These results highlight the proposed scheme's potential to revolutionize secure and efficient healthcare monitoring, enabling real-time, tamper-proof data management in IoHT environments. [ABSTRACT FROM AUTHOR] |
| Abstract (Arabic): | ملخص البحث: إنّ إنترنتتتتتي ء اتتتتتية ءارّتتتتتبّي منتتتتتة ا متتتتت اتتتتتن ا بتتتتت تتتتت ا ءارّمة تتتتت ءارّتتتتتبّي ءانرب يتتتتتة ء نظمتتتتت ءاّتتتتتت لم تتتتت بتتتتت ءارّمتتتتتر متتتتت حّ تّتتتتر لعتتتتتر تتتتتربة ءارّمة تتتتت ءارّتتتتتبّي منتتتتتر متتتتت يّةنتتتتتتة ا لت تتتتتت ةّارّتتتتتتبّ تّتتتتت ءاتتتتتت ب ءابعيعتتتتتت بتتتتتت تتتتتت ءام تتتتتتة م تتتتتت ءاتتتتتترّ بتتتتتت وّءئتتتتترمة ءا مّتتتتتت ا رّمة تتتتت ءارّتتتتتتبّي ءابر لأتتتتت ءا ةّّيتتتتتت تّتتتتت ن إنترنتتتتتتي ء اتتتتتية ءارّتتتتتتبّي لوء تتتتتت لبتتتتتترّ ة ا لتتتتتترلنع ةّ بتتتتتتةن لر تتتتتت إاتتتتتت ءاعتتتتتتر ا ءامبتتتتتتر ا م تتتتتت ءام ةّا تتتتتت تتتتتت ءاتّ تتتتتت إب ةنيتتتتتة ءاتتتتترّ ةّس متتتتت ءاتتتتت ل تتتتتة يّ متتتتتة لتتتتت لمتتتتتو ر م تتتتتو برتتتتتة ةئمتتتتت م تتتتت تتتتت ءا ح تتتتتت ب تتتتتت را إاتتتتت لب تتتتتي بتتتتت ءانيةنتتتتتة ن تتتتتة لتم تتتتت برتتتتتة مو تتتتتن مر تتتتترا ز تتتتتة ا تّتتتتت إب ةنتتتتتة ءاتّ تتتتت لبتتتتتتة إاتتتتت زبتتتتتةن و تتتتت بتتتتت تتتتت إن تتتتتةز ءامرتتتتتة ء بتتتتتر ءاّتتتتت اّ يّتتتتت إب ةنيتتتتت لو تتتتتي ة ز تتتتتة ا ةّم يت تتتتتة تّتتتت نظمتتتتت إنترنتتتتتي ء اتتتتتية ءارّتتتتتبّيٍ ءامو ءاّت ءا ب يّ ة ءً مة مة ا ت ةّبتتتتت بتتتتت متتتتت قّ ءاتّبتتتتترّ ة نعتتتتتترق تّتتتت متتتتت قّ ءاو تتتتت نظتتتتتة برتتتتتة ا ب وّنتتتتتة بتتتتت تّتتتت برءمتتتتت لعتتتتتم ءسمتتتتترء ءاتّ تتتتت ي ءامرتتتتتة إنعتتتتتة ءا تتتتترّ تتتتترب ءا ظتتتتتة ءامعتتتتتترق تّتتتتي نظمتتتتت لربيتتتتت ءام تتتتتةلي ءا ةّبّتتتتت تتتتتة م تتتتت وءا و تتتتت و تتتتتةز لربيتتتتت بتتتتت وء زبيتتتتتٍ ر متتتتتت اتتتتتتو ن ءا و تتتتتتو يتتتتتت ء تّّتتتتتتة لع يتتتتتتة ءابو تتتتتتن ءا تتتتتتنة يّ ءاعةئمتتتتتت م تتتتتت ءا ح ت ؛ُ ب لب ي ة اّ ب ءا ةم ي إب ةني ءاتّو ي تّعيتتتتتتتي ءا ظتتتتتتتة ءامعتتتتتتتترق منتتتتتتتر بعة نتتتتتتتت اّنظمتتتتتتت برتتتتتتتة ا لع ير تتتتتتت ا تّتتتتتت يّتتتتتتتة ءامو تتتتتوس تّتتتترا ءا ظتتتتتة ءامعتتتتتترق ء بت وّ تتتتتة بتتتتت ل تتتتتي تّتتتت ل تتتتت ءابو تتتتتن تتتتتر تتتتت 1(بي تتتتت ةنيتتتتت يّ متتتتتة ل تمتتتتت مم يتتتتت ءامرتتتتتة ب تّتتتترّ زبتتتتت ءاتّتتتتتا ير ءاتتتتت ز ا تّ تتتتت ي 25 1(بي تتتتتت ةنيتتتتتت ء بتتتتتتر ءاتتتتتت اّ تّتتتتت ءا ظتتتتتتة ءامعتتتتتتترق ب ئمتتتتتتة اتمنيعتتتتتتة إنترنتتتتتتي تّتتتتت 50 ء اتتتتتية ا رّمة تتتتت ءارّتتتتتبي ءاّتتتتتت ح تّتتتترّ يّ تتتتتة ءاتتتتت ب متتتتتةب مة تتتتتمة نتتتتتي لب يتتتتت ء بتتتتتةن ن ءا ظتتتتتتتتة ءامعتتتتتتتتترق بعتتتتتتتتة ا متتتتتتتتة ءسا تر نيتتتتتتتت مّتتتتتتتتة يّ تتتتتتتتة م متتتتتتتتة 51 % م متتتتتتتتة ءلا تمتتتتتةم يّ متتتتتة تتتتتت ءاب تتتتتة م تتتتت ل ةبتتتتت ءانيةنتتتتتة تتتتترّ ت ة متتتتت ا م تتتتت اتتتتت تّتتتتت نّ ءا ظتتتتتة ءامعتتتتتترق تتتتت ل تتتتت ءلالّرتتتتتة تتتتترم إب ةنيتتتتت لو تتتتتي نظمتتتتت إنترنتتتتتي ء اتتتتتية ءارّبّي ء ءاب ءا نير ءا تتتتتر ر ةّاتتتتت ةّّر نّ متتتتت قّ ءا تتتتتتةئ لنتتتتتي نّ ءا ظتتتتتة ءامعتتتتتترق مت تتتتت ءسب ةنيتتتتت سمتتتتترء تتتتتو اا تّتتتت ب تتتتتة ءارّمتتتتتر ءيبتتتتت ءا تّّتتتتة انيةنتتتتتة نظمتتتتت إنترنتتتتتي ء اتتتتتية ءارّتتتتتبّي ء بتتتتتر ءاّتتتتت اّ م تتتتت بتتتتت إ ء ا ءانيةنتتتتتة تّتتتت ءاتتتتت ب ءابعيعتتتتت تّتتتت يّ تتتتتة إنترنتتتتتي ء اتتتتتية ءارّتتتتتبّي اّبتتتتتة ا ن ةّم ي. [ABSTRACT FROM AUTHOR] |
| Copyright of Jordanian Journal of Computers & Information Technology is the property of Jordanian Journal of Computers & Information Technology and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.) | |
| Database: | Complementary Index |
Be the first to leave a comment!
Full Text Finder
Nájsť tento článok vo Web of Science