Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

PPLBB: a novel privacy-preserving lattice-based blockchain platform in IoMT

Published: 28 November 2024 Publication History

Abstract

This paper proposes a quantum-secure, privacy-preserving blockchain platform for the Internet of Medical Things (IoMT). It defines a solution to quantum attacks on blockchain by integrating the Dilithium lattice-based signature scheme to enhance security and privacy. A layer-based structure, combined with the Constrained Application Protocol (CoAP), is used to improve the efficiency of data sharing, optimize security, and manage authentication in resource-constrained IoMT environments. Zero-knowledge proofs (ZKP) and lattice-based signatures are used for lightweight authentication and data integrity. Real-time testing on electrochemical sensor data validates the system’s efficiency in securely managing IoMT communications. Additionally, event-based smart contracts (EBSC) are implemented to reduce communication costs and minimize blockchain overhead. Experimental results show that Dilithium outperforms other schemes like Falcon and ECDSA, making it a superior solution for real-time IoMT security.

References

[1]
Ghubaish A, Salman T, Zolanvari M, Unal D, Al-Ali A, and Jain R Recent advances in the internet-of-medical-things (iomt) systems security IEEE Internet of Things Journal 2020 8 11 8707-8718
[2]
Xiong H, Jin C, Alazab M, Yeh K-H, Wang H, Gadekallu TR, Wang W, and Su C On the design of blockchain-based ecdsa with fault-tolerant batch verification protocol for blockchain-enabled iomt IEEE journal of biomedical and health informatics 2021 26 5 1977-1986
[3]
Lian Z, Zeng Q, Wang W, Gadekallu TR, and Su C Blockchain-based two-stage federated learning with non-iid data in iomt system IEEE Transactions on Computational Social Systems 2022 10 4 1701-1710
[4]
Samiullah F, Gan M-L, Akleylek S, Aun Y (2023) Post-quantum group key management in iots. In: 2023 25th International Multitopic Conference (INMIC), pp. 1–6.
[5]
Singh R, Dwivedi AD, Mukkamala RR, and Alnumay WS Privacy-preserving ledger for blockchain and internet of things-enabled cyber-physical systems Computers and Electrical Engineering 2022 103
[6]
Xie Q, Zhao Z, Jiang L, Jiang S, Khan S, Wang W, Wu K (2024) Threshold cryptography-based authentication protocol for remote healthcare. In: 2024 23rd ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN), pp. 303–304. IEEE
[7]
Rajasekaran AS, Azees M, and Al-Turjman F A comprehensive survey on blockchain technology Sustainable Energy Technologies and Assessments 2022 52
[8]
Yadav DK, Sahu H, Chaudhary D, and Lee C-C Module lattice based post quantum secure blockchain empowered vehicle to vehicle communication in the internet of vehicles Computers and Electrical Engineering 2024 117
[9]
Shor PW (1994) Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings 35th Annual Symposium on Foundations of Computer Science, pp. 124–134. Ieee
[10]
Grover LK (1996) A fast quantum mechanical algorithm for database search. In: Proceedings of the Twenty-eighth Annual ACM Symposium on Theory of Computing, pp. 212–219
[11]
Sattath O On the insecurity of quantum bitcoin mining International Journal of Information Security 2020 19 3 291-302
[12]
Seyhan K, Akleylek S (2024) A comprehensive comparison of lattice-based password authenticated key exchange protocols defined on modules. In: International Conference on Information Technologies and Their Applications, pp. 91–105. Springer
[13]
NIST National Cybersecurity Center of Excellence (2023) Post-quantum cryptography: Nist sp 1800-38c, preliminary draft. Technical report. Retrieved from https://www.nccoe.nist.gov/sites/default/files/2023-12/pqc-migration-nist-sp-1800-38c-preliminary-draft.pdf
[14]
Yaga D, Mell P, Roby N, and Scarfone K Blockchain Technology Overview 2018
[15]
Ciulei A-T, Creţu M-C, Simion E (2022) Preparation for Post-Quantum era: a survey about blockchain schemes from a post-quantum perspective. Cryptology ePrint Archive, Paper 2022/026. https://eprint.iacr.org/2022/026
[16]
Gharavi H, Granjal J, Monteiro E (2024) Post-quantum blockchain security for the internet of things: Survey and research directions. IEEE Communications Surveys & Tutorials, 1–1
[17]
Banaeian Far S and Rajabzadeh Asaar M A blockchain-based quantum-secure reporting protocol Peer-to-Peer Networking and Applications 2021 14 5 2992-3011
[18]
Ye F, Zhou Z, and Li Y Quantum-assisted blockchain for iot based on quantum signature Quantum Information Processing 2022 21 9 327
[19]
Sun X, Sopek M, Wang Q, and Kulicki P Towards quantum-secured permissioned blockchain: Signature, consensus, and logic Entropy 2019 21 9 887
[20]
Kiktenko EO, Pozhar NO, Anufriev MN, Trushechkin AS, Yunusov RR, Kurochkin YV, Lvovsky A, and Fedorov AK Quantum-secured blockchain Quantum Science and Technology 2018 3 3
[21]
Gao Y-L, Chen X-B, Xu G, Yuan K-G, Liu W, and Yang Y-X A novel quantum blockchain scheme base on quantum entanglement and dpos Quantum Information Processing 2020 19 12 420
[22]
Qu Z, Zhang Z, and Zheng M A quantum blockchain-enabled framework for secure private electronic medical records in internet of medical things Information Sciences 2022 612 942-958
[23]
Kaushik A, Vadlamani LSS, Hussain MM, Sahay M, Singh R, Singh AK, Indu S, Goswami P, and Kousik NGV Post quantum public and private key cryptography optimized for iot security Wireless Personal Communications 2023 129 2 893-909
[24]
Yuan B, Wu F, and Zheng Z Post quantum blockchain architecture for internet of things over ntru lattice Plos one 2023 18 2 0279429
[25]
Tan L, Yu K, Shi N, Yang C, Wei W, and Lu H Towards secure and privacy-preserving data sharing for covid-19 medical records: A blockchain-empowered approach IEEE Transactions on Network Science and Engineering 2021 9 1 271-281
[26]
Xu G, Cao Y, Xu S, Xiao K, Liu X, Chen X, and Dong M A novel post-quantum blind signature for log system in blockchain Comput. Syst. Sci. Eng. 2022 41 3 945-958
[27]
Abd El-Latif AA, Abd-El-Atty B, Mehmood I, Muhammad K, Venegas-Andraca SE, and Peng J Quantum-inspired blockchain-based cybersecurity: securing smart edge utilities in iot-based smart cities Information Processing & Management 2021 58 4
[28]
Buser M, Dowsley R, Esgin M, Gritti C, Kasra Kermanshahi S, Kuchta V, Legrow J, Liu J, Phan R, Sakzad A, et al. A survey on exotic signatures for post-quantum blockchain: Challenges and research directions ACM Computing Surveys 2023 55 12 1-32
[29]
Li C-Y, Chen X-B, Chen Y-L, Hou Y-Y, and Li J A new lattice-based signature scheme in post-quantum blockchain network Ieee Access 2018 7 2026-2033
[30]
Gao Y-L, Chen X-B, Chen Y-L, Sun Y, Niu X-X, and Yang Y-X A secure cryptocurrency scheme based on post-quantum blockchain Ieee Access 2018 6 27205-27213
[31]
Chen J, Gan W, Hu M, and Chen C-M On the construction of a post-quantum blockchain for smart city Journal of information security and applications 2021 58
[32]
Yi H A post-quantum blockchain notary scheme for cross-blockchain exchange Computers and Electrical Engineering 2023 110
[33]
Sharma P, Choi K, Krejcar O, Blazek P, Bhatia V, and Prakash S Securing optical networks using quantum-secured blockchain: An overview Sensors 2023 23 3 1228
[34]
Li C, Tian Y, Chen X, and Li J An efficient anti-quantum lattice-based blind signature for blockchain-enabled systems Information Sciences 2021 546 253-264
[35]
Fernandez-Carames TM and Fraga-Lamas P Towards post-quantum blockchain: A review on blockchain cryptography resistant to quantum computing attacks IEEE access 2020 8 21091-21116
[36]
Balogh S, Gallo O, Ploszek R, Špaček P, and Zajac P Iot security challenges: cloud and blockchain, postquantum cryptography, and evolutionary techniques Electronics 2021 10 21 2647
[37]
Yi H Secure social internet of things based on post-quantum blockchain IEEE transactions on Network Science and Engineering 2021 9 3 950-957
[38]
Gupta DS, Karati A, Saad W, and Costa DB Quantum-defended blockchain-assisted data authentication protocol for internet of vehicles IEEE Transactions on Vehicular Technology 2022 71 3 3255-3266
[39]
Shahid F, Khan A, and Jeon G Post-quantum distributed ledger for internet of things Computers & Electrical Engineering 2020 83
[40]
Alomari A, Kumar SA (2024) Securing iot systems in a post-quantum environment: Vulnerabilities, attacks, and possible solutions. Internet of Things, 101132
[41]
Thangavel D, Ma X, Valera A, Tan H-X, Tan CK-Y (2014) Performance evaluation of mqtt and coap via a common middleware. In: 2014 IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), pp. 1–6. IEEE
[42]
Ludovici A, Moreno P, and Calveras A Tinycoap: A novel constrained application protocol (coap) implementation for embedding restful web services in wireless sensor networks based on tinyos Journal of Sensor and Actuator Networks 2013 2 2 288-315
[43]
Goldwasser S, Micali S, Rackoff C (2019) The knowledge complexity of interactive proof-systems. In: Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali, pp. 203–225
[44]
Pinto AM (2020) An introduction to the use of zk-snarks in blockchains. In: Mathematical Research for Blockchain Economy: 1st International Conference MARBLE 2019, Santorini, Greece, pp. 233–249. Springer
[45]
Groth J (2016) On the size of pairing-based non-interactive arguments. In: Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II 35, pp. 305–326. Springer
[46]
Ishai Y, Su H, Wu DJ (2021) Shorter and faster post-quantum designated-verifier zksnarks from lattices. In: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, pp. 212–234
[47]
Zhou Z, He D, Liu Z, Luo M, and Choo K-KR A software/hardware co-design of crystals-dilithium signature scheme ACM Transactions on Reconfigurable Technology and Systems (TRETS) 2021 14 2 1-21
[48]
Ducas L, Kiltz E, Lepoint T, Lyubashevsky V, Schwabe P, Seiler G, Stehlé D (2018) Crystals-dilithium: A lattice-based digital signature scheme. IACR Transactions on Cryptographic Hardware and Embedded Systems, 238–268
[49]
Prest T (2017) Sharper bounds in lattice-based cryptography using the rényi divergence. In: Advances in Cryptology–ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I 23, pp. 347–374. Springer
[50]
Peikert C (2014) Lattice cryptography for the internet. In: International Workshop on Post-quantum Cryptography, pp. 197–219. Springer
[51]
Buchmann JA, Butin D, Göpfert F, Petzoldt A (2016) Post-quantum cryptography: state of the art. The New Codebreakers: Essays Dedicated to David Kahn on the Occasion of His 85th Birthday, 88–108
[52]
Conley T, Diaz N, Espada D, Kuruvilla A, Mayone S, Fu X (2023) Instant Zero Knowledge Proof of Reserve. Cryptology ePrint Archive, Paper 2023/1156. https://eprint.iacr.org/2023/1156
[53]
D’Anvers J-P, Dunkelman O, Gueron S, Pöppelmann T, Schwabe P, Seiler G, Unruh D (2021) CRYSTALS-Dilithium: Algorithm Specifications and Supporting Documentation. NIST PQC Submission (Round 3). https://pq-crystals.org/dilithium/data/dilithium-specification-round3-20210208.pdf
[54]
Pornin T (2020) Falcon team: Falcon: Fast-Fourier Lattice-based Compact Signatures over NTRU. NIST PQC Submission (Round 3). https://falcon-sign.info/falcon.pdf
[55]
Rahman WU, Choi Y-S, and Chung K Performance evaluation of video streaming application over coap in iot IEEE Access 2019 7 39852-39861
[56]
Bagchi P, Bera B, Das AK, Shetty S, Vijayakumar P, and Karuppiah M Post quantum lattice-based secure framework using aggregate signature for ambient intelligence assisted blockchain-based iot applications IEEE Internet of Things Magazine 2023 6 1 52-58
[57]
Irshad RR, Hussain S, Hussain I, Nasir JA, Zeb A, Alalayah KM, Alattab AA, Yousif A, Alwayle IM (2023) Iot-enabled secure and scalable cloud architecture for multi-user systems: A hybrid post-quantum cryptographic and blockchain based approach towards a trustworthy cloud computing. IEEE Access
[58]
Naz MT, Elmedany W, Ali M (2024) Securing scada systems in smart grids with iot integration: A self-defensive post-quantum blockchain architecture. Internet of Things, 101381
[59]
Mansoor K, Afzal M, Iqbal W, Abbas Y, Mussiraliyeva S, and Chehri A Pqcaie: Post quantum cryptographic authentication scheme for iot-based e-health systems Internet of Things 2024 27
[60]
Iglesias-Urkia M, Orive A, Urbieta A, and Casado-Mansilla D Analysis of coap implementations for industrial internet of things: a survey Journal of Ambient Intelligence and Humanized Computing 2019 10 7 2505-2518
[61]
Swamy SN and Kota SR An empirical study on system level aspects of internet of things (iot) IEEE Access 2020 8 188082-188134
[62]
Rahman RA, Shah B (2016) Security analysis of iot protocols: A focus in coap. In: 2016 3rd MEC International Conference on Big Data and Smart City (ICBDSC), pp. 1–7. IEEE
[63]
Liu Y, Wang K, Lin Y, and Xu W Lightchain: a lightweight blockchain system for industrial internet of things IEEE Transactions on Industrial Informatics 2019 15 6 3571-3581
[64]
Miao J, Wang Z, Wu Z, Ning X, and Tiwari P A blockchain-enabled privacy-preserving authentication management protocol for internet of medical things Expert Systems with Applications 2024 237
[65]
Kearney JJ and Perez-Delgado CA Vulnerability of blockchain technologies to quantum attacks Array 2021 10
[66]
Xiao N, Wang Z, Sun X, and Miao J A novel blockchain-based digital forensics framework for preserving evidence and enabling investigation in industrial internet of things Alexandria Engineering Journal 2024 86 631-643
[67]
Soleymani SA, Goudarzi S, Anisi MH, Jindal A, Kama N, and Ismail SA A privacy-preserving authentication scheme for real-time medical monitoring systems IEEE Journal of Biomedical and Health Informatics 2023 27 5 2314-2322
[68]
Kuliha M and Verma S Secure internet of medical things based electronic health records scheme in trust decentralized loop federated learning consensus blockchain International Journal of Intelligent Networks 2024 5 161-174
[69]
Deebak BD, Hwang SO (2024) Privacy preserving based on seamless authentication with provable key verification using miomt for b5g-enabled healthcare systems. IEEE Transactions on Services Computing, 1–14

Recommendations

Comments

Information & Contributors

Information

Published In

cover image The Journal of Supercomputing
The Journal of Supercomputing  Volume 81, Issue 1
Jan 2025
10406 pages

Publisher

Kluwer Academic Publishers

United States

Publication History

Published: 28 November 2024
Accepted: 23 October 2024

Author Tags

  1. Post-quantum cryptography
  2. Lattice-based cryptography
  3. Digital signature schemes
  4. IoMT
  5. Privacy-preserving
  6. Blockchain

Qualifiers

  • Research-article

Funding Sources

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 25 Feb 2025

Other Metrics

Citations

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media