2022
DOI: 10.1007/s42979-022-01238-2
|View full text |Cite
|
Sign up to set email alerts
|

PUFchain 2.0: Hardware-Assisted Robust Blockchain for Sustainable Simultaneous Device and Data Security in Smart Healthcare

Abstract: This article presents the first-ever hardware-assisted blockchain for simultaneously handling device and data security in smart healthcare. This article presents the hardware security primitive physical unclonable functions (PUF) and blockchain technology together as PUFchain 2.0 with a two-level authentication mechanism. The proposed PUFchain 2.0 security primitive presents a scalable approach by allowing Internet of Medical Things (IoMT) devices to connect and obtain PUF keys from the edge server with an emb… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 28 publications
(11 citation statements)
references
References 36 publications
0
4
0
Order By: Relevance
“…In [40], the authors have proposed PUF-Chain, a private blockchain and PUF-based authentication protocol which uses both the secured database and the blockchain for the device authentication where the authors assumed that the content of the database is secured. In [41], the authors have proposed PUF-Chain 2.0 for the Internet of medical things (IoMT) device authentication in smart healthcare. PUF-Chain 2.0 uses MAC address of the device along with the PUF key for enhanced security of the devices.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In [40], the authors have proposed PUF-Chain, a private blockchain and PUF-based authentication protocol which uses both the secured database and the blockchain for the device authentication where the authors assumed that the content of the database is secured. In [41], the authors have proposed PUF-Chain 2.0 for the Internet of medical things (IoMT) device authentication in smart healthcare. PUF-Chain 2.0 uses MAC address of the device along with the PUF key for enhanced security of the devices.…”
Section: Related Workmentioning
confidence: 99%
“…Most of the articles found in the literature concentrate on either device authentication or credentials security and not on both. 3) Some of the articles found in literature, [40], [41], [46] have used a secured database along with blockchain to store the authentication credentials of the device. There are high chances for an adversary to hack the database and manipulate or steal the data.…”
Section: A Observationsmentioning
confidence: 99%
“…IoMT devices are vulnerable to various types of physical attacks [11,12]. Cybersecurity solutions are often based on software-based approaches that work based on symmetric and asymmetric key cryptography schemes.…”
Section: Cybersecurity In Smart Healthcarementioning
confidence: 99%
“…The PUF key's unpredictability is the indicator of equilibrium between the number of ones and zeros in a PUF key. A safe PUF module that can withstand extreme strength, as well as other critical guessing assaults, is one in which the PUF key contains an equal number of randomized zeros and ones [37].…”
Section: Randomnessmentioning
confidence: 99%