PUFchain 3.0: Hardware-Assisted Distributed Ledger for Robust Authentication in Healthcare Cyber–Physical Systems
Abstract
:1. Introduction
Cybersecurity in Smart Healthcare
2. Novel Contributions
2.1. Research Problems Addressed in the Current Paper
- To the best of our knowledge, very few security primitives work on providing device and data-assisted security simultaneously for e-Health applications;
- Security gaps associated with device integrity, data confidentiality, and authenticity in edge computing-driven H-CPS;
- Lack of scalable and energy-efficient security approach for resource-constrained distributed systems in H-CPS;
- Sustainable approach to the device integrity-based access control mechanism for electronic health records (EHRs) management;
- Energy-efficient PUF architectures that are effective against machine learning and other attacks;
- Lack of sustainable and energy-efficient hardware-assisted access control mechanisms to the distributed ledger;
- A secure communication interface between various stakeholders in H-CPS with defined access and security;
- Presenting a security framework that could be integrated into real-world healthcare applications;
- Providing a cost-effective innovative approach to integrate various technologies for cybersecurity in smart healthcare;
- Enabling a patient to embed smart health devices that are secure and non-vulnerable to security attacks.
2.2. Novel Contributions of This Article
- Presenting a novel state-of-the-art integration of PUF, blockchain, and Tangle for SbD of H-CPS. To the best of our knowledge, this is the first work on hardware-assisted security in H-CPS that presents a PUF-based approach for access to DLT for device and data security in H-CPS.
- Presenting a novel PUF-based access control mechanism for Tangle.
- A novel blockchain-integrated framework for security in H-CPS using smart contracts.
- Validating the proposed framework in the MAM “Restricted mode” for secure access control to Tangle using PUF.
- An energy-efficient SbD approach that uses delay Arbiter and XOR PUF architectures.
- An edge–cloud-driven approach for resource-constrained systems in H-CPS that has three layers—physical layer, edge layer, and blockchain layer as illustrated in Figure 4.
- A novel energy-efficient approach that works on blockchain using smart contracts for storing and retrieving PUF keys of IoMT devices inside a patient’s Body Area Network (BAN).
- A security approach that facilitates secure access to patients’ BAN and ensures the integrity of data from IoMT in resource-constrained distributed systems.
2.3. A Comprehensive Evaluation of PUFchain Primitives
3. Related Works
Research Works | Application | Security Primitive | Platform | Mechanism |
---|---|---|---|---|
Hellani et al., 2021 [21] | IoT (Data) | Blockchain and Tangle | Edge–Cloud | Smart Contracts |
Mohanty et al., 2019 [19] | IoT (Device and Data) | PUF, blockchain | Edge | Proof-of-PUF-Enabled-Authentication |
Al-Joboury et al., 2021 [23] | IoT (Data) | Blockchain and Cobweb | Cloud | IoT M2M Messaging (MQTT) |
Wang et al., 2022 [30] | IoMT (Device) | Blockchain | Edge | Smart Contracts |
Chaudhary et al., 2021 [22] | Hardware Supply Chain | PUF, blockchain | Edge–Cloud | Smart Contracts |
Venkata et al., 2022 [11] | IoMT (Device) | PUF, blockchain | Edge | Media Access Control (MAC) and PUF-based Authentication |
Satra et al., 2023 [14] | IoMT (Device) | PUF | Edge | Machine Learning |
Fotopoulos et al., 2020 [28] | IoMT (Device) | Blockchain | - | Self- Sovereign Identity (SSI) |
Zheng et al., 2023 [9] | IoMT (Data) | IOTA Tangle and blockchain | Edge | MAM |
Proposed PUFchain 3.0 [20] | IoMT (Device and Data) | PUF, Tangle, blockchain | Edge–Cloud | Masked Authentication Messaging, smart contracts |
4. Role of Physical Unclonable Functions as SbD Primitive
4.1. Security-by-Design
- Proactive but not reactive: Existing cybersecurity solutions for smart electronics mostly focus on the security at application level. SbD promotes security as a design stage metric that is enabled by default.
- End-to-end security: The security of the system should be considered right from the design stage to manufacturing, deployment, application, and maintenance.
- Security as default: The security primitive should be enabled by default in the system and cannot be an optional primitive for the users to choose from.
- Least privilege: Users of an electronic system should have the privilege of running the applications and should not have access to tamper with the system’s security specifications.
- Transparency: The security principles should be clearly transparent and easily understandable. The users of an SbD-enabled system should have access to change their security level based on their choice and should be able to clearly understand its functionality.
- User centricity: The ease of security principles and deployment is an essential aspect of SbD. The security primitives should not be burdensome for the users.
- Full functionality: The security primitive should have efficient performance and should not have performance trade-offs that might impact the system’s functionality and applications.
4.2. PUF for SbD of H-CPS
- Uniqueness: Verifying the extent of variation of the responses from a PUF circuit on two devices is referred to as uniqueness. This is measured by calculating the average inter-Hamming distances of responses from the PUF module on two devices tested with the same set of challenges.
- Reliability: The stability of a PUF is determined by determining the variation of the responses under different environmental conditions. This is an essential metric in evaluating a PUF strength since the responses of the PUF must be stable under noise as well as under varying operating conditions.
- Randomness: The randomness of a PUF is its ability to produce a response key with an equal number of randomly distributed ones and zeros. Ideally, a PUF response should have exactly an equal number of ones and zeros in the response bit stream.
- Diffuseness: The diffuseness of a PUF is obtained by calculating the average intra-Hamming distance of PUF responses to verify the extent of variation of responses for varying challenge inputs in the same PUF.
5. IOTA Tangle: A DAG Blockchain
6. Overview of Blockchain Technology
7. PUFchain 3.0: Proposed Security-by-Design (SbD) approach for Smart Healthcare
7.1. Design and Analysis of Proposed Framework
- Patient’s sensors and gateway registration phase: Initially, all the smart wearable and implantable medical devices are connected to a patient’s gateway. These devices are connected to the gateway through various technologies like NFC, ZigBee, and BLE. All these devices have a PUF-embedded key as their pseudo-identity. The gateway also has a unique PUF-generated identity which acts as the address for this hub of devices. When the edge gateway receives an initiation request from the patient’s gateway, it securely verifies the gateway’s integrity by performing PUF key extraction and validation. Once the validation is successful, the Tangle transaction validation process starts. Initially, the edge gateway connects to a public IOTA node for securely interfacing with IOTA Tangle. The IOTA node then creates a MAM channel to upload and share data. In the proposed approach, the MAM channel operates in the restricted mode, which requires an authorization key for uploading and receiving data onto Tangle. The patient’s gateway transaction is securely uploaded onto the channel. Uploaded transactions could be shared among various stakeholders, who can only access in the restricted mode. The procedural flow of transaction initiation, PUF key validation, and its metric evaluation process are illustrated in Figure 10. Only after verifying the PUF reliability, uniqueness, and randomness are the PUF module keys assigned as pseudo identities to devices.
- 2.
- Patient’s gateway access and control phase In MAM, while validating a transaction, a new root address is generated, which is the subsequent transaction’s hash. This is shared only with the intended recipient to successfully upload a new transaction. Using the side key, the new transaction’s root is obtained by hashing the existing transaction’s root with the side key [10,43,46]. Once the gateway’s key is verified, its details are shared on the MAM channel by creating a transaction. The recipient can be either a server at a hospital, physician, or any other healthcare provider who can access the channel to receive it only after their PUF pseudo-identity verification. Figure 11 and Algorithm 3 outline the validation and verification details. Now each administrative server at any hospital network around the world looking to access the patient’s sensitive physiological data and access the IoMT devices on patients can securely connect to the patient’s gateway hub from Tangle. A global blockchain in the cloud having all the patient’s hub PUF keys can be accessed by the corresponding hospital network or healthcare provider to obtain the individual device’s PUF key in a patient’s BAN as explained in Figure 12. The pseudo-PUF identities and challenges of all the devices are stored inside a blockchain and can be shared globally.
Algorithm 1: Enrolling a patient’s Body Area Network devices. |
Algorithm 2: Patient’s gateway pseudo identity verification phase. |
Algorithm 3: MAM channel and blockchain validation phase. |
1 EG initiates MAM channel |
2 Assign authorization key |
// MAM Channel→ |
// MAM Mode →Restricted(2), Public(0) ,private(1) |
3 Choose Restricted Mode (2) |
4 Upload Pseudo Identity of patient’s hub and patient’s gateway. //→ |
Streams v0 (Channel) |
5 Choose patient’s gateway key as the channel side key |
// → |
6 Fetch Next root |
// MAM Channel →New Root() |
7 Perform hash on side key and root |
// →H(,) |
8 Broadcast new fetched root and new side key |
// --------EG initiates blockchain transaction------- |
9 EG initiates a smart contract with different roles: doctor, patient |
10 EG uploads the patient’s hub PUF data set |
// ---------- |
// →H(,) |
// →H(,) |
// →H(,) |
// | |
// | |
// →H(,) |
11 Deploy smart contract |
12 Obtain mined and validated block |
13 Broadcast validated block globally to various stakeholders |
- Step 1:
- The IoMT device’s integrity is verified by performing PUF key extraction from a set of challenges on the device’s PUFs.
- Step 2:
- The challenge inputs (, ) are tested on the PUF modules at both the gateway’s and device’s PUF modules in the hub.
- Step 3:
- The obtained keys are evaluated by checking the reliability, randomness, Hamming distance, and other metrics.
- Step 4:
- XOR operation is performed on the obtained PUF keys (, ). The XOR output is sent as a challenge input to PUF at IoMT.
- Step 5:
- The obtained key is again tested as input to the PUF module at the gateway.
- Step 6:
- Finally, the obtained key from the gateway is hashed and compared during the verification process by following all the above steps. The obtained final key is hashed. The obtained hash value is compared with the initially obtained hash during registration.
- Step 7:
- Once the device authentication is considered successful by the edge gateway, it then creates a MAM channel to upload the transaction, fetch the address, and broadcast it to the authenticated client to upload its data.
- Step 8:
- The working mode of MAM is chosen as the restricted mode (2). An authorization or side key is defined to access the channel in restricted mode.
- Step 9:
- The authorization key for the MAM channel in the proposed security protocol is the patient’s gateway pseudo identity , which is required to store, share, and access data on IOTA Tangle.
- Step 10:
- Once the new root is fetched, an access link is obtained and broadcasted to all the working nodes in H-CPS to access the transaction data from Tangle.
- Step 11:
- Finally, the root of the transaction and of the MAM channel are hashed to fetch the address () of the new transaction. The new side key is of the patient’s BAN gateway.
- Step 12:
- The subsequent transaction address () is used for data transfer from all the other stakeholders to the intended recipient on the MAM channel, thereby creating a secure communication channel for the patient–doctor interface in H-CPS.
7.2. Assumptions
- All the IoMT devices have embedded PUF.
- A secure network communication exists between the IoMT node and the patient’s and edge gateways during the enrollment and verification process.
- All the IoMT devices have a secure interface with the patient’s gateway using BLE, ZigBee, or other technologies.
- The edge gateway has a running blockchain instance locally.
8. Experimental Results
8.1. Why Restricted Mode of MAM for PUFchain 3.0?
8.2. Block Creation and Validation
9. Discussion and Conclusions
9.1. Principal Findings
9.2. Limitations and Challenges
9.3. Conclusions and Future Research Directions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Sundaravadivel, P.; Kougianos, E.; Mohanty, S.P.; Ganapathiraju, M.K. Everything You Wanted to Know about Smart Health Care: Evaluating the Different Technologies and Components of the Internet of Things for Better Health. IEEE Consum. Electron. Mag. 2018, 7, 18–28. [Google Scholar] [CrossRef]
- Sun, J.; Khan, F.; Li, J.; Alshehri, M.D.; Alturki, R.; Wedyan, M. Mutual Authentication Scheme for the Device-to-Server Communication in the Internet of Medical Things. IEEE Internet Things J. 2021, 8, 15663–15671. [Google Scholar] [CrossRef]
- Marshal, R.; Gobinath, K.; Rao, V.V. Proactive Measures to Mitigate Cyber Security Challenges in IoT based Smart Healthcare Networks. In Proceedings of the IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), Toronto, ON, Canada, 21–24 April 2021. [Google Scholar] [CrossRef]
- Jia, X.; Luo, M.; Wang, H.; Shen, J.; He, D. A Blockchain-Assisted Privacy-Aware Authentication Scheme for Internet of Medical Things. IEEE Internet Things J. 2022, 9, 21838–21850. [Google Scholar] [CrossRef]
- Ghubaish, A.; Salman, T.; Zolanvari, M.; Unal, D.; Al-Ali, A.; Jain, R. Recent Advances in the Internet-of-Medical-Things (IoMT) Systems Security. IEEE Internet Things J. 2021, 8, 8707–8718. [Google Scholar] [CrossRef]
- Mohd Aman, A.H.; Hassan, W.H.; Sameen, S.; Attarbashi, Z.S.; Alizadeh, M.; Latiff, L.A. IoMT amid COVID-19 pandemic: Application, architecture, technology, and security. J. Netw. Comput. Appl. 2021, 174, 102886. [Google Scholar] [CrossRef] [PubMed]
- Jayaraman, I.; Shankar, A.; Ghalib, D.M.; Jayaraman, G.; Hua, Q.; Wen, Z.; Qi, X. Block Chain Based Internet of Medical Things for Uninterrupted, Ubiquitous, User-Friendly, Unflappable, Unblemished, Unlimited Health Care Services (BC IoMT U 6 HCS). IEEE Access 2020, 8, 216856–216872. [Google Scholar] [CrossRef]
- Wazid, M.; Singh, J.; Das, A.K.; Shetty, S.; Khan, M.K.; Rodrigues, J.J.P.C. ASCP-IoMT: AI-Enabled Lightweight Secure Communication Protocol for Internet of Medical Things. IEEE Access 2022, 10, 57990–58004. [Google Scholar] [CrossRef]
- Zheng, X.; Sun, S.; Mukkamala, R.R.; Vatrapu, R.; Meré, J.B.O. Accelerating Health Data Sharing: A Solution Based on the Internet of Things and Distributed Ledger Technologies. J. Med. Internet Res. 2019, 21, e13583. [Google Scholar] [CrossRef]
- Abdullah, S.; Arshad, J.; Khan, M.M.; Alazab, M.; Salah, K. PRISED Tangle: A Privacy-Aware Framework for Smart Healthcare Data Sharing using IOTA Tangle. Complex Intell. Syst. 2022, 9, 3023–3041. [Google Scholar] [CrossRef]
- Bathalapalli, V.K.V.V.; Mohanty, S.P.; Kougianos, E.; Baniya, B.K.; Rout, B. PUFchain 2.0: Hardware-Assisted Robust Blockchain for Sustainable Simultaneous Device and Data Security in Smart Healthcare. SN Comput. Sci. 2022, 3, 344. [Google Scholar] [CrossRef]
- Shi, S.; Luo, M.; Wen, Y.; Wang, L.; He, D. A Blockchain-Based User Authentication Scheme with Access Control for Telehealth Systems. Secur. Commun. Netw. 2022, 2022, 6735003. [Google Scholar] [CrossRef]
- Amintoosi, H.; Nikooghadam, M.; Shojafar, M.; Kumari, S.; Alazab, M. Slight: A lightweight authentication scheme for smart healthcare services. Comput. Electr. Eng. 2022, 99, 107803. [Google Scholar] [CrossRef]
- Satra, S.; Sadhu, P.K.; Yanambaka, V.P.; Abdelgawad, A. Octopus: A Novel Approach for Health Data Masking and Retrieving Using Physical Unclonable Functions and Machine Learning. Sensors 2023, 23, 4082. [Google Scholar] [CrossRef]
- Dey, K.; Kule, M.; Rahaman, H. PUF Based Hardware Security: A Review. In Proceedings of the International Symposium on Devices, Circuits and Systems (ISDCS), Higashihiroshima, Japan, 3–5 March 2021; pp. 1–6. [Google Scholar] [CrossRef]
- Razdan, S.; Sharma, S. Internet of Medical Things (IoMT): Overview, Emerging Technologies, and Case Studies. IETE Tech. Rev. 2021, 39, 775–788. [Google Scholar] [CrossRef]
- Hori, Y.; Yoshida, T.; Katashita, T.; Satoh, A. Quantitative and Statistical Performance Evaluation of Arbiter Physical Unclonable Functions on FPGAs. In Proceedings of the International Conference on Reconfigurable Computing and FPGAs, RECONFIG ’10. Cancun, Mexico, 13–15 December 2010; pp. 298–303. [Google Scholar] [CrossRef]
- Lee, Y.S.; Lee, H.J.; Alasaarela, E. Mutual authentication in wireless body sensor networks (WBSN) based on Physical Unclonable Function (PUF). In Proceedings of the 9th International Wireless Communications and Mobile Computing Conference (IWCMC), Sardinia, Italy, 1–5 July 2013; pp. 1314–1318. [Google Scholar] [CrossRef]
- Mohanty, S.P.; Yanambaka, V.P.; Kougianos, E.; Puthal, D. PUFchain: Hardware-Assisted Blockchain for Sustainable Simultaneous Device and Data Security in the Internet of Everything (IoE). arXiv 2019, arXiv:1909.06496. [Google Scholar] [CrossRef]
- Bathalapalli, V.K.V.V.; Mohanty, S.P.; Kougianos, E.; Baniya, B.K.; Rout, B. PUFchain 3.0: Hardware-Assisted Distributed Ledger for Robust Authentication in the Internet of Medical Things. In Internet of Things. IoT through a Multi-Disciplinary Perspective; Springer: Berlin/Heidelberg, Germany, 2022; pp. 23–40. [Google Scholar] [CrossRef]
- Hellani, H.; Sliman, L.; Samhat, A.E.; Exposito, E. Tangle the Blockchain:Towards Connecting Blockchain and DAG. In Proceedings of the 30th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), Bayonne, France, 27–29 October 2021; pp. 63–68. [Google Scholar] [CrossRef]
- Chaudhary, C.K.; Chatterjee, U.; Mukhopadhayay, D. Auto-PUFChain: An Automated Interaction Tool for PUFs and Blockchain in Electronic Supply Chain. In Proceedings of the Asian Hardware Oriented Security and Trust Symposium (AsianHOST), Shanghai, China, 16–18 December 2021; pp. 1–4. [Google Scholar] [CrossRef]
- Al-Joboury, I.M.; Al-Hemiary, E.H. A Permissioned Consensus Algorithm Based DAGs-to-Blockchain in Hierarchical Architecture for Decentralized Internet of Things. In Proceedings of the International Symposium on Networks, Computers and Communications (ISNCC), Dubai, United Arab Emirates, 31 October–2 November 2021; pp. 1–6. [Google Scholar] [CrossRef]
- Akbulut, S.; Semantha, F.H.; Azam, S.; Pilares, I.C.A.; Jonkman, M.; Yeo, K.C.; Shanmugam, B. Designing a Private and Secure Personal Health Records Access Management System: A Solution Based on IOTA Distributed Ledger Technology. Sensors 2023, 23, 5174. [Google Scholar] [CrossRef] [PubMed]
- Wazid, M.; Gope, P. BACKM-EHA: A Novel Blockchain-enabled Security Solution for IoMT-based E-healthcare Applications. ACM Trans. Internet Technol. 2023, 23, 1–28. [Google Scholar] [CrossRef]
- Tomar, A.; Gupta, N.; Rani, D.; Tripathi, S. Blockchain-assisted authenticated key agreement scheme for IoT-based healthcare system. Internet Things 2023, 23, 100849. [Google Scholar] [CrossRef]
- Vinko, D.; Miličević, K.; Lukić, I.; Köhler, M. Microcontroller-Based PUF for Identity Authentication and Tamper Resistance of Blockchain-Compliant IoT Devices. Sensors 2023, 23, 6769. [Google Scholar] [CrossRef]
- Fotopoulos, F.; Malamas, V.; Dasaklis, T.K.; Kotzanikolaou, P.; Douligeris, C. A Blockchain-enabled Architecture for IoMT Device Authentication. In Proceedings of the IEEE Eurasia Conference on IOT, Communication and Engineering (ECICE), Yunlin, Taiwan, 23–25 October 2020. [Google Scholar] [CrossRef]
- Rahmadika, S.; Astillo, P.V.; Choudhary, G.; Duguma, D.G.; Sharma, V.; You, I. Blockchain-Based Privacy Preservation Scheme for Misbehavior Detection in Lightweight IoMT Devices. IEEE J. Biomed. Health Inform. 2023, 27, 710–721. [Google Scholar] [CrossRef]
- Wang, W.; Chen, Q.; Yin, Z.; Srivastava, G.; Gadekallu, T.R.; Alsolami, F.; Su, C. Blockchain and PUF-Based Lightweight Authentication Protocol for Wireless Medical Sensor Networks. IEEE Internet Things J. 2022, 9, 8883–8891. [Google Scholar] [CrossRef]
- Pescador, F.; Mohanty, S.P. Guest Editorial Security-by-Design for Electronic Systems. IEEE Trans. Consum. Electron. 2022, 68, 2–4. [Google Scholar] [CrossRef]
- Bathalapalli, V.K.V.V.; Mohanty, S.P.; Kougianos, E.; Iyer, V.; Rout, B. iTPM: Exploring PUF-based Keyless TPM for Security-by-Design of Smart Electronics. In Proceedings of the 2023 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), Foz do Iguacu, Brazil, 20–23 June 2023; pp. 1–6. [Google Scholar] [CrossRef]
- Anandakumar, N.N.; Hashmi, M.S.; Chaudhary, M.A. Implementation of Efficient XOR Arbiter PUF on FPGA with Enhanced Uniqueness and Security. IEEE Access 2022, 10, 129832–129842. [Google Scholar] [CrossRef]
- Liu, J.; Zhao, Y.; Zhu, Y.; Chan, C.H.; Martins, R.P. A Weak PUF-Assisted Strong PUF With Inherent Immunity to Modeling Attacks and Ultra-Low BER. IEEE Trans. Circuits Syst. Regul. Pap. 2022, 69, 4898–4907. [Google Scholar] [CrossRef]
- Alshaikhli, M.; Elfouly, T.; Elharrouss, O.; Mohamed, A.; Ottakath, N. Evolution of Internet of Things From Blockchain to IOTA: A Survey. IEEE Access 2022, 10, 844–866. [Google Scholar] [CrossRef]
- Rydningen, E.S.; Åsberg, E.; Jaccheri, L.; Li, J. Advantages and opportunities of the IOTA tangle for health data management. In Proceedings of the 5th International Workshop on Emerging Trends in Software Engineering for Blockchain, Pittsburgh, PA, USA, 21–29 May 2022. [Google Scholar] [CrossRef]
- Chen, Y.; Wang, Y.; Sun, B.; Liu, J. Addressing the Transaction Validation Issue in IOTA Tangle: A Tip Selection Algorithm Based on Time Division. Mathematics 2023, 11, 4116. [Google Scholar] [CrossRef]
- Shabandri, B.; Maheshwari, P. Enhancing IoT Security and Privacy Using Distributed Ledgers with IOTA and the Tangle. In Proceedings of the 6th International Conference on Signal Processing and Integrated Networks (SPIN), Noida, India, 7–8 March 2019; pp. 1069–1075. [Google Scholar] [CrossRef]
- Pinjala, S.K.; Sivalingam, K.M. DCACI: A Decentralized Lightweight Capability Based Access Control Framework using IOTA for Internet of Things. In Proceedings of the IEEE 5th World Forum on Internet of Things (WF-IoT), Limerick, Ireland, 15–18 April 2019. [Google Scholar] [CrossRef]
- Guo, F.; Xiao, X.; Hecker, A.; Dustdar, S. Characterizing IOTA Tangle with Empirical Data. In Proceedings of the IEEE Global Communications Conference GLOBECOM, Taipei, Taiwan, 7–11 December 2020; pp. 1–6. [Google Scholar] [CrossRef]
- Rawat, A.; Daza, V.; Signorini, M. Offline Scaling of IoT Devices in IOTA Blockchain. Sensors 2022, 22, 1411. [Google Scholar] [CrossRef]
- Gangwani, P.; Perez-Pons, A.; Bhardwaj, T.; Upadhyay, H.; Joshi, S.; Lagos, L. Securing Environmental IoT Data Using Masked Authentication Messaging Protocol in a DAG-Based Blockchain: IOTA Tangle. Future Internet 2021, 13, 312. [Google Scholar] [CrossRef]
- Carelli, A.; Palmieri, A.; Vilei, A.; Castanier, F.; Vesco, A. Enabling Secure Data Exchange through the IOTA Tangle for IoT Constrained Devices. Sensors 2022, 22, 1384. [Google Scholar] [CrossRef]
- Lamtzidis, O.; Gialelis, J. An IOTA Based Distributed Sensor Node System. In Proceedings of the IEEE Globecom Workshops (GC Wkshps), Abu Dhabi, United Arab Emirates, 9–13 December 2018; pp. 1–6. [Google Scholar] [CrossRef]
- Mallick, S.R.; Goswami, V.; Lenka, R.K.; Sahoo, T.R.; Kumar, V.; Barik, R.K. Blockchain-based IoMT for an intelligent healthcare system using a drop-offs queue. In Proceedings of the First International Conference on Microwave, Antenna and Communication (MAC), Prayagraj, India, 24–26 March 2023; pp. 1–6. [Google Scholar] [CrossRef]
- Bhandary, M.; Parmar, M.; Ambawade, D. A Blockchain Solution based on Directed Acyclic Graph for IoT Data Security using IoTA Tangle. In Proceedings of the 5th International Conference on Communication and Electronics Systems (ICCES), Coimbatore, India, 10–12 June 2020; pp. 827–832. [Google Scholar] [CrossRef]
- IOTA Foundation. iotaledger/mam.js. 2021. Available online: https://github.com/iotaledger/mam.js (accessed on 7 July 2022).
- IOTA Foundation. iotaledger/mam.client.js. 2021. Available online: https://github.com/iotaledger/mam.client.js/ (accessed on 7 July 2022).
- Truffle Suite. Ganache UI. 2023. Available online: https://github.com/trufflesuite/ganache-ui (accessed on 11 November 2023).
- IOTA Foundation. iotaledger/streams. 2023. Available online: https://github.com/iotaledger/streams (accessed on 11 November 2023).
Research Work | Features | Security Approach |
---|---|---|
PUFchain [19] | The PUF-generated keys are securely stored inside the blockchain for securely binding the identity of each device inside the blockchain. The PUF keys stored inside the blockchain can be retrieved securely for advanced applications requiring security for IoT devices. | Proof-of-PUF-Enabled-Authentication (PoP)–PUF based blockchain. |
PUFchain 2.0 [11] | In PUFchain 2.0, for security and privacy in IoMT, a novel PUF-based blockchain solution for IoMT device and data security that has a two-level authentication mechanism is proposed. This approach has MAC address-based verification as an initial stage followed by the PUF key verification stage. | PUF-based blockchain with MAC address verification |
PUFchain 3.0 [20] | For security and privacy in smart healthcare, all IoMT devices and their data are secured through a PUF-assisted distributed ledger. This approach has PUF, blockchain, and Tangle for simultaneous device and data security in H-CPS. | PUF-based distributed ledger using MAM and smart contracts |
Notation | Description |
---|---|
Pseudo identity of IoMT device | |
PUF module at device | |
Challenge to IoMT device PUF | |
Challenge to gateway’s PUF | |
Response to | |
Patient’s hub | |
Pseudo identity of patient gateway | |
PUF module at gateway | |
PUF modules of all IoMT devices in patient’s hub | |
Random challenges inputs | |
Response | |
Challenge input to IoMT device in hub | |
Extracted response from of in the hub | |
Response output from patient’s gateway PUF module | |
XORed output of and | |
Response output OF XORed input | |
Final key from PUF module | |
XOR | |
Side key | |
Merkle root | |
H | SHA-256 hash function |
Hash value during registration | |
Hash value during authentication | |
Fetched new transaction root |
Parameters | Results |
---|---|
Application | Smart Healthcare |
DLT | IOTA Tangle and Blockchain |
PUF Module | Arbiter and XOR PUF |
Programming | JavaScript, Verilog, Python, Solidity |
IOTA Network | Main net |
Tangle Communication Protocol | MAM |
IOTA Node | Chrysalis |
Working Mode | Restricted |
MAM channel | streams v0 |
FPGA | Artix-7, Basys-3 (xc7a35tcpg236-1) |
Block Validation | Solidity 0.8.18 |
Blockchain network | Ganache |
PUF Metrics | Results |
---|---|
PUF Key Extraction time | 78 ms |
XOR PUF Reliability | 99.72% |
Overall Hamming Distance of XOR PUF | 48.66% |
Overall Hamming Distance of Arbiter PUF | 48.53% |
Arbiter PUF Reliability | 99.73% |
Number of PUF keys | 1000 |
Number of Instances | 64 |
Total On-Chip Power | 0.081 Watts |
Device Authentication Time | 3.66 s |
Message ID | Attachment Time (s) | Fetch Time (s) | Root |
---|---|---|---|
9d9646d0d0536ee 9aede181660ab799 247b58548fe09 107e421643ae3c2581b3 | 13.8 | 1.38 | KJAMAHXDTWOSOJAJ99UMX XRBBKHHUD NDHJVLTBNRQD UFSRQEQZDNYKTS BNGKUTUPYXYC STXLLZXSDP9KR |
f2a2766970d6044 705af5d14fce0f5e0 e844b6a460bd 1960caf82148c0aa3600 | 26.6 | 1.66 | HEXQBCPQSZYYJQXUMB UYKHRSNUOJNUU CPZFNAJLZDSZEUUAE RLLSPLKTBPVEHHECU TKDETPPXKXVYTXAG |
2ac926abc3eeb3 11eaf8356945358b ced6e3836ef7e43d 84f517d756a551970d | 23.0 | 1.33 | ZCEOYFYQB MFXMAWMDHTUZ ZNJMJGA SEVBGBMOU LNHKSWZ OCAER9 KGXOEECLDWRJM CJJEVGRBAAYKINTSTM |
daee1db6f01b59 4f07efaf1e04e 012e01fd ce53e714a83a 0414abb5256064ca5 | 22.5 | 1.67 | E9ESRZ9B SXIXON9URUACLVJ BLHHNKUFGRI9D9 BQJUCAKWI9YQVTVT DAQCIWLQPSMXWUNCT QPTSBIUVUYF |
152518578c56268af d2380bcedd64a 37379b7e200d20a dbbab9c71866567eee1 | 36.1 | 1.90 | GNUJKSBQOGW JZTLXDHDSUFAFVTWH POQXXL9AVOAYZ VVU9YP LRSAKWNGTQ9W TGEURIP STYBOJLMCXGBTIW |
b4c291bbc8b867d 7b912ab9a2cad 3e6d8bb8b 15fa022b3 db7cb14cf88f8c9775 | 20.5 | 1.52 | OBSFYFONDRKIXRDWWB9T BQZYOMVOYK USLGAXYBS9VD MTMNZCXYYOVQX UU9OWUHWR DRHLHMRU KNHPTBMEH |
3877bf6821b5df c36823ce a6eee1a e23b5b61 73c4e080 0dbd58 26516b8 5bbca8 | 2.16 | 1.61 | GXNHDCAVIAUAIDPESPJ BBBYLH9PSIK9FJHMG ALYLAJAQUP ZOV9KIBNFXMBX HJAASZ ZATLE UQQGHEYO9IV |
bee8195b378 2a51443 afb2087d91 eb5743 e31dcdb15f42 32d6ac8e932d 7d3513 | 7.80 | 1.51 | SKGKMHKG9ZNIN JOXMDIONLULRFBZOQFDLQ TAIKUAOIQNMNQT DSYVS9SZKDTAB CYRVVOEARA9UWDFWVPBE |
dde4579afe5 e10bb6a7 a5e0fb8b461 f62d752023e 38769f001f6 e7e5ea95e3a1 | 13.0 | 1.44 | 9GIY9J9UDCN CSYUKZKXBRSJQDZBIU9G HOBGNEBBHQ EPSZYKNCH9LSOBID9 BLPW9TSTNDLHWX JAXNVVASE |
0dc5cfe486b1 ce772d8459b a5f95bd2836 2d8b69cfa 843fc4fc 47caa7d39c3a7 | 11.6 | 1.77 | OMOTIFWLJ9DNRJ QBCGBIBMEMAMYKL FKCFMZOLSC C9WOWVWEO ICYFQDIY9UW HEIADXGMFATZU NJRLCTITK |
Smart Contract Lifecycle | Transaction Hash | Block Hash | Gas Fees |
---|---|---|---|
Contract deployment | 0xe8d063e2a9f6 832a 216bcf5120c fc944907475f739f ce 59b70b74bf0bbc77244 | 0x78d0ef9a76714407c3 1d777b40f8ce0da579ba9181 729cb753b9fe19d26ce73f | 0.02600838 ETH |
Patient’s account initiation | 0xdc68a649d40aeab63b6 2d797580b10664a37f2 8a77adf0b480712678ceee46b5 | 0x7488a604b74b7d9e7 404fac9705108c6ae25f530 d3f39aee97b93cdc2acec58f | 0.00132949 ETH |
PUF data storage | 0x42e97d2e2598393e02c4b7 e3f9092d523761f938373 f2557c6548c5e15255cb1 | 0x0dc657518aaee3fc0fc 4f78691aee2b0c1229 48cd56ba 63b262937a529e49cd9 | 0.01637317 ETH |
Doctor’s account validation | 0xbd4b5a8b148d481b21c 37a6270c6cd168b2d74a60 fb012802854d6b47241100d | 0x84ee5a56e315397dbdb6e 9c08aaa61152fe8ae98 cb51c2256dd81800ccd5f633 | 0.00169751 ETH |
Research Works | System | Security Primitives | Hardware Assisted | Scalable | Hardware Efficient | Computationally Efficient |
---|---|---|---|---|---|---|
Wang et al., 2022 [30] | PUF and Fuzzy extractor-enabled blockchain | 3 | Yes | Yes | No | Yes |
Chaudhary et al., 2021 [22] | PUF-based Smart Contracts | 2 | Yes | Yes | No | Yes |
Satra et al., 2023 [14] | ML-assisted PUF | 1 | Yes | No | Yes | - |
Al-Joboury et al., 2021 [23] | DAG Blockchain | 2 | No | Yes | - | No |
Fotopoulos et al., 2020 [28] | Blockchain-assisted SSI | 1 | No | Yes | - | No |
Zheng et al., 2023 [9] | IOTA MAM | 1 | No | Yes | - | Yes |
PUFchain 3.0 [20] | Blockchain-enabled PUF for Tangle’s MAM | 3 | Yes | Yes | Yes | Yes |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Bathalapalli, V.K.V.V.; Mohanty, S.P.; Kougianos, E.; Iyer, V.; Rout, B. PUFchain 3.0: Hardware-Assisted Distributed Ledger for Robust Authentication in Healthcare Cyber–Physical Systems. Sensors 2024, 24, 938. https://doi.org/10.3390/s24030938
Bathalapalli VKVV, Mohanty SP, Kougianos E, Iyer V, Rout B. PUFchain 3.0: Hardware-Assisted Distributed Ledger for Robust Authentication in Healthcare Cyber–Physical Systems. Sensors. 2024; 24(3):938. https://doi.org/10.3390/s24030938
Chicago/Turabian StyleBathalapalli, Venkata K. V. V., Saraju P. Mohanty, Elias Kougianos, Vasanth Iyer, and Bibhudutta Rout. 2024. "PUFchain 3.0: Hardware-Assisted Distributed Ledger for Robust Authentication in Healthcare Cyber–Physical Systems" Sensors 24, no. 3: 938. https://doi.org/10.3390/s24030938
APA StyleBathalapalli, V. K. V. V., Mohanty, S. P., Kougianos, E., Iyer, V., & Rout, B. (2024). PUFchain 3.0: Hardware-Assisted Distributed Ledger for Robust Authentication in Healthcare Cyber–Physical Systems. Sensors, 24(3), 938. https://doi.org/10.3390/s24030938