Is blockchain for internet of medical things a panacea for COVID-19 pandemic?
- Authors: Li, Xuran , Tao, Bishenghui , Dai, Hong-Ning , Imran, Muhammad , Wan, Dehuan , Li, Dengwang
- Date: 2021
- Type: Text , Journal article
- Relation: Pervasive and Mobile Computing Vol. 75, no. (2021), p.
- Full Text: false
- Reviewed:
- Description: The outbreak of the COVID-19 pandemic has deeply influenced the lifestyle of the general public and the healthcare system of the society. As a promising approach to address the emerging challenges caused by the epidemic of infectious diseases like COVID-19, Internet of Medical Things (IoMT) deployed in hospitals, clinics, and healthcare centers can save the diagnosis time and improve the efficiency of medical resources though privacy and security concerns of IoMT stall the wide adoption. In order to tackle the privacy, security, and interoperability issues of IoMT, we propose a framework of blockchain-enabled IoMT by introducing blockchain to incumbent IoMT systems. In this paper, we review the benefits of this architecture and illustrate the opportunities brought by blockchain-enabled IoMT. We also provide use cases of blockchain-enabled IoMT on fighting against the COVID-19 pandemic, including the prevention of infectious diseases, location sharing and contact tracing, and the supply chain of injectable medicines. We also outline future work in this area. © 2021 Elsevier B.V.
Artificial noise aided scheme to secure UAV-assisted internet of things with wireless power transfer
- Authors: Wang, Qubeijian , Dai, Hong-Ning , Li, Xuran , Shukla, Mahendra , Imran, Muhammad
- Date: 2020
- Type: Text , Journal article
- Relation: Computer Communications Vol. 164, no. (2020), p. 1-12
- Full Text: false
- Reviewed:
- Description: The proliferation of massive Internet of Things (IoT) devices poses research challenges especially in unmanned aerial vehicles(UAV)-assisted IoT. In particular, the limited battery capacity not only restricts the life time of UAV-assisted IoT but also brings security vulnerabilities since computation-complex cryptographic algorithms cannot be adopted in UAV-assisted IoT systems. In this paper, artificial noise and wireless power transfer technologies are integrated to secure communications in UAV-assisted IoT (particularly in secret key distribution). We present the artificial noise aided scheme to secure UAV-assisted IoT communications by letting UAV gateway transfer energy to a number of helpers who will generate artificial noise to interfere with the eavesdroppers while the legitimate nodes can decode the information by canceling additive artificial noise. We introduce the eavesdropping probability and the security rate to validate the effectiveness of our proposed scheme. We further formulate an eavesdropping probability constrained security rate maximization problem to investigate the optimal power allocation. Moreover, analytical and numerical results are provided to obtain some useful insights, and to demonstrate the effect of crucial parameters (e.g., the transmit power, the main channel gain) on the eavesdropping probability, the security rate, and the optimal power allocation. © 2020 Elsevier B.V.
Ear in the sky : terrestrial mobile jamming to prevent aerial eavesdropping
- Authors: Wang, Qubeijian , Liu, Yalin , Dai, Hong-Ning , Imran, Muhammad , Nasser, Nidal
- Date: 2021
- Type: Text , Conference paper
- Relation: 2021 IEEE Global Communications Conference, GLOBECOM 2021, Madrid, 7-11 December 2021, 2021 IEEE Global Communications Conference, GLOBECOM 2021 - Proceedings
- Full Text: false
- Reviewed:
- Description: The emerging unmanned aerial vehicles (UAVs) pose a potential security threat for terrestrial communications when UAVs can be maliciously employed as UAV-eavesdroppers to wiretap confidential communications. To address such an aerial security threat, we present a friendly jamming scheme named terrestrial mobile jamming (TMJ) to protect terrestrial confidential communications from UAV eavesdropping. In our TMJ scheme, a jammer moving along the protection area can emit jamming signals toward the UAV-eavesdropper so as to reduce the eavesdropping risk. We evaluate the performance of our scheme by analyzing a secrecy-capacity maximization problem subject to the legitimate connectivity and eavesdropping probability. In addition, we investigate the optimized position for the jammer as well as its jamming power. Simulation results verify the effectiveness of the proposed scheme. © 2021 IEEE.