DOI QR코드

DOI QR Code

Blockchain and Physically Unclonable Functions Based Mutual Authentication Protocol in Remote Surgery within Tactile Internet Environment

  • Received : 2022.09.05
  • Published : 2022.09.30

Abstract

The Tactile Internet technology is considered as the evolution of the internet of things. It will enable real time applications in all fields like remote surgery. It requires extra low latency which must not exceed 1ms, high availability, reliability and strong security system. Since it appearance in 2014, tremendous efforts have been made to ensure authentication between sensors, actuators and servers to secure many applications such as remote surgery. This human to machine relationship is very critical due to its dependence of the human live, the communication between the surgeon who performs the remote surgery and the robot arms, as a tactile internet actor, should be fully and end to end protected during the surgery. Thus, a secure mutual user authentication framework has to be implemented in order to ensure security without influencing latency. The existing methods of authentication require server to stock and exchange data between the tactile internet entities, which does not only make the proposed systems vulnerables to the SPOF (Single Point of Failure), but also impact negatively on the latency time. To address these issues, we propose a lightweight authentication protocol for remote surgery in a Tactile Internet environment, which is composed of a decentralized blockchain and physically unclonable functions. Finally, performances evaluation illustrate that our proposed solution ensures security, latency and reliability.

Keywords

References

  1. SIMSEK, Meryem, AIJAZ, Adnan, DOHLER, Mischa, et al. 5Genabled tactile internet. IEEE Journal on Selected Areas in Communications, 2016, vol. 34, no 3, p. 460-473 https://doi.org/10.1109/JSAC.2016.2525398
  2. Fettweis, Gerhard P. "The tactile internet: Applications and challenges." IEEE Vehicular Technology Magazine 9.1 (2014): 64-70. https://doi.org/10.1109/MVT.2013.2295069
  3. TANWAR, Sudeep, TYAGI, Sudhanshu, BUDHIRAJA, Ishan, et al. Tactile Internet for autonomous vehicles: Latency and reliability analysis. IEEE Wireless Communications, 2019, vol. 26, no 4, p. 66-72 https://doi.org/10.1109/mwc.2019.1800553
  4. MESHRAM, Dewanand A. et PATIL, Dipti D. 5G enabled tactile internet for tele-robotic surgery. Procedia Computer Science, 2020, vol. 171, p. 2618-2625. https://doi.org/10.1016/j.procs.2020.04.284
  5. WAZID, Mohammad, DAS, Ashok Kumar, et LEE, Jong-Hyouk. User authentication in a tactile internet based remote surgery environment: Security issues, challenges, and future research directions. Pervasive and Mobile Computing, 2019, vol. 54, p. 71-85. https://doi.org/10.1016/j.pmcj.2019.02.004
  6. FETTWEIS, Gerhard P. et BOCHE, Holger. 6G: the personal tactile internet-and open questions for information theory. IEEE BITS the Information Theory Magazine, 2021, vol. 1, no 1, p. 71-82. https://doi.org/10.1109/MBITS.2021.3118662
  7. Wu, F., Li, X., Sangaiah, A. K., Xu, L., Kumari, S., Wu, L., & Shen, J. (2018). A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks. Future Generation Computer Systems, 82, 727-737. https://doi.org/10.1016/j.future.2017.08.042
  8. DAS, Ashok Kumar, SUTRALA, Anil Kumar, ODELU, Vanga, et al. A secure smartcard-based anonymous user authentication scheme for healthcare applications using wireless medical sensor networks. Wireless Personal Communications, 2017, vol. 94, no 3, p. 1899-1933. https://doi.org/10.1007/s11277-016-3718-6
  9. HIDAR, Tarik, ABOU EL KALAM, Anas, et BENHADOU, Siham. Ensuring the Security and Performances in Tactile Internet using Physical Unclonable Functions. In : 2019 4th World Conference on Complex Systems (WCCS). IEEE, 2019. p. 1-6.
  10. HIDAR, Tarik, ABOU EL KALAM, Anas, BENHADOU, Siham, et al. Using blockchain based authentication solution for the remote surgery in tactile internet. International Journal of Advanced Computer Science and Applications, 2021, vol. 12, no 2.
  11. Pauls, Friedrich, Robert Wittig, and Gerhard Fettweis. "A LatencyOptimized Hash-Based Digital Signature Accelerator for the Tactile Internet." International Conference on Embedded Computer Systems. Springer, Cham, 2019
  12. JIANG, Qi, MA, Jianfeng, YANG, Chao, et al. Efficient end-to-end authentication protocol for wearable health monitoring systems. Computers & Electrical Engineering, 2017, vol. 63, p. 182-195. https://doi.org/10.1016/j.compeleceng.2017.03.016
  13. T. Alladi, V. Chamola, and Naren, "HARCI: A two-way authentication protocol for three entity healthcare IoT networks," IEEE J. Sel. Areas Commun., vol. 39, no. 2, pp. 361-369, Feb. 2021 https://doi.org/10.1109/JSAC.2020.3020605
  14. Li, Jiliang, et al. "PSL-MAAKA: Provably Secure and Lightweight Mutual Authentication and Key Agreement Protocol for Fully Public Channels in Internet of Medical Things." IEEE Internet of Things Journal 8.17 (2021): 13183-13195. https://doi.org/10.1109/JIOT.2021.3055827
  15. ACEVEDO, Javier, ULBRICHT, Marian, GABRIEL, Jennifer, et al. Hardware Accelerated Cryptography for Tactile Internet. In : European Wireless 2021; 26th European Wireless Conference. VDE, 2021. p. 1-8.
  16. DEAN, Thomas R. et GOLDSMITH, Andrea J. Physical-layer cryptography through massive MIMO. IEEE Transactions on Information Theory, 2017, vol. 63, no 8, p. 5419-5436. https://doi.org/10.1109/TIT.2017.2715187
  17. SHANTHARAMA, Prateek, THYAGATURU, Akhilesh S., et REISSLEIN, Martin. Hardware-accelerated platforms and infrastructures for network functions: A survey of enabling technologies and research studies. IEEE Access, 2020, vol. 8, p. 132021-132085. https://doi.org/10.1109/access.2020.3008250
  18. Outchakoucht, Aissam, ES-SAMAALI Hamza, and Jean Philippe Leroy. "Dynamic access control policy based on blockchain and machine learning for the internet of things." International journal of advanced Computer Science and applications 8.7 (2017).
  19. Es-Samaali, Hamza, Aissam Outchakoucht, and Jean Philippe Leroy. "A blockchain-based access control for big data." International Journal of Computer Networks and Communications Security 5.7 (2017): 137.
  20. MOUNNAN, Oussama, EL MOUATASIM, Abdelkrim, MANAD, Otman, et al. Privacy-aware and authentication based on blockchain with fault tolerance for IoT enabled fog computing. In : 2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC). IEEE, 2020. p. 347-352.
  21. MOUNNAN, Oussama, EL MOUATASIM, Abdelkrim, MANAD, Otman, et al. Privacy-aware and authentication based on blockchain with fault tolerance for IoT enabled fog computing. In : 2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC). IEEE, 2020. p. 347-352.
  22. Zhang, J. L., Qu, G., Lv, Y. Q., & Zhou, Q. (2014). A survey on silicon PUFs and recent advances in ring oscillator PUFs. Journal of computer science and technology, 29(4), 664-678. https://doi.org/10.1007/s11390-014-1458-1
  23. Standards for Basic Anesthetic Monitoring. Committee of Origin: Standards and Practice Parameters (Approved by the ASA House of Delegates on October 21, 1986, last amended on October 20, 2010, and last affirmed on October 28, 2016) https://www.asahq.org/~/media/Sites/ASAHQ/Files/Public/Resources/standards-guidelines/standards-for-basic-anestheticmonitoring.pdf (Accessed on July 18, 2022)
  24. Klein AA, Meek T, Allcock E, Cook TM, Mincher N, Morris C, and al. Recommendations for standards of monitoring during anaesthesia and recovery 2021: Guideline from the Association of Anaesthetists. Anaesthesia. 2021 Sep;76(9):1212-1223. doi: 10.1111/anae.15501.
  25. Chilkoti G, Wadhwa R, Saxena AK. Technological advances in perioperative monitoring: current concepts and clinical perspectives. J Anaesthesiol Clin Pharmacol. 2015;31:14-24. doi: 10.4103/0970-9185.150521.
  26. K. Tiwari, S. Kumar, and R. K. Tiwari, Fog assisted healthcare architecture for pre-operative support to reduce latency, Procedia Computer Science, vol. 167, pp. 1312-1324, 2020.
  27. Freschi C, Ferrari V, Melfi F, Ferrari M, Mosca F, Cuschieri A.Technical review of the da Vinci surgical telemanipulator. Int J Med Robot Comp. 2013;9(4):396-406.
  28. PETROVA, Marina, RIIHIJARVI, Janne, MAHONEN, Petri, et al. Performance study of IEEE 802.15. 4 using measurements and simulations. In : IEEE Wireless Communications and Networking Conference, 2006. WCNC 2006. IEEE, 2006. p. 487-492
  29. DODIS, Yevgeniy, REYZIN, Leonid, et SMITH, Adam. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In : International conference on the theory and applications of cryptographic techniques. Springer, Berlin, Heidelberg, 2004. p. 523-540.
  30. Vigano, Luca. "Automated security protocol analysis with the AVISPA tool." Electronic Notes in Theoretical Computer Science 155 (2006): 61-86 https://doi.org/10.1016/j.entcs.2005.11.052
  31. Zhang, Y., Li, B., Liu, B., Hu, Y., & Zheng, H. (2021). A privacyaware PUFs-based multiserver authentication protocol in cloud-edge IoT systems using blockchain. IEEE Internet of Things Journal, 8(18), 13958-13974. https://doi.org/10.1109/JIOT.2021.3068410
  32. Abou El Houda, Z., Hafid, A. S., & Khoukhi, L. (2021, June). Blockchain-based Reverse Auction for V2V charging in smart grid environment. In ICC 2021-IEEE International Conference on Communications (pp. 1-6). IEEE
  33. Abou El Houda, Z., Hafid, A., & Khoukhi, L. (2019, December). Co-IoT: A collaborative DDoS mitigation scheme in IoT environment based on blockchain using SDN. In 2019 IEEE Global Communications Conference (GLOBECOM) (pp. 1-6). IEEE.