CURRENT ARTICLES


Spring 2022, No. 1, vol. 4 / Romanian Cyber Security Journal


A Note on Blockchain Authentication Methods for Mobile Devices in Healthcare

George Mircea GROSU, Silvia Elena NISTOR, Emil SIMION

george_mircea.grosu@stud.acs.upb.ro, silvia_elena.nistor@stud.acs.upb.ro, emil.simion@upb.ro


Abstract:
The past couple of decades witnessed a tremendous expansion in the IoT world that gathers now billions of devices, sensors, users and transactions. The aspirations of ubiquitous computing have drastically changed the computing world, from a parallel point of view, to distributed, then grid and cloud computing – all these just to keep up with the proliferation of devices and the users’ expectations. Alongside with this fast development, many issues appeared, especially in terms of scalability and security. Regardless of protocols, devices, applications or technologies used, critical data will be involved and, therefore, vulnerabilities that can affect the performance of the system or allows them to be maliciously exploited. The higher the number of devices, the more constraints appear and along with these constraints the existing models and technologies become overwhelmed and simply not enough. The size of the IoT and its autonomous character make it impossible to sustain and implement a centralized authentication system. Therefore, to allow reliable peer authentication and to approach a trust level management, we propose discussing a model based on blockchain technology. Blockchain is a revolutionary technology, modeled by a linear sequence of blocks, considered to be the future of wireless networks security (Li et al., 2018). We rely on this new data structure to address two major components of security in mobile networks: authentication and trust.

Keywords:
Cryptographic Authentication, Trust, Anonymity, Wireless, Mobile, Hash Functions, Healthcare, Blockchain.

For more details, click on: