Towards Secure IoT Authentication System Based on Fog Computing and Blockchain Technologies to Resist 51% and Hijacking Cyber-Attacks
The Internet of Health Things (IoHT) is a network of healthcare devices, software, and systems that enable remote monitoring and healthcare services by gathering real-time health data through sensors. Despite its significant benefits for modern smart healthcare, IoHT faces growing security challenge...
Saved in:
| Main Authors: | , , , , , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Scientific Research Support Fund of Jordan (SRSF) and Princess Sumaya University for Technology (PSUT)
2025-04-01
|
| Series: | Jordanian Journal of Computers and Information Technology |
| Subjects: | |
| Online Access: | http://www.ejmanager.com/fulltextpdf.php?mno=236097 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1850240455912980480 |
|---|---|
| author | Muwafaq Jawad Ali A. Yassin Hamid Ali Abed Al-asadi Zaid Ameen Abduljabbar Vincent Omollo Nyangares Zaid Alaa Hussien Husam A. Neamah |
| author_facet | Muwafaq Jawad Ali A. Yassin Hamid Ali Abed Al-asadi Zaid Ameen Abduljabbar Vincent Omollo Nyangares Zaid Alaa Hussien Husam A. Neamah |
| author_sort | Muwafaq Jawad |
| collection | DOAJ |
| description | The Internet of Health Things (IoHT) is a network of healthcare devices, software, and systems that enable remote monitoring and healthcare services by gathering real-time health data through sensors. Despite its significant benefits for modern smart healthcare, IoHT faces growing security challenges due to the limited processing power, storage capacity, and self-defense capabilities of its devices. While blockchain-based authentication solutions have been developed to leverage tamper-resistant decentralized designs for enhanced security, they often require substantial computational resources, increased storage, and longer authentication times, hindering scalability and time efficiency in large-scale, time-critical IoHT systems. To address these challenges, we propose a novel four-phase authentication scheme comprising setup, registration, authentication, and secret construction phases. Our scheme integrates chaotic-based public key cryptosystems, a Light Encryption Device (LED) with a 3-D Lorenz chaotic map algorithm, and blockchain-based fog computing technologies to enhance both efficiency and scalability. Simulated on the Ethereum platform using Solidity and evaluated with the JMeter tool, the proposed scheme demonstrates superior performance, with a computational cost reduction of 40% compared to traditional methods like Elliptic Curve Cryptography (ECC). The average latency for registration is 1.25 ms, while the authentication phase completes in just 1.50 ms, making it highly suitable for time-critical IoHT applications. Security analysis using the Scyther tool confirms that the scheme is resistant to modern cyberattacks, including 51% attacks
and hijacking, while ensuring data integrity and confidentiality. Additionally, the scheme minimizes communication costs and supports the scalability of large-scale IoHT systems. These results highlight the proposed scheme's potential to revolutionize secure and efficient healthcare monitoring, enabling real-time, tamper-proof data management in IoHT environments. [JJCIT 2025; 11(2.000): 238-259] |
| format | Article |
| id | doaj-art-0cf11c9b6f4f426ab0fa6ace83d29e51 |
| institution | OA Journals |
| issn | 2413-9351 2415-1076 |
| language | English |
| publishDate | 2025-04-01 |
| publisher | Scientific Research Support Fund of Jordan (SRSF) and Princess Sumaya University for Technology (PSUT) |
| record_format | Article |
| series | Jordanian Journal of Computers and Information Technology |
| spelling | doaj-art-0cf11c9b6f4f426ab0fa6ace83d29e512025-08-20T02:00:51ZengScientific Research Support Fund of Jordan (SRSF) and Princess Sumaya University for Technology (PSUT)Jordanian Journal of Computers and Information Technology2413-93512415-10762025-04-0111223825910.5455/jjcit.71-1736013097236097Towards Secure IoT Authentication System Based on Fog Computing and Blockchain Technologies to Resist 51% and Hijacking Cyber-AttacksMuwafaq Jawad0Ali A. Yassin1Hamid Ali Abed Al-asadi2Zaid Ameen Abduljabbar3Vincent Omollo Nyangares4Zaid Alaa Hussien5Husam A. Neamah6University of Basrah, Basrah, IRAQ University of Basrah, Basrah, IRAQ University of Basrah, Basrah, IRAQ University of Basrah, Basrah, IRAQ Jaramogi Oginga Odinga University of Science and Technology, Kenya Southern Technical University, Iraq University of Debrecen, HungaryThe Internet of Health Things (IoHT) is a network of healthcare devices, software, and systems that enable remote monitoring and healthcare services by gathering real-time health data through sensors. Despite its significant benefits for modern smart healthcare, IoHT faces growing security challenges due to the limited processing power, storage capacity, and self-defense capabilities of its devices. While blockchain-based authentication solutions have been developed to leverage tamper-resistant decentralized designs for enhanced security, they often require substantial computational resources, increased storage, and longer authentication times, hindering scalability and time efficiency in large-scale, time-critical IoHT systems. To address these challenges, we propose a novel four-phase authentication scheme comprising setup, registration, authentication, and secret construction phases. Our scheme integrates chaotic-based public key cryptosystems, a Light Encryption Device (LED) with a 3-D Lorenz chaotic map algorithm, and blockchain-based fog computing technologies to enhance both efficiency and scalability. Simulated on the Ethereum platform using Solidity and evaluated with the JMeter tool, the proposed scheme demonstrates superior performance, with a computational cost reduction of 40% compared to traditional methods like Elliptic Curve Cryptography (ECC). The average latency for registration is 1.25 ms, while the authentication phase completes in just 1.50 ms, making it highly suitable for time-critical IoHT applications. Security analysis using the Scyther tool confirms that the scheme is resistant to modern cyberattacks, including 51% attacks and hijacking, while ensuring data integrity and confidentiality. Additionally, the scheme minimizes communication costs and supports the scalability of large-scale IoHT systems. These results highlight the proposed scheme's potential to revolutionize secure and efficient healthcare monitoring, enabling real-time, tamper-proof data management in IoHT environments. [JJCIT 2025; 11(2.000): 238-259]http://www.ejmanager.com/fulltextpdf.php?mno=236097blockchainfog computingiohtauthenticationchaotic cryptographyhealthcare |
| spellingShingle | Muwafaq Jawad Ali A. Yassin Hamid Ali Abed Al-asadi Zaid Ameen Abduljabbar Vincent Omollo Nyangares Zaid Alaa Hussien Husam A. Neamah Towards Secure IoT Authentication System Based on Fog Computing and Blockchain Technologies to Resist 51% and Hijacking Cyber-Attacks Jordanian Journal of Computers and Information Technology blockchain fog computing ioht authentication chaotic cryptography healthcare |
| title | Towards Secure IoT Authentication System Based on Fog Computing and Blockchain
Technologies to Resist 51% and Hijacking Cyber-Attacks |
| title_full | Towards Secure IoT Authentication System Based on Fog Computing and Blockchain
Technologies to Resist 51% and Hijacking Cyber-Attacks |
| title_fullStr | Towards Secure IoT Authentication System Based on Fog Computing and Blockchain
Technologies to Resist 51% and Hijacking Cyber-Attacks |
| title_full_unstemmed | Towards Secure IoT Authentication System Based on Fog Computing and Blockchain
Technologies to Resist 51% and Hijacking Cyber-Attacks |
| title_short | Towards Secure IoT Authentication System Based on Fog Computing and Blockchain
Technologies to Resist 51% and Hijacking Cyber-Attacks |
| title_sort | towards secure iot authentication system based on fog computing and blockchain technologies to resist 51 and hijacking cyber attacks |
| topic | blockchain fog computing ioht authentication chaotic cryptography healthcare |
| url | http://www.ejmanager.com/fulltextpdf.php?mno=236097 |
| work_keys_str_mv | AT muwafaqjawad towardssecureiotauthenticationsystembasedonfogcomputingandblockchaintechnologiestoresist51andhijackingcyberattacks AT aliayassin towardssecureiotauthenticationsystembasedonfogcomputingandblockchaintechnologiestoresist51andhijackingcyberattacks AT hamidaliabedalasadi towardssecureiotauthenticationsystembasedonfogcomputingandblockchaintechnologiestoresist51andhijackingcyberattacks AT zaidameenabduljabbar towardssecureiotauthenticationsystembasedonfogcomputingandblockchaintechnologiestoresist51andhijackingcyberattacks AT vincentomollonyangares towardssecureiotauthenticationsystembasedonfogcomputingandblockchaintechnologiestoresist51andhijackingcyberattacks AT zaidalaahussien towardssecureiotauthenticationsystembasedonfogcomputingandblockchaintechnologiestoresist51andhijackingcyberattacks AT husamaneamah towardssecureiotauthenticationsystembasedonfogcomputingandblockchaintechnologiestoresist51andhijackingcyberattacks |