Towards Secure IoT Authentication System Based on Fog Computing and Blockchain Technologies to Resist 51% and Hijacking Cyber-Attacks

The Internet of Health Things (IoHT) is a network of healthcare devices, software, and systems that enable remote monitoring and healthcare services by gathering real-time health data through sensors. Despite its significant benefits for modern smart healthcare, IoHT faces growing security challenge...

Full description

Saved in:
Bibliographic Details
Main Authors: Muwafaq Jawad, Ali A. Yassin, Hamid Ali Abed Al-asadi, Zaid Ameen Abduljabbar, Vincent Omollo Nyangares, Zaid Alaa Hussien, Husam A. Neamah
Format: Article
Language:English
Published: Scientific Research Support Fund of Jordan (SRSF) and Princess Sumaya University for Technology (PSUT) 2025-04-01
Series:Jordanian Journal of Computers and Information Technology
Subjects:
Online Access:http://www.ejmanager.com/fulltextpdf.php?mno=236097
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850240455912980480
author Muwafaq Jawad
Ali A. Yassin
Hamid Ali Abed Al-asadi
Zaid Ameen Abduljabbar
Vincent Omollo Nyangares
Zaid Alaa Hussien
Husam A. Neamah
author_facet Muwafaq Jawad
Ali A. Yassin
Hamid Ali Abed Al-asadi
Zaid Ameen Abduljabbar
Vincent Omollo Nyangares
Zaid Alaa Hussien
Husam A. Neamah
author_sort Muwafaq Jawad
collection DOAJ
description The Internet of Health Things (IoHT) is a network of healthcare devices, software, and systems that enable remote monitoring and healthcare services by gathering real-time health data through sensors. Despite its significant benefits for modern smart healthcare, IoHT faces growing security challenges due to the limited processing power, storage capacity, and self-defense capabilities of its devices. While blockchain-based authentication solutions have been developed to leverage tamper-resistant decentralized designs for enhanced security, they often require substantial computational resources, increased storage, and longer authentication times, hindering scalability and time efficiency in large-scale, time-critical IoHT systems. To address these challenges, we propose a novel four-phase authentication scheme comprising setup, registration, authentication, and secret construction phases. Our scheme integrates chaotic-based public key cryptosystems, a Light Encryption Device (LED) with a 3-D Lorenz chaotic map algorithm, and blockchain-based fog computing technologies to enhance both efficiency and scalability. Simulated on the Ethereum platform using Solidity and evaluated with the JMeter tool, the proposed scheme demonstrates superior performance, with a computational cost reduction of 40% compared to traditional methods like Elliptic Curve Cryptography (ECC). The average latency for registration is 1.25 ms, while the authentication phase completes in just 1.50 ms, making it highly suitable for time-critical IoHT applications. Security analysis using the Scyther tool confirms that the scheme is resistant to modern cyberattacks, including 51% attacks and hijacking, while ensuring data integrity and confidentiality. Additionally, the scheme minimizes communication costs and supports the scalability of large-scale IoHT systems. These results highlight the proposed scheme's potential to revolutionize secure and efficient healthcare monitoring, enabling real-time, tamper-proof data management in IoHT environments. [JJCIT 2025; 11(2.000): 238-259]
format Article
id doaj-art-0cf11c9b6f4f426ab0fa6ace83d29e51
institution OA Journals
issn 2413-9351
2415-1076
language English
publishDate 2025-04-01
publisher Scientific Research Support Fund of Jordan (SRSF) and Princess Sumaya University for Technology (PSUT)
record_format Article
series Jordanian Journal of Computers and Information Technology
spelling doaj-art-0cf11c9b6f4f426ab0fa6ace83d29e512025-08-20T02:00:51ZengScientific Research Support Fund of Jordan (SRSF) and Princess Sumaya University for Technology (PSUT)Jordanian Journal of Computers and Information Technology2413-93512415-10762025-04-0111223825910.5455/jjcit.71-1736013097236097Towards Secure IoT Authentication System Based on Fog Computing and Blockchain Technologies to Resist 51% and Hijacking Cyber-AttacksMuwafaq Jawad0Ali A. Yassin1Hamid Ali Abed Al-asadi2Zaid Ameen Abduljabbar3Vincent Omollo Nyangares4Zaid Alaa Hussien5Husam A. Neamah6University of Basrah, Basrah, IRAQ University of Basrah, Basrah, IRAQ University of Basrah, Basrah, IRAQ University of Basrah, Basrah, IRAQ Jaramogi Oginga Odinga University of Science and Technology, Kenya Southern Technical University, Iraq University of Debrecen, HungaryThe Internet of Health Things (IoHT) is a network of healthcare devices, software, and systems that enable remote monitoring and healthcare services by gathering real-time health data through sensors. Despite its significant benefits for modern smart healthcare, IoHT faces growing security challenges due to the limited processing power, storage capacity, and self-defense capabilities of its devices. While blockchain-based authentication solutions have been developed to leverage tamper-resistant decentralized designs for enhanced security, they often require substantial computational resources, increased storage, and longer authentication times, hindering scalability and time efficiency in large-scale, time-critical IoHT systems. To address these challenges, we propose a novel four-phase authentication scheme comprising setup, registration, authentication, and secret construction phases. Our scheme integrates chaotic-based public key cryptosystems, a Light Encryption Device (LED) with a 3-D Lorenz chaotic map algorithm, and blockchain-based fog computing technologies to enhance both efficiency and scalability. Simulated on the Ethereum platform using Solidity and evaluated with the JMeter tool, the proposed scheme demonstrates superior performance, with a computational cost reduction of 40% compared to traditional methods like Elliptic Curve Cryptography (ECC). The average latency for registration is 1.25 ms, while the authentication phase completes in just 1.50 ms, making it highly suitable for time-critical IoHT applications. Security analysis using the Scyther tool confirms that the scheme is resistant to modern cyberattacks, including 51% attacks and hijacking, while ensuring data integrity and confidentiality. Additionally, the scheme minimizes communication costs and supports the scalability of large-scale IoHT systems. These results highlight the proposed scheme's potential to revolutionize secure and efficient healthcare monitoring, enabling real-time, tamper-proof data management in IoHT environments. [JJCIT 2025; 11(2.000): 238-259]http://www.ejmanager.com/fulltextpdf.php?mno=236097blockchainfog computingiohtauthenticationchaotic cryptographyhealthcare
spellingShingle Muwafaq Jawad
Ali A. Yassin
Hamid Ali Abed Al-asadi
Zaid Ameen Abduljabbar
Vincent Omollo Nyangares
Zaid Alaa Hussien
Husam A. Neamah
Towards Secure IoT Authentication System Based on Fog Computing and Blockchain Technologies to Resist 51% and Hijacking Cyber-Attacks
Jordanian Journal of Computers and Information Technology
blockchain
fog computing
ioht
authentication
chaotic cryptography
healthcare
title Towards Secure IoT Authentication System Based on Fog Computing and Blockchain Technologies to Resist 51% and Hijacking Cyber-Attacks
title_full Towards Secure IoT Authentication System Based on Fog Computing and Blockchain Technologies to Resist 51% and Hijacking Cyber-Attacks
title_fullStr Towards Secure IoT Authentication System Based on Fog Computing and Blockchain Technologies to Resist 51% and Hijacking Cyber-Attacks
title_full_unstemmed Towards Secure IoT Authentication System Based on Fog Computing and Blockchain Technologies to Resist 51% and Hijacking Cyber-Attacks
title_short Towards Secure IoT Authentication System Based on Fog Computing and Blockchain Technologies to Resist 51% and Hijacking Cyber-Attacks
title_sort towards secure iot authentication system based on fog computing and blockchain technologies to resist 51 and hijacking cyber attacks
topic blockchain
fog computing
ioht
authentication
chaotic cryptography
healthcare
url http://www.ejmanager.com/fulltextpdf.php?mno=236097
work_keys_str_mv AT muwafaqjawad towardssecureiotauthenticationsystembasedonfogcomputingandblockchaintechnologiestoresist51andhijackingcyberattacks
AT aliayassin towardssecureiotauthenticationsystembasedonfogcomputingandblockchaintechnologiestoresist51andhijackingcyberattacks
AT hamidaliabedalasadi towardssecureiotauthenticationsystembasedonfogcomputingandblockchaintechnologiestoresist51andhijackingcyberattacks
AT zaidameenabduljabbar towardssecureiotauthenticationsystembasedonfogcomputingandblockchaintechnologiestoresist51andhijackingcyberattacks
AT vincentomollonyangares towardssecureiotauthenticationsystembasedonfogcomputingandblockchaintechnologiestoresist51andhijackingcyberattacks
AT zaidalaahussien towardssecureiotauthenticationsystembasedonfogcomputingandblockchaintechnologiestoresist51andhijackingcyberattacks
AT husamaneamah towardssecureiotauthenticationsystembasedonfogcomputingandblockchaintechnologiestoresist51andhijackingcyberattacks