1 Blockchain and Internet of Things in Healthcare Systems Prospects, Issues, and Challenges
Kazeem Moses Abiodun and Emmanuel Abidemi Adeniyi
Landmark University, Omu Aran, Nigeria
Joseph Bamidele Awotunde
University of Ilorin, Ilorin, Nigeria
Chinmay Chakraborty
Birla Institute of Technology, Mesra, Ranchi, Jharkhand, India
Dayo Reuben Aremu
University of Ilorin, Ilorin, Nigeria
Ayodele Ariyo Adebiyi and Marion Olubunmi Adebiyi
Landmark University, Omu Aran, Nigeria
DOI: 10.1201/9781003247128-1
Contents
- 1.1 Introduction
- 1.2 Literature Review
- 1.3 Blockchain Technology and IoT
- 1.3.1 Features of Blockchain
- 1.3.2 The Internet of Things
- 1.3.3 Blockchain and IoT Technologies Integration in Healthcare
- 1.3.4 Digital Health Transformation Using AI
- 1.4 Challenges and Prospects of Using Blockchain and IoT in Healthcare
- 1.5 Proposed Framework
- 1.6 Conclusion
- Conflict of Interest
- Funding
- Data Availability
- References
1.1 Introduction
The healthcare industry is directly connected with peopleās social welfare and lives, so it is a critical concern for both developing and developed countries. In the healthcare sector, research and development should be a continuous process of making life easier by fighting the many health and illness problems. The innovation and latest breakthroughs in machinery have made it easy to witness the improvement in the healthcare sector. The healthcare and medical sectorsā current capabilities can be enhanced by using cutting-edge and innovative computer technologies. These technologies can aid doctors and medical professionals in the initial detection of a variety of ailments. These powerful computer technologies can also greatly increase the precision of identifying diseases in their initial periods. The various technologies used will allow the IoT devices to exchange information about patient health progress and how they are responding to treatment to their physicians for proper monitoring. IoT makes the connection of humans to humans possible, human to things, and things to other things [1]. Blockchain technologyās uniqueness is its ability to store data immutably without relying on a central authority.
Various developing and innovative computer technologies are already being applied with spectacular outcomes in other industries. IoT, blockchain, machine learning, data mining, NLP, computer vision, the clouds, and many other technologies are among them. The Internet of Things (IoT) refers to the notion that everything is linked to the Web. Vehicles, household equipment, people and other digital objects as well as applications, sensors, drive systems, and connectors that enable data to be connected and collected, and distributed, are all included in this category. Kevin Ashton is known as the āFather of the Internet of Thingsā, which refers to Internet connectivity that extends from devices like PCs, computers, mobile phones, and there are several physical technologies and daily things not available on the Internet. Wireless connectivity, clouds, sensors and security are the most common technologies employed in the IoT. The four parts of the IoT lifecycle are as follows:
- Data is collected using sensors on devices;
- The collected data is saved in the cloud for analysis;
- The gadget then receives the examined data; and
- The equipment responds appropriately.
[2]
IoT is useful in a variety of fields, making our lives easier. Agribusiness, smart retailers, autonomous driving and healthcare, smart buildings, smart cities are the most common IoT applications. Security is an important part of any technology, and it is fundamental to the successful operation of IoT networks. Secrecy and authenticity of data, IT communication protocols, user confidence and reliance and the implementation of confidentiality principles techniques are some of the active projects for improving IoT security. The IoT security issue develops as a result of poor program design, which leads to vulnerabilities, which is a major cause of network security difficulties. Proper IoT initialization is achieved in IoT architecture physically to prevent an illegitimate recipient from accessing the system. The five levels of IoT architecture are perceptual layer, logical layer, Internet layer, middleware layer, application layer and business layer. Each level has its own set of aims and challenges. Integrity and Reliability are the three cornerstones of a secure network in IoT. (CIA).
Vulnerabilities in IoT can be classified into four categories, according to multiple research papers: physical assault, intrusion software, networking strike and attack cryptography. The physical attack could take several forms, including (a) node tempering, in which the attacker modifies the compromised node to obtain the encryption key; (b) attack of the IoT system, in which the attacker physically damages the IoT system thereby causing a Denial of Service (DOS) attack; (c) injection of malicious code, which allows the attacker to take complete IoT system management; (d) RF Disturbance to radiofrequency signals is used for RFID communications in which the intruder provides random noise over radio frequency signals; (e) the hacker employs psychological manipulation to acquire the client of an IoT system with sensitive data for his purposes; (f) attack to sleep impoverishment, in which nodes are shut down.; and (g) jamming of nodes in WSNs, the attacker can distract wireless communication by using a jammer. Among the software attacks are (a) phishing attacks, where the attacker creates a false website to gain the userās personal information; (b) virus attacks, which can harm the system by propagating harmful code via The Internet and email files, and without the assistance of individuals, the virus may reproduce itself; (c) malicious files used to access the system; and (d) the denial of service (DOS) assault which prevents users to access the system.
Another concern is network assaults, which comprise but are not restricted to (a) traffic investigation attacks, in which the intruder accesses, analyzes; (b) spoofs RFID transmissions to spoof the assailant, modify the data and provide the system with erroneous information (the method receives incorrect data that has been tampered with by the attacker); (c) sinkhole attack, which is one of the most popular types of attack (the assailant introduces a harmful node within the system and that many nodes are identified in one component of the system); and (d) assault of Sybil: the assailant inserts a wormhole attack within the system and the network node adopts numerous node identities. An encryption attack could be the source of yet another security breach. The primary goal of this violence is to gain the private key, which is required to communicate between two devices. The different types are (a) side-channel: in this attack, the attacker provides some additional information when transferring the information from user to server or vice versa; (b) cryptanalysis assaults: the assailant decrypts data from a reading form without knowing the key throughout this assault; and (c) middleman assault: the assailant monitors data by interfering with connectivity among nodes in the literature, there are a number of security suggestions. Conversely, because of current difficulties such as centralization, single point of failure and so on, security remains a source of concern in IoT networks. As a result, a novel and developing innovation known as āblockchainā can be utilized in conjunction with IoT to improve IoT security. By addressing the problems in IoT, blockchainās strong technologies may be applied to increase its performance and make it a more robust connection and centralized concerns in current security processes, and introduce the notion of decentralization through the blockchain system [3].
Blockchain is a decentralized point-to-point system without the need a someone else for transactions and communication [4]. All of the transactions are self-contained and separate from one another. The blockchain is the technology that underpins the popular and revolutionary concept of cryptocurrencies. Cryptocurrency is thought to be extremely safe and unhackable. The same blockchain technology can be applied to other networks to enhance security. The fresh and growing advent technologies in any industry can result in several concerns and challenges. As a result, identifying those concerns and obstacles is critical, particularly in the healthcare industry, where peopleās lives are closely linked. The prospect of implementing blockchain and IoT in the healthcare industry is addressed in this chapter, as well as numerous new healthcare applications that can be created using these revolutionary technologies. The obstacles and issues associated with the use of these two developing innovations in the healthcare industry are then discussed in depth.
The other parts of this chapter include: Section 1.2 review related works; Section 1.3 discusses the IoT and blockchain integration in healthcare system. Section 1.4 focusses on the challenges, prospect and issues in blockchain and IoT integration for healthcare system. Section 1.5 discusses the proposed framework and how it works. Lastly, Section 1.6 recapitulates the research outcomes and proposal for future work.
1.2 Literature Review
In [5], the authors suggested the blockchain-based IoT Model to better systematically handle transactions performed through healthcare technologies. The MQTT protocol was recommended as the main agent for the architectural connection of biosensors with the IoT system. Furthermore, the architecture included the IPFS (Inter-Planetary File System), which may identify state entries or block modifications when certain transactions are affixed to the nodes, reducing the deduplication of the stored transactions. In [6], the authors presented an interactive environment for an IoT-controlled healthcare system. The suggested architecture is based on the ingestion of generating intelligent wearable gadgets and organic sensor readings, as well as providing patients with clear feedback and simple solutions. In [7], the paper presented an intelligent system in the clinic combining sensor performance with human sensors responses for speedier and timelier patient counselling. The proposal encourages the use of RFID, WSN, and wearable devices that operate on one channel to perform tasks such as intelligent detecting the patientās ecosystem, patient allotments based on the criteria for doctor selection, patient monitoring and reporting cantered on model estimation. The authors in [8] designed a platform for the transmission of health information that outstrips the present approach by allowing for pseudonymity and safeguarding customer identity whose information is published and used by clinical study centres. The study also developed the notion of a Consensus Mechanism to āprove interoperabilityā that enabled system-based companies to perform seamless and more effective operations completely based on compatibility inside the system. In addition, the researcher introduced a multi-architecture at different stages ā the web service, which clinicians will use to submit and preserve the medical records, the cloud middleware, to preserve information from web fetching services via the REST API system and to call on Smart Contracts to perform the prescribed enrolment.
In a similar work, authors in [9] used the ACP Method that is deployed on the public blockchain, provides a parallel health ...