{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T20:58:55Z","timestamp":1765486735442,"version":"3.41.0"},"reference-count":41,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2023,8,21]],"date-time":"2023-08-21T00:00:00Z","timestamp":1692576000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Internet Technol."],"published-print":{"date-parts":[[2023,8,31]]},"abstract":"<jats:p>E-health is the use of information and communication technology (ICT) for the healthcare-related services. It uses various types of digital technologies and telecommunications, such as computers, sensing devices, Internet, and mobile devices to deliver medical services. Internet of Medical Things (IoMT) is a communication environment optimized for low-power devices (for example, health sensors and actuators) and operation on, in, or around the human body (i.e., a patient). It can be used in various applications that are related to healthcare, such as \u201cbody automation,\u201d \u201chealthcare,\u201d \u201cmedical monitoring,\u201d \u201cbody interaction,\u201d and \u201cmedical implants (i.e., pacemaker).\u201d Most of the communications happen in IoMT-based e-healthcare system are wireless in nature. This may cause severe threats to the security of the system. Various information security-related attacks, i.e., replay, man-in-the-middle attack (MiTM), impersonation, privileged insider, unauthorised session key computation, credentials leakage, stolen verifier, malware injection are possible in IoMT-based e-healthcare system. These threats and attacks can create serious problems in the social life of an individual, as this may reveal their confidential healthcare information to other unauthorised parties. Therefore, it is essential to propose an access control and key management scheme to secure the communication of a IoMT-based e-healthcare system. Moreover, the security of such kind of scheme can also be enhanced through the deployment of a blockchain mechanism. Therefore, in this article, we propose a blockchain-enabled access control and key management protocol for IoMT-based e-healthcare system that is named as \u201cBACKM-EHA\u201d in short. The security analysis of proposed BACKM-EHA is also provided through the standard, i.e., \u201cReal-Or-Random model.\u201d The various conducted security analyses prove the security of BACKM-EHA against the different types of potential attacks. The performance of BACKM-EHA is better than the other existing schemes, as it requires less communication cost, computation cost, and provides more \u201csecurity and functionality features.\u201d<\/jats:p>","DOI":"10.1145\/3511898","type":"journal-article","created":{"date-parts":[[2022,3,25]],"date-time":"2022-03-25T06:21:15Z","timestamp":1648189275000},"page":"1-28","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":56,"title":["BACKM-EHA: A Novel Blockchain-enabled Security Solution for IoMT-based E-healthcare Applications"],"prefix":"10.1145","volume":"23","author":[{"given":"Mohammad","family":"Wazid","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, Graphic Era Deemed to be University, India"}]},{"given":"Prosanta","family":"Gope","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Sheffield, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2023,8,21]]},"reference":[{"key":"e_1_3_1_2_2","unstructured":"Quynh H. Dang. 1995. Secure Hash Standard. FIPS PUB 180-1 National Institute of Standards and Technology (NIST) U.S. Department of Commerce NIST Publications. Retrieved from http:\/\/www.umich.edu\/x509\/ssleay\/fip180\/fip180-1.htm."},{"key":"e_1_3_1_3_2","first-page":"65","volume-title":"8th International Workshop on Theory and Practice in Public Key Cryptography (PKC\u201905), Lecture Notes in Computer Science","author":"Abdalla M.","year":"2005","unstructured":"M. Abdalla, P. A. Fouque, and D. Pointcheval. 2005. Password-based authenticated key exchange in the three-party setting. In 8th International Workshop on Theory and Practice in Public Key Cryptography (PKC\u201905), Lecture Notes in Computer Science, Vol. 3386. Les Diablerets, Switzerland, 65\u201384."},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.3020605"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2019.2953740"},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-010-9449-4"},{"key":"e_1_3_1_7_2","doi-asserted-by":"crossref","unstructured":"E. Barker. 2020. Recommendation for Key Management. Special Publication 800-57 Part 1 Rev. 4 NIST 01\/2016.","DOI":"10.6028\/NIST.SP.800-57pt1r4"},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.02.011"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/mc.2020.2989781"},{"key":"e_1_3_1_10_2","first-page":"453","volume-title":"Advances in Cryptology\u2014EUROCRYPT","author":"Canetti R.","year":"2001","unstructured":"R. Canetti and H. Krawczyk. 2001. Analysis of key-exchange protocols and their use for building secure channels. In Advances in Cryptology\u2014EUROCRYPT, Birgit Pfitzmann (Ed.). Springer Berlin, Innsbruck (Tyrol), Austria, 453\u2013474."},{"key":"e_1_3_1_11_2","first-page":"337","volume-title":"Advances in Cryptology\u2014EUROCRYPT","author":"Canetti R.","year":"2002","unstructured":"R. Canetti and H. Krawczyk. 2002. Universally composable notions of key exchange and secure channels. In Advances in Cryptology\u2014EUROCRYPT, Lars R. Knudsen (Ed.). Springer Berlin, Amsterdam, The Netherlands, 337\u2013351."},{"key":"e_1_3_1_12_2","article-title":"Disaster and pandemic management using machine learning: A survey","author":"Chamola Vinay","year":"2021","unstructured":"Vinay Chamola, Vikas Hassija, Sakshi Gupta, Adit Goyal, Mohsen Guizani, and Biplab Sikdar. 2021. Disaster and pandemic management using machine learning: A survey. IEEE Internet Things J. 8, 21 (2021), 16047\u201316071.","journal-title":"IEEE Internet Things J."},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.03.011"},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2877690"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2905298"},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107333"},{"key":"e_1_3_1_18_2","first-page":"1","article-title":"BAKMP-IoMT: Design of blockchain enabled authenticated key management protocol for internet of medical things deployment","author":"Garg N.","year":"2020","unstructured":"N. Garg, M. Wazid, A. K. Das, D. P. Singh, J. J. P. C. Rodrigues, and Y. Park. 2020. BAKMP-IoMT: Design of blockchain enabled authenticated key management protocol for internet of medical things deployment. IEEE Access (2020), 1\u201323. DOI:10.1109\/ACCESS.2020.2995917","journal-title":"IEEE Access"},{"key":"e_1_3_1_19_2","article-title":"A secure IoT-based modern healthcare system with fault-tolerant decision making process","author":"Gope P.","year":"2021","unstructured":"P. Gope, Y. Gheraibia, S. Kabir, and B. Sikdar. 2021. A secure IoT-based modern healthcare system with fault-tolerant decision making process. IEEE J. Biomed. Health Inform. 25, 3 (2021), 862\u2013873.","journal-title":"IEEE J. Biomed. Health Inform."},{"key":"e_1_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2015.2502401"},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2016.2628413"},{"key":"e_1_3_1_22_2","doi-asserted-by":"crossref","first-page":"102552","DOI":"10.1016\/j.scs.2020.102552","article-title":"Security issues in implantable medical devices: Fact or fiction?","volume":"66","author":"Hassija Vikas","year":"2021","unstructured":"Vikas Hassija, Vinay Chamola, Balindam Chandra Bajpai, Naren, and Sherali Zeadally. 2021. Security issues in implantable medical devices: Fact or fiction? Sustain. Cities Societ 66 (2021), 102552.","journal-title":"Sustain. Cities Societ"},{"key":"e_1_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1007\/s102070100002"},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2016.03.007"},{"key":"e_1_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2016.2557850"},{"key":"e_1_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2016.2554625"},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2010.5416350"},{"key":"e_1_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/6140978"},{"key":"e_1_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2002.1004593"},{"key":"e_1_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2010.5416354"},{"key":"e_1_3_1_31_2","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1016\/B978-0-12-815458-8.00002-5","volume-title":"Social Network Analytics","author":"Rath M.","year":"2019","unstructured":"M. Rath, B. Pati, and B. K. Pattanayak. 2019. An overview on social networking: Design, issues, emerging trends, and security. In Social Network Analytics, N. Dey and S. Borah and R. Babo and A. S. Ashour (Eds.). Academic Press, 21\u201347."},{"key":"e_1_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2909004"},{"key":"e_1_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.102496"},{"key":"e_1_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2017.2721545"},{"key":"e_1_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2780232"},{"key":"e_1_3_1_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2764083"},{"key":"e_1_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2960412"},{"key":"e_1_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2992467"},{"key":"e_1_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.09.008"},{"key":"e_1_3_1_40_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2850299"},{"key":"e_1_3_1_41_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.energy.2019.05.127"},{"key":"e_1_3_1_42_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.energy.2019.05.127"}],"container-title":["ACM Transactions on Internet Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3511898","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3511898","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:48:50Z","timestamp":1750182530000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3511898"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,21]]},"references-count":41,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,8,31]]}},"alternative-id":["10.1145\/3511898"],"URL":"https:\/\/doi.org\/10.1145\/3511898","relation":{},"ISSN":["1533-5399","1557-6051"],"issn-type":[{"type":"print","value":"1533-5399"},{"type":"electronic","value":"1557-6051"}],"subject":[],"published":{"date-parts":[[2023,8,21]]},"assertion":[{"value":"2020-11-10","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-01-17","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-08-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}