Data Security Through Zero-Knowledge Proof and Statistical Fingerprinting in Vehicle-to-Healthcare Everything (V2HX) Communications
The security and privacy of healthcare enterprises (HEs) are crucial because they maintain sensitive information. Because of the unique functional requirement of omni-inclusiveness, HEs are expected to monitor patients, allowing for connectivity with vehicular ad hoc networks (VANETs). In the absenc...
Saved in:
Published in | IEEE transactions on intelligent transportation systems Vol. 22; no. 6; pp. 3869 - 3879 |
---|---|
Main Authors | , , , , , |
Format | Journal Article |
Language | English |
Published |
New York
IEEE
01.06.2021
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | The security and privacy of healthcare enterprises (HEs) are crucial because they maintain sensitive information. Because of the unique functional requirement of omni-inclusiveness, HEs are expected to monitor patients, allowing for connectivity with vehicular ad hoc networks (VANETs). In the absence of literature on security provisioning frameworks that connect VANETs and HEs, this paper presents a smart zero-knowledge proof and statistical fingerprinting-based trusted secure communication framework for a fog computing environment. A zero-knowledge proof is used for vehicle authentication, and statistical fingerprinting is employed to secure communication between VANETs and HEs. Authenticity verification of the operations is performed at the on-board unit (OBU) fitted in the vehicle based on the service executions at the resident hardware platform. The processor clock cycles are acquired from the service executions in a complete sandboxed environment. The calculated cycles assist in developing the blueprint signature for the particular OBU of the vehicle. Hence, the fingerprint signature helps build trust and plays a key role in authenticating the vehicle's horizontal movement to everything or to different sections of the HEs. In an environment enabled for fog computing, our novel model can provide efficient remote monitoring. |
---|---|
AbstractList | The security and privacy of healthcare enterprises (HEs) are crucial because they maintain sensitive information. Because of the unique functional requirement of omni-inclusiveness, HEs are expected to monitor patients, allowing for connectivity with vehicular ad hoc networks (VANETs). In the absence of literature on security provisioning frameworks that connect VANETs and HEs, this paper presents a smart zero-knowledge proof and statistical fingerprinting-based trusted secure communication framework for a fog computing environment. A zero-knowledge proof is used for vehicle authentication, and statistical fingerprinting is employed to secure communication between VANETs and HEs. Authenticity verification of the operations is performed at the on-board unit (OBU) fitted in the vehicle based on the service executions at the resident hardware platform. The processor clock cycles are acquired from the service executions in a complete sandboxed environment. The calculated cycles assist in developing the blueprint signature for the particular OBU of the vehicle. Hence, the fingerprint signature helps build trust and plays a key role in authenticating the vehicle’s horizontal movement to everything or to different sections of the HEs. In an environment enabled for fog computing, our novel model can provide efficient remote monitoring. |
Author | Saleem, Kashif Zeeshan, Hafiz Maher Ali Al-Muhtadi, Jalal Alazab, Mamoun Chaudhry, Junaid Ahsenali Rodrigues, Joel J. P. C. |
Author_xml | – sequence: 1 givenname: Junaid Ahsenali surname: Chaudhry fullname: Chaudhry, Junaid Ahsenali email: junaid@duja.com.au organization: Duja Inc., Perth, WA, Australia – sequence: 2 givenname: Kashif orcidid: 0000-0001-8062-3301 surname: Saleem fullname: Saleem, Kashif email: ksaleem@ksu.edu.sa organization: Center of Excellence in Information Assurance (CoEIA), King Saud University, Riyadh, Saudi Arabia – sequence: 3 givenname: Mamoun orcidid: 0000-0002-1928-3704 surname: Alazab fullname: Alazab, Mamoun email: alazab.m@ieee.org organization: College of Engineering, IT and Environment, Charles Darwin University, Casuarina, NT, Australia – sequence: 4 givenname: Hafiz Maher Ali surname: Zeeshan fullname: Zeeshan, Hafiz Maher Ali email: hmaherali@gmail.com organization: Department of Pharmacology, Chonbuk National University, Jeonju, South Korea – sequence: 5 givenname: Jalal orcidid: 0000-0003-0246-2148 surname: Al-Muhtadi fullname: Al-Muhtadi, Jalal email: jalal@ksu.edu.sa organization: Center of Excellence in Information Assurance (CoEIA), King Saud University, Riyadh, Saudi Arabia – sequence: 6 givenname: Joel J. P. C. orcidid: 0000-0001-8657-3800 surname: Rodrigues fullname: Rodrigues, Joel J. P. C. email: joeljr@ieee.org organization: Center of Excellence in Information Assurance (CoEIA), King Saud University, Riyadh, Saudi Arabia |
BookMark | eNp9UE1r2zAYFiOF9WM_oOwi2KU7OJUsybKPI0ubskILycroxbxWXscqjpTK8kbO_eOzl9LDDj29Dy_PB89zQibOOyTknLMp56y4XN2sltOUpXwqWJbJXH8gx1ypPGGMZ5MRpzIpmGIfyUnXPQ1fqTg_Ji_fIQJdoumDjXu6aoLvNw19xOCTH87_aXG9QXofvK8puDVdRoi2i9ZAS6-s22DYBevigKh19AEba1pMok8WCG1sDASk898Y9rEZORcP6eLXVzrz223vBpNovevOyFENbYefXu8p-Xk1X80Wye3d9c3s221ihCpikkmQWZ1rXq1hDUYAz2tRV8JorpgyVQqqQkh1XXPQTBeFLvI8lZLJSiiZM3FKvhx8d8E_99jF8sn3wQ2RZapExgRnmRhY_MAywXddwLocGm4h7EvOynHrcty6HLcuX7ceNPo_jbHxX7kYwLbvKj8flBYR35IKketMMPEXaqSPdw |
CODEN | ITISFG |
CitedBy_id | crossref_primary_10_1016_j_scs_2021_103311 crossref_primary_10_1016_j_dsm_2024_03_001 crossref_primary_10_1109_ACCESS_2023_3343405 crossref_primary_10_3390_cryptography8010007 crossref_primary_10_1016_j_comnet_2023_109643 crossref_primary_10_1016_j_avb_2021_101699 crossref_primary_10_1109_JIOT_2023_3280069 crossref_primary_10_1109_ACCESS_2023_3311515 crossref_primary_10_1109_TITS_2021_3127436 crossref_primary_10_3390_electronics12092143 |
Cites_doi | 10.1109/TBDATA.2017.2723570 10.1007/3-540-45664-3_10 10.1109/TVT.2017.2702388 10.1109/ACCESS.2018.2805919 10.1109/TVT.2019.2929741 10.1109/COMST.2015.2444095 10.1109/NTPE.2017.9778026 10.1177/1550147720912958 10.1109/ITNG.2015.56 10.1109/MCC.2017.9 10.1109/HealthCom.2015.7454499 10.1109/CCNC.2013.6488581 10.1016/j.compeleceng.2018.02.047 10.1109/ACCESS.2018.2841987 10.1109/MCC.2017.13 10.1002/dac.3225 10.1109/MVT.2017.2752798 10.1109/MNET.2016.7513863 10.1109/JIOT.2016.2645559 10.1016/j.scs.2020.102080 10.1109/ICCW.2018.8403559 10.1109/LCN.Workshops.2017.73 10.1109/GLOBECOM38437.2019.9013797 10.1017/S0960129516000104 10.1109/ACCESS.2017.2677520 10.14257/ijsia.2014.8.1.37 10.1016/j.future.2019.02.055 10.1145/1198255.1198257 10.1109/MCC.2017.28 10.1109/ICSPIS48135.2019.9045898 10.1109/ACCESS.2020.2991067 10.1109/TITB.2009.2016086 10.1109/CloudCom.2012.6427481 10.1109/COMST.2000.5340804 10.1109/MIC.2017.37 10.1155/2018/1728303 10.1109/HealthCom.2016.7749423 10.1109/CC.2017.7839768 10.1109/ACCESS.2016.2580623 10.1049/iet-ifs.2008.0127 10.1109/MCC.2017.27 10.1109/COMST.2020.2973314 10.1002/ett.4460080507 10.32604/cmc.2020.011732 10.1109/TNSM.2019.2939221 10.1109/TSMC.1985.6313355 10.1007/978-3-540-27809-2_10 10.1109/MCOM.2016.1600541CM 10.1109/ISMICT.2018.8573695 10.1007/978-3-642-34475-6_52 10.1109/MNET.2017.1600213NM 10.1109/ICC.2018.8422401 10.1109/PCCC.1989.37448 |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021 |
DBID | 97E RIA RIE AAYXX CITATION 7SC 7SP 8FD FR3 JQ2 KR7 L7M L~C L~D |
DOI | 10.1109/TITS.2021.3066487 |
DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database Engineering Research Database ProQuest Computer Science Collection Civil Engineering Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | CrossRef Civil Engineering Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Engineering Research Database Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Civil Engineering Abstracts |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 1558-0016 |
EndPage | 3879 |
ExternalDocumentID | 10_1109_TITS_2021_3066487 9387630 |
Genre | orig-research |
GrantInformation_xml | – fundername: EU funds grantid: UIDB/50008/2020 – fundername: Deanship of Scientific Research at King Saud University through the Research Group grantid: RG-1439-022 funderid: 10.13039/501100011665 – fundername: Fundação para a Ciência e Tecnologia (FCT)/Ministério da Ciência, Tecnologia e ensino Superior (MCTES) through the National Funds funderid: 10.13039/501100001871 – fundername: Brazilian National Council for Research and Development (CNPq) grantid: 313036/2020-9 funderid: 10.13039/501100003593 |
GroupedDBID | -~X 0R~ 29I 4.4 5GY 5VS 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACGFO ACGFS ACIWK ACNCT AENEX AETIX AGQYO AGSQL AHBIQ AIBXA AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 EBS EJD HZ~ H~9 IFIPE IPLJI JAVBF LAI M43 O9- OCL P2P PQQKQ RIA RIE RNS ZY4 AAYXX CITATION RIG 7SC 7SP 8FD FR3 JQ2 KR7 L7M L~C L~D |
ID | FETCH-LOGICAL-c359t-64a46f871bdadac3a18f3fb3c71505cb2a5bea27ff1a70799798824404b354803 |
IEDL.DBID | RIE |
ISSN | 1524-9050 |
IngestDate | Sun Jun 29 13:21:15 EDT 2025 Tue Jul 01 04:29:06 EDT 2025 Thu Apr 24 23:01:24 EDT 2025 Wed Aug 27 02:29:54 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 6 |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c359t-64a46f871bdadac3a18f3fb3c71505cb2a5bea27ff1a70799798824404b354803 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0002-1928-3704 0000-0001-8062-3301 0000-0001-8657-3800 0000-0003-0246-2148 |
PQID | 2536031063 |
PQPubID | 75735 |
PageCount | 11 |
ParticipantIDs | ieee_primary_9387630 crossref_primary_10_1109_TITS_2021_3066487 proquest_journals_2536031063 crossref_citationtrail_10_1109_TITS_2021_3066487 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2021-06-01 |
PublicationDateYYYYMMDD | 2021-06-01 |
PublicationDate_xml | – month: 06 year: 2021 text: 2021-06-01 day: 01 |
PublicationDecade | 2020 |
PublicationPlace | New York |
PublicationPlace_xml | – name: New York |
PublicationTitle | IEEE transactions on intelligent transportation systems |
PublicationTitleAbbrev | TITS |
PublicationYear | 2021 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref57 ref13 ref56 ref12 ref59 ref15 ref58 ref14 ref53 ref52 ref55 ref11 ref54 ref10 box (ref38) 2015 ref17 ref16 ref19 ref18 chaudhry (ref4) 2017 williams (ref7) 2020 khader (ref24) 2012 ref51 ref50 ref46 ref45 ref48 ref47 ref42 ref41 ref44 ref43 fischer (ref36) 2019 ref49 ref8 ref9 ref6 ref5 ref40 o’gorman (ref3) 2019 ref35 ref34 ref37 secutity (ref1) 2016 ref31 ref30 ref33 ref32 ref2 ref39 ref23 ref26 ref25 ref20 ref22 chaudhry (ref60) 2017 ref21 ref28 ref27 ref29 |
References_xml | – ident: ref32 doi: 10.1109/TBDATA.2017.2723570 – ident: ref22 doi: 10.1007/3-540-45664-3_10 – year: 2019 ident: ref3 article-title: Internet security threat report – ident: ref11 doi: 10.1109/TVT.2017.2702388 – ident: ref29 doi: 10.1109/ACCESS.2018.2805919 – ident: ref9 doi: 10.1109/TVT.2019.2929741 – ident: ref44 doi: 10.1109/COMST.2015.2444095 – year: 2017 ident: ref4 article-title: Internet of threats and context aware security: Part two doi: 10.1109/NTPE.2017.9778026 – ident: ref17 doi: 10.1177/1550147720912958 – ident: ref19 doi: 10.1109/ITNG.2015.56 – ident: ref48 doi: 10.1109/MCC.2017.9 – year: 2015 ident: ref38 publication-title: Time Series Analysis Forecasting and Control – start-page: 549 year: 2020 ident: ref7 publication-title: Beyond 2000 The Rise of Australian Cyber Warfare Capability – ident: ref20 doi: 10.1109/HealthCom.2015.7454499 – ident: ref27 doi: 10.1109/CCNC.2013.6488581 – ident: ref2 doi: 10.1016/j.compeleceng.2018.02.047 – ident: ref6 doi: 10.1109/ACCESS.2018.2841987 – ident: ref51 doi: 10.1109/MCC.2017.13 – ident: ref15 doi: 10.1002/dac.3225 – ident: ref37 doi: 10.1109/MVT.2017.2752798 – ident: ref50 doi: 10.1109/MNET.2016.7513863 – ident: ref52 doi: 10.1109/JIOT.2016.2645559 – ident: ref56 doi: 10.1016/j.scs.2020.102080 – ident: ref31 doi: 10.1109/ICCW.2018.8403559 – ident: ref26 doi: 10.1109/LCN.Workshops.2017.73 – ident: ref58 doi: 10.1109/GLOBECOM38437.2019.9013797 – start-page: 1 year: 2019 ident: ref36 article-title: IEEE PHD cybersecurity standards roadmap publication-title: Proc IEEE PHD CyberSecur Standards Roadmap – ident: ref59 doi: 10.1017/S0960129516000104 – ident: ref53 doi: 10.1109/ACCESS.2017.2677520 – start-page: 285 year: 2012 ident: ref24 article-title: A fair and robust voting system by broadcast publication-title: Proc Gesellschaft Inf – ident: ref18 doi: 10.14257/ijsia.2014.8.1.37 – ident: ref40 doi: 10.1016/j.future.2019.02.055 – ident: ref34 doi: 10.1145/1198255.1198257 – ident: ref54 doi: 10.1109/MCC.2017.28 – ident: ref28 doi: 10.1109/ICSPIS48135.2019.9045898 – ident: ref57 doi: 10.1109/ACCESS.2020.2991067 – ident: ref5 doi: 10.1109/TITB.2009.2016086 – ident: ref10 doi: 10.1109/CloudCom.2012.6427481 – ident: ref25 doi: 10.1109/COMST.2000.5340804 – ident: ref46 doi: 10.1109/MIC.2017.37 – ident: ref30 doi: 10.1155/2018/1728303 – ident: ref12 doi: 10.1109/HealthCom.2016.7749423 – ident: ref47 doi: 10.1109/CC.2017.7839768 – ident: ref41 doi: 10.1109/ACCESS.2016.2580623 – ident: ref23 doi: 10.1049/iet-ifs.2008.0127 – ident: ref42 doi: 10.1109/MCC.2017.27 – ident: ref43 doi: 10.1109/COMST.2020.2973314 – ident: ref35 doi: 10.1002/ett.4460080507 – ident: ref8 doi: 10.32604/cmc.2020.011732 – ident: ref49 doi: 10.1109/TNSM.2019.2939221 – ident: ref16 doi: 10.1109/TSMC.1985.6313355 – ident: ref21 doi: 10.1007/978-3-540-27809-2_10 – ident: ref39 doi: 10.1109/MCOM.2016.1600541CM – ident: ref14 doi: 10.1109/ISMICT.2018.8573695 – ident: ref13 doi: 10.1007/978-3-642-34475-6_52 – ident: ref45 doi: 10.1109/MNET.2017.1600213NM – ident: ref55 doi: 10.1109/ICC.2018.8422401 – ident: ref33 doi: 10.1109/PCCC.1989.37448 – year: 2016 ident: ref1 article-title: Healthcare and public health sector-specific plan – start-page: 220 year: 2017 ident: ref60 article-title: Discovering trends for the development of novel authentication applications for dementia patients publication-title: Proc Int Conf Appl Techn Cyber Secur Intell |
SSID | ssj0014511 |
Score | 2.3806348 |
Snippet | The security and privacy of healthcare enterprises (HEs) are crucial because they maintain sensitive information. Because of the unique functional requirement... |
SourceID | proquest crossref ieee |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 3869 |
SubjectTerms | Authentication Biomedical imaging Cloud computing critical infrastructure Cybersecurity Data privacy Fingerprinting fog computing Health care Industries information systems IP networks Medical services Microprocessors Mobile ad hoc networks Provisioning Remote monitoring Security |
Title | Data Security Through Zero-Knowledge Proof and Statistical Fingerprinting in Vehicle-to-Healthcare Everything (V2HX) Communications |
URI | https://ieeexplore.ieee.org/document/9387630 https://www.proquest.com/docview/2536031063 |
Volume | 22 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV27TsMwFLVKJxh4FUShIA8MgHBJ4rhJRgStCgiE1IcqlshObIFACWrTAVZ-HF_nofIQYsvgOJauHZ9zfXwuQodUedL3pUVYzBVxfZcTXwaKMAC_zKc8EEZtcdfpj9zrCZvU0Gl1F0ZKacRnsg2P5iw_TqM5pMrOAgr-aZqgL2nilt_Vqk4MwGfLeKM6LgksVp5g2lZwNrwaDjQTdOy2xscdF9RzC3uQKary409stpfeGrotB5arSp7b80y0o_dvno3_Hfk6Wi1wJj7PJ8YGqslkE60suA820MclzzgeFAXs8DCv2IMf5DQlN2WqDd9raK0wT2IMuNTYOut-eyYbCElBkE3jpwSP5SN8iWQp6VeaMtzVK-UtgywXPho7_ckx_nIjZbaFRr3u8KJPipoMJKIsyEjH5W5HaZYlYh7ziHLbV1QJGnkaWbJIOJwJyR1PKZuD-V4AfmgOmBAKCtZydBvVkzSROwgLjS49X6rI0hzQjl0B3IsrxaWje1ZeE1lllMKoMCyHuhkvoSEuVhBCYEMIbFgEtolOqldec7eOvxo3IFBVwyJGTdQqp0JYrOdZ6DAK5bg1ntv9_a09tAx95yKyFqpn07nc13AlEwdmnn4Cofnn4Q |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT9wwEB4hegAOlKfYFooPHArCS2LHm-SIKKssC6gSAa24RHZiqxVVtoLsob32j9fjPMRLiFsOfkkzjr8Zf_4GYI-bUEeR9qgopKFBFEga6dhQgeBXRFzGyrEtLgfJdXA2EZM5OOzewmitHflM9_HT3eUX03yGqbKjmKN-mg3QP9hzX7D6tVZ3Z4BKW04dlQU09kR7h-l78VE6Sq9sLMj8vkXIgwD5c49OIVdW5cW_2B0ww49w0S6t5pXc9WeV6ud_n6k2vnftK7DcIE1yXLvGKszpcg2WHukPrsO_b7KS5KopYUfSumYPudX3Uzpuk23kuwXXhsiyIIhMnbCzHXfo8oGYFkTiNPlZkhv9A2ei1ZQmHauMnNq98qfCPBf5esOSyT558iblYQOuh6fpSUKbqgw05yKu6CCQwcDYOEsVspA5l35kuFE8Dy22FLliUigtWWiML1F-L0ZFNIYyhIqjuBzfhPlyWuotIMriyzDSJvdsFOgXgcLoSxojNbMjm7AHXmulLG8ky7Fyxq_MhS5enKFhMzRs1hi2Bwddl9-1XsdbjdfRUF3DxkY92G5dIWt29EPGBMeC3BbRfXq91y4sJOnFeXY-uhx_hkWcp6aUbcN8dT_TOxa8VOqL89n_4aLrKw |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Data+Security+Through+Zero-Knowledge+Proof+and+Statistical+Fingerprinting+in+Vehicle-to-Healthcare+Everything+%28V2HX%29+Communications&rft.jtitle=IEEE+transactions+on+intelligent+transportation+systems&rft.au=Chaudhry%2C+Junaid+Ahsenali&rft.au=Saleem%2C+Kashif&rft.au=Alazab%2C+Mamoun&rft.au=Zeeshan%2C+Hafiz+Maher+Ali&rft.date=2021-06-01&rft.pub=IEEE&rft.issn=1524-9050&rft.volume=22&rft.issue=6&rft.spage=3869&rft.epage=3879&rft_id=info:doi/10.1109%2FTITS.2021.3066487&rft.externalDocID=9387630 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1524-9050&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1524-9050&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1524-9050&client=summon |