Abstract
Our work revolves around creating and developing a medical platform that acts on the citizen’s right to access a public space by differentiating between vaccinated and those who have done the PCR test to avoid the fast spread of the covid-19 virus.
In this scope, three algorithms were applied to complete this platform: the first one serves to verify the citizens who are vaccinated, the second allows to see and check the validity of the PCR test for people who are not vaccinated, and, finally, the third algorithm serves to check the temperature and the identity of citizens. This last algorithm is applied when the citizen is not vaccinated or does not have the PCR test. For this project, we used four IoT nodes to run our platform in real time: a Passive infrared (PIR) client node, a temperature sensor, a RFID tag, and a camera client node. We also used artificial intelligence for facial recognition, which will allow us to verify the citizen’s identity. We applied the Constrained Application Protocol to ensure a fluid communication between the platform’s nodes, the integrity, and the confidentiality of the data shared. We secured payloads with two encryption algorithms which are Advanced Encryption Standard (AES)-Secure Hash Algorithm (SHA) 256-bit and Rivest Shamir Adleman (RSA)-SHA256.
The security of the database’s information is also an important aspect; thus, the use of the AT2 blockchain will allow us to strengthen the security of the database against any network attack. As for the network topology, we have opted for the cluster-tree topology, and that is after a study that showed us it is the best in terms of execution time, memory occupation, and energy consumption and even for the reliability of the communication.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
B. Dorsemaine, J. Gaulier, J. Wary, N. Kheir, P. Urien, Internet of things: A definition & taxonomy, in 2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies, (2015), pp. 72–77. https://doi.org/10.1109/NGMAST.2015.71
M. Daniel, O. Benedict, Blockchain mechanisms for IoT security. Internet Things 1–2, 1–13 (2018). https://doi.org/10.1016/j.iot.2018.05.002
R. Guerraoui, P. Kuznetsov, M. Monti, M. Pavlovic, D. Seredinschi, AT2: Asynchronous Trustworthy Transfers (2019)
Z. Wen et al., Blockchain-empowered contact tracing for COVID-19 using crypto-spatiotemporal information, in 2020 IEEE International Conference on E-health Networking, Application & Services (HEALTHCOM), (2021), pp. 1–6. https://doi.org/10.1109/HEALTHCOM49281.2021.9398978
S. Tanwar, R. Gupta, M.M. Patel, A. Shukla, G. Sharma, I.E. Davidson, Blockchain and AI-empowered social distancing scheme to combat COVID-19 situations. IEEE Access 9, 129830–129840 (2021). https://doi.org/10.1109/ACCESS.2021.3114098
M. Kaur, M. Murtaza, M. Habbal, Post study of Blockchain in smart health environment, in 2020 5th International Conference on Innovative Technologies in Intelligent Systems and Industrial Applications (CITISIA), (2020), pp. 1–4. https://doi.org/10.1109/CITISIA50690.200.9371819
L.-Y. Hou, T.-Y. Tang, T.-Y Liang, IOTA-BT: A P2P file-sharing system based on IOTA. J. MDPI Electronics (2020)
L. Wang, J. Kangasharju, Real-world Sybil attacks in BitTorrent mainline DHT, in Proceedings of the 2012 IEEE Global Communications Conference (GLOBECOM) Anaheim, CA, USA, p. 2012
M.S. Ali, K. Dolui, F. Antonelli, IoT data privacy via blockchains and IPFS, in Proceedings of the 7th International Conference on the Internet of Things, Linz, Austria, (2017), p. 14
L. Balduf, S. Henningsen, M. Florian, Monitoring Data Requests in Decentralized Data Storage Systems: A Case Study of IPFS, arXiv:2104.09202 (2021)
S.S. Prayogo, Y. Mukhlis, B.K. Yakti, The use and performance of MQTT and CoAP as internet of things application protocol using NodeMCU ESP8266, in 2019 Fourth International Conference on Informatics and Computing (ICIC), (2019). https://doi.org/10.1109/icic47613.2019.8985850
S. El Aidi, A. Bajit, A. Barodi, H. Chaoui, A. Tamtaoui, An advanced encryption cryptographically-based securing applicative protocols MQTT and CoAP to optimize medical-IOT supervising platforms. Lect. Notes Data Eng. Commun. Technol. 72, 111–121 (2021)
E.M. Fdil, M. El Haidi, A. Bajit, S. El Aidi, A. Barodi, A. Tamtaoui, An new constrained protocol S-CoAP applied to optimize COVID-19 medical IOT intelligent and security-based DATA supervising platform, in 2020 International Symposium on Advanced Electrical and Communication Technologies (ISAECT), (2020), pp. 1–6. https://doi.org/10.1109/ISAECT50560.2020.9523711
A. Rhbech, H. Lotfi, A. Bajit, A. Barodi, S. El Aidi, A. Tamtaoui, An optimized and intelligent security-based message queuing protocol S-MQTT applied to medical IOT COVID-19 DATA monitoring platforms, in 2020 International Symposium on Advanced Electrical and Communication Technologies (ISAECT), (2020), pp. 1–6. https://doi.org/10.1109/ISAECT50560.2020.9523678
A. Cilardo, L. Coppolino, N. Mazzocca, L. Romano, Elliptic curve cryptography engineering. Proc. IEEE 94(2), 395–406 (2006). https://doi.org/10.1109/JPROC.2005.862438
D. Mahto, D.K. Yadav, RSA and ECC: A comparative analysis. Int. J. Appl. Eng. Res. 12(19), 9053–9061 (2017)
C. Arun, B. Hedayath, D. Sivakumar, M. Rizwan, M. Kumar, Communication Engineering, Secured Image Transmission Using Elliptic Curve Cryptography (ECC) (2020). https://doi.org/10.37896/jxu14.5/400
A. Kajal, G. Badolia, Enhanced cloud storage security using ECC-AES a. Hybrid Approach. 4. 5, 10.18231/2454-9150.2018.0593 (2018)
J. Li, R. Chen, J. Su, X. Huang, X. Wang, ME-TLS: Middlebox-enhanced TLS for internet-of-things devices. IEEE Internet Things J. 1–1 (2019). https://doi.org/10.1109/jiot.2019.2953715
http://www.steves-internet-guide.com/mosquitto-tls/, Access on July 21, 2021
H.M. Kelagadi, P. Kumar, A cluster-tree based topology control for wireless sensor network, in 2018 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT), (2018), pp. 643–649. https://doi.org/10.1109/ICEECCOT43722.2018.9001417
M. Ouadou et al., Improved cluster-tree topology adapted for indoor environment in Zigbee sensor network. Proced. Comput. Sci. 94, 272–279 (2016)
S.R. Lee, J. Back, J. Oh, M. Jeong, A mesh topology formation scheme for IEEE 802.15.4 based wireless sensor networks, in 2015 Seventh International Conference on Ubiquitous and Future Networks, (2015), pp. 150–152. https://doi.org/10.1109/ICUFN.2015.7182523
K. Kosek, M. Natkaniec, L. Vollero, A.R. Pach, An analysis of star topology IEEE 802.11e networks in the presence of hidden nodes, in 2008 International Conference on Information Networking, (2008), pp. 1–5. https://doi.org/10.1109/ICOIN.2008.4472755
K. Keyur, M. Sunil, Internet of Things-IOT: Definition, Characteristics, Architecture, Enabling Technologies, Application & Future Challenges (2016)
Ovidiu Vermesan SINTEF, Norway, Dr. Peter Friess EU, Belgium, in Internet of Things: Converging Technologies for Smart Environments and Integrated Ecosystems, river publishers’ series in communications (2013)
V. Lampkin et al., Building smarter planet solutions with MQTT and IBM WebSphere MQ telemetry IBM. O (2012)
G. Rachid, K. Petr, M. Matteo, P. Matej, S. Dragos-Adrian, AT2: Asynchronous Trustworthy Transfers. arXiv preprint arXiv:1812.10844 (2018)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
El Aidi, S., Hamza, F.Z., Beloualid, S., Bajit, A., Chaoui, H., Tamtaoui, A. (2022). Applying Advanced Wireless Network Cluster-Tree Topology to Optimize Covid-19 Sanitary Passport Blockchain-Based Security in a Constrained IoT Platform. In: Maleh, Y., Tawalbeh, L., Motahhir, S., Hafid, A.S. (eds) Advances in Blockchain Technology for Cyber Physical Systems. Internet of Things. Springer, Cham. https://doi.org/10.1007/978-3-030-93646-4_15
Download citation
DOI: https://doi.org/10.1007/978-3-030-93646-4_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-93645-7
Online ISBN: 978-3-030-93646-4
eBook Packages: Computer ScienceComputer Science (R0)