Skip to main content

Applying Advanced Wireless Network Cluster-Tree Topology to Optimize Covid-19 Sanitary Passport Blockchain-Based Security in a Constrained IoT Platform

  • Chapter
  • First Online:
Advances in Blockchain Technology for Cyber Physical Systems

Part of the book series: Internet of Things ((ITTCC))

Abstract

Our work revolves around creating and developing a medical platform that acts on the citizen’s right to access a public space by differentiating between vaccinated and those who have done the PCR test to avoid the fast spread of the covid-19 virus.

In this scope, three algorithms were applied to complete this platform: the first one serves to verify the citizens who are vaccinated, the second allows to see and check the validity of the PCR test for people who are not vaccinated, and, finally, the third algorithm serves to check the temperature and the identity of citizens. This last algorithm is applied when the citizen is not vaccinated or does not have the PCR test. For this project, we used four IoT nodes to run our platform in real time: a Passive infrared (PIR) client node, a temperature sensor, a RFID tag, and a camera client node. We also used artificial intelligence for facial recognition, which will allow us to verify the citizen’s identity. We applied the Constrained Application Protocol to ensure a fluid communication between the platform’s nodes, the integrity, and the confidentiality of the data shared. We secured payloads with two encryption algorithms which are Advanced Encryption Standard (AES)-Secure Hash Algorithm (SHA) 256-bit and Rivest Shamir Adleman (RSA)-SHA256.

The security of the database’s information is also an important aspect; thus, the use of the AT2 blockchain will allow us to strengthen the security of the database against any network attack. As for the network topology, we have opted for the cluster-tree topology, and that is after a study that showed us it is the best in terms of execution time, memory occupation, and energy consumption and even for the reliability of the communication.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 179.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 179.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. B. Dorsemaine, J. Gaulier, J. Wary, N. Kheir, P. Urien, Internet of things: A definition & taxonomy, in 2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies, (2015), pp. 72–77. https://doi.org/10.1109/NGMAST.2015.71

    Chapter  Google Scholar 

  2. Towards an optimized blockchain for IoT, in 2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI), pp. 173–178

  3. M. Daniel, O. Benedict, Blockchain mechanisms for IoT security. Internet Things 1–2, 1–13 (2018). https://doi.org/10.1016/j.iot.2018.05.002

    Article  Google Scholar 

  4. R. Guerraoui, P. Kuznetsov, M. Monti, M. Pavlovic, D. Seredinschi, AT2: Asynchronous Trustworthy Transfers (2019)

    Google Scholar 

  5. Z. Wen et al., Blockchain-empowered contact tracing for COVID-19 using crypto-spatiotemporal information, in 2020 IEEE International Conference on E-health Networking, Application & Services (HEALTHCOM), (2021), pp. 1–6. https://doi.org/10.1109/HEALTHCOM49281.2021.9398978

    Chapter  Google Scholar 

  6. S. Tanwar, R. Gupta, M.M. Patel, A. Shukla, G. Sharma, I.E. Davidson, Blockchain and AI-empowered social distancing scheme to combat COVID-19 situations. IEEE Access 9, 129830–129840 (2021). https://doi.org/10.1109/ACCESS.2021.3114098

    Article  Google Scholar 

  7. M. Kaur, M. Murtaza, M. Habbal, Post study of Blockchain in smart health environment, in 2020 5th International Conference on Innovative Technologies in Intelligent Systems and Industrial Applications (CITISIA), (2020), pp. 1–4. https://doi.org/10.1109/CITISIA50690.200.9371819

    Chapter  Google Scholar 

  8. L.-Y. Hou, T.-Y. Tang, T.-Y Liang, IOTA-BT: A P2P file-sharing system based on IOTA. J. MDPI Electronics (2020)

    Google Scholar 

  9. L. Wang, J. Kangasharju, Real-world Sybil attacks in BitTorrent mainline DHT, in Proceedings of the 2012 IEEE Global Communications Conference (GLOBECOM) Anaheim, CA, USA, p. 2012

    Google Scholar 

  10. M.S. Ali, K. Dolui, F. Antonelli, IoT data privacy via blockchains and IPFS, in Proceedings of the 7th International Conference on the Internet of Things, Linz, Austria, (2017), p. 14

    Google Scholar 

  11. L. Balduf, S. Henningsen, M. Florian, Monitoring Data Requests in Decentralized Data Storage Systems: A Case Study of IPFS, arXiv:2104.09202 (2021)

    Google Scholar 

  12. S.S. Prayogo, Y. Mukhlis, B.K. Yakti, The use and performance of MQTT and CoAP as internet of things application protocol using NodeMCU ESP8266, in 2019 Fourth International Conference on Informatics and Computing (ICIC), (2019). https://doi.org/10.1109/icic47613.2019.8985850

    Chapter  Google Scholar 

  13. S. El Aidi, A. Bajit, A. Barodi, H. Chaoui, A. Tamtaoui, An advanced encryption cryptographically-based securing applicative protocols MQTT and CoAP to optimize medical-IOT supervising platforms. Lect. Notes Data Eng. Commun. Technol. 72, 111–121 (2021)

    Article  Google Scholar 

  14. E.M. Fdil, M. El Haidi, A. Bajit, S. El Aidi, A. Barodi, A. Tamtaoui, An new constrained protocol S-CoAP applied to optimize COVID-19 medical IOT intelligent and security-based DATA supervising platform, in 2020 International Symposium on Advanced Electrical and Communication Technologies (ISAECT), (2020), pp. 1–6. https://doi.org/10.1109/ISAECT50560.2020.9523711

    Chapter  Google Scholar 

  15. A. Rhbech, H. Lotfi, A. Bajit, A. Barodi, S. El Aidi, A. Tamtaoui, An optimized and intelligent security-based message queuing protocol S-MQTT applied to medical IOT COVID-19 DATA monitoring platforms, in 2020 International Symposium on Advanced Electrical and Communication Technologies (ISAECT), (2020), pp. 1–6. https://doi.org/10.1109/ISAECT50560.2020.9523678

    Chapter  Google Scholar 

  16. A. Cilardo, L. Coppolino, N. Mazzocca, L. Romano, Elliptic curve cryptography engineering. Proc. IEEE 94(2), 395–406 (2006). https://doi.org/10.1109/JPROC.2005.862438

    Article  Google Scholar 

  17. D. Mahto, D.K. Yadav, RSA and ECC: A comparative analysis. Int. J. Appl. Eng. Res. 12(19), 9053–9061 (2017)

    Google Scholar 

  18. C. Arun, B. Hedayath, D. Sivakumar, M. Rizwan, M. Kumar, Communication Engineering, Secured Image Transmission Using Elliptic Curve Cryptography (ECC) (2020). https://doi.org/10.37896/jxu14.5/400

    Book  Google Scholar 

  19. A. Kajal, G. Badolia, Enhanced cloud storage security using ECC-AES a. Hybrid Approach. 4. 5, 10.18231/2454-9150.2018.0593 (2018)

    Google Scholar 

  20. J. Li, R. Chen, J. Su, X. Huang, X. Wang, ME-TLS: Middlebox-enhanced TLS for internet-of-things devices. IEEE Internet Things J. 1–1 (2019). https://doi.org/10.1109/jiot.2019.2953715

  21. http://www.steves-internet-guide.com/mosquitto-tls/, Access on July 21, 2021

  22. H.M. Kelagadi, P. Kumar, A cluster-tree based topology control for wireless sensor network, in 2018 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT), (2018), pp. 643–649. https://doi.org/10.1109/ICEECCOT43722.2018.9001417

    Chapter  Google Scholar 

  23. M. Ouadou et al., Improved cluster-tree topology adapted for indoor environment in Zigbee sensor network. Proced. Comput. Sci. 94, 272–279 (2016)

    Article  Google Scholar 

  24. S.R. Lee, J. Back, J. Oh, M. Jeong, A mesh topology formation scheme for IEEE 802.15.4 based wireless sensor networks, in 2015 Seventh International Conference on Ubiquitous and Future Networks, (2015), pp. 150–152. https://doi.org/10.1109/ICUFN.2015.7182523

    Chapter  Google Scholar 

  25. K. Kosek, M. Natkaniec, L. Vollero, A.R. Pach, An analysis of star topology IEEE 802.11e networks in the presence of hidden nodes, in 2008 International Conference on Information Networking, (2008), pp. 1–5. https://doi.org/10.1109/ICOIN.2008.4472755

    Chapter  Google Scholar 

  26. K. Keyur, M. Sunil, Internet of Things-IOT: Definition, Characteristics, Architecture, Enabling Technologies, Application & Future Challenges (2016)

    Google Scholar 

  27. Ovidiu Vermesan SINTEF, Norway, Dr. Peter Friess EU, Belgium, in Internet of Things: Converging Technologies for Smart Environments and Integrated Ecosystems, river publishers’ series in communications (2013)

    Google Scholar 

  28. V. Lampkin et al., Building smarter planet solutions with MQTT and IBM WebSphere MQ telemetry IBM. O (2012)

    Google Scholar 

  29. G. Rachid, K. Petr, M. Matteo, P. Matej, S. Dragos-Adrian, AT2: Asynchronous Trustworthy Transfers. arXiv preprint arXiv:1812.10844 (2018)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

El Aidi, S., Hamza, F.Z., Beloualid, S., Bajit, A., Chaoui, H., Tamtaoui, A. (2022). Applying Advanced Wireless Network Cluster-Tree Topology to Optimize Covid-19 Sanitary Passport Blockchain-Based Security in a Constrained IoT Platform. In: Maleh, Y., Tawalbeh, L., Motahhir, S., Hafid, A.S. (eds) Advances in Blockchain Technology for Cyber Physical Systems. Internet of Things. Springer, Cham. https://doi.org/10.1007/978-3-030-93646-4_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-93646-4_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-93645-7

  • Online ISBN: 978-3-030-93646-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics