ABSTRACT

An Internet of Things (IoT)-based healthcare monitoring system is an amalgamation of smart healthcare devices and applications which connect to the healthcare information system through the internet. It has opened up a world of possibilities in the medical field. Connected smart healthcare devices can collect important healthcare data and provide extra details about the symptoms. That further enables remote care as the patient can consult the appropriate healthcare expert. It generally provides patients more control over their lives and treatment. Moreover, a blockchain-enabled IoT-based healthcare monitoring system (BIoT-HMS) is one step ahead as it can reduce unnecessary hospital visits and the burden on healthcare systems by connecting patients to their healthcare experts and allowing the secure transfer and storage of healthcare data by making use of the blockchain mechanism. Some of the possible applications of BIoT-HMS are “remote health monitoring,” “management of healthcare operations,” “detection and prevention of diseases” and many more. However, IoT-based healthcare monitoring systems have issues related to security breaches and privacy of healthcare data. Therefore, it is essential to design some security protocols for IoT-based healthcare monitoring systems. From time to time researchers propose different protocols to secure the data of IoT-based healthcare monitoring systems. However, most of them are vulnerable to various types of attack like, replay, MiTM, impersonation, secret credentials leakage, unauthorized data update, etc., Therefore, researchers came up with the idea of inclusion of blockchain-enabled security in the IoT-based healthcare monitoring system, which further can be considered as a blockchain-enabled IoT-based healthcare monitoring system (BIoT-HMS). In this chapter, we provide the details of various possible architectures of BIoT-HMS. We also provide the details of various threats and attacks along with the threat model in BIoT-HMS. The security requirements and applications of BIoT-HMS are also discussed. We then provide the summary of various existing security protocols related to BIoT-HMS. The comparison of “security and functionality features” of security protocols related to BIoT-HMS is also provided.