Skip to main content

Advertisement

Log in

Design and Development of Consensus Activation Function Enabled Neural Network-Based Smart Healthcare Using BIoT

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

In the healthcare region, Internet of Things (IoT) plays a major role in various fields and is developed as a common technique. An enormous amount of data is collected from various sensing equipment owing to the increasing demand for IoT. There occur a few challenges in the designing and developing of analyzing the huge amount of data resource limitations, absence of suitable training data, centralized architecture, privacy, and security. These issues are resolved by incorporating blockchain technology, they provide a decentralized mechanism and also ensure safe transmission of data. Blockchain technology majorly assists the caretaker to reveal the encrypted genetic codes by ensuring the security level for secure data transfer and enabling the secure transmission of patient electronic health records. The smart doctor has the accessibility to decrypt the data which is in encrypted form and after verifying the condition of the patient, the report is securely transmitted to the hospital cloud with the same encryption process. Only the relevant features are selected and are delivered to the optimized neural network with the consensus activation function. The neural network classifier performance is enhanced by the utilization of smart echolocation optimization in the developed method. The consensus activation function majorly helps to capture only the significant features for further training the model and which improves the classification accuracy. The trained model is compared with the test data to predict the disease affected the patient in the n number of hospitals.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Agyekum, K. O. B. O., Xia, Q., Sifah, E. B., Cobblah, C. N. A., Xia, H., Gao, J. (2021). A proxy re-encryption approach to secure data sharing in the internet of things based on blockchain. IEEE Systems Journal.

  2. Gu, L., Wang, J., & Sun, B. (2014). Trust management mechanism for Internet of Things. China Communications, 11(2), 148–156.

    Article  Google Scholar 

  3. Pavithran, D., Al-Karaki, J. N., & Shaalan, K. (2021). Edge-based blockchain architecture for event-driven iot using hierarchical identity based encryption. Information Processing & Management, 58(3), 102528.

    Article  Google Scholar 

  4. Mishra, P., Puthal, D., Tiwary, M., & Mohanty, S. P. (2019). Software defined IoT systems: Properties, state of the art, and future research. IEEE Wireless Communication Magazine, 26(6), 64–71.

    Article  Google Scholar 

  5. Ray, P. P., Chowhan, B., Kumar, N., & Almogren, A. (2021). Biothr: Electronic health record servicing scheme in IoT-blockchain ecosystem. IEEE Internet of Things Journal, 8(13), 10857–10872.

    Article  Google Scholar 

  6. Veeramakali, T., Siva, R., Sivakumar, B., Senthil Mahesh, P. C., & Krishnaraj, N. (2021). An intelligent internet of things-based secure healthcare framework using blockchain technology with an optimal deep learning model. The Journal of Supercomputing, 77(9), 9576–9596.

    Article  Google Scholar 

  7. Puthal, D., & Mohanty, S. P. (2019). Proof of authentication: IoT-friendly blockchains. IEEE Potentials Mag., 38(1), 26–29.

    Article  Google Scholar 

  8. Gatteschi, V., Lamberti, F., Demartini, C., Pranteda, C., & Santamaría, C. (2018). To blockchain or not to blockchain: That is the question. IT Professional, 20(2), 62–74.

    Article  Google Scholar 

  9. Li, J., Ji, Y., Choo, K.-K.R., & Hogrefe, D. (2019). CL-CPPA: Certificate-less conditional privacy-preserving authentication protocol for the Internet of Vehicles. IEEE Internet of Things Journal, 6(6), 10332–10343.

    Article  Google Scholar 

  10. Ilyas, B., Kumar, A., Setitra, M. A., Bensalem, Z. A., Lei, H. (2023) Prevention of DDoS attacks using an optimized deep learning approach in blockchain technology. Transactions On Emerging Telecommunication and Technologies.

  11. Ilyas, B., Kumar, A., Bensalem, Z. E. A., Hang, L. (2023). Secure transmission of secret data using optimization based embedding techniques in Blockchain. Expert Systems with Applications, 211.

  12. Roy, S. S., Puthal, D., Sharma, S., Mohanty, S. P., & Zomaya, A. Y. (2018). Building a sustainable Internet of Things: Energy-efficient routing using low-power sensors will meet the need. IEEE Consumer Electronics Magazine, 7(2), 42–49.

    Article  Google Scholar 

  13. Lau, C. H., Alan, K.-H. Y., Yan, F. (2018). Blockchain-based authentication in IoT networks. In Proceedings of 2018 IEEE conference on dependable and secure computing, DSC, IEEE, pp. 1–8.

  14. Vishwakarma, L., & Das, D. (2021). SCAB-IoTA: Secure communication and authentication for IoT applications using blockchain. Journal of Parallel and Distributed Computing, 154, 94–105.

    Article  Google Scholar 

  15. Shukla, S., Thakur, S., Hussain, S., Breslin, J. G., & Jameel, S. M. (2021). Identification and authentication in healthcare internet-of-things using integrated fog computing based blockchain model. Internet of Things, 15, 100422.

    Article  Google Scholar 

  16. Narayanan, U., Paul, V., & Joseph, S. (2022). Decentralized blockchain based authentication for secure data sharing in Cloud-IoT. Journal of Ambient Intelligence and Humanized Computing, 13(2), 769–787.

    Article  Google Scholar 

  17. Pal, S., Rabehaja, T., Hill, A., Hitchens, M., & Varadharajan, V. (2019). On the integration of blockchain to the internet of things for enabling access right delegation. IEEE Internet of Things Journal, 7(4), 2630–2639.

    Article  Google Scholar 

  18. Xia, Q., Sifah, E. B., Agyekum, K.O.-B.O., Xia, H., Acheampong, K. N., Smahi, A., Gao, J., Du, X., & Guizani, M. (2019). Secured fine-grained selective access to outsourced cloud data in IoT environments. IEEE Internet of Things Journal, 6(6), 10749–10762.

    Article  Google Scholar 

  19. Liu, Y., Zhang, J., & Zhan, J. (2021). Privacy protection for fog computing and the internet of things data based on blockchain. Cluster Computing, 24(2), 1331–1345.

    Article  Google Scholar 

  20. Al-Jaroodi, J., & Mohamed, N. (2019). Blockchain in industries: A survey. IEEE Access, 7, 36500–36515.

    Article  Google Scholar 

  21. Guan, Z., et al. (2017). Achieving efficient and secure data acquisition for cloud-supported internet of things in smart grid. IEEE Internet of Things Journal, 4(6), 1934–1944. https://doi.org/10.1109/JIOT.2017.2690522

    Article  Google Scholar 

  22. Cui, H., et al. (2018). Achieving scalable access control over encrypted data for edge computing networks. IEEE Access, 6, 30049–30059.

    Article  Google Scholar 

  23. Efficient and privacy-preserving online fingerprint authentication scheme over outsourced data. IEEE Transactions on Cloud Computing, 6(1):1–11.

  24. Integrity verification for digital Holy Quran verses using cryptographic hash function and compression. Journal of King Saud University-Computer and Information Sciences 32(1), 24–34.

  25. Research on application of blockchain and identity-based cryptography. IOP Conference Series Earth and Environmental Science, 252(4).

  26. Fully homomorphic encryption using ideal lattices. In Proceedings of the forty-first annual ACM symposium on Theory of computing, 169–178.

  27. Rajavel, R., Ravichandran, S. K., Harimoorthy, K., Nagappan, P., & Gobichettipalayam, K. R. (2022). IoT-based smart healthcare video surveillance system using edge computing. Journal of Ambient Intelligence and Humanized Computing, 13(6), 1–13.

    Article  Google Scholar 

  28. Pima Indians Diabetes dataset. https://www.kaggle.com/datasets/uciml/pima-indians-diabetes-database/discussion.

  29. Benardos, P. G., & Vosniakos, G.-C. (2007). Optimizing feedforward artificial neural network architecture. Engineering Applications of Artificial Intelligence, 20(3), 365–382.

    Article  Google Scholar 

  30. Abualigah, L., Yousri, D., Abd Elaziz, M., Ewees, A. A., Al-Qaness, M. A., & Gandomi, A. H. (2021). Aquila optimizer: A novel meta-heuristic optimization algorithm. Computers & Industrial Engineering, 157, 107250.

    Article  Google Scholar 

  31. Yang, X.S., & Gandomi, A. H. (2012). Bat algorithm: A novel approach for global engineering optimization. Engineering Computations.

  32. Thilakarathne, N. N., Kagita, M. K., Lanka, D., Ahmad, H. (2020). Smart grid: a survey of architectural elements, machine learning and deep learning applications and future directions. arXiv preprint arXiv:2010.08094.

  33. Jeong, S., Shen, J. H., Ahn, B. (2021). A study on smart healthcare monitoring using IoT based on blockchain. Wireless Communications and Mobile Computing.

  34. Awan, K. A., Din, I. U., Almogren, A., Almajed, H., Mohiuddin, I., & Guizani, M. (2020). NeuroTrust—artificial-neural-network-based intelligent trust management mechanism for large-scale internet of medical things. IEEE Internet of Things Journal, 8(21), 15672–15682.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Contributions

Benkhaddra Ilyas conceived the presented idea and designed the analysis. Also, he carried out the experiment and wrote the manuscript with support from Abhishek Kumar, Setitra Mohamed Ali and Hang Lei. Abhishek Kumar co-supervised the whole work and supervision done by Lei Hang. All authors discussed the results and contributed to the final manuscript. All authors read and approved the final manuscript.

Corresponding author

Correspondence to Ilyas Benkhaddra.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Benkhaddra, I., Kumar, A., Setitra, M.A. et al. Design and Development of Consensus Activation Function Enabled Neural Network-Based Smart Healthcare Using BIoT. Wireless Pers Commun 130, 1549–1574 (2023). https://doi.org/10.1007/s11277-023-10344-0

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-023-10344-0

Keywords

Navigation