Skip to main content
Top
Published in: Wireless Personal Communications 3/2023

20-03-2023

Design and Development of Consensus Activation Function Enabled Neural Network-Based Smart Healthcare Using BIoT

Authors: Ilyas Benkhaddra, Abhishek Kumar, Mohamed Ali Setitra, Lei Hang

Published in: Wireless Personal Communications | Issue 3/2023

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In the healthcare region, Internet of Things (IoT) plays a major role in various fields and is developed as a common technique. An enormous amount of data is collected from various sensing equipment owing to the increasing demand for IoT. There occur a few challenges in the designing and developing of analyzing the huge amount of data resource limitations, absence of suitable training data, centralized architecture, privacy, and security. These issues are resolved by incorporating blockchain technology, they provide a decentralized mechanism and also ensure safe transmission of data. Blockchain technology majorly assists the caretaker to reveal the encrypted genetic codes by ensuring the security level for secure data transfer and enabling the secure transmission of patient electronic health records. The smart doctor has the accessibility to decrypt the data which is in encrypted form and after verifying the condition of the patient, the report is securely transmitted to the hospital cloud with the same encryption process. Only the relevant features are selected and are delivered to the optimized neural network with the consensus activation function. The neural network classifier performance is enhanced by the utilization of smart echolocation optimization in the developed method. The consensus activation function majorly helps to capture only the significant features for further training the model and which improves the classification accuracy. The trained model is compared with the test data to predict the disease affected the patient in the n number of hospitals.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Agyekum, K. O. B. O., Xia, Q., Sifah, E. B., Cobblah, C. N. A., Xia, H., Gao, J. (2021). A proxy re-encryption approach to secure data sharing in the internet of things based on blockchain. IEEE Systems Journal. Agyekum, K. O. B. O., Xia, Q., Sifah, E. B., Cobblah, C. N. A., Xia, H., Gao, J. (2021). A proxy re-encryption approach to secure data sharing in the internet of things based on blockchain. IEEE Systems Journal.
2.
go back to reference Gu, L., Wang, J., & Sun, B. (2014). Trust management mechanism for Internet of Things. China Communications, 11(2), 148–156.CrossRef Gu, L., Wang, J., & Sun, B. (2014). Trust management mechanism for Internet of Things. China Communications, 11(2), 148–156.CrossRef
3.
go back to reference Pavithran, D., Al-Karaki, J. N., & Shaalan, K. (2021). Edge-based blockchain architecture for event-driven iot using hierarchical identity based encryption. Information Processing & Management, 58(3), 102528.CrossRef Pavithran, D., Al-Karaki, J. N., & Shaalan, K. (2021). Edge-based blockchain architecture for event-driven iot using hierarchical identity based encryption. Information Processing & Management, 58(3), 102528.CrossRef
4.
go back to reference Mishra, P., Puthal, D., Tiwary, M., & Mohanty, S. P. (2019). Software defined IoT systems: Properties, state of the art, and future research. IEEE Wireless Communication Magazine, 26(6), 64–71.CrossRef Mishra, P., Puthal, D., Tiwary, M., & Mohanty, S. P. (2019). Software defined IoT systems: Properties, state of the art, and future research. IEEE Wireless Communication Magazine, 26(6), 64–71.CrossRef
5.
go back to reference Ray, P. P., Chowhan, B., Kumar, N., & Almogren, A. (2021). Biothr: Electronic health record servicing scheme in IoT-blockchain ecosystem. IEEE Internet of Things Journal, 8(13), 10857–10872.CrossRef Ray, P. P., Chowhan, B., Kumar, N., & Almogren, A. (2021). Biothr: Electronic health record servicing scheme in IoT-blockchain ecosystem. IEEE Internet of Things Journal, 8(13), 10857–10872.CrossRef
6.
go back to reference Veeramakali, T., Siva, R., Sivakumar, B., Senthil Mahesh, P. C., & Krishnaraj, N. (2021). An intelligent internet of things-based secure healthcare framework using blockchain technology with an optimal deep learning model. The Journal of Supercomputing, 77(9), 9576–9596.CrossRef Veeramakali, T., Siva, R., Sivakumar, B., Senthil Mahesh, P. C., & Krishnaraj, N. (2021). An intelligent internet of things-based secure healthcare framework using blockchain technology with an optimal deep learning model. The Journal of Supercomputing, 77(9), 9576–9596.CrossRef
7.
go back to reference Puthal, D., & Mohanty, S. P. (2019). Proof of authentication: IoT-friendly blockchains. IEEE Potentials Mag., 38(1), 26–29.CrossRef Puthal, D., & Mohanty, S. P. (2019). Proof of authentication: IoT-friendly blockchains. IEEE Potentials Mag., 38(1), 26–29.CrossRef
8.
go back to reference Gatteschi, V., Lamberti, F., Demartini, C., Pranteda, C., & Santamaría, C. (2018). To blockchain or not to blockchain: That is the question. IT Professional, 20(2), 62–74.CrossRef Gatteschi, V., Lamberti, F., Demartini, C., Pranteda, C., & Santamaría, C. (2018). To blockchain or not to blockchain: That is the question. IT Professional, 20(2), 62–74.CrossRef
9.
go back to reference Li, J., Ji, Y., Choo, K.-K.R., & Hogrefe, D. (2019). CL-CPPA: Certificate-less conditional privacy-preserving authentication protocol for the Internet of Vehicles. IEEE Internet of Things Journal, 6(6), 10332–10343.CrossRef Li, J., Ji, Y., Choo, K.-K.R., & Hogrefe, D. (2019). CL-CPPA: Certificate-less conditional privacy-preserving authentication protocol for the Internet of Vehicles. IEEE Internet of Things Journal, 6(6), 10332–10343.CrossRef
10.
go back to reference Ilyas, B., Kumar, A., Setitra, M. A., Bensalem, Z. A., Lei, H. (2023) Prevention of DDoS attacks using an optimized deep learning approach in blockchain technology. Transactions On Emerging Telecommunication and Technologies. Ilyas, B., Kumar, A., Setitra, M. A., Bensalem, Z. A., Lei, H. (2023) Prevention of DDoS attacks using an optimized deep learning approach in blockchain technology. Transactions On Emerging Telecommunication and Technologies.
11.
go back to reference Ilyas, B., Kumar, A., Bensalem, Z. E. A., Hang, L. (2023). Secure transmission of secret data using optimization based embedding techniques in Blockchain. Expert Systems with Applications, 211. Ilyas, B., Kumar, A., Bensalem, Z. E. A., Hang, L. (2023). Secure transmission of secret data using optimization based embedding techniques in Blockchain. Expert Systems with Applications, 211.
12.
go back to reference Roy, S. S., Puthal, D., Sharma, S., Mohanty, S. P., & Zomaya, A. Y. (2018). Building a sustainable Internet of Things: Energy-efficient routing using low-power sensors will meet the need. IEEE Consumer Electronics Magazine, 7(2), 42–49.CrossRef Roy, S. S., Puthal, D., Sharma, S., Mohanty, S. P., & Zomaya, A. Y. (2018). Building a sustainable Internet of Things: Energy-efficient routing using low-power sensors will meet the need. IEEE Consumer Electronics Magazine, 7(2), 42–49.CrossRef
13.
go back to reference Lau, C. H., Alan, K.-H. Y., Yan, F. (2018). Blockchain-based authentication in IoT networks. In Proceedings of 2018 IEEE conference on dependable and secure computing, DSC, IEEE, pp. 1–8. Lau, C. H., Alan, K.-H. Y., Yan, F. (2018). Blockchain-based authentication in IoT networks. In Proceedings of 2018 IEEE conference on dependable and secure computing, DSC, IEEE, pp. 1–8.
14.
go back to reference Vishwakarma, L., & Das, D. (2021). SCAB-IoTA: Secure communication and authentication for IoT applications using blockchain. Journal of Parallel and Distributed Computing, 154, 94–105.CrossRef Vishwakarma, L., & Das, D. (2021). SCAB-IoTA: Secure communication and authentication for IoT applications using blockchain. Journal of Parallel and Distributed Computing, 154, 94–105.CrossRef
15.
go back to reference Shukla, S., Thakur, S., Hussain, S., Breslin, J. G., & Jameel, S. M. (2021). Identification and authentication in healthcare internet-of-things using integrated fog computing based blockchain model. Internet of Things, 15, 100422.CrossRef Shukla, S., Thakur, S., Hussain, S., Breslin, J. G., & Jameel, S. M. (2021). Identification and authentication in healthcare internet-of-things using integrated fog computing based blockchain model. Internet of Things, 15, 100422.CrossRef
16.
go back to reference Narayanan, U., Paul, V., & Joseph, S. (2022). Decentralized blockchain based authentication for secure data sharing in Cloud-IoT. Journal of Ambient Intelligence and Humanized Computing, 13(2), 769–787.CrossRef Narayanan, U., Paul, V., & Joseph, S. (2022). Decentralized blockchain based authentication for secure data sharing in Cloud-IoT. Journal of Ambient Intelligence and Humanized Computing, 13(2), 769–787.CrossRef
17.
go back to reference Pal, S., Rabehaja, T., Hill, A., Hitchens, M., & Varadharajan, V. (2019). On the integration of blockchain to the internet of things for enabling access right delegation. IEEE Internet of Things Journal, 7(4), 2630–2639.CrossRef Pal, S., Rabehaja, T., Hill, A., Hitchens, M., & Varadharajan, V. (2019). On the integration of blockchain to the internet of things for enabling access right delegation. IEEE Internet of Things Journal, 7(4), 2630–2639.CrossRef
18.
go back to reference Xia, Q., Sifah, E. B., Agyekum, K.O.-B.O., Xia, H., Acheampong, K. N., Smahi, A., Gao, J., Du, X., & Guizani, M. (2019). Secured fine-grained selective access to outsourced cloud data in IoT environments. IEEE Internet of Things Journal, 6(6), 10749–10762.CrossRef Xia, Q., Sifah, E. B., Agyekum, K.O.-B.O., Xia, H., Acheampong, K. N., Smahi, A., Gao, J., Du, X., & Guizani, M. (2019). Secured fine-grained selective access to outsourced cloud data in IoT environments. IEEE Internet of Things Journal, 6(6), 10749–10762.CrossRef
19.
go back to reference Liu, Y., Zhang, J., & Zhan, J. (2021). Privacy protection for fog computing and the internet of things data based on blockchain. Cluster Computing, 24(2), 1331–1345.CrossRef Liu, Y., Zhang, J., & Zhan, J. (2021). Privacy protection for fog computing and the internet of things data based on blockchain. Cluster Computing, 24(2), 1331–1345.CrossRef
20.
go back to reference Al-Jaroodi, J., & Mohamed, N. (2019). Blockchain in industries: A survey. IEEE Access, 7, 36500–36515.CrossRef Al-Jaroodi, J., & Mohamed, N. (2019). Blockchain in industries: A survey. IEEE Access, 7, 36500–36515.CrossRef
22.
go back to reference Cui, H., et al. (2018). Achieving scalable access control over encrypted data for edge computing networks. IEEE Access, 6, 30049–30059.CrossRef Cui, H., et al. (2018). Achieving scalable access control over encrypted data for edge computing networks. IEEE Access, 6, 30049–30059.CrossRef
23.
go back to reference Efficient and privacy-preserving online fingerprint authentication scheme over outsourced data. IEEE Transactions on Cloud Computing, 6(1):1–11. Efficient and privacy-preserving online fingerprint authentication scheme over outsourced data. IEEE Transactions on Cloud Computing, 6(1):1–11.
24.
go back to reference Integrity verification for digital Holy Quran verses using cryptographic hash function and compression. Journal of King Saud University-Computer and Information Sciences 32(1), 24–34. Integrity verification for digital Holy Quran verses using cryptographic hash function and compression. Journal of King Saud University-Computer and Information Sciences 32(1), 24–34.
25.
go back to reference Research on application of blockchain and identity-based cryptography. IOP Conference Series Earth and Environmental Science, 252(4). Research on application of blockchain and identity-based cryptography. IOP Conference Series Earth and Environmental Science, 252(4).
26.
go back to reference Fully homomorphic encryption using ideal lattices. In Proceedings of the forty-first annual ACM symposium on Theory of computing, 169–178. Fully homomorphic encryption using ideal lattices. In Proceedings of the forty-first annual ACM symposium on Theory of computing, 169–178.
27.
go back to reference Rajavel, R., Ravichandran, S. K., Harimoorthy, K., Nagappan, P., & Gobichettipalayam, K. R. (2022). IoT-based smart healthcare video surveillance system using edge computing. Journal of Ambient Intelligence and Humanized Computing, 13(6), 1–13.CrossRef Rajavel, R., Ravichandran, S. K., Harimoorthy, K., Nagappan, P., & Gobichettipalayam, K. R. (2022). IoT-based smart healthcare video surveillance system using edge computing. Journal of Ambient Intelligence and Humanized Computing, 13(6), 1–13.CrossRef
29.
go back to reference Benardos, P. G., & Vosniakos, G.-C. (2007). Optimizing feedforward artificial neural network architecture. Engineering Applications of Artificial Intelligence, 20(3), 365–382.CrossRef Benardos, P. G., & Vosniakos, G.-C. (2007). Optimizing feedforward artificial neural network architecture. Engineering Applications of Artificial Intelligence, 20(3), 365–382.CrossRef
30.
go back to reference Abualigah, L., Yousri, D., Abd Elaziz, M., Ewees, A. A., Al-Qaness, M. A., & Gandomi, A. H. (2021). Aquila optimizer: A novel meta-heuristic optimization algorithm. Computers & Industrial Engineering, 157, 107250.CrossRef Abualigah, L., Yousri, D., Abd Elaziz, M., Ewees, A. A., Al-Qaness, M. A., & Gandomi, A. H. (2021). Aquila optimizer: A novel meta-heuristic optimization algorithm. Computers & Industrial Engineering, 157, 107250.CrossRef
31.
go back to reference Yang, X.S., & Gandomi, A. H. (2012). Bat algorithm: A novel approach for global engineering optimization. Engineering Computations. Yang, X.S., & Gandomi, A. H. (2012). Bat algorithm: A novel approach for global engineering optimization. Engineering Computations.
32.
go back to reference Thilakarathne, N. N., Kagita, M. K., Lanka, D., Ahmad, H. (2020). Smart grid: a survey of architectural elements, machine learning and deep learning applications and future directions. arXiv preprint arXiv:2010.08094. Thilakarathne, N. N., Kagita, M. K., Lanka, D., Ahmad, H. (2020). Smart grid: a survey of architectural elements, machine learning and deep learning applications and future directions. arXiv preprint arXiv:​2010.​08094.
33.
go back to reference Jeong, S., Shen, J. H., Ahn, B. (2021). A study on smart healthcare monitoring using IoT based on blockchain. Wireless Communications and Mobile Computing. Jeong, S., Shen, J. H., Ahn, B. (2021). A study on smart healthcare monitoring using IoT based on blockchain. Wireless Communications and Mobile Computing.
34.
go back to reference Awan, K. A., Din, I. U., Almogren, A., Almajed, H., Mohiuddin, I., & Guizani, M. (2020). NeuroTrust—artificial-neural-network-based intelligent trust management mechanism for large-scale internet of medical things. IEEE Internet of Things Journal, 8(21), 15672–15682.CrossRef Awan, K. A., Din, I. U., Almogren, A., Almajed, H., Mohiuddin, I., & Guizani, M. (2020). NeuroTrust—artificial-neural-network-based intelligent trust management mechanism for large-scale internet of medical things. IEEE Internet of Things Journal, 8(21), 15672–15682.CrossRef
Metadata
Title
Design and Development of Consensus Activation Function Enabled Neural Network-Based Smart Healthcare Using BIoT
Authors
Ilyas Benkhaddra
Abhishek Kumar
Mohamed Ali Setitra
Lei Hang
Publication date
20-03-2023
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 3/2023
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-023-10344-0

Other articles of this Issue 3/2023

Wireless Personal Communications 3/2023 Go to the issue