Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Article type: Research Article
Authors: Kuppusamy, Ramesha; * | Murugesan, Anbarasanb
Affiliations: [a] Department of Computer Science and Engineering, V.R.S. College of Engineering and Technology, Arasur, India | [b] Department of Artificial Intelligence and Data Science, Panimalar Engineering College, Chennai, India
Correspondence: [*] Corresponding author: Ramesh Kuppusamy, Department of Computer Science and Engineering, V.R.S. College of Engineering and Technology, Arasur, Villupuram, India. E-mails: [email protected] and [email protected].
Abstract: BACKGROUND: In recent times, there has been widespread deployment of Internet of Things (IoT) applications, particularly in the healthcare sector, where computations involving user-specific data are carried out on cloud servers. However, the network nodes in IoT healthcare are vulnerable to an increased level of security threats. OBJECTIVE: This paper introduces a secure Electronic Health Record (EHR) framework with a focus on IoT. METHODS: Initially, the IoT sensor nodes are designated as registered patients and undergo initialization. Subsequently, a trust evaluation is conducted, and the clustering of trusted nodes is achieved through the application of Tasmanian Devil Optimization (STD-TDO) utilizing the Student’s T-Distribution. Utilizing the Transposition Cipher-Squared random number generator-based-Elliptic Curve Cryptography (TCS-ECC), the clustered nodes encrypt four types of sensed patient data. The resulting encrypted data undergoes hashing and is subsequently added to the blockchain. This configuration functions as a network, actively monitored to detect any external attacks. To accomplish this, a feature reputation score is calculated for the network’s features. This score is then input into the Swish Beta activated-Recurrent Neural Network (SB-RNN) model to classify potential attacks. The latest transactions on the blockchain are scrutinized using the Neutrosophic Vague Set Fuzzy (NVS-Fu) algorithm to identify any double-spending attacks on non-compromised nodes. Finally, genuine nodes are granted permission to decrypt medical records. RESULTS: In the experimental analysis, the performance of the proposed methods was compared to existing models. The results demonstrated that the suggested approach significantly increased the security level to 98%, reduced attack detection time to 1300 ms, and maximized accuracy to 98%. Furthermore, a comprehensive comparative analysis affirmed the reliability of the proposed model across all metrics. CONCLUSION: The proposed healthcare framework’s efficiency is proved by the experimental evaluation.
Keywords: Cluster Head (CH), Electronic Health Records (EHR), Student’s T-Distribution employed Tasmanian Devil Optimization (STD-TDO), Swish Beta activated-Recurrent Neural Network (SB-RNN), Neutrosophic Vague Set Fuzzy (NVS-Fu)
DOI: 10.3233/THC-231895
Journal: Technology and Health Care, vol. 32, no. 4, pp. 2711-2731, 2024
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]