Article
Computer Science, Information Systems
Wenshuo Wang, Xu Li, Xiuqin Qiu, Xiang Zhang, Vladimir Brusic, Jindong Zhao
Summary: FRESH is a comprehensive smart healthcare framework based on FL and ring signature defense. It collects physiological data from individuals using wearable devices, trains ML models locally, and uploads model parameters to the central server for joint training. By utilizing ring signature to hide the source of parameter updates, it effectively resists source inference attacks.
INFORMATION PROCESSING & MANAGEMENT
(2023)
Article
Engineering, Electrical & Electronic
Md Zia Ur Rahman, Sala Surekha, Krishna Prasad Satamraju, Shafi Shahsavar Mirza, Aime Lay-Ekuakille
Summary: The paper proposes a blockchain-based healthcare framework to address issues related to sensor data collection, monitoring, storage, and sharing in the healthcare industry. Utilizing IoMT devices and a Markov state chain for patient medical state monitoring, the framework utilizes Ethereum permissioned blockchain for access control and data security.
IEEE SENSORS JOURNAL
(2021)
Article
Computer Science, Hardware & Architecture
Amal Abid, Saoussen Cheikhrouhou, Slim Kallel, Zahir Tari, Mohamed Jmaiel
Summary: This paper discusses the challenges of security in IoT environments and proposes a smart contract-based access control framework using Blockchain technology. Experimental evaluation and comparative analysis demonstrate the feasibility and effectiveness of the proposed solution.
Article
Computer Science, Information Systems
Akanksha Saini, Qingyi Zhu, Navneet Singh, Yong Xiang, Longxiang Gao, Yushu Zhang
Summary: This article proposes an access control framework based on smart contracts to ensure the security of sharing EMRs among different entities in the smart healthcare system.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Computer Science, Information Systems
Vinayakumar Ravi, Mamoun Alazab, Shymalagowri Selvaganapathy, Rajasekhar Chaganti
Summary: Recent security attack reports show that the number of malware attacks in smart healthcare systems is growing. This study proposes a multi-view attention-based deep learning framework for malware detection by considering PE-Header, PE-Imports, PE-Image, and API calls features. The proposed approach outperforms existing methods with an accuracy of 95% and shows robustness for both Windows and Android-based malware detection in smart healthcare systems.
COMPUTER COMMUNICATIONS
(2022)
Article
Computer Science, Hardware & Architecture
Vahideh Hayyolalam, Moayad Aloqaily, Oznur Ozkasap, Mohsen Guizani
Summary: The demand for real-time, affordable, and efficient smart healthcare services is rising exponentially, and edge computing technology along with AI can provide effective solutions. The article emphasizes the advantages of edge intelligent technology and AI in smart healthcare systems, and proposes a new smart healthcare model.
IEEE WIRELESS COMMUNICATIONS
(2021)
Article
Mathematics
Dhairya Jadav, Nilesh Kumar Jadav, Rajesh Gupta, Sudeep Tanwar, Osama Alfarraj, Amr Tolba, Maria Simona Raboaca, Verdes Marina
Summary: With the rise of smart devices in healthcare, data security has become a major concern. Blockchain and AI can be used to ensure the security of patient's wearable data and provide a secure and trusted framework for managing and sharing patient data.
Article
Computer Science, Information Systems
Mahmuda Akter, Nour Moustafa, Timothy Lynar, Imran Razzak
Summary: Federated learning provides privacy protection for smart healthcare systems and introduces the Edge Intelligence framework to combat privacy attacks, achieving better model performance and privacy protection.
IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS
(2022)
Article
Computer Science, Artificial Intelligence
Muna Al-Hawawreh, Nour Moustafa, Jill Slay
Summary: This study presents a new threat intelligence framework to examine and model attacks on the CoAP protocol in IIoHT systems, introducing RDoS as a new threat and utilizing deep learning for real-time discovery of attack network behaviors. The experiment results show that the proposed discovery model outperforms other conventional machine learning algorithms in revealing RDoS and effectively protecting SmartSat-IIoHT networks.
NEURAL COMPUTING & APPLICATIONS
(2021)
Article
Engineering, Multidisciplinary
A. O. Al-Abbasi, L. Samara, S. Salem, R. Hamila, N. Al-Dhahir
Summary: This paper proposes a novel framework for distributing patients to medical facilities in order to minimize the expected service time and service time tail probability. The algorithms prioritize patients with severe conditions and offer a model-based and model-free approach for scheduling. Extensive results demonstrate significant performance improvement compared to other algorithms.
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING
(2022)
Article
Chemistry, Analytical
Mannan Javed, Noshina Tariq, Muhammad Ashraf, Farrukh Aslam Khan, Muhammad Asim, Muhammad Imran
Summary: The paper introduces GBG-RPL, a novel technique utilizing Gini index and blockchain technology for efficient detection and mitigation of blackhole and greyhole attacks in CPSs. Results show notable improvements compared to BCPS-RPL, including reduced packet loss ratio, enhanced energy utilization, decreased energy consumption, improved attack-detection rate, and faster attack-detection time. GBG-RPL optimizes network management by reducing message overhead and end-to-end delay.
Article
Chemistry, Analytical
Dragos Daniel Taralunga, Bogdan Cristian Florea
Summary: Modern technology is playing a significant role in transitioning from traditional healthcare to smart healthcare systems, where mHealth utilizes wearable sensors, telecommunications, and IoT to create a patient-centered healthcare concept. However, privacy and security concerns remain, with blockchain technology proving to be a potential solution, offering decentralization, immutability, traceability, and transparency. Our proposed mHealth system utilizes a private blockchain on the Ethereum platform for secure communication between wearable sensors and smart devices, with smart contracts enabling data queries, access to patient information, and alert notifications.
Article
Construction & Building Technology
Ala Nekouvaght Tak, Burgin Becerik-Gerber, Lucio Soibelman, Gale Lucas
Summary: We developed a framework to investigate the drivers for and barriers against adopting integrated smart home technologies to encourage broader adoption of these technologies that can significantly reduce the environmental impact of residential buildings. The results showed that performance expectancy, effort expectancy, habit, and trust had significant effects on adoption intent. Privacy and transparency were found to be predictors of trust, and interaction adequacy and customizability had a strong effect on effort expectancy.
BUILDING AND ENVIRONMENT
(2023)
Article
Automation & Control Systems
Akhilendra Pratap Singh, Nihar Ranjan Pradhan, Ashish K. Luhach, Sivansu Agnihotri, Noor Zaman Jhanjhi, Sahil Verma, Kavita, Uttam Ghosh, Diptendu Sinha Roy
Summary: With the widespread adoption of information technology in healthcare services, digital healthcare alternatives like electronic health records (EHR) have gained attention, and blockchain technology has been proposed to address the issues existing in traditional EHR systems. This article presents a patient-centric design of a decentralized healthcare management system with blockchain-based EHR and implements a working prototype to demonstrate its efficacy.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2021)
Article
Computer Science, Hardware & Architecture
Chandramohan Dhasarathan, Manish Kumar, Atul Kumar Srivastava, Fadi Al-Turjman, Achyut Shankar, Manoj Kumar
Summary: The advancement of wireless computing technologies has revolutionized communication and computing efficiency. Opportunistic computing has great potential for growth, utilizing sharable resources while preserving user privacy. The proposed framework adopts a bio-inspired technique to identify resources for opportunistic computing, showing high performance in computation resource searching, identifying, emergency data transfer, and participative node privacy preserving.
JOURNAL OF SUPERCOMPUTING
(2021)