4.8 Article

A Privacy-Preserving Internet of Things Smart Healthcare Financial System

Journal

IEEE INTERNET OF THINGS JOURNAL
Volume 10, Issue 21, Pages 18452-18460

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2022.3233783

Keywords

leaking any required. Index Terms-Blockchain; distributed ledger; healthcare; privacy; zero knowledge

Ask authors/readers for more resources

The article presents an efficient zero-knowledge blockchain-based system for lightweight computer devices that protects privacy and enables decentralized healthcare finance. By using noninteractive zero-knowledge proofs, the system reduces communication costs and achieves millisecond-level transaction validation.
Several emerging areas, such as sensor networks, the Internet of Things (IoT), and distributed networks are gaining traction where resource-constrained devices communicate by sharing privacy-preserving information. Due to heavy cryptographic components, standard cryptographic algorithms do not fit these IoT devices. In this article, we propose an efficient zero-knowledge blockchain-based privacy-preserving decentralized healthcare finance system that is suitable for lightweight computer devices. The proposed design mainly focuses on noninteractive zero-knowledge proof, which substantially reduces the cost of communication between two devices. We explain the system framework and its use case for a healthcare financial system at a micro-level. However, it can also be extended easily to more general financial systems. Our system framework is efficient and lightweight, using more efficient zero-knowledge-based proofs; validation of the transactions is done in milliseconds. As an advancement to our work, the proposed healthcare financial system for lightweight computer devices is also auditable without leaking any extra information than required.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Computer Science, Information Systems

Group intrusion detection in the Internet of Things using a hybrid recurrent neural network

Asma Belhadi, Youcef Djenouri, Djamel Djenouri, Gautam Srivastava, Jerry Chun-Wei Lin

Summary: This paper presents a novel framework that combines deep learning and decomposition for identifying a group of intrusions in the IoT context. By collecting data and using a recurrent neural network to estimate individual intrusions, the framework then identifies outliers based on a decomposition strategy. Experimental evaluation using two intrusion datasets demonstrates the superiority of the proposed framework over state-of-the-art approaches.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2023)

Article Computer Science, Information Systems

When explainable AI meets IoT applications for supervised learning

Youcef Djenouri, Asma Belhadi, Gautam Srivastava, Jerry Chun-Wei Lin

Summary: This paper presents a novel and comprehensive framework that combines eXplainable AI (XAI), deep learning, and evolutionary computation to solve various IoT applications. The IoT data from different sensors is transformed into an image database using the Gamian angular field. The images are then trained using VGG16 with the integration of XAI technology and hyper-parameter optimization. Extensive testing on two separate IoT datasets demonstrates the superior performance of the proposed approach in terms of both runtime and accuracy compared to the baseline approaches.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2023)

Article Engineering, Electrical & Electronic

An Intelligent Collaborative Image-Sensing System for Disease Detection

Youcef Djenouri, Asma Belhadi, Anis Yazidi, Gautam Srivastava, Pushpita Chatterjee, Jerry Chun-Wei Lin

Summary: With the increase in smart medical devices and applications in healthcare settings, the use of IoT and intelligent agents for disease detection and healthcare decision-making has become more important. This article presents a collaborative disease detection system based on IoMT and image data, where intelligent agents explore the medical data obtained from smart sensor devices using reinforcement learning to detect diseases. The results of intensive experiments show the significance of using intelligent agents and collaboration in disease detection, surpassing baseline solutions.

IEEE SENSORS JOURNAL (2023)

Article Computer Science, Artificial Intelligence

Deep Fuzzy Contrast-Set Deviation Point Representation and Trajectory Detection

Usman Ahmed, Jerry Chun-Wei Lin, Gautam Srivastava

Summary: This article presents the approach of embedding trajectory deviation points and deep clustering. The proposed learning trajectory embedding approach successfully captures the structural identity and outperforms competing strategies in detecting outliers in the trajectory and deviation locations.

IEEE TRANSACTIONS ON FUZZY SYSTEMS (2023)

Article Computer Science, Information Systems

Point-supervised temporal action localisation based on multi-branch attention

Shuai Liu, Yang Zhang, Gautam Srivastava

Summary: This study proposes a multi-branch attention network and a pseudo-background label generation method to address the problem of temporal action localisation in video understanding. Experimental results show that the proposed method can improve the separation effect of action instances, background, and action context, and achieves excellent performance on the THUMOS-14 dataset.

ENTERPRISE INFORMATION SYSTEMS (2023)

Article Engineering, Civil

A Secure Blockchain Enabled V2V Communication System Using Smart Contracts

Debashis Das, Sourav Banerjee, Pushpita Chatterjee, Uttam Ghosh, Utpal Biswas

Summary: In recent years, the corporate and industrial sectors have undergone significant transformations in vehicle-to-vehicle (V2V) communication, using the latest software, hardware, and technologies to develop trusted applications. Various technologies, including sensors, data storage, and communication devices, have been integrated into connected vehicles for V2V communication. Blockchain can help address issues such as data security, user privacy, and vehicle security in V2V communication systems. This paper proposes a secure blockchain-enabled V2V communication system (BVCS) that enhances vehicle security and enables secure data sharing and communication among vehicles, using smart contracts to authenticate users and establish secure communication. The proposed system improves data security, user privacy, and vehicle security, creating a trusted environment in V2V communication systems.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2023)

Article Computer Science, Information Systems

A multi-frequency communication routing protocol for mobile devices in the Internet of things

Tianzhu Guan, Gautam Srivastava

Summary: A new multi-frequency communication routing protocol is proposed to improve the average remaining energy of the network, reduce the routing overhead, extend the network lifecycle, and reduce the average end-to-end delay. The protocol constructs a multi-frequency wireless communication network topology and measures and analyzes its routing. The optimal wireless network multi-frequency communication routing protocol is selected using the ant colony algorithm based on the wireless network communication energy consumption model and the wireless network communication data transmission mechanism. The experimental results demonstrate the effectiveness of the protocol in terms of network energy, routing overhead, network lifespan, and end-to-end delay reduction.

WIRELESS NETWORKS (2023)

Article Computer Science, Information Systems

An artificial intelligence lightweight blockchain security model for security and privacy in IIoT systems

Shitharth Selvarajan, Gautam Srivastava, Alaa O. Khadidos, Adil O. Khadidos, Mohamed Baza, Ali Alshehri, Jerry Chun-Wei Lin

Summary: This research aims to implement an Artificial Intelligence-based Lightweight Blockchain Security Model (AILBSM) to ensure privacy and security of IIoT systems. By combining the advantages of lightweight blockchain and AI mechanisms, the proposed model reduces the impact of attacks and transforms features into encoded data using an Authentic Intrinsic Analysis (AIA) model. Extensive experiments validate the improved execution time, classification accuracy, and detection performance of the proposed model.

JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS (2023)

Review Management

Modern-day marketing concepts based on face recognition and neuro-marketing: a review and future research directions

Gautam Srivastava, Surajit Bag

Summary: This study explores the potential for face recognition and neuro-marketing in modern-day marketing based on an in-depth examination of the extant literature. The findings reveal that these two domains remain understudied and provide insights for managers to design marketing strategies and boost conversion rates.

BENCHMARKING-AN INTERNATIONAL JOURNAL (2023)

Article Engineering, Civil

An optimization neural network model for bridge cable force identification

Tongtong Gai, Dehu Yu, Sen Zeng, Jerry Chun-Wei Lin

Summary: Accurate determination of cable force values is crucial for preventing damage to cable bridges. This paper proposes an intelligent method for determining bridge cable force based on the vibration method, which overcomes the challenges of distinguishing boundary conditions and low-order natural frequency. By using cable length, linear density, flexural stiffness, and input frequency as inputs and cable force as the output, a neural network is established to identify the cable force and optimize the model using an intelligent swarm optimization algorithm. Results show that the proposed GRNN optimized by sparrow search algorithm achieves better identification performance compared to other prediction models, with prediction errors within 10% for short cables and within 5% for long cables. This method allows for accurate identification of cable force, disregarding boundary conditions and vibration frequency, and has wide-ranging applications.

ENGINEERING STRUCTURES (2023)

Article Engineering, Civil

Intelligent Graph Convolutional Neural Network for Road Crack Detection

Youcef Djenouri, Asma Belhadi, Essam H. Houssein, Gautam Srivastava, Jerry Chun-Wei Lin

Summary: This paper presents a novel intelligent system based on graph convolutional neural networks for road crack detection, which achieves high precision by analyzing image features and training models.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2023)

Article Computer Science, Hardware & Architecture

Embedded Design and Implementation of a Wireless Multimedia Platform for Digital Estimation of Agricultural Output

Qing Wei, Qiaoli Lin, Gautam Srivastava

Summary: This paper presents the design of a multimedia platform for digitally estimating agricultural output. By utilizing embedded technology, the platform collects environmental parameters related to agricultural output and utilizes the grey relational Support Vector Machine algorithm for prediction. Experimental results demonstrate that this method accurately predicts agricultural output with high precision and has abundant applications.

MOBILE NETWORKS & APPLICATIONS (2023)

Article Computer Science, Information Systems

Self-Consistent Graph Neural Networks for Semi-Supervised Node Classification

Yanbei Liu, Shichuan Zhao, Xiao Wang, Lei Geng, Zhitao Xiao, Jerry Chun-Wei Lin

Summary: Graph Neural Networks (GNNs), based on deep learning, have attracted research interest. Many GNNs have achieved state-of-the-art accuracy but lack supervision information for unlabeled data. To address this, we propose SCGNN which extracts self-supervision information from unlabeled nodes and utilizes label information from labeled nodes. Experimental results show that SCGNN outperforms baselines, improving accuracy by an average of 2.08% and by 5.8% on the Disease dataset.

IEEE TRANSACTIONS ON BIG DATA (2023)

Article Computer Science, Artificial Intelligence

Privacy-preserving remote sensing images recognition based on limited visual cryptography

Denghui Zhang, Muhammad Shafiq, Liguo Wang, Gautam Srivastava, Shoulin Yin

Summary: This study proposes a security scheme suitable for computation-limited devices in IoT, achieving secure and efficient transmission of high-resolution remote sensing images using visual cryptography. The recognition performance of small encryption datasets for remote sensing images is improved by fine-tuning the pre-trained model from large-scale datasets.

CAAI TRANSACTIONS ON INTELLIGENCE TECHNOLOGY (2023)

Article Engineering, Electrical & Electronic

Intercell Interference Coordination for UAV Enabled URLLC With Perfect/Imperfect CSI Using Cognitive Radio

Ali Ranjha, Muhammad Awais Javed, Gautam Srivastava, Jerry Chun-Wei Lin

Summary: Unmanned aerial vehicles (UAVs) have emerged as potential candidates to support communications in 6G systems, but their usage increases interference. To address this issue, we propose low-complexity algorithms for interference coordination and model different types of interference. Results show that the proposed algorithms achieve better fairness and performance compared to conventional algorithms in UAV communications.

IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY (2023)

No Data Available