1. Introduction
In recent decades, wireless communication plays a vital role in the medical industry’s growth, smart cities, vehicular and transportation systems using IoT networks [
1,
2,
3]. The wireless nodes are dispersed in the observing field for collecting the related data and further transmit it towards the cloud paradigm. The application users using the internet and access the needed information directly on their smartphones and computing machines. Almost all critical applications need an on-time response from the sensing objects and facilitate their users. The architecture of wireless networks consists of small, less expansive, and low-powered intelligent sensors distributed either uniformly or randomly in various fields, i.e., military, agriculture, healthcare, smart cities, and grids for information observing [
4,
5,
6]. The sensory data is collected based on particular events or periodic intervals and transmitted to centralized servers. In medical applications [
7,
8,
9], the medical experts access the patients’ information from centralized or distributed servers using the internet through some developing next-generation wireless techniques. However, the traditional data analysis techniques are incompatible to extract useful health information; therefore, most academics are focusing on intelligent methods with the internet of medical things for a precise and thorough exploration of patients’ sensitive data. Health services widely adopt the internet of medical items due to its significant impact on diagnosing disease and facilitating treatments with the least communication cost. The medical applications are comprised of three main phases. In the first phase, wearable sensors collected the patients’ data and forwarded them to a local administrator or coordinator. The second phase communicates the patients’ data to the server or sinks node with the intermediate devices over the wireless transmission system. Finally, the medical data is stored on some cloud service providers; thus, medical professionals judge the patients’ condition and provides suitable actions. In the flat-based structure with the same processing, receiving, forwarding, and storage capabilities. Moreover, in the flat-based structure, many researchers have been proposed a cluster-based solution [
10,
11,
12] to divide the medical sensors into different clusters with one cluster head in each cluster. Some applications are also based on a hierarchical structure [
13,
14,
15], and the data aggregation capabilities are separated based on different levels. The massive medical data is stored on cloud servers and moves wirelessly over the insecure forwarding medium. Therefore, secure and privacy-preserving solutions for sustainable systems are demanding factors and need to maintain the resources efficiently [
16,
17,
18,
19]. The purpose of this research work is to explore blockchain, which is an emerging technology [
20,
21] to improve the performance of the healthcare system against security extortions with efficient data management. The technology of blockchain is a distributed database, which is comprised of various blocks that are linked together using irreversible chains. A block is a single element, and it is composed of information related to a specific transaction. Recently, blockchain is an emerging technology and has been applied by many researchers to secure confidential data over insecure transmission systems [
22,
23].
The main contributions of our proposed solution are:
It presents a graph-oriented model for collecting and distributing network information with an accessible and efficient system.
Artificial intelligence techniques are utilized for producing the least error-prone communication with decreasing delays by avoiding unnecessary malicious traffic.
A reliable and authentic sharing system is modeled against threats by supporting symmetric digital certificates.
The distributed security is provided by exploiting blockchain technology in which data is encrypted and dispersed in a decentralized model.
The measurement of the proposed work with a set of simulation-based experiments has demonstrated significant performance with other schemes in a trustless environment.
The rest of the research article is organized as follows. A discussion of related work is presented in
Section 2.
Section 3 offers and explains the main components of the proposed algorithm.
Section 4 analyzes the performance of the proposed algorithm than existing work through simulations.
Section 5 concludes the paper.
2. Related Work
In wireless technology using IoT [
24,
25,
26], several smart sensors and physical objects are distributed in smart cities to support real-time systems. Furthermore, one or more Base Station (BS), which has unlimited resources, is connected to the internet, facilitating many application users simultaneously. In a wireless sensor network (WSN)-based medical system, the Denial of Service (DOS) attacks are categorized into three different approaches, i.e., standalone, distributive/cooperative, and hierarchical [
27,
28]. Each sensor node has been equipped with its defense agent in a standalone approach and can only identify the attack by itself. In the distributed defense approach, a global defense system is generated based on various agents’ collaboration. Its performance is better than the standalone defense system and is usually preferred for flat topologies. In a hierarchical defense approach, the cluster head is responsible for detecting an attack for its members and performing appropriate security actions with efficient energy efficiency [
29,
30]. The authors [
31] proposed intrusion detection in homogeneous and heterogeneous WSNs, proposing two detection models for classifying the malicious nodes. The detection probability is based on the distance traveled by the malicious node, the likelihood of detecting the malicious node, and the average distance traveled by the malicious node parameters. In [
32], authors have proposed a multi-level intrusion detection system based on an immune theory known as Danger theory. The proposed solution uses the various functions of immune cells to design the multi-level intrusion detection system. The proposed solution is based on battery power, message or data size, and data transfer parameters to detect malicious activities.
Furthermore, a few nodes were placed near BS to perform immune nodes’ roles and specific processing capabilities. In [
33], the authors proposed an improved secure authentication and data encryption scheme for medical systems using the Internet of things (IoT). It provides user anonymity and avoids network threats of replay and password/sensed data disclosure. Moreover, the authors modified the authentication process and decreasing the redundancy in the design phase. It was verified that the proposed solution is more efficient in terms of performance than other schemes. The authors of [
34] established an association with body sensors using tokens, and afterward, a secret key is shared to provide data security. The proposed solution encrypts and decrypts the health data with two phases of the authentication method using the private key. The collected data is forwarded to the server using blockchain technology. The security analysis described the feasibility of the proposed solution for securing healthcare information. In [
35], the authors proposed a user authentication scheme and data transmission mechanism to provide privacy and security. It offers efficient monitoring facilitates to medical experts and comprehensive treatment to patients. It uses smart cards and passwords, so only authorized medical experts can access patient information. In addition, a secure cryptosystem has been applied to form a data transmission mechanism. Furthermore, the proposed work can cope with common network attacks. The authors in [
36], proposed a fine-grained EHR access control scheme and provides a secure standard model. The proposed solution generates offline encrypted data before knowing EHR data and access policies and it offers secure communication for the mobile cloud. The extensive simulation experiments are performed and it is proven effective performance in the comparison of other solutions. In [
37], the authors emphasize flexible compute-intensive task offloading to a local cloud, which aims to improve the network performance for energy consumption, cost, and operation speed. They proposed a fruit fly optimization-based task offloading (FOTO) algorithm, which improves the data offloading and allocation of network resources with affordable energy consumption. Its performance is verified in terms of different realistic factors and demonstrates a significant improvement from other existing work.
The secure knowledge and cluster-based intrusion detection mechanism proposed in [
38], aims to handle generated intrusions. It stores the particular events triggered by the node in the network field, and the knowledge base is situated on the BS. Based on inference engine cluster heads, the proposed solution stores the events data into the knowledge base. The authors of [
39] proposed intrusion detection based on state context and hierarchical trust in WSN. The proposed solution is based on the dynamic state context and hierarchical trust of sensor nodes. In the proposed solution, the trust evaluation and the self-adaptation detection threshold are used to detect malicious nodes’ behavior. In [
40], the authors developed a biometric-based security framework using resource-constrain-oriented and wearable sensors. It extracts the heartbeats from ECG signals and analyses time-domain-based biometric features. The proposed framework is significantly optimizing the security and transmission for medical applications. In [
41], the authors explored privacy-protected data collection challenges and presented a practical framework called Privacy Protector, patient privacy-protected data collection. It consists of secret sharing and shares repairing for compromised and lost patients’ information. The proposed framework uses a distributed database, which comprises multiple cloud servers and guaranteed data privacy. The authors of [
42] developed a secure data collection scheme for IoT-based healthcare systems named SecureData, which aims to cope with data security. It comprises four main layers. It utilizes a lightweight field-programmable gate array (FPGA) hardware-based cipher and secret cipher share algorithms. For the cloud computing layer, the proposed solution applied a distributed database technique that includes several cloud data servers to ensure privacy for patients’ data. The performance results are validated through simulations and it is proven that the proposed solution is significantly efficient for saving security risks for IoT-based healthcare applications.
IoT technology is widely utilized for data collection and offers heterogeneous services for healthcare systems. The public health data collecting a vast number of patient’s data, which need to be processed and evaluated to diagnose diseases for a timely and appropriate cure. However, due to the restricted structure and rapid collapse of medical sensors’, there are many communication threats that expose patients’ information, therefore, it is a demand for trustworthiness with a secured network. It is also noticed that most of the existing solution increases the management cost in sustaining and handling the network data. Moreover, many secured solutions have been developed for IoT networks and tackle with privacy-preserving, but with the unnecessary complexity and runtime overhead. Therefore, this research article presents an AI-enabled privacy-preserving with big data transferring using blockchain technology, which aims to offer a secured network and attain data confidentiality with optimized services. It also enhances the availability of network resources and provides reliability for public health data without compromising the constraint parameters and communication links.
3. Proposed Algorithm
In this section, we explain the detailed overview of our proposed algorithm. The proposed algorithm is based on two main components. The first component uses a graph-based modeling and artificial intelligence technique to arrange the network for stable communication, which is comprised of regions with cluster heads. The sub-graphs are also constructed to reduce the complexity and congestion in the forming of consistent routes from local sensors to sink nodes and eliminate the redundant links. On the other hand, the second component presents an authentication phase based on symmetric digital certificates, which increases the network strength against unauthorized nodes. Moreover, data security for integrity is obtained using blockchain technology, which leads to trustworthy communication in distributed approach and ensures a sustainable healthcare system.
Figure 1 demonstrates the main components of the proposed algorithm. Moreover, its communication flow is depicted in
Figure 2. For the convenience of describing the proposed solution, the used notations are summarized in
Table 1.
With the ability to develop the proposed algorithm using IoT technology and capabilities of wireless sensors, we simulate the performance for a realistic scenario under the following assumptions:
The IoT-based network is restricted for battery power, memory, transmission, and processing factors.
They are immobile and equipped with Global Positioning System (GPS).
The wireless channels are asymmetric.
Corresponding nodes can adjust the transmission power using the distance property.
Intruders are malicious objects and can generate bogus packets for the response.
3.1. Intellectual Graph-Based Modeling
The proposed algorithm’s main aim is to use graph-based modeling and split the network nodes into various groups. Unlike most of the other techniques, the graph-based approach does not know the dimension for grouping and takes an input of undirected weighted graph
, which comprises vertices
and bidirectional edges ϵ. Initially, nodes are placed on their appropriate positions in
using the cost function
, which is comprised of distance and energy parameters. In addition, each node marks the entry of its neighbors on the local_table. After the formation of an undirected graph
, the BS runs the Prims algorithm [
43] to identify the subset of nodes without any redundant cycles and parallel edges
. It gives sub-graph
, where
is extracted vertices and
is extracted edges. It increases the size of
by extracting one node at a time from
such that
and
is a subset of
. The summation of weighted values
of extracted vertices and edges is minimized to obtain the optimal performance, where
can be computed as given in Equation (1).
It aims to determine the subset of the edges that forms a tree, which comprises the subset of nodes. Such an approach explicitly decreases the overhead in developing an optimal delivery service for the e-health system by removing the redundant links. Next, the proposed algorithm computes the trust value
for the nodes in obtaining sub-graph
, and selects the trustworthy with the highest transmission power cluster heads. The trusted value of the sensor node
is computed in an aggregated manner using three-node parameters, i.e., residual energy
, node density
, and received signal strength interference
as given in Equation (2). The trust value increases the network performance in terms of least data distance and neighboring cost with high signal strength.
In Equation (1),
is the fraction of residual energy over the initial energy at the end of the duty cycle. It increases the probability for the selection of cluster head when it increases from the preset threshold. Secondly, the density of the node
denotes the relation tightness between the neighbors, and it is calculated using the derived
The higher the nodes’ density increases the probability of the node selecting the cluster head. In the end, the node
whose link estimation
value is on an extreme level than its neighbors is given a high probability for the selection of cluster head. Let us consider
is the transmission power, and α denotes the depleted radio power in transmitting the beacon messages
over the distance
, then
is computed as given in Equation (3).
Accordingly, based on the highest value, the proposed algorithm chooses the set of particular cluster heads. The cluster heads select the next-hop nodes from sub-graph and formulate individual clusters. Next, cluster heads send the status message to their members, and upon receiving the ACK messages, the particular cluster head constructs a cluster_table. Moreover, the IDs of the selected cluster heads are stored with the BS in its global table. Similarly, the member nodes also map the ID of their selected cluster heads in their local_tables. Furthermore, the neighboring cluster heads sharing their information, and accordingly, every cluster head makes an entry in the local cluster_table. All the tables are updated when any changes incur in the processes of network structure.
3.2. Secured Transmissions
This section presents the security component for the proposed algorithm and aims to prevent network intruders from the transmission system. It is comprised of registration, verification, and encryption phases. In this component, the BS is treated as a central authority (CA) and can be valuable for two-way mutual authentication along with privacy-preserving routing. All the selected cluster heads must be registered with BS and obtained digital certificates. Without the digital certificate, the particular cluster head can not participate in the routing phase. The registration and verification phases consist of the following steps.
Cluster head
generates a secret key
and shared it with BS over the secure channel. It embedded
with identity
, timestamp
and create a request packet
. The
is forwarded to BS for issuing digital certificates. The
is encrypted using a master secret key of
of BS as given in Equation (4).
where
denotes the random number.
Upon receiving the
from cluster head, BS first verifies identities
from its global table, and accordingly, it generates the
including RSA signature [
44]
to verify its authenticity as given in Equation (5).
After obtaining the BS certificates, the cluster heads and exchange their certificates with each other to prove two-way mutual authentication before transmitting. Furthermore, the digital certificates are usable for only the particular period Δt, and afterward, the cluster heads are required to resend towards BS for the issuance of .
In addition, the
is useful to prevent the malicious node from resending the
packet towards BS. Such a mechanism in the proposed algorithm prevents the replay threat and ensures reliable message forwarding between routing nodes. Further, digital certificates are digitally signed by the master secret key of BS
that indicates its validity. Before transmitting the routing data, both clusters heads
and
exchange
with each other. Upon receiving, they are decrypted to recover the secret keys
as given in Equation (6).
After the completion of the registration and mutual verification phases, the block of data messages
ϵ
set as encrypted blocks
independently by using
and XoR
function as given in Equation (7).
The cluster head
is selected from the chain and decodes the incoming encrypted blocks with the same
. Later, it performs the same hashing procedure to generate
with its actual data message
and
operation. Furthermore, received hash code
is linked to ensuring blockchain and distributed security
to support data integrity as given in Equation (8).
Afterward, the pattern of blocks are encrypted using of BS and forwarded to cloud systems. Upon receiving, the decryption function is applied to integrate the and .
Algorithm 1 gives the flow of the proposed work.
Algorithm 1: AI-enabled privacy-preserving big data algorithm. |
Initialization Input: sensors, data messages Output: graph-oriented transmission paths for Sensor ϵ do extract subset of nodes initial routes to sink end for Sensor ϵ do compute trust = + generate sub-regions end BS generates digital certificates encryption function If decryption is successful then cert is validated Else cert is rejected end end block of data ϵ for ϵ do produce cipher blocks end hashes with end-to-end encryption End
|
4. Performance Analysis
This section explains the comparative analysis of the proposed work along with the simulation environment. To verify the complexity and energy usage of the proposed work, the experiments were conducted using two different scenarios, i.e., with the varying number of nodes and varying data rates. The performance is evaluated using various network metrics such as network delivery ratio, network latency, energy consumption, malicious attacks, runtime overhead, link disconnectivity, and complexity. The number of nodes varied from 50 to 250, and data rates increased from 8 bytes to 40 bytes per second. We increased the data generation rates to verify the runtime and processing overheads of the proposed algorithm on nodes as compared to other solutions. Initially, the energy level was set to 2j. In the implementation phase, a discrete event-based network simulator NS-3 was used, which is widely utilized in [
45,
46]. The simulation was run for 2000 sec. The transmission power was set to 5 m. The number of jamming nodes was assumed as 5. The default simulation parameters are displayed in
Table 2.
In
Figure 3 and
Figure 4, the experimental analysis shows that the proposed AI-EPP has improved network delivery by 14% and 15% than the existing solutions. Such improvement is the choice of the graph-based artificial intelligence technique for splitting the observing field. It eliminates the process of direct data delivery toward a destination and utilizes the constraint resources efficiently. Moreover, the clusters cooperate in multi-hop with a secure strategy and reduce the probability of packet drop rate in the presence of malicious and unexpected events. The proposed AI-EPP algorithm produces much more stable and consistent data transportation because of using the up-to-date measurement of the network field. It decreases the chances to adopt the longer route and distribute the forwarders load in a balanced manner by splitting it into various chunks. In
Figure 5 and
Figure 6, the experimental results have shown that the proposed AI-EPP pointedly decreases the ratio of network latency by 41% and 39% than other solutions. The existing solutions incur high blockage and interruption costs under varying network nodes. Therefore, such a solution increases the ratio of anonymous calls of route maintenance and route re-adjustment. Furthermore, such solutions do not determine the reliability of wireless channels under a dynamic environment, which results in the inability to transmit sensors’ data on a robust route. Accordingly, the most processing time is wasted in computing the optimal route and leads to high data delay. However, the proposed AI-EPP algorithm separates the IoT network into various regions using hop count and network data is transmitted by multi-tiers. Further, it minimizes the route breakages and the re-establishment of alternate routes in case of a high data generation rate. Moreover, it efficiently manages wireless links’ and their available capacity for the delivery of sensitive data on time.
In
Figure 7 and
Figure 8, the experimental analysis presents the improvement in terms of energy consumption of proposed AI-EPP by 28% and 30% than the existing solutions. This is due to selecting the most competent nodes in terms of resource as cluster heads with the least transmission distance to both centroid and BS. The proposed AI-EPP offers a graph-based technique based on dividing the nodes into different clusters, reducing the proportion of energy consumption on the node level. The public key certificate-based cryptography mechanism in the proposed AI-EPP significantly reduces the chances of intrusions for re-directing the data packets towards prohibited points and decreases the unnecessary energy consumption of nodes. The proposed solution also exploits the lightweight computing functions for providing data security and avoids the chances for a malicious node to generate high intrusion on the transmission channels. In
Figure 9 and
Figure 10, the experimental analysis shows that the proposed AI-EPP reduces the ratio of malicious packets by 40% and 37% compared to existing solutions. This is due to the proposed AI-EPP algorithm incorporating the public key-based digital certificates for routing nodes, and accordingly, only the authorized nodes are eligible for data transmission. The computed trust value in the proposed AI-EPP is based on the nodes’ local information rather than the global facts of the entire network field that significantly increases the strength for identifying the malicious nodes with nominal cost. Furthermore, AI-EPP offers centralized authority for digital certificates’ issuance and manages data routing, minimizing malicious activities.
Figure 11 and
Figure 12 illustrate the analysis of the proposed AI-EPP algorithm with other solutions in terms of runtime overhead. The results have proven its significant improvement by 33% and 21%, respectively. It is due to providing the minimum routing cost solution in determining the optimal routes for medical data. In addition, a graph-based approach imposes the least overheads on exchanging the control messages among sensors and increases the routes’ strength. Moreover, the BS acts as a central authority to provide the selected routes’ authorization and avoid the extra messages among neighbors to negotiate. Unlike other solutions that enforce high control overhead for achieving data security, the proposed AI-EPP algorithm preserves privacy among medical sensors using the least computational-powered exclusive-OR function.
Figure 13 and
Figure 14 demonstrate the performance analysis of the proposed AI-EPP algorithm than existing solutions for link disconnectivity under a varying number of nodes. It is seen that the AI-EPP algorithm improved by 13% and 17%, respectively. The cost function operates on multiple factors and each time its archives optimal data routing even in the presence of network threats. The symmetric digital certificates offer trustworthiness criteria for mutual authentication among nodes with the collaboration BS. Unlike other solutions that impose an unbalanced load on routing nodes, the proposed AI-EPP algorithm efficiently utilizes the link performance in terms of interference and strength of the transmission system.
Figure 15 and
Figure 16 depict the performance analysis of the complexity for the AI-EPP algorithm against an existing solution. To analyze the complexity, we estimate the processing time while requesting the needed data from the application user and obtain the process data back to their ends. It is seen that the proposed solution reduces the processing time by 37% and 23% as compared to other solutions. This is due because it optimizes the communication services for time and constraint resources. Furthermore, flooding of control messages is reduced that significantly decreased the complexity time for data processing. Moreover, BS performed the role of establishing trust monitoring and authorization policies among the IoT network, which ultimately decreases the overheads on the nodes and offers timely service for application users.
5. Conclusions
In this work, an IoT solution is proposed by utilizing AI-enabled privacy-preserving with big data transferring using blockchain. The proposed work improves the management of data forwarding and offers a secure network infrastructure to maintain information privacy along authorize access against unusual events. It is seen that most of the existing work developed a solution for improving the public health system and facilitated the connected users in terms of optimal services. However, most of them are unreliable in terms of data controlling, especially when the load is increasing and communication channels are overburdened. Moreover, it is also observed that the existing solution offered security services to constraint devices but compromised the network performance for runtime overheads, energy consumption, and data latency. On the other hand, the proposed AI-EPP algorithm uses graph-based optimal modeling to produce trusted nodes for routing the data. It also performs registration, verification phases by using symmetric digital certificates and increasing the transmission credibility with a cloud platform. In addition, it provides integrity by incorporating blockchain technology in distributed development with minor computing overheads on network nodes. The results are tested and analyzed by simulations and the AI-EPP algorithm outperforms existing solutions with consistent and sustainable communication. In the future, we would like to exploit the machine learning approach to optimize the training process of the AI-EPP algorithm with real data sets. Moreover, we aim to collaborate with multiple cloud platforms for data accessibility and computational intelligence.