Abstract
The Industrial Internet of Things (IIoT) is gaining importance as most technologies and applications are integrated with the IIoT. Moreover, it consists of several tiny sensors to sense the environment and gather the information. These devices continuously monitor, collect, exchange, analyze, and transfer the captured data to nearby devices or servers using an open channel, i.e., internet. However, such centralized system based on IIoT provides more vulnerabilities to security and privacy in IIoT networks. In order to resolve these issues, we present a blockchain-based deep-learning framework that provides two levels of security and privacy. First a blockchain scheme is designed where each participating entities are registered, verified, and thereafter validated using smart contract based enhanced Proof of Work, to achieve the target of security and privacy. Second, a deep-learning scheme with a Variational AutoEncoder (VAE) technique for privacy and Bidirectional Long Short-Term Memory (BiLSTM) for intrusion detection is designed. The experimental results are based on the IoT-Botnet and ToN-IoT datasets that are publicly available. The proposed simulations results are compared with the benchmark models and it is validated that the proposed framework outperforms the existing system.
Keywords: security, IoT network, BLSTM, privacy, PoW, blockchain, smart contracts
1. Introduction
The Internet of Things (IoT)-based applications and services include sensor networks, healthcare systems, transportation, smart industry, communication systems, smart cities, and manufacturing [1]. The Industrial Internet of Things (IIoT) has been proposed to dramatically enhance qualities of traditional industries, break regional limitations to achieve remote monitoring, perform autonomous production, and provide real-time information to users [2,3,4]. The Internet of Thing (IoT) will deliver about 85% of all IoT devices in healthcare by 2025 [1]. According to Tractia, an intelligent organization, annual earnings in this sector using blockchain technologies would reach USD 9 billion by 2025 [2]. IoT devices are widely used in healthcare to give real-time services to patients and physicians [3]. IoMT-based medical device applications include medical institutions and businesses. However, as the number of internet-connected medical devices (IoMT) increases, greater volumes and inconsistency of data will be generated. With centralized cloud-based characteristics, handling significant data traffic in IoT (IoMT) has now become a severe problem and reason for concern [4]. As a result, patient safety and confidentiality concerns have grown while data collection, data ownership, location privacy, etc., will be at risk. By copying data and changing the identification of healthcare equipment, intruders and hackers can easily target the 5G-enabled IoMT network. IoMT-Cloud currently has a single point of failure, malicious attacks, and privacy leaks, as shown in Figure 1. To ensure network security and secure PHR transmission, data transfer between IoMT and Cloud requires trust, device identification, and user authentication (UA). With the traditional Central Cloud service, however, due to the round-the-clock networking of nodes in this IoT network, it is vulnerable to various security issues, such as message tampering, eavesdropping, and denial-of-service attacks [5]. In the industrial industry, this raises major security issues as the misuse of data can result in the incorrect diagnosis and can cause life-threatening scenarios for the patients under observation [6,7].
Figure 1.
Application of fog computing.
2. Background and Related Studies
The fog computing-based IoMT is currently a popular topic. Previous research missed important security issues such as: 1. Healthcare IoMT devices send data to cloud servers that are frequently unencrypted and open to manipulation and attack. As a result, sensitive patient information will likely be accessible. This issue leads to security vulnerabilities. 2. To our knowledge, the need to identify IoMT medical devices, which leads to the verification and authentication of health data, is considered very important and sensitive, and it can be accomplished quickly using a blockchain in the FC-IoMT system. Moreover, servers at the network’s edge should perform more detailed authentication and verification. BAKMP-IoMT, the new IoMT key agreement technique for blockchain-accessible authentication, was designed by [8]. It is also obtained theoretically from the algorithm’s top time complexity and the number of patients. Researcher in a study [9] explored various design research topics on readers’ 5G-enabled tactile internet fog computing. In the same way [10] thoroughly examined 5G-assisted smart health (Version 30 November 2021; Journal submitted to: not specified) of 14 care solutions in the IoT. R. Researchers in a study [11] proposed a multi-cloud cascade architecture, a low-overhead native testing framework, and a medical data storage backup method. This is also something that is examined by researchers [12] proposed a smart authentication (SSA) system to improve patient–physician data security and privacy preservation systems. Ref. [13] designed a node security identity authentication; providing a secure and reliable updating method for authentication keys and session keys. Ref. [14] proposed smart remote healthcare systems that require long working periods, low cost, network resilience, and confidence in highly dynamic network environments. Ref. [15] highlight the rising issues in IIoT information processing storage, querying, and dynamic data collecting. Researchers in a study [16] proposed a 69 case database and the current patient’s privacy was protected regardless of whether the abstracts matched or not. The overall comparative analysis of different parameters for 5G-enabled IoMT communication such as IoMT application, scalability, security, sustainability, storage, and computing is presented in Table 1. Ethereum is a permissionless blockchain that has been widely used by various blockchain enthusiasts. Ethereum follows the standard principles and elements of a blockchain network. Similar to a84blockchain, it uses the Proof of Work (PoW) consensus process to facilitate validation of blocks of the network by mining nodes before adding the blocks and their transactions into the blockchain. Ethereum can be utilized by connecting nodes to a blockchain with a unique chain-id. This allows all the nodes to participate within the blockchain activities and access blocks and/or transactions. Ethereum can also be implemented as a private blockchain for typical enterprise solutions that restrict access to their trusted assets and personnel [17].
Table 1.
Experimental Setup.
| Component Name | Description | Types |
|---|---|---|
| Hardware | Raspberry Pi | Hard |
| Memory | 1 GB | RAM |
| OS | Android | V.8 |
| Language Tool | Java | Hyperledger |
| Simulation Tool | Mat lab | V.2020 |
| Design Tool | Rational Rose | |
| Editing Tool | Latex | V3 |
A recent study conducted by Dorri et al. [18] reviewed the main challenges of fog computing and IOT. The study concluded the recent trends of IOT algorithms and the main challenges in fog computing, which works as a middle layer between data centers in the cloud and IOT networks. Hang et al. [19] developed a new scheme that captures the most significant features of the DBMS environment, including relational, graph-based, key-value, tree-like, etc., query languages, platforms (servers), plus running environments (desktop, Web, cloud), and specific contexts—i.e., focusing on optimizing queries, redundancy, security, performance, as compared with other schema-less approaches, programming languages/paradigms, and others. Yu et al. [20] focused on Quality of Service (QoS) in IOT utilization. They performed an analysis review on QoS techniques developed in the literature for IoT applications and investigated current research trends. They found that the most popular QoS metrics are Network Usage, Throughput, Reliability, and Latency.
2.1. Smart Contracts
The classical distributed consensus mechanism is the consensus mechanism used in the traditional distributed network, which realizes the distributed consensus through the state machine replication between network nodes. Hameed et al. [21] proposed the Byzantine Generals Problem and studied how non-fault nodes reach agreement on specific data in the case of possible failure nodes or malicious attacks, which became the basis for the research on consensus mechanisms. Dwivedi et al. [22] proposed a Paxos algorithm to solve the Byzantine Generals Problem. This algorithm can tolerate the collapse of a certain number of nodes in the network, so as to reach an agreement on a specific value in the distributed system. Daraghmi et al. [23] proposed the Practical Byzantine Fault Tolerance (PBFT). As a solution to the Byzantine Generals Problem, PBFT could achieve the final consensus among honest nodes while the number of enemies was no more than 1/3 of the total number of nodes. Jung et al. [24] proposed a new common algorithm: Mixed Byzantine Fault Tolerance (MBFT). Functionally, MBFT partitions the nodes participating in the consensus process and improves scalability and efficiency without sacrificing security. MBFT also introduces a random node selection mechanism and a credit mechanism to improve security and fault tolerance. Esposito et al. [25] proposed a dynamic reputation practical Byzantine fault tolerance algorithm. The dynamic reputation practical Byzantine fault tolerant algorithm adopts the consensus election method based on credit. The monitoring node divides the remaining nodes into two types of nodes according to their reputation values: consensus nodes and auxiliary nodes, which participate in different stages of the block generation process, respectively, and dynamically update the consensus nodes with low reputation scores.
2.2. PoX Consensus Mechanism
The PoX consensus mechanism is usually a blockchain consensus mechanism oriented towards the public chain. Its core idea is to determine the probability and expectation of the nodes to obtain the correct accounting based on the proportion of certain key resources owned by the nodes, so as to improve the security of the public chain network. Kermanshahi et al. [26] realized the design of a bitcoin system based on the traditional Proof of Work (PoW), and the blockchain was proposed for the first time as its underlying technology. Kermanshahi et al. [27] proposed Proof of Stake and introduced the concept of age of currency for the first time. The core idea is that the more coins a node has and the longer it has been holding coins, the more likely it will be chosen as a blocker. Kermanshahi et al. [28] proposed Permacoin based on Proof of Capacity (PoC), which requires participants to be able to store part of a large file. The authors of [18] proposed a novel lightweight Proof of Block Trade (PoBT) algorithm for the blockchain of the Internet of Things and its integrated framework, which can verify transactions and blocks with reduced computing time. Kermanshahi et al. [29] proposed a novel consensus mechanism called Proof of Negotiation (PoN). PoN introduced a trust mechanism to realize the random selection of honest miners and conducted a round of block creation through a negotiation mechanism.
2.3. Authorization Consensus Mechanism
The main idea of the authorization consensus mechanism is to complete the generation and maintenance of blocks through a distributed consistency algorithm after nodes have been authenticated. Dwivedi et al. [30] proposed the basic framework for Hyperledger Fabric. Hyperledger is a series of open source blockchain projects initiated by the Linux Foundation, which aims to provide an enterprise-class open-source distributed ledger framework and source code. Hyperledger Fabric is a community-based project that provides a supporting framework for blockchain applications. Rathi et al. [31] proposed the DFINITY consensus mechanism. DFINITY protocol operates in periods and divides all participating nodes into different groups. A random committee is responsible for transaction processing and consensus operation in each period, and at the end of each period, a random number function is used to determine the group serving as the committee in the next period. The PaLa consensus mechanism proposed by [32,33,34,35,36] realizes the rapid consensus in the authorization network. PaLa uses the method of parallel pipeline to improve the efficiency of block processing and adopts the sub-committee sliding window reconfiguration to ensure the sustainability of transaction processing during the reconfiguration.
2.4. Hybrid Consensus Mechanism
The main idea of the hybrid consensus mechanism is to select some nodes as the consensus committee through the PoX consensus mechanism and run the Byzantine consensus mechanism inside the committee to complete the generation of blocks. Ali et al. [37] first combined the classical distributed consistency algorithm PBFT with blockchain and proposed the PeerCensus consensus algorithm. Bitcoin is used as the underlying chain to select a certain number of nodes and complete the generation of the final block through the Chain Agreement (CA) algorithm after their identity authentication. Ali et al. [38] proposed the Hybrid Consensus mechanism, which realized state machine replication in an unauthorized environment by using workload proof. Hybrid Consensus for the first time uses a formal security model and modular design to model the hybrid consensus mechanism and proves that it can meet the safety characteristics such as consistency and activity. Siam et al. [39] proposed ELASTICO, a fragmentation consensus mechanism, which divides nodes participating in the consensus into multiple groups, outputs a block from each group, and then obtains the total block. Qasem et al. [40] proposed the RapidChain consensus mechanism, which realized computing sharing, communication sharing, and storage sharing. Its main modules include startup, consensus, and reconfiguration. Almaiah [41] proposed a Proof of QoS (PoQ) based on Quality of Service (QoS). In this validation protocol, the whole network is divided into several small regions, each region specifies a node according to its QoS, and then runs deterministic Byzantine fault tolerant consensus among all the specified nodes. Although the above-mentioned consensus mechanisms on the indices such as security and efficiency have excellent performance, but the consensus mechanism is still facing single-chain or homogeneous blockchain, they cannot be directly applied to multilevel heterogeneous and cross-blockchain application scenarios of governing blockchain by blockchain. They still need a safe, efficient, and scalable cross-blockchain mechanism for governing blockchain by blockchain frameworks. One of the key distinguishing features that hyper ledger supports for its users is smart contracts. The concept of smart contracts was introduced by Nick Szabo in 1994 who defined it as “a computerized transaction protocol that executes the terms of a contract”. The primary objective of introducing smart contracts was to facilitate the execution of scripts stored in the blockchain without the need for an intermediate entity.
Transactions: a transaction is a signed package of data that contains the following components: the signature of the sender and recipient of the message. The amount of ether to be transferred to the data field (optional). GASPRICE: fee required per computational step required for the sender to pay. STARTGAS: represents the max number of computational steps allowed for the transaction to execute. The data field is the key field that the contracts use to read whenever a smart contract is addressed [42,43,44,45,46]. IIoT Security Threats IIoT solutions consist of industrial systems that connect to cloud for data collection and analysis purposes. IIoT is similar to the traditional Industrial Control Systems (ICS) although the tight security restriction applied in ICS cannot be applied to IIoT environments naturally. This is due to the necessity of cloud computing requiring IIoT devices to have direct access to the internet. This is different from the traditional ICS environments that require different zoning and in-depth defense frameworks. ICS environments differ from the standard enterprise environments in many ways, and below are some of the key differences [47,48,49,50]. Risk level: significant impact on human lives and possibly the nation. Performance Requirements: requires real-time analysis as performance issues can affect the operations and hence can be risky to the organization. Availability Requirements: needs to be available at all times with redundant systems to ensure availability in case of a failure. Safety: safety requirements to be able prevent hazards by detecting unusual behavior and triggering alarms and safety measures. Multiple attacks have occurred in the past using different attack vectors using malware payload to take control of the ICS system. This includes but is not limited to the following ICS cyber attacks: 1. Stuxnet Malware [50,51,52,53,54,55]. Multiple attacks on the Ukraine Power Grid in 2015 and 2016 [56,57]. 2. Ransomware attacks by NotPetya [18]. TRITON attack framework targeting the safety instrumented system [58,59,60]. By analyzing the requirements and the risk level of traditional ICS environments, we can see that the data these systems transfer and receive within these environments are considered to be very sensitive. Any data exposure to unauthorized parties can have a major impact on organizations and potentially nations as a whole. Implementing IIoT may involve exposing some of these sensitive systems directly to the cloud. There have been multiple incidents that involve compromising IoT devices in order to use them to launch DDoS attacks [61,62,63] or to breach data to Command-Control (C2) servers [64,65,66,67]. By performing appropriate threat modeling of a 150private Ethereum blockchain solution, our paper examined the following research questions:
What are the threats that IIoT will face when blockchains are utilized in their environments?
How can blockchain transparency impact the exposure of IIoT environments to external threats?
What are the implications of compromising blockchain nodes within IIoT environments?
2.5. Contribution
The following are the main contributions of this research. 1. A novel proposed a scalable blockchain architecture for FC-based 5G-enabled IoMT that considers secure data access (SDA) and trust. 2. The integration of fog-based IoMT with a unique and decentralized management confidence architecture based on blockchain technology. 3. The use of a lightweight encryption system to reduce the computational, storage, and communication overhead. The rest of the paper is organized in the following structure: Section 3 describes the related work undertaken by the researcher. Section 3 has two subsections: (A) that overviews the 5G-enabled IoMT; (B) blockchain and fog-based architecture for IoMT. Section 4 represents the simulation and analysis of results. The last Section 5 and Section 6, represents the conclusion and future work.
3. Methodology
The proposed research methodology consists of training the proposed hybrid deep-learning model in a distributed manner and then deploying it on the edge devices. The edge or fog devices use its local data to update the pre-trained model and evaluate their own models. Moreover, all the users in the proposed model are considered trusted users due to the application of blockchain technology [1,6,7]. Due to the secured and flexible access control scheme, maintaining data integrity when communicating the data over IoT network is a challenging issue. Second, designing an adaptable security mechanism that can efficiently distinguish normal and attack instances in IIoT is also a challenging issue. The proposed model consists of an IoMT network consisting of various interconnected medical sensors, actuators, and machines, located at multiple fog nodes [8,10,14]. Third, developing a new framework for deploying blockchain and deep-learning techniques in current cloud-edge assisted industrial systems is of utmost importance with the integration of blockchain. The backup data is stored in the cloud whereas the meta-data are stored and hashed inside the blockchain. As such framework often faces issues related to scalability, due to different computing power of the participating edge nodes it is infeasible to store the complete block in the edge networks [4,5]. Figure 2 represents the scenarios of our proposed framework. The integration of blockchain with the hybrid IOT and its application in fog computing are explained in Figure 2.
Figure 2.
System layers of the proposed model.
This is based on the blockchain concept and can be utilized to perform peer-to-peer data transmission in a secured manner. This will be used to store transaction data for a long time and will not be fabricated or deleted from the blockchain. Furthermore, the transaction details are kept on the cloud server, which makes the data immutable and decentralized [12]. The data integrity can be achieved by the secure hash function SHA512. This hash function is included in the respective message digest and creates the fixed length of the unique fingerprint. The used SHA512 is resistant to collision and can be applied in real-time processing along with brute force attacks [13]. The message digest can be used in transaction blocks since it can circumvent the poisoning attack known as the avalanche effect [14]. Moreover, if we change one bit of data this can completely change the message digest. Thus, it preserves the IoT data integrity. Some of the information present in the created blocks are block index, previous hash, current block hash, current proof, data (Tvalue), (Tscore), and timestamp. Figure 3 represents different modules of the proposed system architecture and the flow of data through various organizations.
Figure 3.
Integration of the blockchain with the proposed model.
As shown in Figure 4 and Figure 5, the generated blockchain is maintained with the help of the hash function of the previous chain. Thus, the verifiability of the system has been enhanced. Moreover, in the blockchain, the verification of the integrity of the hash chain has been performed while conducting the generation of new blocks by utilizing the consensus mechanism [15]. 5G-Enabled IoMT Communication. One of the essential applications in 5G networks is smart healthcare. The general architecture and essential entities of the 5G intelligent health network are depicted in Figure 2, representing the smart antenna requirement for 5G-enabled network communication. Smart antennas benefit from several significant advancements in the current scenario that boost 5G [8]. Perfect signal and transmission capabilities are possible thanks to a well-coordinated RF beam. However, because the focus of interest diminishes with increased attenuation, the location remains an issue. The use of machine-to-machine connections (M2M) and the IoMT as the foundations of intelligent healthcare in 5G networks (IoMT) is predictable. There are two fundamental drawbacks to the strategies given. The first is many terminals, resulting in dense networks. For IoMT and M2M applications, ultra-density and scalability issues are required. The second point of concern is secure consumption, which results from the nature of IoMT-based [9] applications that use wireless sensors. Figure 5 describes the timeline diagram of the proposed model and its function.
Figure 4.
Flow of data through the proposed model.
Figure 5.
Timeline diagram of the proposed model.
4. Proposed Framework
This section presents the proposed framework for fog computing using 5G technology. Once the data is generated via IoT devices, the network traffic is routed to FogBlock by the nearest gateway/router. The incoming traffic is sniffed using a sensor, which extracts features at the fog block. The reputation score is computed, and the address-based blockchain reputation system is designed. The three primary classifications of transactions based on the outcome are general, honest, and dishonest. The distributed file storage system stores the raw or transaction data [25]. The raw data was transmitted with trust information using the privacy-preservation module and the hast proof with message digest is constructed using ePoW on the blockchain which prevents inference attacks and validates data record chains using system-based machine learning. The GTBSS-HDNN model categorizes many types of attacks as well as normal data. The MICA approach uses second-level privacy to transform the original data into a new transformed format. The anomalous class administrator is replaced at the end and the Cloud Block receives the request safely.
In Cloud Block, several providers offer various types of data centers. In the proposed architecture, three data centers are used: A, B, and C. To create a blockchain network, the 268 proposed GTBSS-HDNN architecture is implemented at each data center and these are the 269 entities in the Cloud Block network [26]. The trust between the verifiable, auditable, 270, and immutable blocks is built using the proposed hybrid NN architecture. Threat ID type properties: T1 Internal Confidentiality; T2 External Availability Internal Threats. The likelihood of internal threats mainly depends on the frequency of security attacks and data breaches caused by insider threats. According to a report produced by Nucleus Cyber in 2019 [31], 60% of the surveyed organizations had experienced one or more insider attacks within the last 12 months in 2019. In addition, according to a threat report produced by Proof point [32], around 75% percent of the reported attacks analyzed were caused by criminal or malicious insiders in 2020. Therefore, the threat the likelihood for threat T1 can be considered to be moderate. External threats: A shown in Figure 4, the intended architecture is composed of several layers. By processing IoMT data on fog nodes (FN), the initial layer (IL) of FN minimizes latency. This also enables the user to realize his desire for quick service. In future, in IoMT devices [25], a multi-layered design, as depicted in Figure 2, has been proposed for applications involving large amounts of data. The devices connected and FN are shown in the first layer of this design. Connected devices communicate with one another, and blockchain technology provides security. The second level of FN’s latency is reduced because of IoMT device communication. As a result, users’ requirements are encountered in the proposed fog computing (FC) model [43,44,45,46,47,48,49,50].
4.1. Proposed Smart Contracts and Fog Computing
A blockchain and fog network [24] connects the Internet of Medical Things (IoMT) and fog nodes (FN) (IoMT-Fog). Distributed technology can deliver on-demand services by combining high performance and low latency (LL). It will raise the threshold for monitoring people’s health. The FC paradigm aids IoMT elements with low latency (LL), allowing for faster data processing. The proposed IoMT-Fog, shown in Figure 6 and Figure 7, could provide a more appropriate medical equipment (ME) solution. The proposed neural network with the integration of smart contracts is represented through Figure 8.
Figure 6.
Proposed access control and the data flow through blockchain.
Figure 7.
Comparative analysis of the writing Merkle tree vs. writing contribution data.
Figure 8.
Performance evaluation of the proposed model versus the benchmark model.
One of the essential applications in 5G networks is smart healthcare. The general architecture and essential entities of the 5G intelligent health network are depicted in Figure 2, which represents the smart antenna requirement for 5G-enabled network communication. Smart antennas benefit from several significant advancements in the current scenario boost 5G coverage and capacity. Beam shaping (vertical and horizontal) is a breakthrough that concentrates RF energy in a compact beam and targets it precisely where it is needed, rather than dispersing it over a large region.
4.2. Proposed Algorithm
In this section we describe our proposed two algorithms (Algorithms 1 and 2). These algorithms are represented as below:
| Algorithm 1: FC-Average Algorithm |
|
1: Init: a = 0; 2: for each round t = 1,2,…do 3: select K clients 4: for each K clients do 5: wkt, UpdateClient( ) 6: dkt ← the distance between two classes dataset end for 7: If (dk = t) ←1 8: dk = wk * t ←pk k = 1nk f(dkt) wt1/pkk = 1nkfd kt) 9: end for 10: Updatefunction( ) 11: Initialize local minibatch size L, local epochs E, learning rate 12: for each epoch i E do 13: randomly choose S: based on size L 14: wi ← w1 – w5g(w1:s) 15: end for 16: return i 17: End Procedure 18: End Algorithm |
| Algorithm 2: Algorithm Method Evaluation |
|
1: Enhance Analysis of both the IOMT end 2: Select IOMT node for Transaction selection (Node) 3: Get EMR data, hash, get (EMR) 4: Extract EMRFromRepository from ERM (ERM name) 5: ERM, valid SHA256 CheckHash (ERM, Hash) 6: if ERM is T, then 7: Get the Connent (Connect) 8: Generate Indications (Connect length) 9: Valid Blockchain transaction Valid (i, indications) 10: Del Local EMR delete (EMR) 11: End if (EMR) 12: End 13: End 14: wi ← w1 – w5g(w1:s) |
5. Experimental Setup
We set up an experimental environment to implement our proposed framework using Fog Node (FN) for IoMT networks with the corresponding throughput elapsed time or intervened time. When a cloud-based ordering system is established using a virtual machine (VM), the time of the associated bypass and the number of nodes is assessed. For performance measurement, 16.04 LTS Core i5 CPU Ubuntu is a Linux distribution 2.50 GHz 2.71 GHz (VirtualBox). The RAM capacity is 16 GB. Each follower peer virtualization scenario has 30 vCPUs and 8 gigabytes of RAM. It repeats the following process 30 times. The number of transactions handled per subsequent is referred to as a second transaction—several transactions per second (TPS). The response time was 226 milliseconds, with a minimum of milliseconds and milliseconds. Figure 6 shows the hyperledger-based fog architecture for intervened time. As the thread group starts and pauses a demo application, we notice network latency (NL). We also managed threads in a blockchain (BC) network successfully. The response times to the blockchain (BC) network are depicted in Figure 7 and show the intervened time and active thread in the fog computing environment. We moved the ordering service to the cloud to determine if the network is steady. Despite the low minimum (LM), the ordering instance 233 generates a reasonably stable network. It was proven to work in situations where 234 high throughput and a real-time environment are required. The performance graph of a 235 fog network based on Hyperleader Fabric (HF) over time is shown in Figure 7. Blockchain, IoMT (Fog-BC-IoMT), and FC technologies all utilized the proposed architecture (Fog-IoMT). To record transactions, the BC is utilized to create a legal public, hyperdistributed EMR. Several IoMT-NODES are utilized in the architecture testing and implementation. The outcomes were estimated satisfactorily. This study suggests an architecture for preventing data fraud by converting existing centralized database systems to block-based distributed databases. It divides the system into four parts: cloud, fog, blockchain, and IoMT. The IoMT system is self-contained. We also examined whether the network convention method could assist with public cloud resources more effectively. The ordered migrates to the cloud for stability, security, and scalability and avoids performance issues by not directly connecting IoMT devices to forbidden networks. Hyperledger, a chain block solution, handles IoMT validation and safety. To reduce network latency (NL) and output, smart contracts (SC) and transaction checking on fog nodes (FN) is recommended. The network architecture will challenge cost reductions in the cloud and optimize cloud and FN instancing performance to boost the efficiency of the hyperledger BC network [50,51,52,53,54,55,56,57,58].
6. Results and Discussion
Internal threats: the likelihood of internal threats mainly depends on the frequency of security attacks and data breaches caused by insider threats [59,60,61,62,63,64,65,66,67]. According to a report produced by Nucleus Cyber in 2019 [31], 60% of the surveyed organizations have experienced one or more insider attacks within the last 12 months in 2019. In addition, according to a threat report produced by Proof point [32], around 50% percent of the reported attacks analyzed were caused by criminal or malicious insiders in 2020. Therefore, the likelihood for threat T1 can be considered to be moderate. Algorithm 2 describes the process of encryption and hashing techniques. We carried out the experimental setup based on the proposed framework and algorithm. The simulations were carried out using the hyperledger fabric tool. In order to implement the proposed algorithm and smart contracts we used chain code for blockchain transactions. The parameters used for analysis include block creation, encryption time, decryption time, number of transactions, number of iterations, and number of nodes. Figure 9 shows the comparative analysis between the writing Merkle tree root and writing contribution data using hybrid deep-learning techniques using consortium blockchain in terms of number of tests carried out and execution time in seconds. We carried out up to 100 tests and the execution time was noted as up to 100. Figure 10 simulations were carried out on the experimental results from the number of devices and the service execution time. We provided a comparative analysis through the experiment based on a simulation of the proposed model and the benchmark model. From Figure 7, it is very obvious that our proposed model takes significantly less process and execution time as compared to the benchmark models.
Figure 9.
Performance analysis of the proposed system versus benchmark model.
Figure 10.
Latency evaluation through number of rounds versus execution time.
As presented in Figure 8, we carried out the simulations results based on training time based on the proposed hybrid deep-learning protocol (BLSTM + CNN) and the number of transactions. From the simulations results, it is very clear that the number of transactions is higher as compared to the benchmark models based on the training time. The simulation result in Figure 8 explains that our proposed system is more intelligent, and it transfers the blocks according to the requirements and quick access to the participants in the system, thus, it is time effective as well.
As presented in Figure 9, we carried out simulation results based on number of records and the execution time. In Figure 11, we compare our proposed model with the benchmark model such as [12,13,14]. Using hybrid deep-learning techniques and choosing the blocks according to the requirements, our proposed model takes significantly less time as compared to the benchmark model. Thus, Figure 9 justifies that our proposed framework is efficient and intelligent. In Figure 10, we present an experimental analysis based on the number of rounds and the number of transactions through the proposed model. We tested our proposed model based on different nodes and we started from 20 nodes up to a maximum of 140 nodes. The number of rounds taken into account were 300 and the number of transactions counted was up to 5000.
Figure 11.
Comparative analysis of the number of rounds versus execution time.
As presented in Figure 11, we carried out simulations based on two parameters including privacy parameter and test accuracy. We carried out the simulation results for two rounds and then we analyzed the test accuracy. We validated our simulations results through Figure 11, and we found that there is significantly less difference in the accuracy, showing the validation of our method for security and privacy. Figure 12 and Figure 13 represent the simulations results based on the number of domains and the local epoch. The value epoch represents the training of the datasets in batch form. Figure 14 represents the simulation results based on number of blocks and the processing time in microseconds.
Figure 12.
Privacy evaluation of the proposed model.
Figure 13.
Cross-domain analysis of the proposed framework.
Figure 14.
Effective cost analysis, w.r.t., number of blocks.
7. Conclusions
In this research, a novel approach based on hybrid deep learning (BLST + CNN) was used to train the model in a decentralized fashion with minimum latency as well as less computational cost. The proposed model learns from a defined model which tracks the behavior and integration of the users. The proposed framework provides a decentralized nature and privacy preservation approach. The training of the model was carried out on each local device using hybrid deep learning (BLSTM + CNN). The bi-linear long short-term memory (BLSTM) consists of two modules, i.e., feed forward and feed backward and at the end it concatenates. We used the datasets based on IoT-ToN available publicly on UNSW, Australia website. Moreover, we divided the dataset into two parts, i.e., training and testing. Similarly, for the proposed model, 30% of data were used for training and 70% used for testing and validation. From the simulations results, it was concluded that the proposed model outperformed the benchmark model. The latency of the proposed framework was observed up to 20 ms which is lower as compared to the benchmark models. In order to provide privacy preservation, the proposed model was encrypted using lightweight encryption and decryption based on homomorphic encryption. Similarly, the use of homomorphic encryption provides the ability to perform additive or multiplicative operations over encrypted data. The proposed model is recommended for cross-domain networks in any healthcare systems. In the future, we want to extend the proposed research work using a PSO algorithm integrated with federated learning. This approach will improve the existing work.
Acknowledgments
This work was supported through the Annual Funding track by the Deanship of Scientific Research, Vice Presidency for Graduate Studies and Scientific Research, King Faisal University, Saudi Arabia [Project No. GRANT294] and Princess Nourah bint Abdulrahman University Researchers Supporting Project number (PNURSP2022R236), Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia.
Author Contributions
M.A.A. (Mohammed Amin Almaiah), A.A. and F.H. conceived and designed the experiments; M.F.P. performed the experiments; M.A.A. (Mohammed Amin Almaiah), M.A.A. (Manal Abdullah Alohali) and A.A. analyzed the data; M.F.P. contributed reagents/materials/analysis tools; M.A.A. (Manal Abdullah Alohali), F.H. and A.A. wrote the paper. All authors have read and agreed to the published version of the manuscript.
Funding
This research was funded by the King Faisal University, Saudi Arabia and Princess Nourah bint Abdulrahman University, Saudi Arabia.
Institutional Review Board Statement
Not available.
Informed Consent Statement
Not applicable.
Data Availability Statement
The data used within the research can be provided by the first author upon request.
Conflicts of Interest
All authors declare that they have no conflict of interest.
Footnotes
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.
References
- 1.Shah A.A., Piro G., Grieco L.A., Boggia G. A qualitative cross-comparison of emerging technologies for software-defined systems; Proceedings of the 2019 Sixth International Conference on Software Defined Systems (SDS); Rome, Italy. 10–13 June 2019; pp. 138–145. [Google Scholar]
- 2.Ali A., Mehboob M. Comparative analysis of selected routing protocols for wlan based wireless sensor networks (wsns); Proceedings of the 2nd International Multi-Disciplinary Conference; Gujrat, Pakistan. 19–20 December 2016; p. 20. [Google Scholar]
- 3.Shah A., Piro G., Grieco L.A., Boggia G. A review of forwarding strategies in transport software-defined networks; Proceedings of the 2020 22nd International Conference on Transparent Optical Networks (ICTON); Bari, Italy. 19–23 July 2020; pp. 1–4. [Google Scholar]
- 4.Bruce R.R., Cunard J.P., Director M.D. From Telecommunications to Electronic Services: A Global Spectrum of Definitions, Boundary Lines, and Structures. Butterworth-Heinemann; Oxford, UK: 2014. [Google Scholar]
- 5.Gatteschi V., Lamberti F., Demartini C., Pranteda C., Santamaría V. Blockchain and smart contracts for insurance: Is the technology mature enough? Future Internet. 2018;10:20. doi: 10.3390/fi10020020. [DOI] [Google Scholar]
- 6.Jia B., Zhou T., Li W., Liu Z., Zhang J. A Blockchain-Based Location Privacy Protection Incentive Mechanism in Crowd Sensing Networks. Sensors. 2018;18:3894. doi: 10.3390/s18113894. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 7.Biswas K., Muthukkumarasamy V. Securing smart cities using blockchain technology; Proceedings of the 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS); Sydney, NSW, Australia. 12–14 December 2016; pp. 1392–1393. [Google Scholar]
- 8.Fernández-Caramés T.M., Froiz-Míguez I., Blanco-Novoa O., Fraga-Lamas P. Enabling the Internet of Mobile Crowdsourcing Health Things: A Mobile Fog Computing, Blockchain and IoT Based Continuous Glucose Monitoring System for Diabetes Mellitus Research and Care. Sensors. 2019;19:3319. doi: 10.3390/s19153319. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 9.Ali A., Naveed M., Mehboob M., Irshad H., Anwar P. An interference aware multi-channel mac protocol for wasn; Proceedings of the 2017 International Conference on Innovations in Electrical Engineering and Computational Technologies (ICIEECT); Karachi, Pakistan. 5–7 April 2017; pp. 1–9. [Google Scholar]
- 10.Beebeejaun A. VAT on foreign digital services in Mauritius; a comparative study with South Africa. Int. J. Law Manag. 2020;63:239–250. doi: 10.1108/IJLMA-09-2020-0244. [DOI] [Google Scholar]
- 11.Aziz Shah A., Piro G., Grieco L.A., Boggia G. A quantitative cross-comparison of container networking technologies for virtualized service infrastructures in local computing environments. Trans. Emerg. Telecommun. Technol. 2021;32:e4234. doi: 10.1002/ett.4234. [DOI] [Google Scholar]
- 12.Yazdinejad A., Parizi R.M., Dehghantanha A., Choo K.-K.R. Blockchain-enabled authentication handover with efficient privacy protection in sdn-based 5g networks. IEEE Trans. Netw. Sci. Eng. 2019;8:1120–1123. doi: 10.1109/TNSE.2019.2937481. [DOI] [Google Scholar]
- 13.Kim H., Kim S.-H., Hwang J.Y., Seo C. Efficient Privacy-Preserving Machine Learning for Blockchain Network. IEEE Access. 2019;7:136481–136495. doi: 10.1109/ACCESS.2019.2940052. [DOI] [Google Scholar]
- 14.Cirstea A., Enescu F.M., Bizon N., Stirbu C., Ionescu V.M. Blockchain Technology Applied in Health The Study of Blockchain Application in the Health System (II); Proceedings of the 2018 10th International Conference on Electronics, Computers and Artificial Intelligence (ECAI); Iasi, Romania. 28–30 June 2018; pp. 1–4. [DOI] [Google Scholar]
- 15.Yazdinejad A., Srivastava G., Parizi R.M., Dehghantanha A., Choo K.-K.R., Aledhari M. Decentralized Authentication of Distributed Patients in Hospital Networks Using Blockchain. IEEE J. Biomed. Health Inform. 2020;24:2146–2156. doi: 10.1109/JBHI.2020.2969648. [DOI] [PubMed] [Google Scholar]
- 16.Patel V. A framework for secure and decentralized sharing of medical imaging data via blockchain consensus. Health Inform. J. 2018;25:1398–1411. doi: 10.1177/1460458218769699. [DOI] [PubMed] [Google Scholar]
- 17.El-Rewini Z., Sadatsharan K., Selvaraj D.F., Plathottam S.J., Ranganathan P. Cybersecurity challenges in vehicular communications. Veh. Commun. 2019;23:100214. doi: 10.1016/j.vehcom.2019.100214. [DOI] [Google Scholar]
- 18.Dorri A., Kanhere S.S., Jurdak R., Gauravaram P. Blockchain for iot security and privacy: The case study of a smart home; Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops); Kona, HI, USA. 13–17 March 2017; pp. 618–623. [Google Scholar]
- 19.Hang L., Kim D.-H. Design and Implementation of an Integrated IoT Blockchain Platform for Sensing Data Integrity. Sensors. 2019;19:2228. doi: 10.3390/s19102228. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 20.Yu B., Kermanshahi S.K., Sakzad A., Nepal S. International Conference on Provable Security. Springer; Cham, Switzerland: 2019. Chameleon Hash Time-Lock Contract for Privacy Preserving Payment Channel Networks; pp. 303–318. [DOI] [Google Scholar]
- 21.Hameed K., Ali A., Naqvi M.H., Jabbar M., Junaid M., Haider A. Resource management in operating systems-a survey of scheduling algorithms; Proceedings of the International Conference on Innovative Computing (ICIC); Lanzhou, China. 2–5 August 2016; pp. 2–5. [Google Scholar]
- 22.Dwivedi A.D., Srivastava G., Dhar S., Singh R. A Decentralized Privacy-Preserving Healthcare Blockchain for IoT. Sensors. 2019;19:326. doi: 10.3390/s19020326. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 23.Daraghmi E.-Y., Daraghmi Y.-A., Yuan S.-M. MedChain: A Design of Blockchain-Based System for Medical Records Access and Permissions Management. IEEE Access. 2019;7:164595–164613. doi: 10.1109/ACCESS.2019.2952942. [DOI] [Google Scholar]
- 24.Jung Y., Peradilla M., Agulto R. Packet Key-Based End-to-End Security Management on a Blockchain Control Plane. Sensors. 2019;19:2310. doi: 10.3390/s19102310. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 25.Esposito C., de Santis A., Tortora G., Chang H., Choo K.-K.R. Blockchain: A panacea for healthcare cloud-based data security and privacy? IEEE Cloud Comput. 2018;5:31–37. doi: 10.1109/MCC.2018.011791712. [DOI] [Google Scholar]
- 26.Kermanshahi S.K., Liu J.K., Steinfeld R., Nepal S., Lai S., Loh R., Zuo C. Multi-client Cloud-based Symmetric Searchable Encryption. IEEE Trans. Dependable Secur. Comput. 2019;18:2419–2437. doi: 10.1109/TDSC.2019.2950934. [DOI] [Google Scholar]
- 27.Zhang P., Zhang Y. A BAS Algorithm Based Neural Network for Intrusion Detection; Proceedings of the 2021 11th International Conference on Intelligent Control and Information Processing (ICICIP); Dali, China. 3–7 December 2021; pp. 22–27. [Google Scholar]
- 28.Kermanshahi S.K., Liu J.K., Steinfeld R. Australasian Conference on Information Security and Privacy. Springer; Berlin/Heidelberg, Germany: 2017. Multi-user cloud-based secure keyword search; pp. 227–247. [Google Scholar]
- 29.Kermanshahi S.K., Liu J.K., Steinfeld R., Nepal S. European Symposium on Research in Computer Security. Springer; Cham, Switzerland: 2019. Generic Multi-keyword Ranked Search on Encrypted Cloud Data; pp. 322–343. [DOI] [Google Scholar]
- 30.Almomani O. A hybrid model using bio-inspired metaheuristic algorithms for network intrusion detection system. Comput. Mater. Contin. 2021;68:409–429. doi: 10.32604/cmc.2021.016113. [DOI] [Google Scholar]
- 31.Rathi V.K., Chaudhary V., Rajput N.K., Ahuja B., Jaiswal A.K., Gupta D., Elhoseny M., Hammoudeh M. A blockchain-enabled multi domain edge computing orchestrator. IEEE Internet Things Mag. 2020;3:30–36. doi: 10.1109/IOTM.0001.1900089. [DOI] [Google Scholar]
- 32.Xu X., Weber I., Staples M., Zhu L., Bosch J., Bass L., Pautasso C., Rimba P. A taxonomy of blockchain-based systems for architecture design; Proceedings of the 2017 IEEE International Conference on Software Architecture (ICSA); Gothenburg, Sweden. 3–7 April 2017; pp. 243–252. [Google Scholar]
- 33.Ayed A.B. A conceptual secure blockchain-based electronic voting system. Int. J. Netw. Secur. Its Appl. 2017;9:1–9. [Google Scholar]
- 34.Wan Z., Guan Z., Zhou Y., Ren K. zk-AuthFeed: How to Feed Authenticated Data into Smart Contract with Zero Knowledge; Proceedings of the 2019 IEEE International Conference on Blockchain (Blockchain); Atlanta, GA, USA. 14–17 July 2019; pp. 83–90. [DOI] [Google Scholar]
- 35.Jin H., Su L., Xiao H., Nahrstedt K. Incentive Mechanism for Privacy-Aware Data Aggregation in Mobile Crowd Sensing Systems. IEEE/ACM Trans. Netw. 2018;26:2019–2032. doi: 10.1109/TNET.2018.2840098. [DOI] [Google Scholar]
- 36.Pang X., Guo D., Wang Z., Sun P., Zhang L. Towards fair and efficient task allocation in blockchain-based crowdsourcing. CCF Trans. Netw. 2020;3:193–204. doi: 10.1007/s42045-020-00043-w. [DOI] [Google Scholar]
- 37.Ali A., Rahim H.A., Ali J., Pasha M.F., Masud M., Rehman A.U., Chen C., Baz M. A Novel Secure Blockchain Framework for Accessing Electronic Health Records Using Multiple Certificate Authority. Appl. Sci. 2021;11:9999. doi: 10.3390/app11219999. [DOI] [Google Scholar]
- 38.Ali A., Rahim H.A., Pasha M.F., Dowsley R., Masud M., Ali J., Baz M. Security, privacy, and reliability in digital healthcare systems using blockchain. Electronics. 2021;10:2034. doi: 10.3390/electronics10162034. [DOI] [Google Scholar]
- 39.Siam A.I., Almaiah M.A., Al-Zahrani A., Elazm A.A., El Banby G.M., El-Shafai W., El-Samie F.E.A., El-Bahnasawy N.A. Secure Health Monitoring Communication Systems Based on IoT and Cloud Computing for Medical Emergency Applications. Comput. Intell. Neurosci. 2021;2021:8016525. doi: 10.1155/2021/8016525. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 40.Qasem M.H., Obeid N., Hudaib A., Almaiah M.A., Al-Zahrani A., Al-Khasawneh A. Multi-agent system combined with distributed data mining for mutual collaboration classification. IEEE Access. 2021;9:70531–70547. doi: 10.1109/ACCESS.2021.3074125. [DOI] [Google Scholar]
- 41.Almaiah M.A. Artificial Intelligence and Blockchain for Future Cybersecurity Applications. Springer; Berlin/Heidelberg, Germany: 2021. Almaiah, M.A. A new scheme for detecting malicious attacks in wireless sensor networks based on blockchain technology; pp. 217–234. [Google Scholar]
- 42.Almaiah M.A., Al-Zahrani M. Multilayer neural network based on MIMO and channel estimation for impulsive noise environment in mobile wireless networks. Int. J. Adv. Trends Comput. Sci. Eng. 2020;9:315–321. doi: 10.30534/ijatcse/2020/48912020. [DOI] [Google Scholar]
- 43.Ababneh J., Almomani O. Survey of Error Correction Mechanisms for Video Streaming over the Internet. Int. J. Adv. Comput. Sci. Appl. 2014;5:154–161. doi: 10.14569/IJACSA.2014.050322. [DOI] [Google Scholar]
- 44.Ali A., Pasha M.F., Fang O.H., Khan R., Almaiah M.A., KAl Hwaitat A. Big Data Intelligence for Smart Applications. Springer; Berlin/Heidelberg, Germany: 2022. Big Data Based Smart Blockchain for Information Retrieval in Privacy-Preserving Healthcare System; pp. 279–296. [Google Scholar]
- 45.Almaiah M.A., Hajjej F., Ali A., Pasha M.F., Almomani O. A Novel Hybrid Trustworthy Decentralized Authentication and Data Preservation Model for Digital Healthcare IoT Based CPS. Sensors. 2022;22:1448. doi: 10.3390/s22041448. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 46.Ali A., Almaiah M.A., Hajjej F., Pasha M.F., Fang O.H., Khan R., Teo J., Zakarya M. An Industrial IoT-Based Blockchain-Enabled Secure Searchable Encryption Approach for Healthcare Systems Using Neural Network. Sensors. 2022;22:572. doi: 10.3390/s22020572. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 47.Almaiah M.A., Hajjej F., Ali A., Pasha M.F., Almomani O. An AI-Enabled Hybrid Lightweight Authentication Model for Digital Healthcare Using Industrial Internet of Things Cyber-Physical Systems. [(accessed on 12 February 2022)]. Available online: https://www.researchgate.net/publication/358575824_An_AI-Enabled_Hybrid_Lightweight_Authentication_Model_for_Digital_Healthcare_Using_Industrial_Internet_of_Things_Cyber-Physical_Systems.
- 48.Qasem M.H., Hudaib A., Obeid N., Almaiah M.A., Almomani O., Al-Khasawneh A. Big Data Intelligence for Smart Applications. Springer; Berlin/Heidelberg, Germany: 2022. Multi-agent Systems for Distributed Data Mining Techniques: An Overview; pp. 57–92. [DOI] [Google Scholar]
- 49.Almaiah M.A., Al-Zahrani A., Almomani O., Alhwaitat A.K. Artificial Intelligence and Blockchain for Future Cybersecurity Applications. Springer; Cham, Switzerland: 2021. Classification of cyber security threats on mobile devices and applications; pp. 107–123. [Google Scholar]
- 50.Bubukayr M.A., Almaiah M.A. Cybersecurity concerns in smart-phones and applications: A survey; Proceedings of the 2021 International Conference on Information Technology (ICIT); Amman, Jordan. 14 July 2021; pp. 725–731. [Google Scholar]
- 51.Al Nafea R., Almaiah M.A. Cyber security threats in cloud: Literature review; Proceedings of the 2021 International Conference on Information Technology (ICIT); Amman, Jordan. 14 July 2021; pp. 779–786. [Google Scholar]
- 52.Almomani O., Almaiah M.A., Alsaaidah A., Smadi S., Mohammad A.H., Althunibat A. Machine Learning Classifiers for Network Intrusion Detection System: Comparative Study; Proceedings of the 2021 International Conference on Information Technology (ICIT); Amman, Jordan. 14 July 2021; pp. 440–445. [Google Scholar]
- 53.Alamer M., Almaiah M.A. Cybersecurity in Smart City: A systematic mapping study; Proceedings of the 2021 International Conference on Information Technology (ICIT); Amman, Jordan. 14 July 2021; pp. 719–724. [Google Scholar]
- 54.Khan M.N., Rahman H.U., Almaiah M.A., Khan A., Raza M., Al-Zahrani M., Almomani O., Khan R. Improving Energy Efficiency With Content-Based Adaptive and Dynamic Scheduling in Wireless Sensor Networks. IEEE Access. 2020;8:176495–176520. doi: 10.1109/ACCESS.2020.3026939. [DOI] [Google Scholar]
- 55.Adil M., Almaiah M.A., Omar Alsayed A., Almomani O. An anonymous channel categorization scheme of edge nodes to detect jamming attacks in wireless sensor networks. Sensors. 2020;20:2311. doi: 10.3390/s20082311. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 56.Al Hwaitat A.K., Almaiah M.A., Almomani O., Al-Zahrani M., Al-Sayed R.M., Asaifi R.M., Adhim K.K., Althunibat A., Alsaaidah A. Improved security particle swarm optimization (PSO) algorithm to detect radio jamming attacks in mobile networks. Quintana. 2020;11:614–624. doi: 10.14569/IJACSA.2020.0110480. [DOI] [Google Scholar]
- 57.Adil M., Khan R., Almaiah M.A., Al-Zahrani M., Zakarya M., Amjad M.S., Ahmed R. MAC-AODV Based Mutual Authentication Scheme for Constraint Oriented Networks. IEEE Access. 2020;8:44459–44469. doi: 10.1109/ACCESS.2020.2978303. [DOI] [Google Scholar]
- 58.Almaiah M.A., Dawahdeh Z., Almomani O., Alsaaidah A., Al-Khasawneh A., Khawatreh S. A new hybrid text encryption approach over mobile ad hoc network. Int. J. Electr. Comput. Eng. 2020;10:6461–6471. doi: 10.11591/ijece.v10i6.pp6461-6471. [DOI] [Google Scholar]
- 59.Adil M., Khan R., Almaiah M.A., Bin Sawad M., Ali J., Al Saaidah A., Ta Q.T.H. An Efficient Load Balancing Scheme of Energy Gauge Nodes to Maximize the Lifespan of Constraint Oriented Networks. IEEE Access. 2020;8:148510–148527. doi: 10.1109/ACCESS.2020.3015941. [DOI] [Google Scholar]
- 60.Adil M., Khan R., Ali J., Roh B.-H., Ta Q.T.H., Almaiah M.A. An Energy Proficient Load Balancing Routing Scheme for Wireless Sensor Networks to Maximize Their Lifespan in an Operational Environment. IEEE Access. 2020;8:163209–163224. doi: 10.1109/ACCESS.2020.3020310. [DOI] [Google Scholar]
- 61.AlMedires M., AlMaiah M. Cybersecurity in Industrial Control System (ICS); Proceedings of the 2021 International Conference on Information Technology (ICIT); Amman, Jordan. 14 July 2021; pp. 640–647. [Google Scholar]
- 62.Almudaires F., Almaiah M. Data an overview of cybersecurity threats on credit card companies and credit card risk mitigation; Proceedings of the 2021 International Conference on Information Technology (ICIT); Amman, Jordan. 14 July 2021; pp. 732–738. [Google Scholar]
- 63.Amaiah A., Almomani O. An investigation of digital forensics for shamoon attack behaviour in FOG computing and threat intelligence for incident response. J. Theor. Appl. Inf. Technol. 2020;15:98. [Google Scholar]
- 64.Almomani O. A feature selection model for network intrusion detection system based on PSO, GWO, FFA and GA algorithms. Symmetry. 2020;12:1046. doi: 10.3390/sym12061046. [DOI] [Google Scholar]
- 65.Sabireen H., Neelanarayanan V. A review on fog computing: Architecture, fog with IoT, algorithms and research challenges. Ict Express. 2021;7:162–176. [Google Scholar]
- 66.Buraga S.C., Amariei D., Dospinescu O. An OWL-Based Specification of Database Management Systems. Comput. Mater. Contin. 2022;70:5537–5550. doi: 10.32604/cmc.2022.021714. [DOI] [Google Scholar]
- 67.Samann F.E., Zeebaree S.R., Askar S. IoT provisioning QoS based on cloud and fog computing. J. Appl. Sci. Technol. Trends. 2021;2:29–40. doi: 10.38094/jastt20190. [DOI] [Google Scholar]
Associated Data
This section collects any data citations, data availability statements, or supplementary materials included in this article.
Data Availability Statement
The data used within the research can be provided by the first author upon request.














