Next Article in Journal
Structure Design, Kinematics Analysis, and Effect Evaluation of a Novel Ankle Rehabilitation Robot
Previous Article in Journal
Combinatorial Effect of Multiple Abiotic Factors on Up-Regulation of Carotenoids and Lipids in Monoraphidium sp. for Pharmacological and Nutraceutical Applications
Previous Article in Special Issue
Improvement of Auxiliary Diagnosis of Diabetic Cardiovascular Disease Based on Data Oversampling and Deep Learning
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Internet of Medical Things with a Blockchain-Assisted Smart Healthcare System Using Metaheuristics with a Deep Learning Model

by
Ashwag Albakri
1,* and
Yahya Muhammed Alqahtani
2
1
Department of Computer Science, College of Computer Science & Information Technology, Jazan University, Jazan 45142, Saudi Arabia
2
Department of Information Technology, College of Computer Science and Information Technology, Jazan University, Jazan 45142, Saudi Arabia
*
Author to whom correspondence should be addressed.
Appl. Sci. 2023, 13(10), 6108; https://doi.org/10.3390/app13106108
Submission received: 23 February 2023 / Revised: 27 April 2023 / Accepted: 14 May 2023 / Published: 16 May 2023
(This article belongs to the Special Issue Deep Learning and Machine Learning in Biomedical Data)

Abstract

:
The Internet of Medical Things (IoMT) is a network of healthcare devices such as wearables, diagnostic equipment, and implantable devices, which are linked to the internet and can communicate with one another. Blockchain (BC) technology can design a secure, decentralized system to store and share medical data in an IoMT-based intelligent healthcare system. Patient records were stored in a tamper-proof and decentralized way using BC, which provides high privacy and security for the patients. Furthermore, BC enables efficient and secure sharing of healthcare data between patients and health professionals, enhancing healthcare quality. Therefore, in this paper, we develop an IoMT with a blockchain-based smart healthcare system using encryption with an optimal deep learning (BSHS-EODL) model. The presented BSHS-EODL method allows BC-assisted secured image transmission and diagnoses models for the IoMT environment. The proposed method includes data classification, data collection, and image encryption. Initially, the IoMT devices enable data collection processes, and the gathered images are stored in BC for security. Then, image encryption is applied for data encryption, and its key generation method can be performed via the dingo optimization algorithm (DOA). Finally, the BSHS-EODL technique performs disease diagnosis comprising SqueezeNet, Bayesian optimization (BO) based parameter tuning, and voting extreme learning machine (VELM). A comprehensive set of simulation analyses on medical datasets highlights the betterment of the BSHS-EODL method over existing techniques with a maximum accuracy of 98.51%, whereas the existing methods such as DBN, YOLO-GC, ResNet, VGG-19, and CDNN models have lower accuracies of 94.15%, 94.24%, 96.19%, 91.19%, and 95.29% respectively.

1. Introduction

Smart healthcare is the advancement of conventional healthcare with advanced internet technologies. It incorporates various technologies to render real-time health-relevant data collected from patients utilizing smart wearable devices and detection of health problems in real time from the collected data [1]. The Internet of Medical Things (IoMT) plays a crucial role in the medical field to increase electronic devices’ throughput, precision, and consistency. Due to the outbreak of the coronavirus pandemic, visiting a doctor becomes a high risk for a person with small problems [2]. With the help of IoMT devices, it becomes easy to monitor health records daily, and preventive measures can be taken on our own. An IoMT-based smart healthcare system refers to a collection of several smart medical devices linked within the network over the internet [3]. Analysis can be done by making use of proper AI-based data transformation and interpretation methods after getting the medical dataset. However, easy access to healthcare applications and services has increased the risks and vulnerabilities that hinder smart healthcare systems’ performance. Also, many more heterogeneous devices collect data that differ in formats and size, making it a challenge to manage the data in the healthcare repositories and secure it from attackers who seek to profit from the data [4]. Therefore, smart healthcare schemes are prone to several security risks and threats, such as network attacks, software and hardware-based attacks, and system-level attacks, which put the lives of patients at risk.
Developing technologies, namely blockchain (BC), were utilized for providing cutting-edge solutions in several settings [5], one among them being the healthcare sector. BC technology is used in the medical field to guarantee the security of patient reports and rationalise data sharing amongst pharmaceutical companies, health care providers, and labs [6]. In the medical world, applications (apps) built on BC technology can detect significant and even hazardous errors [7]. Thus, it is capable of enhancing the openness, efficacy, and safety of the systems to exchange healthcare data in the medical field. Medical institutions are aided by BC technology to obtain insight and enhance medical record analysis. Then, the healthcare support system demands a new processing method with delay-sensitive monitoring which should be smart and managed stably [8].
Deep learning (DL) related medical diagnosis in the IoMT signifies the use of machine learning (ML) and artificial intelligence (AI) approaches to examine medical datasets collected from different devices connected to the internet, namely medical equipment and wearable devices [9]. It enhances the precision level of diagnostic decisions, helps identify trends and patterns in patient data, and enables efficient and more personalized healthcare delivery [10]. Simultaneously, hyperparameter tuning of the DL models becomes essential to improve the overall classification performance. Since trial-and-error hyperparameter selection is a challenging task, metaheuristic optimization techniques are used. In addition, image encryption schemes can be used to securely transmit healthcare data in the IoMT encryption. Furthermore, the key generation process is critical to the security of an encryption algorithm, as the strength of the key directly impacts the security of the encrypted data. Therefore, it is important to use strong and secure key generation methods and to properly manage and protect the keys.
This article develops an IoMT with a blockchain-based smart healthcare system using encryption with an optimal deep learning (BSHS-EODL) model. The presented BSHS-EODL technique comprises a few processes: data collection, image encryption, and data classification. Initially, the IoMT devices enable data collection processes, and the gathered images are stored in BC for security. Then, image encryption is employed to encrypt the data, and its key generation process is performed via the dingo optimization algorithm (DOA). Finally, the BSHS-EODL technique performs disease diagnosis comprising SqueezeNet, Bayesian optimization (BO) based parameter tuning, and voting extreme learning machine (VELM). A comprehensive set of simulation analyses is performed on medical datasets.
The rest of the paper is organized as follows: Section 2 discusses the related works, Section 3 demonstrates the proposed approach, performance validation is depicted in Section 4, and the conclusion is shown in Section 5.

2. Related Works

Almaiah et al. [11] present a DL framework based on BC that offers a dual level of security and privacy. Initially, a BC technique was modelled in which each participating entity was verified, validated, and registered by making use of a smart contract related enhanced proof-of-work to reach the target of privacy and security. Then, a DL approach including bidirectional long short-term memory (BLSTM) for a variational autoencoder (VAE) and intrusion detection systems for privacy were devised. Khan et al. [12] introduced BIoMT, a BC Hyperledger fabric-assisted consortium architecture which offers transparency, security, and integrity to health-oriented transactions and interchanges delicate medical data in serverless peer-to-peer (P2P) secured network settings. A consensus was devised and constituted to decrease rate of BC resource limitations on the IoMT.
In [13], suggesting a BC-based secured data management framework (BSDMF) for medical data related to the IoTs to exchange patients’ data securely and improve data accessibility and scalability. To assure data management and data transmission security among associated nodes, the IoMT-related security structure uses BC. In [14], this study evaluated offloading and scheduling issues for medical workflow in IoMT fog-cloud platforms. Thus, this study addressed the issue as an offloading and scheduling issue and developed deep reinforcement learning (DRL) as a Markov problem. This study designed an innovative DRL and BC-based system which contained multi-criteria offloading depending on DRL policies.
Lakhan et al. [15] developed an LSEOS method called lightweight secure efficient offloading scheduling. LSEOS has lightweight and secured offloading and scheduling methodologies whose offloading delay will be lesser compared to prevailing techniques. The end goal of LSEOS is to run the application over other nodes and diminish the delay and security threats in the mechanism. The metaheuristic LSEOS has the elements they are scheduling with neighbourhood search schemes, adaptive deadlines, and sorting. Kumar and Tripathi [16] offered an innovative contract-based consortium BC technique. The authors compiled interplanetary file systems (IPFS) and cluster nodes where smart contracts are deployable in the early phase. The IPFS cluster node assures the authentication and security of gadgets and even offers safe storage in IoMT based health care systems. Alqaralleh et al. [17] designed DL with BC-based secured image transmission and diagnosis system for the IoMT environment. The elliptic curve cryptography (ECC) was implemented in the initial stage, and then by combining grasshopper and fruit fly optimization (GO-FFO) system, ECC’s optimum key generation is taken. Finally, a method called a deep belief network (DBN) is applied to find the existence of disease. In [18], a novel secure authentication method utilizing ML was presented. To find the attack authentication and detection in an IoMT platform, this study applies ML and k-nearest neighbour (KNN) with smart contract (KNN-MLSC).
Uppal et al. [19] proposed an interplanetary file system (IPFS) enabled model for secure healthcare system. It enables the client to continuously upload the healthcare information gathered by IoT devices and to add to the BC transactions. The authors in [20] developed a BC based electronic medical records (EMR) management model for a smart healthcare system. The privacy of the healthcare data can be accomplished using BC technology. It offers off-chain storage for the records and assuring the authenticity and integrity of the health records. In [21], a new hybrid Elman Neural-based Blowfish BC approach has been introduced for the security of the healthcare data in the IoT environment. The Elman network offered continual monitoring to predict abnormal activities in the trained multimedia data. The authors in [22] developed a Lionized Golden Eagle based Homomorphic Elapid Security (LGE-HES) technique with blockchain in healthcare network. The blockchain provides the privacy of the medical images using hash operations.
Although several encryption techniques have been presented in the literature, security performance still needs to be improved. Since the images encompass a massive quantity of data, high redundancy rate, and increased correlation between neighboring pixels, classical encryption models cannot be used to resolve the requirements of the image encryption technique. Therefore, several approaches have been presented based on chaotic concepts, pixel swapping, etc. On the other hand, the continuous deepening of the DL model has resulted in the model overfitting issue. In addition, various hyperparameters have provided a substantial impact on the performance of the CNN model. In particular, the hyperparameters such as learning rate, batch size, and number of epochs are important to attain effectual outcome. As the trial-and-error technique for hyperparameter tuning is a challenging and erroneous procedure, a BO algorithm is used in this study.

3. The Proposed Model

In this paper, we develop a new BSHS-EODL method for secured medical image transmission and analysis in the IoMT environment. The presented BSHS-EODL technique enables BC assisted secured image communication and detection models for the IoMT environment. The proposed method includes data classification, data collection, and image encryption. At the initial stage, the IoMT devices enable data collection processes, and the gathered images are stored in BC for security. Once the images are gathered, they are encrypted using effective image encryption technique with a DOA based key generation process. Next, the encrypted image was securely transferred using BC technology. At the receiver end, the image decryption was implemented, and the disease diagnosis process was later. Figure 1 demonstrates the working process of the BSHS-EODL method.

3.1. Image Encryption

In this work, image encryption method takes place to secure medical images. The image encryption procedure mostly comprises key selection, chaotic sequence pre-processing, diffusion, block scrambling, confusion, and expansion [23]. The chaotic sequence pre-processing makes the sequence more arbitrary. Block scrambling has been separated, as intra- and inter-block scrambling decrease the correlation and offer optimum protection against statistical attack. The expansion stage enhances arbitrary numbers to novel images towards all the encryption and thus gains a distinct ciphertext image that is optimally prepared to resist chosen plaintext attack. Diffusion and confusion complicate the connection amongst ciphertext and keys, which make it complex for adversaries to decrypt a ciphertext image and that improves the resistance of such scenarios.
  • Key Selection
Optimizing values x 0 ,   y 0 ,   μ 1 ,   μ 2 ,   λ 1 , and λ 2 created by the DOA technique can be utilized as the keys for 2-D logistic maps. For avoiding transient impact, the first 200 points can be discarded and generate 2 chaotic sequences x n ,   y n that are of length M N .
  • Chaotic Sequence Preprocessing
The 2 chaotic sequences x n ,   y can be pre-processed based on Equation (1).
x 1 i = 10 q x n i r o u n d 10 q x n i + 0.5 y 1 i = 10 q y n i r o u n d 10 q y n i + 0.5
whereas x 1 i and y 1 i implies the chaotic sequences x n ,   y pre-processed sequence, whereas q = 8 .
  • Image Scrambling
The 16 sub-blocks B i , i = 1 , 2 , , 16 of similar sizes can be separated by the new image P 1 , and the remaining 16 numbers of sequences x i are acquired for composing a sequences D i . The acquired integer sequence S i was sorted, and inter-block scrambling was attained based on Equation (2).
S i = f l o o r m o d D i × 10 14 , 16 + 1 s , l = s o r t S B 1 = B l
Sequences t 1 and t 2 refer to the collection of 8 sequence values from the mid sequences x i and i , correspondingly and a novel sequence t was created based on Equation (3). All the sub-blocks were disordered t j times by intra-block scrambling established to process the novel disordered sixteen sub-blocks.
t 2 i 1 + 1 = f l o o r m o d   t 1 × 10 14 , 3 + 4 t 2 i = f l o o r m o d   t 2 × 10 14 , 3 + 4
Finally, the 16 sub-blocks can be combined with procedure image P 2 .
  • Image Expansion
The R 0 and R 1 are 2 random matrices created, whereas the sizes of R 0 and R 1 are 4 × N + 4 and M × 4 , correspondingly. Develop image P 2 based on the system for forming an expanded image P 3 .
  • Confusion and Diffusion
The chaotic scheme comprises two stages: diffusion and confusion. Confusion seeks to obscure and confound the relationships among key and the cipher images. Diffusion aims to obscure the relationships among the cipher and plain images by making it as convoluted. Principally, the swapping operation on the rows and the columns was performed for the realization of the confusion effects. Primarily, compute the novel row index r i = c e i l x 1 i × M + 4 utilizing x 1 i , followed by related row i with row indexes r i .
i f   r i < i ,   t h e n r i = i
Secondly, the parameters k 11 ,   k 12 are computed utilizing x 1 i .
k 11 i = m o d f l o o r x 1 i × 10 8 , 256 k 12 i = m o d f l o o r x 1 i × 10 9 , 256
Thirdly, accomplish a bitwise XOR function on the expansion image P 3 with parameters k 11 ,   k 12 .
If = r i , then
P 30 i , : = P 3 i , : k 11 i i f   r i ,   t h e n P 30 i , : = P 3 i , : k 11 i P 30 r i , : = P 3 r i , : k 12 i
At the fourth stage, swap the i th and r i th row of P 30 for obtaining P 31 .
t e m p = P 30 i , : P 30 i , : = P 30 r i , : P 30 r i , : = t e m p P 31 = P 30
In the fifth, the first and last columns of P 31 can be computed to obtain P 4 .
P 4 i ,   1 = m o d   P 31 i ,   1 + P 31 i ,   N + 4 , 256
At the sixth stage, the other columns of P 31 and P 4 can be computed.
P 4 i , j = m o d   P 31 i , j + P 4 i , j 1 , 256
The diffusion and confusion of columns are related to the row, but that sequence y 1 i was utilized rather than sequence x 1 i . The particular computation process was projected in Algorithm 1.
Algorithm 1: Column confusion and diffusion
Input: Image P 4 and pre-processed chaotic sequence y 1 i
Output: Image P 5
for j = 1 to N + 4
    q j = c e i l N + 4 y 1 j ,
     k 21 j = m o d   f l o o r 10 8 × y 1 j , 2 8 ,
     k 22 j = m o d   f l o o r 10 9 × y 1 j , 2 8 ,
   if q j < j then
                         q j = j ,
   end if
   if q j = j then
         P 4 : , j = k 21 j P 4 : , j ,
   else if
     P 4 : , j = k 21 j P 4 : , j ,
P 4 : , q j = k 22 j P 4   q j ) ,
end if
t e m p = P 4 : , j ,
P 4 : , j = P 4 : , q j ,
               P 4 : , q j = t e m p ,
                   P 41 = P 4 ;
   for i = 1   t o   M + 4
        P 5 1 , j = m o d   P 41 1 , j + P 41 M + 4 , j , 2 8 ,
        P 5 i , j = m o d   P 5 i 1 , j + P 41 i , j , 2 8 ,
  end for
end for

3.2. Key Generation Process

The DOA is used for an effective key generation process. The DOA is a metaheuristic approach stimulated by the hunting behaviours of dingo. DOA is chosen for key generation due to its following advantages: high convergence, robust, global optimization, a smaller number of parameters, simplicity, and highly versatile. This strategy includes scavenging nature, attack by persecution, and assembling procedures [24]. Australian dingo dogs are in danger of extermination. Consequently, the survival rate of dingo is regarded in the DOA. The mathematical expression of DOA is given in the following. In general, dingoes meet in groups during hunting. They then find the prey location and surround it using the following equation:
x i t + 1 = β 1 k = 1 n a φ k t x i t \ ϕ k t n a x i t  
In Equation (10), x t + 1 represents the new prey location of the searching agent, n a denotes the random integer generated within [ 2, S i z e P o p 2 ] , where SizePop indicates overall dingo population size. φ k t shows the subset of search agent where ϕ X ,   X denotes the randomly generated dingo population, x i t specifies the existing search agent, x i t signifies the best possible searching agent attained from prior iteration, and β 1 is a consistently produced arbitrary number within [−2, 2]. Typically, dingoes hunt tiny prey and chase it till it gets caught. These characteristics are expressed as follows:
x i t + 1 = x t + β 1 e β 2 x r 1 t x i t  
In Equation (11), x t + 1 describes the movement of the dingo, x i t shows existing search agents, x t means best possible search agent obtained from the previous iteration, r 1 represents randomly produced numbers from the interval 1 to the size of maximal of the search agent, and x r 1 t shows the r 1 th selected search agent, where i r 1 .
Scavenger is characterized as a dingo finding meat to eat if they get a random walk in the habitat.
x i t + 1 = 1 2 [ e β 2 x r 1 t 1 ) σ x i t
In Equation (12), x t + 1 denotes the dingo progress, β 2 has equivalent value as in Equation (12), r 1 represents the randomly generated number within [1, max_size of searching agent] interval, x r 1 t indicates the r 1 t h selected search agent, x i t denotes the existing search agent, where i r 1 , and σ signifies the arbitrarily created binary number. Finally, the survival rate of the dingoes is expressed as follows:
s u r v i v a l   i = f i t n e s s   max   f i t n e s s i f i t n e s s   max   f i t n e s s   min  
In Equation (13), f i t n e s s   max   and f i t n e s s   min correspondingly represent poor and optimum fitness values in the present round. f i t n e s s i signifies existing fitness value of i - t h searching agent. The survival vector in Equation (13) encompasses the normalizing fitness value within 0 ,   1 . Equation (14) is used for attaining lower survival rate.
x i t = x t + 1 2 [ x r 1 t 1 ) σ x r 2 t
In Equation (14), x i t represents that search agent with minimal survival rate is upgraded. In addition, r 1 and r 2 denote the randomly produced numbers within [1, max_size of searching agent] interval,   x t specifies best possible searching agent accomplished from previous iteration, and σ showing binary number of agents, with r 1 r 2 ,   x r 1 t and x r 2 t , describes r 1 , r 2 selected searching agent, x t indicates the best possible searching agent accomplished from previous iteration, and σ shows the randomly generated number.
The set of keys is preferred by considering the “fitness function” as a max key using peak signal-to-noise ratio (PSNR) for scrambling and unscrambling data from medical images. With the help of hybrid optimization, the organization has been developed, and it is given in the following:
F i t n e s s = max P S N R

3.3. Blockchain Technology

The proposed BSHS-EODL technique used BC technology for secure data transmission in the medical field. A BC is distributed data where a novel time-stamped transaction is grouped and appended to a hash-chain of blocks [25]. The BSHS-EODL technique comprises a data processing section, application server for data transmission and reception, BC enabled decentralized databases, application programming interface (API) management element, and data analytics unit. A few processes which take place in the system are Create_Patient_Data, Grant_Access_ToHCP, and Revoke_Access. The structured data of the patient gets saved in the classical dataset and the unstructured data gets stored in the data warehouse. The encrypted data gets saved in the distributed BC using preferrable smart contract. After the storage of data in the allotted BC, BSHS-EODL technique uses VELM classifier for classification process. The medical image is loaded into the decentralized BC, and the BSHS-EODL technique can be employed to the data fetched from the decentralized network. The BSHS-EODL technique operates in the following way. Ethereum BC network can be employed for patient data distribution. Each individual actor carries out various activities in the network and has access to the data for which they received access. The patients can generate the information and commit the transaction. When the transactions are committed in the BC, the altered transaction is dispersed over the Internet, verifying that each data existing in the network can be accessed by every actor in the network and cannot be changed by unintentional persons. The medical personnel can access the data only when the respective user provides access permissions. Healthcare professionals can access the patient data and perform disease diagnostic processes. If the healthcare professional receives a request from the patient, they can accept it and send a request to access the data to the specific person. Upon the acceptance of the request, they investigate the medical data for disease detection purposes.

3.4. Disease Classification Model

In this work, the BSHS-EODL technique performs disease diagnosis comprising SqueezeNet, BO based parameter tuning, and VELM.

3.4.1. Feature Extraction Using SqueezeNet

To produce feature vectors, the SqueezeNet model is used in this work. SqueezeNet is a small, efficient deep neural network structure [26]. It is intended to be faster and smaller than other architectures while accomplishing higher accuracy on image classification tasks. SqueezeNet exploits a technique named “squeeze-and-excitation” to decrease the parameter count in the network, enabling it to be more effective in terms of memory and computational requirements. It was specifically designed for use on embedded and mobile devices. The SqueezeNet architecture comprises a series of layers, including the following:
  • Pooling layers, decrease the spatial dimension of the feature maps.
  • The input layer takes in the image dataset.
  • A sequence of FC layers categorises the image based on the extracted features through the convolution layer.
  • A sequence of convolutional layers extracts features from the image. This layer uses “fire modules” that comprise the “expand” layer with a larger number of filters, followed by “squeeze” layer with smaller number of filters. This enables the network to maintain fewer parameters while still extracting relevant features from the image.
The architecture also includes a dropout layer and a softmax layer. Dropout is a regularization technique that prevents overfitting by randomly dropping out some neurons during training. The softmax layer creates a probability distribution over the feasible classes used to classify the image. The SqueezeNet architecture is designed to be small and efficient, with a total of only 1.2 million parameters. This makes it better suited for use on embedded and mobile devices with limited computational resources.
Here, the BO is utilized for the hyperparameter selection of SqueezeNet. A probabilistic method of the objective function x called the surrogate function can be created using BO technique [27]. Bayes’ Theorem is the core of BO technique and computes the conditional probability of event A given another event B ,   P ( A | B ) ,
P A | B = P B | A P A P B
Bayes’ theorem is capable of being adjusted by neglecting the P B marginal probability from the conditional probability for optimization problem using Equation (17):
P A | B = P B | A P A
A new version of Bayes’ theorem is given as follows:
P o s t e r i o r = L i k e l i h o o d   P r i o r
The conditional probability is a function that estimates the objective function and is utilized for sampling the searching space. The searching space in these problems is the SqueezeNet hyperparameter. BO algorithm, as an informed search technique, can be differentiated by using an acquisition function that exploits the posterior for sampling the searching area and selecting the succeeding sample to evaluate the objective function. In this study, the objective function can be denoted as a Gaussian method with the Matern 5/2 kernel. At first, random samples from the search space x 1 ,   x 2 ,   ,   x n are exploited for determining the F x objective function at these samples. The assessments and samples are gathered in a consecutive way, which leads to a sequence of data points S = x i ,   F x j ,   x n ,   F x n , where n denotes the number of samples. The set S defines the likelihood, and prior function can be described as follows:
P ( F | S ) = P ( S | F ) P S
The posterior is updated afterwards with the evaluation of prior and probability. The acquisition function, C , is enhanced over the Gaussian algorithm for selecting the subsequent sample x n , which can be represented as follows:
x n =   argmax x C ( x | S 1 : n 1 )
In this study, the acquisition function can be executed by the expected improvement algorithm, as defined below.
C x = E max F x P x + , 0
In Equation (21), F x indicates the value of objective function for the better sample, E denotes the expectation operator, and x + shows the better sample location in the search range. Then, the sample selected can be assessed by the objective function, and these processes are repeated until the objective function attains its least or minimum objective within the given run time.

3.4.2. Image Classification Using VELM Model

Finally, the classification of medical images is performed by the VELM model. The VELM was utilized as a classifier in this work. The VELM is a significant ML model which enhances classification accuracy while maintaining high processing speeds and robustness to noise and outliers in the input data. An ELM is a type of artificial neural network (ANN) with a single hidden layer (HL) [28]. Here, the weight that connects input to the HL and HL to biases are randomized. The weights between the output and HLs are computed by the Moore–Penrose inverse, making the training model faster. Several ELMs can be used for classification to increase detection accuracy. Each individual ELM is trained using similar data. In the process of detection, the sample is used for all the ELMs and output is computed. Based on the majority voting, the last output is computed. Assume, an ELM with activation functions f and l hidden neurons in HL. If there is N training sample of the form x i ,   t i , where x i = [ x i 1 ,   x i 2 ,   ,   x i n ] T R n and t i = [ t i 1 ,   t i 2 ,   ,   t i m ] T R m ( m = 2 ) then the output can be represented as
0 i = j = 1 1 v j f u j ,   b j ,   x i  
for, i = 1 , 2 , 3 , , N .
Where u j R n and b j R denote the learning parameters of jth hidden neuron. v j = [ ν j 1 ,   ν j 2 ,   ,   ν j m ] T indicates the weight vector that connects jth hidden neurons to output neurons. This can be represented as follows:
O = H V
where,
H = f u 1 , b 1 , x 1 f u l , b l , x 1 f u 1 , b 1 , x N f u l , b | , x N , V = v 1 T v l T and   O = o 1 T o N T
The u j and b j parameters are randomly initialized for minimizing the error O T , where T = t 1 ,   t 2 , , t N , that is independent of input dataset. The output weights can be expressed by finding the least square solution,
V = H + T
where the symbol + characterizes the Moore–Penrose generalized inverse of matrix. It implies ELM is trained. In V -ELM, k - th ELM is used. The equivalent number of hidden layers initialized this ELM. The learning parameter u j and b j   of each ELM is initialized in a random fashion. Next, each ELM is trained on a similar dataset and the results are computed. In detection stage, a set of samples of the form y i =   y i 1 ,   y i 2 ,   ,   y i n is used for each ELM. The output 0 i = 0 ,   1 or 0 i = 1 ,   0 of every individual ELM is taken, and majority voting receives the last output. For every i sample, a vector C i Z > = 0 2 has been used for storing the class labels recognized by dissimilar ELMs. At first, C i is initialized to zero C i = 0 , 0 once an ELM output takes place; the value of equivalent location in C i can be raised by 1. For instance, assume output of E L M 1 is [1, 0] now C i become [1, 0]. Output of E L M 2 is again 1 ,   0 , then C i becomes 2 ,   0 . Output of E L M 3 is 0 ,   1 , then C i becomes 2 ,   1 . Once each k output is reached, then the concluding output is evaluated.

4. Performance Validation

In this section, the experimental outcome of the BSHS-EODL technique is well studied on skin lesion images in the ISIC database. Figure 2 illustrates the sample images.
Figure 3 shows the histogram analysis of the BSHS-EODL technique. Figure 3a,b show the original images and their corresponding histogram images. Similarly, Figure 3c,d demonstrate the encrypted images and their respective histograms.
Table 1 represents the comparative MSE and PSNR examination of the BSHS-EODL technique with existing techniques [17,29] on different images. The results indicate that the GWO and GO-PSO algorithms resulted in higher MSE values, while the GO-FFO and HOCE-ECC techniques led to considerable MSE values. However, the BSHS-EODL technique gains effective performance over other models with minimal MSE of 0.072, 0.057, 0.078, 0.102, and 0.071 under test images 1–5, respectively. The experimental outcomes indicate that the GWO and GO-PSO algorithms represented lower PSNR values than existing ones. Although the GO-FFO and HOCE-ECC models reach moderately improved PSNR values, the BSHS-EODL technique outperformed the existing models with a higher PSNR of 59.56 dB, 60.57 dB, 59.21 dB, 58.04 dB, and 59.62 dB under images 1–5 respectively.
Table 2 shows a brief CC outcome of the BSHS-EODL system under several images. The experimental outcome stated that the GWO and GO-PSO algorithms represented lesser CC values over existing ones. However, the GO-FFO and HOCE-ECC models reach moderately enhanced CC values, and the BSHS-EODL approach outperformed the existing techniques with maximal CC of 99.42, 99.63, 99.21, 99.72, and 99.68 under images 1–5 correspondingly.
Table 3 represents the encryption outcomes of the BSHS-EODL method with existing models under the presence of attacks in terms of computation time (CT) and PSNR. The outcome inferred that the GWO and GO-PSO algorithms resulted in higher CT values, while the GO-FFO and HOCE-ECC approaches led to considerable CT values. The BSHS-EODL algorithm attains effectual performance over other systems with minimal CT of 0.20 s, 0.13 s, 0.16 s, 0.11 s, and 0.15 s under test images 1–5 correspondingly.
The experimental outcomes implied that the GWO and GO-PSO algorithms represented minimal PSNR values over existing ones. However, the GO-FFO and HOCE-ECC models reached moderately greater PSNR values, and the BSHS-EODL approach outperformed the existing approaches with enhanced PSNR of 59.21 dB, 60.17 dB, 58.80 dB, 57.71 dB, and 59.31 dB under images 1–5 correspondingly.
The classification performance of the BSHS-EODL technique can be tested on the ISIC 2017 Dataset, comprising 318 samples with seven classes, as defined in Table 4.
The confusion matrices of the BSHS-EODL method are investigated under distinct sizes of TRS and TSS in Figure 4. The results demonstrated that the BSHS-EODL technique properly recognizes the samples under every class.
In Table 5, the overall results of the BSHS-EODL technique are demonstrated. The results indicate that the BSHS-EODL technique properly classified the images under all classes. For instance, with 80% of TRS, the BSHS-EODL technique reaches average a c c u b a l of 97.30%. In addition, with 20% of TSS, the BSHS-EODL approach attains average a c c u b a l of 97.32%. Meanwhile, with 70% of TRS, the BSHS-EODL system attains average a c c u b a l of 97.68%. Finally, with 30% of TSS, the BSHS-EODL algorithm obtains average a c c u b a l of 98.51%.
The training accuracy (TACY) and validation accuracy (VACY) of the BSHS-EODL method can be assessed in Figure 5. The figure inferred that the BSHS-EODL algorithm has demonstrated greater results with enhanced values of TACY and VACY. It can be noted that the BSHS-EODL system has obtained maximal TACY outcomes.
The training loss (TLOS) and validation loss (VLOS) of the BSHS-EODL approach are tested in Figure 6. The figure stated that the BSHS-EODL approach has demonstrated higher performance with decreasing TLOS and VLOS. Evidently, the BSHS-EODL algorithm has resulted in lesser VLOS outcomes.
The extensive comparative study of the BSHS-EODL technique takes place in Table 6 [17,30]. The results highlighted that the VGG-19 model shows least performance, whereas the DBN and YOLO-GC techniques reported moderately similar outcomes. In comparison, the ResNet and CDNN models attain a reasonable performance.
However, the BSHS-EODL technique gains maximum classification performance with a c c u y of 98.51%, s e n s y of 92.98%, and s p e c y of 99.11%. These outcomes ensured the betterment of the BSHS-EODL method over other existing techniques in the IoMT environment.

5. Conclusions

This article introduces a new BSHS-EODL technique for secure medical image transmission and analysis in the IoMT environment. The presented BSHS-EODL technique enables BC assisted secured image transmission and diagnosis models for the IoMT platform. The proposed method includes data classification, data collection, and image encryption. At the initial stage, the IoMT devices enable data collection processes, and the gathered images are stored in BC for security. Subsequently, image encryption is applied to encrypt the data and the key generation process is performed via the DOA. Finally, the BSHS-EODL technique performs disease diagnosis comprising SqueezeNet, BO based parameter tuning, and VELM. A comprehensive set of simulation analyses on medical datasets highlights the supremacy of the BSHS-EODL technique. In upcoming years, the performance of the proposed method can be tested on other disease diagnoses.

Author Contributions

Conceptualization, A.A.; Methodology, A.A.; Software, Y.M.A.; Validation, Y.M.A.; Formal analysis, Y.M.A.; Writing—original draft, A.A.; Writing—review & editing, Y.M.A.; Visualization, A.A.; Funding acquisition, A.A. All authors have read and agreed to the published version of the manuscript.

Funding

This research work is funded by the Deputyship for Research & Innovation, Ministry of Education in Saudi Arabia by the grant number RUP3-1.

Institutional Review Board Statement

This article does not contain any studies with human participants performed by any of the authors.

Data Availability Statement

Data sharing is not applicable to this article as no datasets were generated during the current study.

Acknowledgments

The authors extend their appreciation to the Deputyship for Research & Innovation, Ministry of Education in Saudi Arabia, for funding this research work through project number RUP3-1.

Conflicts of Interest

The authors declare that they have no conflicts of interest.

References

  1. Vaiyapuri, T.; Binbusayyis, A.; Varadarajan, V. Security, privacy and trust in IoMT enabled smart healthcare system: A systematic review of current and future trends. Int. J. Adv. Comput. Sci. Appl. 2021, 12, 731–737. [Google Scholar] [CrossRef]
  2. Garg, N.; Wazid, M.; Das, A.K.; Singh, D.P.; Rodrigues, J.J.; Park, Y. BAKMP-IoMT: Design of blockchain enabled authenticated key management protocol for internet of medical things deployment. IEEE Access 2020, 8, 95956–95977. [Google Scholar] [CrossRef]
  3. Gul, M.J.; Rehman, A.; Paul, A.; Rho, S.; Riaz, R.; Kim, J. Blockchain expansion to secure assets with fog node on special duty. Soft Comput. 2020, 24, 15209–15221. [Google Scholar] [CrossRef]
  4. Kagita, M.K.; Thilakarathne, N.; Gadekallu, T.R.; Maddikunta, P.K.R. A review on security and privacy of internet of medical things. Intell. Internet Things Healthc. Ind. 2022, 171–187. [Google Scholar]
  5. Dai, H.N.; Imran, M.; Haider, N. Blockchain-enabled internet of medical things to combat COVID-19. IEEE Internet Things Mag. 2020, 3, 52–57. [Google Scholar] [CrossRef]
  6. Roshanzamir, M.; Darbandy, M.T.; Roshanzamir, M.; Alizadehsani, R.; Shoeibi, A.; Ahmadian, D. Swarm Intelligence in Internet of Medical Things. In Proceedings of the 2022 IEEE 10th Jubilee International Conference on Computational Cybernetics and Cyber-Medical Systems (ICCC), Reykjavík, Iceland, 6–9 July 2022; pp. 371–376. [Google Scholar]
  7. Razdan, S.; Sharma, S. Internet of medical things (IoMT): Overview, emerging technologies, and case studies. IETE Tech. Rev. 2022, 39, 775–788. [Google Scholar] [CrossRef]
  8. Egala, B.S.; Pradhan, A.K.; Badarla, V.; Mohanty, S.P. Fortified-chain: A blockchain-based framework for security and privacy-assured internet of medical things with effective access control. IEEE Internet Things J. 2021, 8, 11717–11731. [Google Scholar] [CrossRef]
  9. Dwivedi, R.; Mehrotra, D.; Chandra, S. Potential of Internet of Medical Things (IoMT) applications in building a smart healthcare system: A systematic review. J. Oral Biol. Craniofacial Res. 2022, 12, 302–318. [Google Scholar] [CrossRef]
  10. Lakhan, A.; Mohammed, M.A.; Elhoseny, M.; Alshehri, M.D.; Abdulkareem, K.H. Blockchain multi-objective optimization approach-enabled secure and cost-efficient scheduling for the Internet of Medical Things (IoMT) in fog-cloud system. Soft Comput. 2022, 26, 6429–6442. [Google Scholar] [CrossRef]
  11. Almaiah, M.A.; Ali, A.; Hajjej, F.; Pasha, M.F.; Alohali, M.A. A lightweight hybrid deep learning privacy preserving model for FC-based industrial internet of medical things. Sensors 2022, 22, 2112. [Google Scholar] [CrossRef]
  12. Khan, A.A.; Wagan, A.A.; Laghari, A.A.; Gilal, A.R.; Aziz, I.A.; Talpur, B.A. BIoMT: A state-of-the-art consortium serverless network architecture for healthcare system using blockchain smart contracts. IEEE Access 2022, 10, 78887–78898. [Google Scholar] [CrossRef]
  13. Abbas, A.; Alroobaea, R.; Krichen, M.; Rubaiee, S.; Vimal, S.; Almansour, F.M. Blockchain-assisted secured data management framework for health information analysis based on Internet of Medical Things. Pers. Ubiquitous Comput. 2021, 1–14. [Google Scholar] [CrossRef]
  14. Lakhan, A.; Mohammed, M.A.; Kozlov, S.; Rodrigues, J.J. Mobile-fog-cloud assisted deep reinforcement learning and blockchain-enable IoMT system for healthcare workflows. Trans. Emerg. Telecommun. Technol. 2021, e4363. [Google Scholar] [CrossRef]
  15. Lakhan, A.; Sodhro, A.H.; Majumdar, A.; Khuwuthyakorn, P.; Thinnukool, O. A lightweight secure adaptive approach for internet-of-medical-things healthcare applications in edge-cloud-based networks. Sensors 2022, 22, 2379. [Google Scholar] [CrossRef]
  16. Kumar, R.; Tripathi, R. Towards design and implementation of security and privacy framework for internet of medical things (iomt) by leveraging blockchain and ipfs technology. J. Supercomput. 2021, 77, 7916–7955. [Google Scholar] [CrossRef]
  17. Alqaralleh, B.A.; Vaiyapuri, T.; Parvathy, V.S.; Gupta, D.; Khanna, A.; Shankar, K. Blockchain-assisted secure image transmission and diagnosis model on Internet of Medical Things Environment. Pers. Ubiquitous Comput. 2021, 1–11. [Google Scholar] [CrossRef]
  18. Al-Otaibi, Y.D. K-nearest neighbour-based smart contract for internet of medical things security using blockchain. Comput. Electr. Eng. 2022, 101, 108129. [Google Scholar] [CrossRef]
  19. Uppal, S.; Kansekar, B.; Mini, S.; Tosh, D. HealthDote: A blockchain-based model for continuous health monitoring using interplanetary file system. Healthc. Anal. 2023, 3, 100175. [Google Scholar] [CrossRef]
  20. Zakzouk, A.; El-Sayed, A.; Hemdan, E.E.D. A blockchain-based electronic medical records management framework in smart healthcare infrastructure. Multimed. Tools Appl. 2023, 1–19. [Google Scholar] [CrossRef]
  21. Karthik, G.M.; Kalyana Kumar, A.S.; Karri, A.B.; Jagini, N.P. Deep intelligent blockchain technology for securing IoT-based healthcare multimedia data. Wirel. Netw. 2023, 1–13. [Google Scholar] [CrossRef]
  22. Miriam, H.; Doreen, D.; Dahiya, D.; Rene Robin, C.R. Secured Cyber Security Algorithm for Healthcare System Using Blockchain Technology. Intell. Autom. Soft Comput. 2023, 35, 1889–1906. [Google Scholar] [CrossRef]
  23. Hussain, M.; Iqbal, N.; Bashir, Z. A chaotic image encryption scheme based on multi-directional confusion and diffusion operations. J. Inf. Secur. Appl. 2022, 70, 103347. [Google Scholar] [CrossRef]
  24. Almazán-Covarrubias, J.H.; Peraza-Vázquez, H.; Peña-Delgado, A.F.; García-Vite, P.M. An improved Dingo optimization algorithm applied to SHE-PWM modulation strategy. Appl. Sci. 2022, 12, 992. [Google Scholar] [CrossRef]
  25. Maw, A.; Adepu, S.; Mathur, A. ICS-BlockOpS: Blockchain for operational data security in industrial control system. Pervasive Mob. Comput. 2019, 59, 101048. [Google Scholar] [CrossRef]
  26. Shafiee, M.J.; Li, F.; Chwyl, B.; Wong, A. Squishednets: Squishing squeezenet further for edge device scenarios via deep evolutionary synthesis. arXiv 2017, arXiv:1711.07459. [Google Scholar]
  27. Atteia, G.; Alhussan, A.A.; Samee, N.A. BO-ALLCNN: Bayesian-Based Optimized CNN for Acute Lymphoblastic Leukemia Detection in Microscopic Blood Smear Images. Sensors 2022, 22, 5520. [Google Scholar] [CrossRef]
  28. Kushwah, G.S.; Ranga, V. Voting extreme learning machine based distributed denial of service attack detection in cloud computing. J. Inf. Secur. Appl. 2020, 53, 102532. [Google Scholar] [CrossRef]
  29. Padmavathi, U.; Rajagopalan, N. Blockchain Enabled Emperor Penguin Optimizer Based Encryption Technique for Secure Image Management System. Wirel. Pers. Commun. 2022, 127, 2347–2364. [Google Scholar] [CrossRef]
  30. Yacin Sikkandar, M.; Alrasheadi, B.A.; Prakash, N.B.; Hemalakshmi, G.R.; Mohanarathinam, A.; Shankar, K. Deep learning based an automated skin lesion segmentation and intelligent classification model. J. Ambient Intell. Humaniz. Comput. 2021, 12, 3245–3255. [Google Scholar] [CrossRef]
Figure 1. Working process of BSHS-EODL approach.
Figure 1. Working process of BSHS-EODL approach.
Applsci 13 06108 g001
Figure 2. Sample Images.
Figure 2. Sample Images.
Applsci 13 06108 g002
Figure 3. (a) Original Images (b) Histogram of Original Images (c) Encrypted Images (d) Histogram of Encrypted Images.
Figure 3. (a) Original Images (b) Histogram of Original Images (c) Encrypted Images (d) Histogram of Encrypted Images.
Applsci 13 06108 g003
Figure 4. Confusion matrices of BSHS-EODL approach (a,b) TRS/TSS of 80:20 and (c,d) TRS/TSS of 70:30.
Figure 4. Confusion matrices of BSHS-EODL approach (a,b) TRS/TSS of 80:20 and (c,d) TRS/TSS of 70:30.
Applsci 13 06108 g004
Figure 5. TACY and VACY analysis of BSHS-EODL method.
Figure 5. TACY and VACY analysis of BSHS-EODL method.
Applsci 13 06108 g005
Figure 6. TLOS and VLOS analysis of BSHS-EODL approach.
Figure 6. TLOS and VLOS analysis of BSHS-EODL approach.
Applsci 13 06108 g006
Table 1. MSE and PSNR analysis BSHS-EODL approach with other systems under varying images.
Table 1. MSE and PSNR analysis BSHS-EODL approach with other systems under varying images.
Sample ImagesBSHS-EODLHOCE-ECC [29]GO-FFO [17]GO-PSO [17]GWO [17]
MSEPSNRMSEPSNRMSEPSNRMSEPSNRMSEPSNR
Image 10.07259.560.11257.640.13256.930.17155.800.19755.19
Image 20.05760.570.08358.940.11957.380.15256.310.17255.78
Image 30.07859.210.11857.410.15256.310.18855.390.22054.71
Image 40.10258.040.1356.990.15756.170.18455.480.21054.91
Image 50.07159.620.10757.840.12857.060.16555.960.18655.44
Table 2. CC analysis of BSHS-EODL approach with other techniques under varying images.
Table 2. CC analysis of BSHS-EODL approach with other techniques under varying images.
Sample ImagesBSHS-EODLHOCE-ECC [29]GO-FFO [17]GO-PSO [17]GWO [17]
Image 199.4298.9398.4998.1697.7
Image 299.6399.2298.8498.5398.18
Image 399.2198.7698.4597.9897.54
Image 499.7299.3399.0198.6598.19
Image 599.6899.3799.0498.5498.22
Table 3. CT and PSNR outcome of BSHS-EODL approach with other techniques under varying images.
Table 3. CT and PSNR outcome of BSHS-EODL approach with other techniques under varying images.
Computation Time (s)
Sample ImagesBSHS-EODLHOCE-ECC [29]GO-FFO [17]GO-PSO [17]GWO [17]
Image 10.200.500.780.941.29
Image 20.130.310.510.701.05
Image 30.160.480.720.921.07
Image 40.110.450.590.891.03
Image 50.150.410.681.001.31
PSNR During Attacks (dB)
Sample ImagesBSHS-EODLHOCE-ECC [29]GO-FFO [17]GO-PSO [17]GWO [17]
Image 159.2157.0856.4755.2954.66
Image 260.1758.3456.9056.0155.48
Image 358.8057.0155.7454.8454.38
Image 457.7156.4455.6154.9154.44
Image 559.3157.4356.5955.4255.09
Table 4. Details of dataset.
Table 4. Details of dataset.
LabelsClassNo. of Images
C-0Angioma21
C-1Nevus46
C-2Lentigo NOS41
C-3Solar Lentigo68
C-4Melanoma51
C-5Seborrheic Keratosis54
C-6BCC37
Total count of Images318
Table 5. Classifier outcome of BSHS-EODL approach with different metrics.
Table 5. Classifier outcome of BSHS-EODL approach with different metrics.
Labels A c c u y S e n s y S p e c y F s c o r e MCC
Training Phase (80%)
C-098.4385.7199.1785.7184.88
C-196.4679.4999.5387.3285.85
C-298.0390.6299.1092.0690.96
C-397.2496.3097.5093.6991.99
C-496.8593.0297.6390.9189.04
C-596.4691.3097.6090.3288.16
C-697.6492.3198.2588.8987.64
Average97.3089.8298.4089.8588.36
Testing Phase (20%)
C-098.4485.71100.0092.3191.78
C-198.44100.0098.2593.3392.72
C-2100.00100.00100.00100.00100.00
C-398.44100.0098.0096.5595.64
C-496.88100.0096.4388.8987.83
C-596.88100.0096.4388.8987.83
C-692.1954.55100.0070.5970.60
Average97.3291.4798.4490.0889.49
Training Phase (70%)
C-099.1088.24100.0093.7593.48
C-198.2096.6798.4493.5592.57
C-298.6590.62100.0095.0894.45
C-394.5987.7696.5387.7684.29
C-498.6596.5598.9694.9294.15
C-596.4092.3197.2790.0087.84
C-698.2092.3198.9892.3191.29
Average97.6892.0698.6092.4891.15
Testing Phase (30%)
C-098.9675.00100.0085.7186.14
C-1100.00100.00100.00100.00100.00
C-298.96100.0098.8594.7494.32
C-394.7989.4796.1087.1883.96
C-498.9695.45100.0097.6797.05
C-5100.00100.00100.00100.00100.00
C-697.9290.9198.8290.9189.73
Average98.5192.9899.1193.7493.03
Table 6. Comparative outcome of BSHS-EODL method with other DL techniques.
Table 6. Comparative outcome of BSHS-EODL method with other DL techniques.
MethodsAccuracySensitivitySpecificity
BSHS-EODL98.5192.9899.11
DBN [17]94.1591.4090.98
YOLO-GC [17]94.2489.3090.77
ResNet Model [17]96.1990.4491.03
VGG-19 [30]91.1990.2093.73
CDNN [17]95.2991.1992.77
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Albakri, A.; Alqahtani, Y.M. Internet of Medical Things with a Blockchain-Assisted Smart Healthcare System Using Metaheuristics with a Deep Learning Model. Appl. Sci. 2023, 13, 6108. https://doi.org/10.3390/app13106108

AMA Style

Albakri A, Alqahtani YM. Internet of Medical Things with a Blockchain-Assisted Smart Healthcare System Using Metaheuristics with a Deep Learning Model. Applied Sciences. 2023; 13(10):6108. https://doi.org/10.3390/app13106108

Chicago/Turabian Style

Albakri, Ashwag, and Yahya Muhammed Alqahtani. 2023. "Internet of Medical Things with a Blockchain-Assisted Smart Healthcare System Using Metaheuristics with a Deep Learning Model" Applied Sciences 13, no. 10: 6108. https://doi.org/10.3390/app13106108

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop