Next Article in Journal
Investigation of the Stress-Strain State of a Rectangular Plate after a Temperature Shock
Next Article in Special Issue
Non-Contact Breathing Rate Estimation Using Machine Learning with an Optimized Architecture
Previous Article in Journal
Statistics of Weibull Record-Breaking Events
Previous Article in Special Issue
Stroke Localization Using Multiple Ridge Regression Predictors Based on Electromagnetic Signals
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Trustworthy Healthcare Management Framework Using Amalgamation of AI and Blockchain Network

1
Department of Computer Science and Engineering, Institute of Technology, Nirma University, Ahmedabad 382481, India
2
Computer Science Department, Community College, King Saud University, Riyadh 11437, Saudi Arabia
3
Doctoral School, University Politehnica of Bucharest, Splaiul Independentei Street No. 313, 060042 Bucharest, Romania
4
National Research and Development Institute for Cryogenic and Isotopic Technologies—ICSI Rm. Vâlcea, Uzinei Street, No. 4, P.O. Box 7 Râureni, 240050 Râmnicu Vâlcea, Romania
5
Faculty of Civil Engineering and Building Services, Department of Building Services, Technical University of Gheorghe Asachi, 700050 Iași, Romania
*
Authors to whom correspondence should be addressed.
Mathematics 2023, 11(3), 637; https://doi.org/10.3390/math11030637
Submission received: 17 December 2022 / Revised: 23 January 2023 / Accepted: 25 January 2023 / Published: 27 January 2023

Abstract

:
Over the last few decades, the healthcare industry has continuously grown, with hundreds of thousands of patients obtaining treatment remotely using smart devices. Data security becomes a prime concern with such a massive increase in the number of patients. Numerous attacks on healthcare data have recently been identified that can put the patient’s identity at stake. For example, the private data of millions of patients have been published online, posing a severe risk to patients’ data privacy. However, with the advent of Industry 4.0, medical practitioners can digitally assess the patient’s condition and administer prompt prescriptions. However, wearable devices are also vulnerable to numerous security threats, such as session hijacking, data manipulation, and spoofing attacks. Attackers can tamper with the patient’s wearable device and relays the tampered data to the concerned doctor. This can put the patient’s life at high risk. Since blockchain is a transparent and immutable decentralized system, it can be utilized for securely storing patient’s wearable data. Artificial Intelligence (AI), on the other hand, utilizes different machine learning techniques to classify malicious data from an oncoming stream of patient’s wearable data. An amalgamation of these two technologies would make the possibility of tampering the patient’s data extremely difficult. To mitigate the aforementioned issues, this paper proposes a blockchain and AI-envisioned secure and trusted framework (HEART). Here, Long-Short Term Model (LSTM) is used to classify wearable devices as malicious or non-malicious. Then, we design a smart contract that allows only of those patients’ data having a wearable device to be classified as non-malicious to the public blockchain network. This information is then accessible to all involved in the patient’s care. We then evaluate the HEART’s performance considering various evaluation metrics such as accuracy, recall, precision, scalability, and network latency. On the training and testing sets, the model achieves accuracies of 93% and 92.92%, respectively.

1. Introduction

Modernization in the Internet of Things (IoT) technology makes a paradigm shift from human-centric to machine-centric interactions. It inspires especially the healthcare sector, which has been revolutionized from 1.0 to 4.0 by incorporating the promising characteristics of IoT technology. The essential benefits of IoT, such as data collection capability, deployment easiness, customer centricity, and less operational cost, ushered the healthcare sector to offer intelligent medical services, such as remote diagnosis, tracking of chronic diseases, and on-demand medical report analysis. Recently, a well-designed application of IoT, i.e., wearable devices, has been preferred in the healthcare sector, which measures the blood oxygen, temperature, blood pressure, breathing rate, and glucose state for the remote diagnosis of the patient. It utilizes Artificial intelligence (AI) algorithms to analyze the above-mentioned measures and provide significant inferences about the patient [1,2]. Furthermore, information communication tools and technology advancements make wearable devices reliable and efficient. However, it also makes it vulnerable to security threats where an attacker can exploit and manipulate the patient’s healthcare data [3]. Furthermore, from the literature, we can analyze that the collected healthcare data are processed and analyzed at the centralized system, which is also susceptible to various security attacks, such as session hijacking, data manipulation, and spoofing attacks [4,5]. Additionally, attackers can find vulnerabilities in the centralized system and resist healthcare centres from data access. Consequently, it can put an individual’s life at risk.
Various researchers from academia/industry have given indispensable solutions to resist security attacks associated with wearable devices. For instance, researchers have employed cryptographic-based solutions to protect healthcare data. The authors of [6] presented a dynamic cryptographic cipher structure and data availability strategy to guarantee healthcare data security in terms of confidentiality, availability, source authentication, and integrity. Their proposed solution is lightweight and needs a minimum number of iterations. Ref. [7] presented a recoverable encrypted and watermarked image approach for medical image security in healthcare information systems. They utilize symmetric key encryption in their approach and employ a client authentication scheme that grants access to medical images. However, the aforementioned cryptographic solutions cannot withstand modern computing capabilities that can easily break off the encryption ciphers of wearable healthcare data. If this happens, it is effortless for an attacker to attempt unauthorized access and fetch the crucial healthcare data of the patients. Therefore, there is a stringent requirement for a technology that can seamlessly differentiate malicious and non-malicious intents of the exploited wearables.
Authors in [8] proposed a PDiag system based on Bayesian classification for efficient and privacy-ensured diagnosis. The online medical primary diagnostic service processes sensitive personal health information without compromising privacy. In particular, a lightweight polynomial aggregation approach is utilized to offer an efficient and privacy-preserving classification strategy using an improved naive Bayes classifier. The encrypted user query is sent straight to the service provider and the user can only decrypt the assessment result. Furthermore, to ensure healthcare data security, ref. [9] suggested a robust watermarking methodology for healthcare data using key and transform coefficients of the source image. This obfuscates the entire process of sending and receiving medical data and ensures protection against intruders. While AI is advantageous in the healthcare industry, it has certain downsides. One significant disadvantage of AI-based systems is that they are relatively easy to copy once constructed. This implies that an attacker can perform adversarial attacks, i.e., poisoning the training and learning of the AI model.
The advent of blockchain technology attracted the attention of the entire scientific community. It is a shared public ledger that securely stores wearable healthcare data in an immutable manner to improve data privacy and establish trust between various entities of the healthcare systems [10,11]. Ref. [12] introduced a medical care information preservation system that considered the complete data storage process in wearables and medical centre servers. The procedure is secure and follows the Health Insurance Portability and Accountability (HIPAA) privacy and security requirements. Their suggested approach employed the advanced chaotic map technique key negotiation, reducing the amount of processing required, and achieving lightweight quantification. It also takes advantage of blockchain technology’s characteristics that secure healthcare data from data manipulation attacks and boost data security. Then, the authors of [13] offered a blockchain and smart contract-based trustworthy and transparent medicine supply chain to prevent doctors’ prescription information from being manipulated by attackers.
However, blockchain technology solely cannot confront the security threats associated with wearable devices. Thus, there is a need for a blockchain-based secure and trusted monitoring framework that takes the benefits of AI algorithms to strengthen the security of wearable device data. The proposed framework, i.e., HEART utilizes the LSTM model trained on the WUSTL EHMS 2020 dataset, which comprises wearable healthcare and attack data. Then, the learning of the pre-trained LSTM model is integrated into wearable devices to classify it as malicious or non-malicious by analyzing its feature space. Once the devices are classified, only legitimate wearable devices’ healthcare data are stored in the blockchain network to ensure data security. A blockchain-based smart contract is designed to verify the authenticity of different healthcare sector entities, such as doctors, wearable devices, patients, and healthcare data. Only the verified members can access the wearable healthcare data, and unauthenticated members are discarded from the HEART. Furthermore, the HEART operates on the Sixth-Generation (6G) communication technology, which offers ultra-low latency, extremely high reliability, and high availability compared to conventional 3G, 4G, and 5G communication technologies. Incorporating a 6G network interface is crucial for critical services, such as healthcare, which can exchange patients’ healthcare data efficiently with healthcare centers that potentially save a person’s life. The performance of the HEART is evaluated using different performance metrics, such as accuracy, precision, recall, loss curve, scalability, and network latency. The LSTM model shows better accuracy in terms of training and testing accuracies, i.e., 93% and 92.92%.

1.1. Motivation

There are millions of people participating in the healthcare sector, whether they are directly or indirectly affiliated. Hospitals and health facilities gather information such as a person’s name, social security number, address, and other personal information. The most difficult difficulty that the healthcare business faces is securely storing data so that unauthorized users cannot access it. There have been multiple cyberattacks on the healthcare business, and millions of people’s data have been released online. Upon analysis of different research [14,15] regarding cybersecurity in the healthcare sector, it is observed that those approaches only utilize a single technology. This results in a dilemma of whether to store the patient data securely or to analyze the data for tampering with the patient’s health data. As a result of this, we present a blockchain and AI-based solution for securely storing patient data and analyzing it for any tampering that could have taken place by an attacker.

1.2. Background

Healthcare is a very important sector as it deals with very sensitive information about patients, which, if compromised, can put the lives of millions of patients at risk. To combat this, the research community has spent countless hours integrating Artificial Intelligence (AI) with healthcare in order to combat the rising cybersecurity attacks on healthcare systems. AI as well as machine learning applications are revolutionizing healthcare delivery. Health organizations have amassed massive amounts of data in the form of health records and photographs, demographic data, claims data, and clinical trial data. AI technologies are perfectly adapted to evaluating this data and uncovering patterns and insights that humans would not be able to discover on their own. Deep learning from AI may assist healthcare companies to make better financial and clinical choices and enhance the quality of experience they give.
AI alone cannot be suitable enough to resist cyberattacks. There needs to be a place to securely store the patient’s data which can not be modified once it is stored there. This is where blockchain comes into the picture, as it provides security as well as the immutability of patient’s health data. The use of blockchain technology to store patient data will reduce the number of cyberattacks as the security aspect of blockchain will deter attackers from trying and infiltrate the blockchain. The actual benefit of interoperability might be unlocked via a blockchain-powered health information exchange. Current middlemen’s friction and expenses might be reduced or eliminated by blockchain-based solutions. Blockchain’s promise has far-reaching ramifications for stakeholders in the healthcare ecosystem. This technology offers immutability and security of data. The decentralized nature of this technology indicates that, in order to change the patient’s data, the attacker must gather control of 51% of nodes in the blockchain and on a public blockchain; this task is next to impossible. This makes it unfeasible to change a patient’s record in the blockchain. Making use of this technology offers the ability to integrate disparate systems in order to produce insights and better determine the worth of care. A statewide blockchain network for electronic medical information can increase efficiency and promote improved health outcomes for patients in the long run.

1.3. Research Contributions

The following are the salient contributions of the paper:
  • We propose a blockchain and AI-based secure and trusted framework, i.e., HEART that efficiently detects the security attacks from the healthcare wearable devices;
  • An AI-based LSTM model is adopted to detect the presence of malicious wearable devices by utilizing its pre-training on the standard dataset, i.e., the WUSTL EHMS 2020 dataset;
  • A blockchain-based smart contract is deployed, which allows only legitimate wearable devices to store their healthcare data inside the blockchain’s immutable ledger;
  • The HEART is evaluated by considering several assessment metrics, such as training accuracy, loss, blockchain scalability, and latency. As a result, the Adam-based LSTM model surpasses other optimizers in terms of accuracy, i.e., 93%.

1.4. Paper Organization

The flow of the remaining paper is described as follows: Section 2 discusses the motivation behind the proposed work by comparing it with the existing baseline works. Section 3 presents the system model and the problem formulated, i.e., to enhance the security and privacy concerns of the smart healthcare system. Section 4 shows the proposed framework-HEART. Section 5 illustrates the results and discussion. Lastly, Section 6 provides concluding remarks and shows the future scope of this work.

2. Related Works

This section discusses the existing work that calls attention to cybersecurity difficulties in the healthcare industry.

2.1. IoT Security in Healthcare

Ref. [16] has suggested a solution to secure smart gadgets physically while simultaneously maintaining data secrecy. The disadvantage of this suggested system is that it has only been tested on an IoT testbed. Therefore, the system’s performance in the real world might vary, and its behavior is uncertain. Ref. [17] has presented a lightweight authentication technique for wireless medical sensor networks to secure data exchange from sensors to doctors [18]. Next, the authors of [19] presented an authentication scheme for the internet of medical things that takes advantage of physically unclonable features. Their suggested method prevents attackers from accessing servers and harmful devices from entering. The aforementioned solutions are highly efficient; however, the authentication schemes do not resist modern decryption tools that easily break off the encryption keys.

2.2. AI Security in Healthcare

Ref. [20] has proposed an online medical prediagnosis system that uses a nonlinear support vector machine to protect the privacy of medical information. Their suggested approach is highly efficient in terms of prediction. Then, Ref. [21] has presented a machine learning (ML)-based solution for identifying harmful activity in smart healthcare systems. Their proposed system employs four machine learning techniques: artificial neural networks, decision trees, random forests, and k-nearest neighbors. Their result outperforms in terms of accuracy, i.e., 90%. Next, the authors of [22] introduced a trust-based strategy for detecting rogue devices in the healthcare industry using Bayesian inference. Their technology is capable of recognizing rogue medical equipment. However, the proposed solutions have not discussed how they confront data integrity and manipulation attacks.

2.3. Blockchain in Healthcare

Ref. [23] proposed an automated health record system that utilizes blockchain technology. The proposed framework is designed to exchange health information on the blockchain in order to create a smart e-health system. The system uses a modified Merkle tree data structure for faster and more secure access to patient logs [24]. The disadvantage, however, is that the proposed system did not consider the possibility of malicious data being uploaded into the blockchain. Attackers can manipulate the patient’s data and upload it onto the blockchain, which can cause many problems in the system. Ref. [25] has proposed a bribery self-mining system in the blockchain that works on Ethereum. The proposed system describes a new way of essentially gaining higher rewards and spending less Ethereum. The system is tested on a simulated healthcare system, and it is seen that harmful attacks can be made on a healthcare system due to higher rewards and lower spending costs. The disadvantage of this system is that it considers the attacks being made in the form of mining and not the malicious data sent to the blockchain. Ref. [26] proposed a blockchain-orchestrated deep learning approach for secure data transmission of data in IoT-enabled healthcare systems. The proposed system has been developed to detect intrusion in healthcare systems using deep learning and blockchain. The demerit of this system is that it does not consider the patient’s health data, which can threaten the patient’s life if incorrect data are fed into the blockchain. Ref. [27] has proposed a 5G blockchain architecture for healthcare systems. The proposed system aims to provide a comparable database for each user. The disadvantage of this system is that it is not tested in the real world; therefore, its performance is unknown. Ref. [28] has presented a framework for detecting anomalies in patients’ health data. In this system, blockchain is utilized to securely store the patient’s data. However, the proposed solution has a higher computational complexity as it has processed all the healthcare data. Ref. [29] presented a blockchain-based electronic medical record and patients, practitioners, laboratories, and admin to form a secured environment in the blockchain. Still, the system is not functioning as a full-fledged healthcare management system. The aforementioned analysis shows that none of the existing work has amalgamated blockchain and AI technology to alleviate the security attacks from wearable devices. Moreover, most solutions are centric on one security attack, wherein HEART uses different security threats, such as man-in-the-middle attacks, spoofing, data injection, and data integrity attacks to analyze the security of wearable devices. Therefore, there is a requirement for a blockchain and AI-based secure and trusted framework that analyzes different security attacks from wearable devices and improves the security and privacy of the healthcare industry. Table 1 shows the comparative analysis of the existing approaches and the proposed work.

3. System Model and Problem Formulation

3.1. System Model

The proposed system model is represented in Figure 1. Every patient has a wearable gadget that actively monitors the patient’s health data. The primary goal of the proposed system is to securely store health data such that there is no data breach by an unauthorized user. To do this, the wearable device’s integrity is first evaluated. If the wearable gadget is attacked, the data it transmits are not recorded on the blockchain and is therefore deleted. Once the device’s integrity has been certified, the patient’s data are transmitted to the blockchain for storage. The blockchain’s smart contract allows just the most critical data to be stored on the network. It is also in charge of data access control. Only those participating in the patient’s therapy have access to the data. The forthcoming section provides a detailed description of the system model.

3.2. Problem Formulation

Consider wearable devices W and patients P in the following way:
W = { W 1 , W 2 , W 3 , , W k , , W N }
P = { P 1 , P 2 , P 3 , , P j , , P N }
where k represents a single wearable device and N represents the total number of wearable devices such that 1 k N . j represents a single individual, and each patient P j is equipped with a wearable device W k , so that
P j W k
1 j , k N
Each P j ’s health data is gathered by W k and kept on a centralized system C. An attacker A can enter the system and gain access to patient information, such as
D = { D 1 , D 2 , D 3 , , D j , D N }
C D
A Attacks C
A C c o m p ( D j )
1 j N
where D j represents the patient’s medical records, and C c o m p represents the hacked centralized system. The aforementioned equations show that, without sufficient security measures, the system is readily infiltrated, and A may take patient data for malicious intent. To address the above-mentioned issues, the HEART employs AI and blockchain to create a more robust and secure method of storing patient data. Rather than storing D j straight into C, it is first examined by the AI-based system S to confirm its integrity. Once verified to be saved, D j is recorded in blockchain B, which is thereafter viewable only to those participating in the patient’s care. Mathematically, it is defined as follows:
S Analyzes D j
i f s a f e , B Store D j
I v P Access D j
1 j N
where I v P refers to the persons participating in the treatment. The usage of blockchain makes it next to impossible for an attacker to acquire access to P j s data. In order to identify that data have been manipulated, the AI model will be continuously monitoring the incoming patient health data. Since these data are time series data, the trained LSTM model is best suited for detecting the manipulation of patient data. The entire system is connected to the public blockchain, which indicates that, if malicious data are found, all the participants will be informed and the data will be discarded. The forthcoming section contains detailed information on the HEART.

4. HEART: The Proposed Framework

The HEART is presented in Figure 2. The system is dissected into three layers, i.e., user, analytic, and blockchain layers. Algorithm 1 depicts the entire system flow. The following is a detailed description of all the layers.
Algorithm 1: Flow of the system.
    Input: Wearable device data
  • j = 1
  • for j N do
  •      P j W j
  •      D j = { H e a r t R a t e , S p O 2 , }
  •      P j has D j
  •      W j D j
  •      S examines W j ( D j )
  •     if W j = = A then
  •         Discard data of W j
  •     else
  •         Smart Contract sent D j
  •         Smart Contract stores in B
  •          I v P accesses D j from B
  •         If necessary, Doctor treatment medicine P j
  •     end if
  • end for

4.1. User Layer

The patients P 1 , P 2 , P 3 , P N P each have wearable devices W 1 , W 2 , W 3 , W N W , which measure the patient’s health data. The wearable device collects the data from the users, such that
W j { P j ( H R ) , P j ( O 2 ) , P j ( T ) , }
1 j N
where P j ( H R ) , P j ( O 2 ) , and P j ( T ) are the user’s heart rate, blood oxygen level, and temperature. In this layer, apart from regular users, there may be a possibility that an attacker is also among them. The attacker can grab the data from the communication channel and manipulate the data such that
A Changes { P j ( H R ) , P j ( O 2 ) , P j ( T ) , }
W j { P j C ( H R ) , P j C ( O 2 ) , P j C ( T ) , }
1 j N
where P j C denotes the changed data of the user. This can lead to severe problems; for instance, a patient who requires a critical medical diagnosis cannot acquire it because the attackers have manipulated the patient’s data and forwarded it to the medical practitioners. Hence, such situations can be life-threatening for the user. To detect an attacker in the system, the forthcoming security layer deploys a DL model for the same.

4.2. Analytic Layer

The analytic layer collects all data from wearable devices and saves it in a database. Then, the obtained data are cleaned, and preprocessing is performed on it. The following section provides a detailed description of the dataset and data preparation.

4.2.1. Dataset Description

A dataset named WUSTL EHMS 2020 dataset [30] is utilized for training the LSTM-based sequence model. For the purpose of continuously detecting whether the patient’s wearable data has tampered or not, there are no proper time-series datasets other than WUSTL EHMS 2020. This dataset is ideal for our use case as the patient’s data would be continuously communicated via an open channel to the blockchain. Thus, the dataset consists of different network characteristics which can further aid in the detection of incoming malicious data. The dataset also features information regarding the patient’s health data obtained from a wearable device. Using this data will allow the trained machine learning model to learn to analyze the health data and check if it has been tampered with. The dataset contains 44 characteristics, 35 of which are network traffic measures, eight biometric features from patients, and one feature for the class label that specifies the attack data or not. The dataset comprises a total of 16,318 samples, of which 14,272 are normal samples, and 2046 are attack samples. Table 2 represents the patient data considered in the system. Since there are a lot of components for the purpose of obtaining the security information of a network, the security information is instead described by the following equation:
Security information Different networking components

4.2.2. Data Preprocessing and Preparation

The collected dataset requires preprocessing before it is forwarded to training and prediction. Figure 3 depicts the data preprocessing and preparation stages in detail. Only 26 of the 44 qualities truly contribute to forecasting the result. Flags, IP addresses, MAC addresses, and other trivial information are removed from the dataset as they are not competent features compared to the others. After obtaining the relevant features, their values are normalized using the min-max scaler from the sklearn package. Because the values of characteristics have varying ranges, normalization is required. Normalizing the data puts the mean closer to 0 and speeds up convergence. The values are normalized to be between 0 and 1, inclusive. The min-max scaler formula is as follows:
τ s t d = τ τ m i n τ m a x τ m i n
τ s c a l e d = τ s t d ( m a x m i n ) + m i n
where τ represents the value that needs to be normalized, τ m i n and τ m a x denotes the feature’s minimum and maximum value. τ s c a l e d is the normalized value (using min-max scalar), and m a x and m i n express the maximum and minimum value of the new range for normalization. The preprocessing procedure is completed after the data have been normalized. To use the data for training, it must be reshaped into three-dimensional data, as LSTM requires three-dimensional input. There are m features and n samples for each k t h device. As a result, the data are reshaped as m × n × 1 for training purposes for each device. Thus, the input shape χ for every device is χ m × n × 1 .

4.2.3. LSTM

After the data have been processed, an LSTM is trained on it. LSTMs are Recurrent Neural Networks (RNNs) that can learn order dependency in sequence prediction challenges [31,32]. RNNs are a form of neural network that predicts sequential or time-series data. RNNs are differentiated by their “memory”, which allows them to alter the current input and output by using information from previous inputs [33]. Unlike standard feedforward networks, the output is determined by the preceding items in the sequence.
The LSTM cell with C t 1 s , C t s , O t 1 , O t , ϖ , σ , and t a n h representing the previous cell state, cell state, previous output, output, input data, sigmoid, and tangent activation functions [31,34]. The LSTM has three gates: a forget gate, an input gate, and an output gate. As the name implies, the forget gate eliminates unneeded information before merging into the cell state. This gate takes as an input x t and h t 1 . To reduce extraneous data, the inputs are passed via a sigmoid function. The input gate is used to update the cell state with fresh information. Like the forget gate, the input gate accepts O t 1 and ϖ as input and runs it via a sigmoid and a t a n h function. The outcomes are then multiplied, and the usable data are added to the current cell state. The output gate stores relevant information based on C t s , O t 1 , and ϖ . After the input and forget gates are combined, the C t s is sent via a t a n h function. O t 1 and ϖ are sent through a sigmoid function to determine which values need to be updated. Finally, the result of both operations is multiplied and produces the cell’s final output. The equations for all the gates are shown below [35]:
i n p t = s i g ( z i [ O t 1 , ϖ ] + q i )
f o r g t = s i g ( z f [ O t 1 , ϖ ] + q f )
o u t t = s i g ( z o [ O t 1 , ϖ ] + q o )
where i n p t , f o r g t and o u t t are the equations for input, forget and output gate. s i g is the sigmoid function. z i , z f and z o are the weight for each of the respective gates. The equations for candidate cell, C t s and final output are as follows:
δ = t a n h ( z c [ O t 1 , ϖ ] + q c )
C t s = f o r g t O t 1 + i n p t δ
O t = o u t t t a n h ( C t s )
where δ is the candidate cell at timestamp t. Figure 4 shows the overall architecture of the LSTM model which is used for training and prediction. Algorithm 2 represents the prediction flow of the LSTM-based sequence model. Since LSTM is a type of recurrent neural network, the computational complexity of these models is dependent on the length of the input sequence. This indicates that, if the length of the input sequence is l, then the computational complexity of LSTM will be O ( l ) . The complexity is O ( l ) because, in order to obtain the output, the LSTM model must traverse the entire sequence of input.
Algorithm 2: Flow of the LSTM-based prediction model.
  Input:  χ m × n × 1
  Output: Attacker_Type
  • model = Sequential(),         ▹ ml = model
  • ml.add(InputLayer(input_shape = (m, 1)))
  • ml.add(LSTM(150, return_sequences = True))
  • ml.add(BatchNormalization())
  • ml.add(Dropout(0.2))
  • ml.add(LSTM(150))
  • ml.add(Dense(10, activation= relu))
  • ml.add(Dense(1, activation = sigmoid))
  • ml.compile(loss=log_loss,optimizer= adam)
  • ml.load_weights()
  • Attacker_Type = ml.predict( χ )
  • if Attacker_Type == 0 then
  •     The device is not an attacker.
  • else if Attacker_Type == 1 then
  •     The device is an attacker.
  • end if
When the dataset is completely processed, the training of the LSTM model begins. The processed time-series data are fed into the LSTM model for the prediction of attacker type. The weights and biases at the beginning of the training are randomly initialized. As the training proceeds, the weights and biases start to converge toward the optimum point. The optimum point is achieved when the model’s accuracy becomes stagnant, i.e., the model no longer converges. This optimum point differs for every use case and, in our case, the optimum point is achieved when the model achieves 90% accuracy. At this point, it can be said that the LSTM model has converged. The specific time to converge for a model varies from model to model and, in our case, the LSTM model took around 1300 s to converge. Once the LSTM model is trained on the standard dataset, i.e., the WUSTL EHMS 2020 dataset, it is then deployed in the wearable devices to validate its pre-trained learning on the unknown wearable healthcare data. Finally, suppose the LSTM model successfully bifurcates legitimate wearable devices based on its learning from the WUSTL EHMS 2020 dataset. In that case, its healthcare data are forwarded to the blockchain network to protect it from data manipulation attacks.

4.3. Blockchain Layer

The blockchain layer is in charge of securing data stored in the blockchain to tackle data injection attacks [36,37,38]. To check the validity of the data, a smart contract is employed. Smart contracts are programs executed based on the satisfaction of certain conditions and are stored in the blockchain network. The data are initially routed through a smart contract, determining who has access to the information.
Blockchain is particularly important in the healthcare industry because the system protects sensitive data, which is very valuable in the field of healthcare. With the growth of electronic medical records, the healthcare industry is continuously attempting to secure patient, hospital, insurance, and billing records. In addition, with so much data available, keeping track of it all while maintaining privacy is difficult. Blockchain’s essential properties, such as transparency, immutability, distributed network, and reliability, strengthen security and offers trust in healthcare systems. In healthcare systems, it is used to monitor the manufacturing of prescription medications and their safety. It provides a platform for storing patient medical records that practitioners can quickly access to give remote medical aid. It is utilized to lessen the risk of fraud and inaccuracy in the medical industry by expediting qualification verification [39].
In the HEART, the patient’s health records are only sent by the smart contract to be stored on the blockchain. The patient and the doctor can only access the data. If required, the doctor can prescribe medication and also suggest necessary treatment to the patient.
Figure 5 shows the implementation of the aforementioned smart contract for the HEART. The smart contract has four major functionality: aUser, healthData, prescription and viewPatientData. The aUser function is responsible for checking the type of user, i.e., whether they are a patient or a doctor. If the user is a patient, the wearable device automatically enters the patient’s health data in the healthData function. This data are then stored onto the blockchain and can be viewed either by the patient or the doctor using the viewPatientData function. Figure 5a,b show the above mentioned functionalities. The user must enter a unique patient ID to view the patient’s data. If the user is a doctor, they can use the prescription function to enter the medication, if necessary, to be given to the patient and also provide insights into what kind of treatment is necessary for the said patient. These functionalities are shown in Figure 5c and Figure 5d, respectively. If any unauthorized user tries to view a patient’s data, a warning message is shown, and the patient’s data will not be visible. The warning message is shown in Figure 5e. Furthermore, the healthcare data are stored inside the interplanetary file system (IPFS)-based public blockchain. A Merkle Tree or Merkle Directed Acyclic Graph, similar to the one used in the Git Version Control system, is employed inside IPFS to efficiently track changes to files on a network in a decentralized manner. Each data element is identified by the cryptographic hash of its contents, known as content-addressing to improve the response time and scalability of the blockchain network. Each block contains a header, which includes metadata such as the timestamp, the hash of the previous block, and the nonce (a value used in the mining process). The block also contains a list of validated transactions, and a Merkle Tree root, which is a single hash that represents the entire collection of transactions in the block. Furthermore, each block also has a unique digital signature, called a “block hash”, which is generated using a cryptographic hashing algorithm. The block hash is based on the contents of the block, including the transaction data and the previous block’s hash.
The AI-based model was developed using Python 3.7.12 on Google Colaboratory (Colab) with 12.69 GiB of RAM and Tensorflow 2.6.0. To speed up the training, the Tesla K80 GPU is enabled. The smart contract is written in solidity language (version 0.8.7) and deployed over the remix ide (version 0.21.1).

5. Results and Discussion

This section assessed the proposed LSTM-based system on the test data and also describe the experimental setup and tools which were utilized for conducting the experiment. To obtain the best working model, many variable parameters are tuned.

Experimental Setup and Tools

This section describes the experimental setup for the proposed HEART framework. The LSTM model in the analytics layer is developed with Python v3.7.12 as the base environment. Tensorflow v2.9.2 and Keras v2.9.0 were utilized to develop the LSTM model for detecting an attacker. To perform mathematical calculations and processing of the dataset, Numpy v1.21.6 and Pandas v1.3.5 are used respectively. Matplotlib v3.2.2 is used to obtain the performance evaluation graphs for the LSTM model. The LSTM model is simulated on a cloud computing platform named Google Colab, which utilizes an Intel(R) Xenon(R) CPU @ 2.20 GHz, 12.69 Gb of RAM, and a Tesla K80 GPU, where this simulation is run for 150 epochs. Furthermore, once the LSTM model is trained, the non-malicious data detected by the model are sent to a smart contract. The smart contract is developed for blockchain using Remix IDE v0.29.2 and solidity v0.8.7 is the programming language with which the smart contract is written. The smart contract has four major functionalities which are as follows; a U s e r , h e a l h D a t a , p r e s c r i p t i o n , and v i e w P a t i e n t D a t a . A detailed description of each function is provided in the aforementioned section. Since the patient’s health data are a piece of very critical information, the data are stored in a blockchain, which ensures that the data cannot be tampered with by anyone. A block in a blockchain has the following attributes; magic number, which is used to identify a block in a blockchain, block size which defines the size of data that can be written in the block, block header which contains critical block information such as previous block hash, merkle root, timestamp, nonce and more, transactions is a list of all the transactions in that particular block, which in our case is the patient’s health data. The blockchain is also available to every medical personnel associated with a particular patient which ensures transparency and also prevents tampering with data. Since the data are stored on a public blockchain, a hash is calculated using all the patient’s health data and is appended to the block. This ensures that, if the patient’s health data have been tampered with, the new hash generated from the patient’s data by medical personnel and the hash stored in the block will not match, thus indicating that the data are manipulated by a malicious user. This malicious user can also be identified by medical personnel because the user must be registered onto the blockchain to manipulate the patient’s health data. Table 3 shows the configuration set-up for entire experiment.
Multiple evaluations and validation techniques are used to accurately. For that, we used a few benchmarked performance parameters, such as precision, recall, and the F1 score. The trained model’s accuracy, recall, and F1-score are displayed in Table 4. Both the training and testing sets are used to compute the scores. The recall value specifies the proportion of expected positive values that outnumber the predicted ones. Precision score, on the other hand, is defined as the proportion of actually expected positive values that exceed the actual ones. Lastly, the F1 score balances the accuracy and recall values to strengthen the prediction performance for the proposed work [40]. The trained LSTM model is also compared with a Recurrent Neural Network (RNN), another type of model that works on time series data. The comparison between the two models is provided in Table 5. The table shows that the LSTM model outperforms the RNN model in every evaluation measure and also takes significantly less time to train. This is because RNNs suffer from vanishing gradient problems for longer input sequences. A vanishing gradient problem is one where the gradient of the loss function of the model reaches closer to zero, making it harder to train the model. Due to the vanishing gradient problem, the ability of RNNs to retain information for longer sequences is severely limited. LSTM, on the other hand, utilizes input and forget gates which helps the model retain longer dependencies and overall better flow control of gradients. The gates in an LSTM unit regulate the addition or removal of information in the unit. This allows the LSTM model to maintain long-term dependencies. Thus, the LSTM model is taken as the model of choice for the detection of a malicious user.
For training purposes, all optimizers are given a constant learning rate of 0.001. Figure 6a,b represent the model’s loss. A loss is a penalty for making an incorrect forecast. The loss is 0 if the model’s forecast is flawless; otherwise, the loss is significant. Figure 6a measures the loss over each iteration, whereas Figure 6c measures the loss over each epoch. An epoch is a single pass of the whole dataset, whereas an iteration is the total number of passes with a defined number of instances in each pass [41]. This number is referred to as the batch size, which in our instance is 256. Figure 6a shows that the model is trained for three different optimizers where the Stochastic Gradient Descent (SGD) performs marginally worse than the rest. The model’s training and testing loss are observed in Figure 6c. It is seen that there are spikes in the graph, and the overall loss is decreasing, indicating that the model is learning.
The model’s accuracy is another criterion for evaluating it. Accuracy gives a decent indication of the model’s prediction ability. A higher accuracy gives a good insight that the model is performing well on the given dataset. The model’s accuracy is determined at each iteration and epoch in the same way as the loss measure. Figure 6b represents the model’s correctness over all iterations. This graph shows that all of the optimizers produce quite comparable accuracies. Figure 6d displays the model’s accuracy estimated over all epochs for both training and testing sets. From the above-mentioned graphs ( Figure 6), it is clear that the accuracy parameter is performing well, i.e., achieving 93% and 92.92% on the training and testing set, respectively. We want to mention that the above outcome is obtained without modifying any parameters (e.g., number of epochs, batch size) in the LSTM model. Furthermore, various optimizers are compared for the LSTM model to showcase the convergence speed of each optimizer in terms of training loss and accuracy.
Figure 6e illustrates the scalability comparison between a conventional blockchain and the 6G-based proposed blockchain network. The persistent characteristic of a 6G network, such as ubiquitous data rate (1 Tbps), drives the blockchain network to operate quickly, allowing it to handle more transactions. From the graph, we can depict that, as the number of transactions increases, the scalability of a 6G-based proposed blockchain network increases. On the contrary, the conventional blockchain cannot process more transactions due to the absence of 6G network properties.
Figure 6f displays the latency comparison among traditional cellular networks, such as 4G and 5G and 6G. Latency is an essential parameter that needs to be measured in a critical application such as wearable technology. It is evident that, due to the enriched properties of a 6G network, such as ubiquitous high data rates (1 Tbps), high scalability ( 10 9 devices/sqm), and high reliability (99.99999%), the latency of the HEART decreases, i.e., low latency (<1 ms). Furthermore, from the graph, we can observe that, as the number of transactions increases, the latency of a 6G network decreases compared to a 4G and 5G network interfaces. This is because the inclusion of a 6G network reduces the packet drop ratio and increases the packet delivery ratio compared to conventional network interfaces. Consequently, the 6G network improves the latency, i.e., reduces the delay in the HEART.

6. Conclusions

In this study, we proposed a blockchain and AI-assisted secure and trusted framework, i.e., HEART to protect wearable healthcare data from numerous security vulnerabilities, such as man-in-the-middle, session hijacking, data manipulation, and spoofing attacks. First, we trained the LSTM model on a standard dataset, i.e., the WUSTL EHMS 2020 dataset and integrated it into wearable devices, which detects whether the device is malicious or not. Furthermore, the healthcare data of the legitimate wearable device are forwarded to the blockchain network, which securely stores the data inside the immutable ledger. The entire HEART is communicating via a 6G network interface, improving latency and scalability. Lastly, the HEART is evaluated against numerous performance metrics, such as accuracy, latency, scalability, and loss curve. The results show that the Adam-based LSTM model achieves 93% and 92.92% training and testing accuracies compared to other optimizers.
In the future, we will improve the AI model by using LSTM and Gated Recurrent Unit (GRU) in an ensemble model which will enhance the capabilities of the model further and will become much more robust. We will also improvise the security aspects of the HEART by including modern-day attacks, such as ransomware, Sybil attack, and zero-day attacks.

Author Contributions

Conceptualization: R.G., N.K.J., A.T., S.T.; writing—original draft preparation: D.J., R.G., S.T., M.S.R., N.K.J.; methodology: S.T., O.A., D.J., R.G.; writing—review and editing: S.T., R.G., V.M., N.K.J.; Investigation: R.G., O.A., A.T., S.T., N.K.J.; Supervision: S.T., M.S.R., R.G.; Visualization; S.T., V.M., O.A., A.T., N.K.J.; Software; N.K.J., M.S.R., R.G. All authors have read and agreed to the published version of the manuscript.

Funding

This work was funded by the Researchers Supporting Project number. (RSP2023R102) King Saud University, Riyadh, Saudi Arabia. The results were obtained with the support of the Ministry of Investments and European Projects through the Human Capital Sectoral Operational Program 2014-2020, Contract no. 62461/03.06.2022, SMIS code 153735. This work is supported by Ministry of Research, Innovation, Digitization from Romania by the National Plan of R & D, Project PN 19 11, Subprogram 1.1. Institutional performance-Projects to finance excellence in RDI, Contract No. 19PFE/30.12.2021 and a grant of the National Center for Hydrogen and Fuel Cells (CNHPC)—Installations and Special Objectives of National Interest (IOSIN). This paper was partially supported by UEFISCDI Romania and MCI through BEIA projects ADCATER, ALPHA, IPSUS, T4ME2, Inno4Health, AICOM4Health and by European Union’s Horizon Europe research and innovation program under grant agreements No. 101095720 (SHIFT-HUB) and 101073982 (MOBILISE).

Data Availability Statement

No data are associated with this research work.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Tanwar, S.; Vora, J.; Kaneriya, S.; Tyagi, S.; Kumar, N.; Sharma, V.; You, I. Human Arthritis Analysis in Fog Computing Environment Using Bayesian Network Classifier and Thread Protocol. IEEE Consum. Electron. Mag. 2020, 9, 88–94. [Google Scholar] [CrossRef]
  2. Patel, K.; Mehta, D.; Mistry, C.; Gupta, R.; Tanwar, S.; Kumar, N.; Alazab, M. Facial Sentiment Analysis Using AI Techniques: State-of-the-Art, Taxonomies, and Challenges. IEEE Access 2020, 8, 90495–90519. [Google Scholar] [CrossRef]
  3. 8 Major Problems with the, U.S. Healthcare System Today. Available online: https://www.medifind.com/news/post/problems-us-healthcare-system (accessed on 10 December 2022).
  4. Evolution of Health Data Storage for Digital Healthcare. Available online: https://www.linkedin.com/pulse/evolution-health-data-storage-digital-healthcare-ambarish-giliyar/ (accessed on 22 December 2022).
  5. Anand, P.; Singh, Y.; Selwal, A.; Alazab, M.; Tanwar, S.; Kumar, N. IoT Vulnerability Assessment for Sustainable Computing: Threats, Current Solutions, and Open Challenges. IEEE Access 2020, 8, 168825–168853. [Google Scholar] [CrossRef]
  6. Noura, M. Efficient and Secure Cryptographic Solutions for Medical Data. Ph.D. Thesis, Université Bourgogne, Dijon, France, 2019. [Google Scholar]
  7. Kester, Q.A.; Nana, L.; Pascu, A.C.; Gire, S.; Eghan, J.M.; Quaynor, N.N. A Cryptographic Technique for Security of Medical Images in Health Information Systems. Procedia Comput. Sci. 2015, 58, 538–543. [Google Scholar] [CrossRef] [Green Version]
  8. Liu, X.; Zhu, H.; Lu, R.; Li, H. Efficient privacy-preserving online medical primary diagnosis scheme on naive bayesian classification. Peer-to-Peer Netw. Appl. 2018, 11, 334–347. [Google Scholar] [CrossRef]
  9. Rai, A.; Singh, H. SVM based robust watermarking for enhanced medical image security. Multimed. Tools Appl. 2017, 76, 18605–18618. [Google Scholar] [CrossRef]
  10. Gupta, R.; Shukla, A.; Tanwar, S. AaYusH: A Smart Contract-Based Telesurgery System for Healthcare 4.0. In Proceedings of the 2020 IEEE International Conference on Communications Workshops (ICC Workshops), Dublin, Ireland, 7–11 June 2020; pp. 1–6. [Google Scholar] [CrossRef]
  11. Singh, R.; Tanwar, S.; Sharma, T.P. Utilization of blockchain for mitigating the distributed denial of service attacks. Secur. Priv. 2020, 3, e96. [Google Scholar] [CrossRef]
  12. Lee, T.F.; Chang, I.P.; Kung, T.S. Blockchain-Based Healthcare Information Preservation Using Extended Chaotic Maps for HIPAA Privacy/Security Regulations. Appl. Sci. 2021, 11, 10576. [Google Scholar] [CrossRef]
  13. Zhu, P.; Hu, J.; Zhang, Y.; Li, X. A Blockchain Based Solution for Medication Anti-Counterfeiting and Traceability. IEEE Access 2020, 8, 184256–184272. [Google Scholar] [CrossRef]
  14. Tauqeer, H.; Iqbal, M.M.; Ali, A.; Zaman, S.; Chaudhry, M.U. Cyberattacks Detection in IoMT using Machine Learning Techniques. J. Comput. Biomed. Inform. 2022, 4, 13–20. [Google Scholar] [CrossRef]
  15. Lu, W. Detecting Malicious Attacks Using Principal Component Analysis in Medical Cyber-Physical Systems. In Artificial Intelligence for Cyber-Physical Systems Hardening; Springer: Berlin/Heidelberg, Germany, 2023; pp. 203–215. [Google Scholar]
  16. Yeh, K.H. A Secure IoT-Based Healthcare System With Body Sensor Networks. IEEE Access 2016, 4, 10288–10299. [Google Scholar] [CrossRef]
  17. Wu, F.; Li, X.; Sangaiah, A.K.; Xu, L.; Kumari, S.; Wu, L.; Shen, J. A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks. Future Gener. Comput. Syst. 2018, 82, 727–737. [Google Scholar] [CrossRef]
  18. Banerjee, S.; Odelu, V.; Das, A.K.; Chattopadhyay, S.; Kumar, N.; Park, Y.; Tanwar, S. Design of an Anonymity-Preserving Group Formation Based Authentication Protocol in Global Mobility Networks. IEEE Access 2018, 6, 20673–20693. [Google Scholar] [CrossRef]
  19. Yanambaka, V.P.; Mohanty, S.P.; Kougianos, E.; Puthal, D. PMsec: Physical Unclonable Function-Based Robust and Lightweight Authentication in the Internet of Medical Things. IEEE Trans. Consum. Electron. 2019, 65, 388–397. [Google Scholar] [CrossRef]
  20. Zhu, H.; Liu, X.; Lu, R.; Li, H. Efficient and Privacy-Preserving Online Medical Prediagnosis Framework Using Nonlinear SVM. IEEE J. Biomed. Health Inform. 2017, 21, 838–850. [Google Scholar] [CrossRef]
  21. Newaz, A.K.M.I.; Sikder, A.K.; Rahman, M.A.; Uluagac, A.S. HealthGuard: A Machine Learning-Based Security Framework for Smart Healthcare Systems. arXiv 2019, arXiv:1909.10565. [Google Scholar]
  22. Meng, W.; Choo, K.K.R.; Furnell, S.; Vasilakos, A.V.; Probst, C.W. Towards Bayesian-Based Trust Management for Insider Attacks in Healthcare Software-Defined Networks. IEEE Trans. Netw. Serv. Manag. 2018, 15, 761–773. [Google Scholar] [CrossRef] [Green Version]
  23. Chelladurai, U.; Pandian, S. A novel blockchain based electronic health record automation system for healthcare. J. Ambient. Intell. Humaniz. Comput. 2022, 13, 693–703. [Google Scholar] [CrossRef]
  24. Mistry, C.; Thakker, U.; Gupta, R.; Obaidat, M.S.; Tanwar, S.; Kumar, N.; Rodrigues, J.J.P.C. MedBlock: An AI-enabled and Blockchain-driven Medical Healthcare System for COVID-19. In Proceedings of the ICC 2021—IEEE International Conference on Communications, Montreal, QC, Canada, 14–23 June 2021; pp. 1–6. [Google Scholar] [CrossRef]
  25. Wang, Y.; Wang, Z.; Zhao, M.; Han, X.; Zhou, H.; Wang, X.; Koe, A.S.V. BSM-ether: Bribery selfish mining in blockchain-based healthcare systems. Inf. Sci. 2022, 601, 1–17. [Google Scholar] [CrossRef]
  26. Kumar, P.; Kumar, R.; Gupta, G.P.; Tripathi, R.; Jolfaei, A.; Islam, A.N. A blockchain-orchestrated deep learning approach for secure data transmission in IoT-enabled healthcare system. J. Parallel Distrib. Comput. 2023, 172, 69–83. [Google Scholar] [CrossRef]
  27. Khujamatov, K.; Reypnazarov, E.; Akhmedov, N.; Khasanov, D. Blockchain for 5G Healthcare architecture. In Proceedings of the 2020 International Conference on Information Science and Communications Technologies (ICISCT), Tashkent, Uzbekistan, 4–6 November 2020; pp. 1–5. [Google Scholar] [CrossRef]
  28. Chakraborty, S.; Aich, S.; Kim, H.C. A Secure Healthcare System Design Framework using Blockchain Technology. In Proceedings of the 2019 21st International Conference on Advanced Communication Technology (ICACT), Pyeong Chang, Republic of Korea, 17–20 February 2019; pp. 260–264. [Google Scholar] [CrossRef]
  29. Sharma, Y.; Balamurugan, B. Preserving the Privacy of Electronic Health Records using Blockchain. Procedia Comput. Sci. 2020, 173, 171–180. [Google Scholar] [CrossRef]
  30. WUSTL EHMS 2020 Dataset for Internet of Medical Things (IoMT) Cybersecurity Research. Available online: https://www.cse.wustl.edu/~jain/ehms/index.html (accessed on 23 July 2021).
  31. Staudemeyer, R.C.; Morris, E.R. Understanding LSTM—A tutorial into Long Short-Term Memory Recurrent Neural Networks. arXiv 2019, arXiv:1909.09586. [Google Scholar]
  32. Patel, D.; Bielecki, D.; Rai, R.; Dargush, G. Improving connectivity and accelerating multiscale topology optimization using deep neural network techniques. Struct. Multidiscip. Optim. 2022, 65, 126. [Google Scholar] [CrossRef]
  33. Sherstinsky, A. Fundamentals of Recurrent Neural Network (RNN) and Long Short-Term Memory (LSTM) Network. arXiv 2018, arXiv:1808.03314. [Google Scholar] [CrossRef] [Green Version]
  34. Longari, S.; Nova Valcarcel, D.H.; Zago, M.; Carminati, M.; Zanero, S. CANnolo: An Anomaly Detection System Based on LSTM Autoencoders for Controller Area Network. IEEE Trans. Netw. Serv. Manag. 2021, 18, 1913–1924. [Google Scholar] [CrossRef]
  35. LSTM and Its Equations. Available online: https://medium.com/@divyanshu132/lstm-and-its-equations-5ee9246d04af (accessed on 6 July 2018).
  36. What Is Blockchain? Available online: https://www.euromoney.com/learning/blockchain-explained/what-is-blockchain (accessed on 20 August 2022).
  37. Qiu, J.; Liang, X.; Shetty, S.; Bowden, D. Towards secure and smart healthcare in smart cities using blockchain. In Proceedings of the 2018 IEEE International Smart Cities Conference (ISC2), Kansas City, MO, USA, 16–19 September 2018; pp. 1–4. [Google Scholar]
  38. Swetha, M.; Pushpa, S.; Muneshwara, M.; Manjunath, T. Blockchain enabled secure healthcare Systems. In Proceedings of the 2020 IEEE International Conference on Machine Learning and Applied Network Technologies (ICMLANT), Hyderabad, India, 20–21 December 2020; pp. 1–6. [Google Scholar]
  39. Blockchain in Healthcare. Available online: https://www.oracle.com/in/blockchain/what-is-blockchain/blockchain-in-healthcare/ (accessed on 19 September 2022).
  40. Zhou, X.; Hu, Y.; Liang, W.; Ma, J.; Jin, Q. Variational LSTM Enhanced Anomaly Detection for Industrial Big Data. IEEE Trans. Ind. Inform. 2021, 17, 3469–3477. [Google Scholar] [CrossRef]
  41. Epoch vs. Batch Size vs. Iterations. Available online: https://towardsdatascience.com/epoch-vs-iterations-vs-batch-size-4dfb9c7ce9c9 (accessed on 23 September 2017).
Figure 1. System model.
Figure 1. System model.
Mathematics 11 00637 g001
Figure 2. HEART system architecture.
Figure 2. HEART system architecture.
Mathematics 11 00637 g002
Figure 3. Data preprocessing in the analytic layer.
Figure 3. Data preprocessing in the analytic layer.
Mathematics 11 00637 g003
Figure 4. LSTM-based sequence model.
Figure 4. LSTM-based sequence model.
Mathematics 11 00637 g004
Figure 5. Smart contract for storing user’s health data. (a) Smart contract for a patient entering details. (b) Smart contract for patient viewing details. (c) Smart contract for a doctor entering details. (d) Smart contract for a doctor viewing details. (e) Warning message when an unauthorized user tries to access patient record.
Figure 5. Smart contract for storing user’s health data. (a) Smart contract for a patient entering details. (b) Smart contract for patient viewing details. (c) Smart contract for a doctor entering details. (d) Smart contract for a doctor viewing details. (e) Warning message when an unauthorized user tries to access patient record.
Mathematics 11 00637 g005
Figure 6. Loss and accuracy curves for different model optimizers during the training process. Scalability and Latency graphs to show the influence of a 6G communication.
Figure 6. Loss and accuracy curves for different model optimizers during the training process. Scalability and Latency graphs to show the influence of a 6G communication.
Mathematics 11 00637 g006
Table 1. A comparative table between the existing state-of-the-art works and the proposed work.
Table 1. A comparative table between the existing state-of-the-art works and the proposed work.
AuthorYearIssues TargetedSolution ProposedProsCons
Chelladurai et al. [23]2022Automated health record system using blockchainThe proposed system exchanges health information on the blockchain to create a smart e-health systemThe system utilizes a modified Merkle tree data structure which provides secure and fast access of patient logs.The system does not consider the possible manipulation of patient data by attackers.
Wang et al. [25]2022Bribery self mining in blockchainProposed a new selfish mining scheme and ways to tackle itThe system proposes a unique way of selfish mining in Ethereum which is more efficient than othersThe proposed scheme has lower ethereum costs and higher rewards, leading to more harmful attacks on healthcare systems.
Khujamatov et al. [27]2020Blockchain for healthcareBlockchain-based 5G healthcare architectureThe solution utilizes the 5G technology alongside blockchain, which provides ultra-low latency and high data rate, which are crucial for healthcare systems.The proposed framework does not check whether the data received by the blockchain is tampered with or not.
Sharma et al. [29]2020Privacy of patient’s dataBlockchain-enabled electronic health records privacy preservingTransactions are secured via blockchain technology which improves transparency in the healthcare industry.The system is not functioning as a full-fledged healthcare management system.
Newaz et al. [21]2019Security of smart healthcare devicesAI-based secure smart healthcare frameworkDetected malicious intents in smart healthcare systems.The data collected from smart healthcare systems are considered not compromised.
Yanambaka et al. [19]2019Security of Internet of Medical ThingsPhysical unclonable function-based lightweight authentication schemeA device authentication mechanism for the internet of medical things that take advantage of physically unclonable features.The proposed system does not use technologies such as 5G/6G, which provide even faster authentication time for each device.
Meng et al. [22]2018Trust management in healthcareTrust management in healthcare systemsCapable of recognizing rogue medical equipment.Large traffic, security policy enforcement, and the deployment of extra security measures are some of the system’s downsides.
Yeh et al. [16]2016Security of healthcare systemsSecuring healthcare system with body sensor networksSecure smart gadgets physically while simultaneously maintaining data secrecy and resistance against forgery attacks and replay attacks.Overall performance and computation cost are not measured
HEART2022Security of wearable devices and patient’s healthcare dataBlockchain and AI-based frameworkHEART authenticates the integrity of wearable devices-
Table 2. Parameters considered for patient’s data.
Table 2. Parameters considered for patient’s data.
Patient Data TypeDescription
TempThe temperature of the patient
SpO2The SpO2 reading of the patient
Pulse RateThe measurement of heart rate
SysThe systolic pressure of the patient
DiaThe diastolic pressure of the patient
Heart RateThe rate at which the heart beats per minute
Resp RateThe rate at which the patient is breathing
STElectrically neutral area between ventricular depolarization
(QRS complex) and repolarization (T wave) in millivolts
Table 3. Simulation parameters for the proposed HEART framework.
Table 3. Simulation parameters for the proposed HEART framework.
ParametersValues
Analytics Layer Parameters
Epochs150
OptimizerAdam
Activation Functiontanh
Learning Rate0.001
Loss FunctionBinary Crossentropy
Blockchain Layer Parameters
Solidity Compilerv0.8.7
Remix IDE0.29.2
Gas Limit3,000,000
Table 4. Model scores’ comparison on training and testing set.
Table 4. Model scores’ comparison on training and testing set.
Statistical MeasureTraining SetTesting Set
Precision value (%)0.870.88
Recall value (%)1.001.00
F1-Score (%)0.930.93
Table 5. Comparison of LSTM and RNN.
Table 5. Comparison of LSTM and RNN.
Statistical MeasuresLSTMRNN
Precision Value (%)0.880.84
Recall Value (%)1.000.92
F1-Score (%)0.930.88
Training Time (seconds)15002250
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Jadav, D.; Jadav, N.K.; Gupta, R.; Tanwar, S.; Alfarraj, O.; Tolba, A.; Raboaca, M.S.; Marina, V. A Trustworthy Healthcare Management Framework Using Amalgamation of AI and Blockchain Network. Mathematics 2023, 11, 637. https://doi.org/10.3390/math11030637

AMA Style

Jadav D, Jadav NK, Gupta R, Tanwar S, Alfarraj O, Tolba A, Raboaca MS, Marina V. A Trustworthy Healthcare Management Framework Using Amalgamation of AI and Blockchain Network. Mathematics. 2023; 11(3):637. https://doi.org/10.3390/math11030637

Chicago/Turabian Style

Jadav, Dhairya, Nilesh Kumar Jadav, Rajesh Gupta, Sudeep Tanwar, Osama Alfarraj, Amr Tolba, Maria Simona Raboaca, and Verdes Marina. 2023. "A Trustworthy Healthcare Management Framework Using Amalgamation of AI and Blockchain Network" Mathematics 11, no. 3: 637. https://doi.org/10.3390/math11030637

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop