{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T21:07:15Z","timestamp":1763672835354,"version":"3.45.0"},"reference-count":84,"publisher":"Springer Science and Business Media LLC","issue":"17","license":[{"start":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T00:00:00Z","timestamp":1763596800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T00:00:00Z","timestamp":1763596800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"DOI":"10.1007\/s11227-025-08010-2","type":"journal-article","created":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T19:19:08Z","timestamp":1763666348000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Securing IoMT-based healthcare systems with meta-heuristic quantum cryptography and honeybee optimization"],"prefix":"10.1007","volume":"81","author":[{"given":"Mohamed A. G.","family":"Hazber","sequence":"first","affiliation":[]},{"given":"Abdulrahman","family":"Albarrak","sequence":"additional","affiliation":[]},{"given":"Mohammed","family":"Altamimi","sequence":"additional","affiliation":[]},{"given":"Anandhavalli","family":"Muniasamy","sequence":"additional","affiliation":[]},{"given":"Asharul","family":"Islam","sequence":"additional","affiliation":[]},{"given":"Mohammed Altaf","family":"Ahmed","sequence":"additional","affiliation":[]},{"given":"Khaled M.","family":"Alalayah","sequence":"additional","affiliation":[]},{"given":"Shahid","family":"Hussain","sequence":"additional","affiliation":[]},{"given":"Reyazur Rashid","family":"Irshad","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,20]]},"reference":[{"key":"8010_CR1","doi-asserted-by":"publisher","first-page":"1123","DOI":"10.1007\/s11596-021-2485-0","volume":"41","author":"Y Xie","year":"2021","unstructured":"Xie Y, Lu L, Gao F, He S-J, Zhao H-J, Fang Y, Yang J-M, An Y, Ye Z-W, Dong Z (2021) Integration of artificial intelligence, blockchain, and wearable technology for chronic disease management: a new paradigm in smart healthcare. Curr Med Sci 41:1123\u20131133","journal-title":"Curr Med Sci"},{"key":"8010_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cmpb.2021.106146","volume":"207","author":"SK Shahzad","year":"2021","unstructured":"Shahzad SK, Ahmed D, Naqvi MR, Mushtaq MT, Iqbal MW, Munir F (2021) Ontology driven smart health service integration. Comput Methods Programs Biomed 207:106146","journal-title":"Comput Methods Programs Biomed"},{"key":"8010_CR3","doi-asserted-by":"publisher","first-page":"1134","DOI":"10.1007\/s11596-021-2486-z","volume":"41","author":"Z-x Lu","year":"2021","unstructured":"Lu Z-x, Qian P, Bi D, Ye Z-w, He X, Zhao Y-h, Su L, Li S-l, Zhu Z-l (2021) Application of ai and IOT in clinical medicine: summary and challenges. Curr Med Sci 41:1134\u20131150","journal-title":"Curr Med Sci"},{"key":"8010_CR4","first-page":"1","volume":"28","author":"A Abbas","year":"2021","unstructured":"Abbas A, Alroobaea R, Krichen M, Rubaiee S, Vimal S, Almansour FM (2021) Blockchain-assisted secured data management framework for health information analysis based on internet of medical things. Person Ubiquit Comput 28:1\u201314","journal-title":"Person Ubiquit Comput"},{"key":"8010_CR5","doi-asserted-by":"crossref","unstructured":"Awotunde JB, Jimoh RG, Folorunso SO, Adeniyi EA, Abiodun KM, Banjo OO (2021) Privacy and security concerns in IoT-based healthcare systems. In: The Fusion of Internet of Things, Artificial Intelligence, and Cloud Computing in Health Care. Springer, Berlin, pp 105\u2013134","DOI":"10.1007\/978-3-030-75220-0_6"},{"key":"8010_CR6","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/978-3-030-55833-8_2","volume":"1","author":"S Goyal","year":"2021","unstructured":"Goyal S, Sharma N, Bhushan B, Shankar A, Sagayam M (2021) Iot enabled technology in secured healthcare: applications, challenges and future directions. Cognit Internet Med Things Smart Healthc Serv Appl 1:25\u201348","journal-title":"Cognit Internet Med Things Smart Healthc Serv Appl"},{"key":"8010_CR7","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1007\/978-3-319-05029-4_13","volume":"1","author":"T Beyan","year":"2014","unstructured":"Beyan T, Ayd\u0131n Son Y (2014) Emerging technologies in health information systems: genomics driven wellness tracking and management system (go-well). Big Data Internet Things Roadmap Smart Environ 1:315\u2013339","journal-title":"Big Data Internet Things Roadmap Smart Environ"},{"key":"8010_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2022.103332","volume":"201","author":"RU Rasool","year":"2022","unstructured":"Rasool RU, Ahmad HF, Rafique W, Qayyum A, Qadir J (2022) Security and privacy of internet of medical things: a contemporary review in the age of surveillance, botnets, and adversarial ml. J Netw Comput Appl 201:103332","journal-title":"J Netw Comput Appl"},{"issue":"3","key":"8010_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.neuri.2021.100028","volume":"2","author":"A Sujith","year":"2022","unstructured":"Sujith A, Sajja GS, Mahalakshmi V, Nuhmani S, Prasanalakshmi B (2022) Systematic review of smart health monitoring using deep learning and artificial intelligence. Neurosci Inform 2(3):100028","journal-title":"Neurosci Inform"},{"issue":"1","key":"8010_CR10","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/s42452-019-1925-y","volume":"2","author":"S Selvaraj","year":"2020","unstructured":"Selvaraj S, Sundaravaradhan S (2020) Challenges and opportunities in IoT healthcare systems: a systematic review. SN Appl Sci 2(1):139","journal-title":"SN Appl Sci"},{"key":"8010_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2020.110208","volume":"135","author":"SY Teng","year":"2021","unstructured":"Teng SY, Tou\u0161 M, Leong WD, How BS, Lam HL, M\u00e1\u0161a V (2021) Recent advances on industrial data-driven energy savings: digital twins and infrastructures. Renew Sustain Energy Rev 135:110208","journal-title":"Renew Sustain Energy Rev"},{"key":"8010_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108586","volume":"203","author":"G Zhang","year":"2022","unstructured":"Zhang G, Yang Z, Liu W (2022) Blockchain-based privacy preserving e-health system for healthcare data in cloud. Comput Netw 203:108586","journal-title":"Comput Netw"},{"issue":"13","key":"8010_CR13","doi-asserted-by":"publisher","first-page":"816","DOI":"10.1007\/s10586-025-05518-3","volume":"28","author":"MA Hazber","year":"2025","unstructured":"Hazber MA, Albarrak A, Altamimi M, Muniasamy A, Islam A, Ahmed MA, Alalayah KM, Hussain S, Irshad RR (2025) A blockchain-enabled edge computing framework leveraging artificial neural network and aquila optimization to enhance security and scalability of cloud-based IoT platforms. Clust Comput 28(13):816","journal-title":"Clust Comput"},{"issue":"1","key":"8010_CR14","doi-asserted-by":"publisher","first-page":"34619","DOI":"10.1038\/s41598-025-18243-z","volume":"15","author":"R Manchanda","year":"2025","unstructured":"Manchanda R, Panchal S, Sandiri R, Sudhamsu G, Mehta A, Gupta R, Bhowmik A, Bukate BB (2025) Energy-efficient clustering and routing for IoT-enabled healthcare using adaptive fuzzy logic and hybrid optimization. Sci Rep 15(1):34619","journal-title":"Sci Rep"},{"key":"8010_CR15","doi-asserted-by":"crossref","unstructured":"Negi L, Bhatt S (2022) A review on security schemes for electronic health records. In: 2022 Fifth International Conference on Computational Intelligence and Communication Technologies (CCICT), IEEE, pp 37\u201341","DOI":"10.1109\/CCiCT56684.2022.00019"},{"key":"8010_CR16","doi-asserted-by":"crossref","unstructured":"Gunjan VK, Garcia Diaz V, Cardona M, Solanki VK, Sunitha K (2020) ICICCT 2019-System Reliability, Quality Control, Safety, Maintenance and Management. Springer, Berlin","DOI":"10.1007\/978-981-13-8461-5"},{"key":"8010_CR17","doi-asserted-by":"crossref","unstructured":"Maseleno A, Hashim W, Perumal E, Ilayaraja M, Shankar K (2020) Access control and classifier-based blockchain technology in e-healthcare applications. In: Intelligent Data Security Solutions for e-Health Applications, Elsevier, pp 151\u2013167","DOI":"10.1016\/B978-0-12-819511-6.00008-X"},{"key":"8010_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2020.103290","volume":"122","author":"A Tandon","year":"2020","unstructured":"Tandon A, Dhir A, Islam AN, M\u00e4ntym\u00e4ki M (2020) Blockchain in healthcare: a systematic literature review, synthesizing framework and future research agenda. Comput Ind 122:103290","journal-title":"Comput Ind"},{"issue":"1","key":"8010_CR19","doi-asserted-by":"publisher","first-page":"25040","DOI":"10.1038\/s41598-025-09957-1","volume":"15","author":"A Kumar","year":"2025","unstructured":"Kumar A, Dhanka S, Sharma A, Bansal R, Fahlevi M, Rabby F, Aljuaid M (2025) A hybrid framework for heart disease prediction using classical and quantum-inspired machine learning techniques. Sci Rep 15(1):25040","journal-title":"Sci Rep"},{"issue":"1","key":"8010_CR20","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1016\/j.gltp.2022.04.015","volume":"3","author":"V Shilpa","year":"2022","unstructured":"Shilpa V, Vidya A, Pattar S (2022) Mqtt based secure transport layer communication for mutual authentication in Iot network. Global Trans Proc 3(1):60\u201366","journal-title":"Global Trans Proc"},{"key":"8010_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2025.113716","volume":"321","author":"S Kumari","year":"2025","unstructured":"Kumari S (2025) Next-gen Iot security using polar codes-based cryptography for malware defence through quantum self-attention neural network. Knowl Based Syst 321:113716","journal-title":"Knowl Based Syst"},{"issue":"1","key":"8010_CR22","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1007\/s11227-024-06782-7","volume":"81","author":"AA Khan","year":"2025","unstructured":"Khan AA, Laghari AA, Baqasah AM, Bacarra R, Alroobaea R, Alsafyani M, Alsayaydeh JAJ (2025) Bdlt-IOMT-a novel architecture: Svm machine learning for robust and secure data processing in internet of medical things with blockchain cybersecurity. J Supercomput 81(1):271","journal-title":"J Supercomput"},{"key":"8010_CR23","doi-asserted-by":"crossref","unstructured":"Riaz MZ, Behera BK, Mumtaz S, Al-Kuwari S, Farouk A (2025) Quantum machine learning for energy-efficient 5g-enabled iomt healthcare systems: enhancing data security and processing. IEEE Internet Things J","DOI":"10.1109\/JIOT.2025.3586090"},{"key":"8010_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2025.110761","volume":"128","author":"S Khan","year":"2025","unstructured":"Khan S, Perumal K, Alsolai H, Aljohani A (2025) Fedtinymed: federated learning enabled tiny multi task machine learning model for smart healthcare monitoring for iomt. Comput Electr Eng 128:110761","journal-title":"Comput Electr Eng"},{"issue":"23","key":"8010_CR25","doi-asserted-by":"publisher","first-page":"16749","DOI":"10.1109\/JIOT.2021.3051158","volume":"8","author":"H Elayan","year":"2021","unstructured":"Elayan H, Aloqaily M, Guizani M (2021) Digital twin for intelligent context-aware Iot healthcare systems. IEEE Internet Things J 8(23):16749\u201316757","journal-title":"IEEE Internet Things J"},{"key":"8010_CR26","doi-asserted-by":"crossref","unstructured":"Poongodi T, Krishnamurthi R, Indrakumari R, Suresh P, Balusamy B (2020) Wearable devices and Iot. In: A handbook of Internet of Things in Biomedical and Cyber Physical System, pp 245\u2013273","DOI":"10.1007\/978-3-030-23983-1_10"},{"issue":"2","key":"8010_CR27","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1109\/MCE.2019.2953740","volume":"9","author":"T Alladi","year":"2020","unstructured":"Alladi T, Chamola V, Sikdar B, Choo K-KR (2020) Consumer IoT: security vulnerability case studies and solutions. IEEE Consum Electron Mag 9(2):17\u201325","journal-title":"IEEE Consum Electron Mag"},{"issue":"1","key":"8010_CR28","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1007\/s42452-020-04089-9","volume":"3","author":"AK Gautam","year":"2021","unstructured":"Gautam AK, Kumar R (2021) A comprehensive study on key management, authentication and trust management techniques in wireless sensor networks. SN Appl Sci 3(1):50","journal-title":"SN Appl Sci"},{"key":"8010_CR29","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1016\/j.comcom.2020.12.003","volume":"166","author":"P Kumar","year":"2021","unstructured":"Kumar P, Gupta GP, Tripathi R (2021) An ensemble learning and fog-cloud architecture-driven cyber-attack detection framework for iomt networks. Comput Commun 166:110\u2013124","journal-title":"Comput Commun"},{"key":"8010_CR30","doi-asserted-by":"publisher","first-page":"131397","DOI":"10.1109\/ACCESS.2020.3007405","volume":"8","author":"G Mehmood","year":"2020","unstructured":"Mehmood G, Khan MZ, Waheed A, Zareei M, Mohamed EM (2020) A trust-based energy-efficient and reliable communication scheme (trust-based ercs) for remote patient monitoring in wireless body area networks. IEEE Access 8:131397\u2013131413","journal-title":"IEEE Access"},{"key":"8010_CR31","unstructured":"Goswami N, Raj S, Thakral D, Arias-Gonz\u00e1les JL, Flores-Albornoz J, Asnate-Salazar E, Kapila D, Yadav S, Kumar S (2023) Intrusion detection system for iot-based healthcare intrusions with lion-salp-swarm-optimization algorithm: metaheuristic-enabled hybrid intelligent approach. Eng Sci"},{"key":"8010_CR32","unstructured":"Liu Z, Wan L, Guo J, Huang F, Feng X, Wang L, Ma J (2023) Ppru: a privacy-preserving reputation updating scheme for cloud-assisted vehicular networks. IEEE Trans Veh Technol"},{"issue":"5","key":"8010_CR33","doi-asserted-by":"publisher","first-page":"3650","DOI":"10.1109\/TMC.2023.3277702","volume":"23","author":"Y Miao","year":"2023","unstructured":"Miao Y, Li F, Li X, Liu Z, Ning J, Li H, Choo K-KR, Deng RH (2023) Time-controllable keyword search scheme with efficient revocation in mobile e-health cloud. IEEE Trans Mob Comput 23(5):3650\u20133665","journal-title":"IEEE Trans Mob Comput"},{"issue":"1","key":"8010_CR34","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1109\/TKDE.2023.3283020","volume":"36","author":"Y Miao","year":"2023","unstructured":"Miao Y, Yang Y, Li X, Wei L, Liu Z, Deng RH (2023) Efficient privacy-preserving spatial data query in cloud computing. IEEE Trans Knowl Data Eng 36(1):122\u2013136","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"8010_CR35","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2020.100266","volume":"11","author":"M Mahbub","year":"2020","unstructured":"Mahbub M, Hossain MM, Gazi MSA (2020) Iot-cognizant cloud-assisted energy efficient embedded system for indoor intelligent lighting, air quality monitoring, and ventilation. Internet Things 11:100266","journal-title":"Internet Things"},{"issue":"3","key":"8010_CR36","doi-asserted-by":"publisher","first-page":"862","DOI":"10.1109\/JBHI.2020.3007488","volume":"25","author":"P Gope","year":"2020","unstructured":"Gope P, Gheraibia Y, Kabir S, Sikdar B (2020) A secure IoT-based modern healthcare system with fault-tolerant decision making process. IEEE J Biomed Health Inform 25(3):862\u2013873","journal-title":"IEEE J Biomed Health Inform"},{"key":"8010_CR37","doi-asserted-by":"publisher","DOI":"10.1016\/j.bspc.2022.103481","volume":"74","author":"N Raheja","year":"2022","unstructured":"Raheja N, Manocha AK (2022) Iot based ECG monitoring system with encryption and authentication in secure data transmission for clinical health care approach. Biomed Signal Process Control 74:103481","journal-title":"Biomed Signal Process Control"},{"key":"8010_CR38","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.future.2022.12.040","volume":"143","author":"S Singh","year":"2023","unstructured":"Singh S, Kumar D (2023) Energy-efficient secure data fusion scheme for iot based healthcare system. Futur Gener Comput Syst 143:15\u201329","journal-title":"Futur Gener Comput Syst"},{"issue":"2","key":"8010_CR39","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1109\/MCE.2021.3140048","volume":"12","author":"S Namasudra","year":"2022","unstructured":"Namasudra S, Sharma P, Crespo RG, Shanmuganathan V (2022) Blockchain-based medical certificate generation and verification for iot-based healthcare systems. IEEE Consum Electron Mag 12(2):83\u201393","journal-title":"IEEE Consum Electron Mag"},{"key":"8010_CR40","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.108025","volume":"101","author":"SB Othman","year":"2022","unstructured":"Othman SB, Almalki FA, Chakraborty C, Sakli H (2022) Privacy-preserving aware data aggregation for iot-based healthcare with green computing technologies. Comput Electr Eng 101:108025","journal-title":"Comput Electr Eng"},{"issue":"2","key":"8010_CR41","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1109\/JSAC.2020.3020655","volume":"39","author":"GS Aujla","year":"2020","unstructured":"Aujla GS, Jindal A (2020) A decoupled blockchain approach for edge-envisioned iot-based healthcare monitoring. IEEE J Sel Areas Commun 39(2):491\u2013499","journal-title":"IEEE J Sel Areas Commun"},{"key":"8010_CR42","doi-asserted-by":"publisher","first-page":"1629","DOI":"10.1007\/s12083-021-01077-7","volume":"14","author":"JA Onesimu","year":"2021","unstructured":"Onesimu JA, Karthikeyan J, Sei Y (2021) An efficient clustering-based anonymization scheme for privacy-preserving data collection in iot based healthcare services. Peer-to-Peer Netw Appl 14:1629\u20131649","journal-title":"Peer-to-Peer Netw Appl"},{"issue":"6","key":"8010_CR43","doi-asserted-by":"publisher","first-page":"4009","DOI":"10.1007\/s11276-021-02652-9","volume":"27","author":"M Nasr Esfahani","year":"2021","unstructured":"Nasr Esfahani M, Shahgholi Ghahfarokhi B, Etemadi Borujeni S (2021) End-to-end privacy preserving scheme for iot-based healthcare systems. Wirel Netw 27(6):4009\u20134037","journal-title":"Wirel Netw"},{"key":"8010_CR44","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.future.2021.01.028","volume":"123","author":"M Gheisari","year":"2021","unstructured":"Gheisari M, Najafabadi HE, Alzubi JA, Gao J, Wang G, Abbasi AA, Castiglione A (2021) Obpp: an ontology-based framework for privacy-preserving in iot-based smart city. Futur Gener Comput Syst 123:1\u201313","journal-title":"Futur Gener Comput Syst"},{"key":"8010_CR45","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1016\/j.comcom.2021.08.011","volume":"180","author":"KM Hossein","year":"2021","unstructured":"Hossein KM, Esmaeili ME, Dargahi T, Khonsari A, Conti M (2021) Bchealth: a novel blockchain-based privacy-preserving architecture for iot healthcare applications. Comput Commun 180:31\u201347","journal-title":"Comput Commun"},{"key":"8010_CR46","doi-asserted-by":"crossref","unstructured":"Irshad RR, Hussain S, Hussain I, Nasir JA, Zeb A, Alalayah KM, Alattab AA, Yousif A, Alwayle IM (2023) Iot-enabled secure and scalable cloud architecture for multi-user systems: a hybrid post-quantum cryptographic and blockchain based approach towards a trustworthy cloud computing. IEEE Access","DOI":"10.1109\/ACCESS.2023.3318755"},{"key":"8010_CR47","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2022.103914","volume":"82","author":"G Zhang","year":"2022","unstructured":"Zhang G, Navimipour NJ (2022) A comprehensive and systematic review of the iot-based medical management systems: applications, techniques, trends and open issues. Sustain Cities Soc 82:103914","journal-title":"Sustain Cities Soc"},{"key":"8010_CR48","doi-asserted-by":"crossref","unstructured":"Irshad RR, Sohail SS, Hussain S, Madsen D\u00d8, Zamani AS, Ahmed AAA, Alattab AA, Badr MM, Alwayle IM (2023) Towards enhancing security of iot-enabled healthcare system. Heliyon","DOI":"10.1016\/j.heliyon.2023.e22336"},{"key":"8010_CR49","doi-asserted-by":"crossref","unstructured":"Hussain S, Kim Y-C (2016) Fault resilient communication network architecture for monitoring and control of wind power farms. In: 2016 18th International Conference on Advanced Communication Technology (ICACT), IEEE, pp 685\u2013692","DOI":"10.1109\/ICACT.2016.7423598"},{"key":"8010_CR50","doi-asserted-by":"crossref","unstructured":"Irshad RR, Hussain S, Hussain I, Alattab AA, Yousif A, Alsaiari OAS, Ibrahim EII (2023) A novel artificial spider monkey based random forest hybrid framework for monitoring and predictive diagnoses of patients healthcare. IEEE Access","DOI":"10.1109\/ACCESS.2023.3297957"},{"key":"8010_CR51","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2020.100254","volume":"11","author":"R Martino","year":"2020","unstructured":"Martino R, Cilardo A (2020) Designing a sha-256 processor for blockchain-based iot applications. Internet Things 11:100254","journal-title":"Internet Things"},{"key":"8010_CR52","doi-asserted-by":"crossref","unstructured":"Irshad RR, Hussain S, Hussain I, Ahmad I, Yousif A, Alwayle IM, Alattab AA, Alalayah KM, Breslin JG, Badr MM et al (2023) An intelligent buffalo-based secure edge-enabled computing platform for heterogeneous iot network in smart cities. IEEE Access","DOI":"10.1109\/ACCESS.2023.3288815"},{"key":"8010_CR53","doi-asserted-by":"crossref","unstructured":"Irshad RR, Sohail SS, Hussain S, Madsen D\u00d8, Ahmed MA, Alattab AA, Alsaiari OAS, Norain KAA, Ahmed AAA (2023) A multi-objective bee foraging learning-based particle swarm optimization algorithm for enhancing the security of healthcare data in cloud system. IEEE Access","DOI":"10.1109\/ACCESS.2023.3265954"},{"key":"8010_CR54","doi-asserted-by":"crossref","unstructured":"Grasselli F, Grasselli F (2021) Device-independent quantum cryptography. In: Quantum Cryptography: From Key Distribution to Conference Key Agreement, Springer, pp 105\u2013148","DOI":"10.1007\/978-3-030-64360-7_7"},{"key":"8010_CR55","doi-asserted-by":"crossref","unstructured":"Choi S, Jang E, Kim Y, Ahn S, Ro WW (2025) q-point: a numeric format for quantum circuit simulation using polar form complex numbers. IEEE Trans Emerg Top Comput","DOI":"10.1109\/TETC.2025.3572935"},{"key":"8010_CR56","volume":"50","author":"SM Kareem","year":"2020","unstructured":"Kareem SM, Rahma AMS (2020) A novel approach for the development of the Twofish algorithm based on multi-level key space. J Inf Secur Appl 50:102410","journal-title":"J Inf Secur Appl"},{"issue":"3","key":"8010_CR57","doi-asserted-by":"publisher","first-page":"1404","DOI":"10.1002\/ima.22515","volume":"31","author":"LR Chilakala","year":"2021","unstructured":"Chilakala LR, Kishore GN (2021) Optimal deep belief network with opposition-based hybrid grasshopper and honeybee optimization algorithm for lung cancer classification: A dbnghhb approach. Int J Imaging Syst Technol 31(3):1404\u20131423","journal-title":"Int J Imaging Syst Technol"},{"key":"8010_CR58","doi-asserted-by":"crossref","unstructured":"Shukla S, Thakur S, Hussain S, Breslin JG, Jameel SM (2022) Identification of false stealthy data injection attacks in smart meters using machine learning and blockchain. In: International Congress on Blockchain and Applications, Springer, pp 398\u2013409","DOI":"10.1007\/978-3-031-21229-1_37"},{"issue":"5","key":"8010_CR59","first-page":"1148","volume":"9","author":"Q Jan","year":"2023","unstructured":"Jan Q, Hussain S, Pan Z, Liu N, Ali Z, Liu Z, You X (2023) Parity-check and g-matrix based intelligent early stopping criterion for belief propagation decoder for polar codes. Dig Commun Netw 9(5):1148\u20131156","journal-title":"Dig Commun Netw"},{"issue":"22","key":"8010_CR60","doi-asserted-by":"publisher","first-page":"15312","DOI":"10.3390\/su142215312","volume":"14","author":"S Alam","year":"2022","unstructured":"Alam S, Shuaib M, Ahmad S, Jayakody DNK, Muthanna A, Bharany S, Elgendy IA (2022) Blockchain-based solutions supporting reliable healthcare for fog computing and internet of medical things (iomt) integration. Sustainability 14(22):15312","journal-title":"Sustainability"},{"issue":"23","key":"8010_CR61","doi-asserted-by":"publisher","first-page":"3839","DOI":"10.3390\/electronics11233839","volume":"11","author":"Q Jan","year":"2022","unstructured":"Jan Q, Hussain S, Furqan M, Pan Z, Liu N, You X (2022) Parity-check-CRC concatenated polar codes sscflip decoder. Electronics 11(23):3839","journal-title":"Electronics"},{"key":"8010_CR62","doi-asserted-by":"crossref","unstructured":"Jan Q, Hussain S, Zechen L, Zhiwen P, Nan L, Xiaohu Y (2022) Improved partitioned fast-SSC-flip decoding for polar codes. In: 2022 7th International Conference on Computer and Communication Systems (ICCCS), IEEE, pp 382\u2013386","DOI":"10.1109\/ICCCS55155.2022.9846207"},{"key":"8010_CR63","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2024.101335","volume":"28","author":"K Fiaz","year":"2024","unstructured":"Fiaz K, Zeb A, Hussain S, Khurshid K, Irshad RR, Alharby M, Rahman T, Alwayle IM, Pallonetto F (2024) A two-phase blockchain-enabled framework for securing internet of medical things systems. Internet Things 28:101335","journal-title":"Internet Things"},{"issue":"6","key":"8010_CR64","doi-asserted-by":"publisher","first-page":"4049","DOI":"10.1002\/ett.4049","volume":"33","author":"M Papaioannou","year":"2022","unstructured":"Papaioannou M, Karageorgou M, Mantas G, Sucasas V, Essop I, Rodriguez J, Lymberopoulos D (2022) A survey on security threats and countermeasures in internet of medical things (iomt). Trans Emerg Telecommun Technol 33(6):4049","journal-title":"Trans Emerg Telecommun Technol"},{"issue":"1","key":"8010_CR65","first-page":"346","volume":"9","author":"Y Perwej","year":"2022","unstructured":"Perwej Y, Akhtar N, Kulshrestha N, Mishra P (2022) A methodical analysis of medical internet of things (miot) security and privacy in current and future trends. J Emerg Technol Innov Res 9(1):346\u2013371","journal-title":"J Emerg Technol Innov Res"},{"issue":"19","key":"8010_CR66","doi-asserted-by":"publisher","first-page":"8107","DOI":"10.3390\/s23198107","volume":"23","author":"CR Bhukya","year":"2023","unstructured":"Bhukya CR, Thakur P, Mudhivarthi BR, Singh G (2023) Cybersecurity in internet of medical vehicles: state-of-the-art analysis, research challenges and future perspectives. Sensors 23(19):8107","journal-title":"Sensors"},{"key":"8010_CR67","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2021.100422","volume":"15","author":"S Shukla","year":"2021","unstructured":"Shukla S, Thakur S, Hussain S, Breslin JG, Jameel SM (2021) Identification and authentication in healthcare internet-of-things using integrated fog computing based blockchain model. Internet Things 15:100422","journal-title":"Internet Things"},{"key":"8010_CR68","doi-asserted-by":"crossref","unstructured":"Chakraborty C, Nagarajan SM, Devarajan GG, Ramana T, Mohanty R (2023) Intelligent ai-based healthcare cyber security system using multi-source transfer learning method. ACM Trans Sens Netw","DOI":"10.1145\/3597210"},{"key":"8010_CR69","doi-asserted-by":"publisher","first-page":"2653","DOI":"10.1016\/j.matpr.2020.08.519","volume":"37","author":"P Velmurugadass","year":"2021","unstructured":"Velmurugadass P, Dhanasekaran S, Anand SS, Vasudevan V (2021) Enhancing blockchain security in cloud computing with IOT environment using ECIES and cryptography hash algorithm. Mater Today Proc 37:2653\u20132659","journal-title":"Mater Today Proc"},{"key":"8010_CR70","doi-asserted-by":"publisher","first-page":"153349","DOI":"10.1109\/ACCESS.2019.2946978","volume":"7","author":"M Pourvahab","year":"2019","unstructured":"Pourvahab M, Ekbatanifard G (2019) Digital forensics architecture for evidence collection and provenance preservation in IAAS cloud environment using SDN and blockchain technology. IEEE Access 7:153349\u2013153364","journal-title":"IEEE Access"},{"key":"8010_CR71","first-page":"1","volume":"1","author":"A Goel","year":"2023","unstructured":"Goel A, Neduncheliyan S (2023) An intelligent blockchain strategy for decentralised healthcare framework. Peer-to-Peer Netw Appl 1:1\u201312","journal-title":"Peer-to-Peer Netw Appl"},{"issue":"1","key":"8010_CR72","doi-asserted-by":"publisher","first-page":"140","DOI":"10.3390\/electronics12010140","volume":"12","author":"KA Awan","year":"2022","unstructured":"Awan KA, Ud Din I, Almogren A, Khattak HA, Rodrigues JJ (2022) Edgetrust: a lightweight data-centric trust management approach for IOT-based healthcare 4.0. Electronics 12(1):140","journal-title":"Electronics"},{"key":"8010_CR73","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2022.101552","volume":"82","author":"KS Patil","year":"2022","unstructured":"Patil KS, Mandal I, Rangaswamy C (2022) Hybrid and adaptive cryptographic-based secure authentication approach in IOT based applications using hybrid encryption. Pervasive Mob Comput 82:101552","journal-title":"Pervasive Mob Comput"},{"issue":"3","key":"8010_CR74","first-page":"1","volume":"34","author":"AJ Basha","year":"2022","unstructured":"Basha AJ, Rajkumar N, AlZain MA, Masud M, Abouhawwash M (2022) Fog-based self-sovereign identity with RSA in securing IOMT data. Intell Autom Soft Comput 34(3):1","journal-title":"Intell Autom Soft Comput"},{"issue":"5","key":"8010_CR75","doi-asserted-by":"publisher","first-page":"971","DOI":"10.1007\/s12553-022-00686-3","volume":"12","author":"S Chhabra","year":"2022","unstructured":"Chhabra S, Lata K (2022) Obfuscated AES cryptosystem for secure medical imaging systems in IOMT edge devices. Heal Technol 12(5):971\u2013986","journal-title":"Heal Technol"},{"key":"8010_CR76","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1016\/j.compeleceng.2018.10.009","volume":"72","author":"I Farahat","year":"2018","unstructured":"Farahat I, Tolba A, Elhoseny M, Eladrosy W (2018) A secure real-time internet of medical smart things (iomst). Comput Electr Eng 72:455\u2013467","journal-title":"Comput Electr Eng"},{"key":"8010_CR77","doi-asserted-by":"crossref","unstructured":"Aparna R, Mallick AK, Sahay U (2022) Securing sensor data on internet of things (IoT) devices. In: Proceedings of the International Conference on Cognitive and Intelligent Computing: ICCIC 2021, vol 1, Springer, pp 411\u2013419","DOI":"10.1007\/978-981-19-2350-0_40"},{"key":"8010_CR78","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1016\/j.future.2019.10.043","volume":"104","author":"S Tuli","year":"2020","unstructured":"Tuli S, Basumatary N, Gill SS, Kahani M, Arya RC, Wander GS, Buyya R (2020) Healthfog: an ensemble deep learning based smart healthcare system for automatic diagnosis of heart diseases in integrated IoT and fog computing environments. Futur Gener Comput Syst 104:187\u2013200","journal-title":"Futur Gener Comput Syst"},{"key":"8010_CR79","doi-asserted-by":"publisher","DOI":"10.1016\/j.energy.2024.132823","volume":"308","author":"S Hussain","year":"2024","unstructured":"Hussain S, Teni AP, Hussain I, Hussain Z, Pallonetto F, Eichman J, Irshad RR, Alwayle IM, Alharby M, Hussain MA et al (2024) Enhancing electric vehicle charging efficiency at the aggregator level: a deep-weighted ensemble model for wholesale electricity price forecasting. Energy 308:132823","journal-title":"Energy"},{"issue":"8","key":"8010_CR80","doi-asserted-by":"publisher","first-page":"271","DOI":"10.3390\/fi15080271","volume":"15","author":"AS Rajawat","year":"2023","unstructured":"Rajawat AS, Goyal S, Bedi P, Jan T, Whaiduzzaman M, Prasad M (2023) Quantum machine learning for security assessment in the internet of medical things (IOMT). Future Internet 15(8):271","journal-title":"Future Internet"},{"key":"8010_CR81","doi-asserted-by":"publisher","first-page":"21641","DOI":"10.1109\/ACCESS.2023.3251649","volume":"11","author":"O Shirko","year":"2023","unstructured":"Shirko O, Askar S (2023) A novel security survival model for quantum key distribution networks enabled by software-defined networking. IEEE Access 11:21641\u201321654","journal-title":"IEEE Access"},{"issue":"3","key":"8010_CR82","doi-asserted-by":"publisher","first-page":"94","DOI":"10.3390\/fi15030094","volume":"15","author":"R Ur Rasool","year":"2023","unstructured":"Ur Rasool R, Ahmad HF, Rafique W, Qayyum A, Qadir J, Anwar Z (2023) Quantum computing for healthcare: a review. Future Internet 15(3):94","journal-title":"Future Internet"},{"key":"8010_CR83","doi-asserted-by":"publisher","DOI":"10.1016\/j.energy.2023.128446","volume":"282","author":"S Afzal","year":"2023","unstructured":"Afzal S, Ziapour BM, Shokri A, Shakibi H, Sobhani B (2023) Building energy consumption prediction using multilayer perceptron neural network-assisted models; comparison of different optimization algorithms. Energy 282:128446","journal-title":"Energy"},{"key":"8010_CR84","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2020.106711","volume":"213","author":"F MiarNaeimi","year":"2021","unstructured":"MiarNaeimi F, Azizyan G, Rashki M (2021) Horse herd optimization algorithm: a nature-inspired algorithm for high-dimensional optimization problems. Knowl Based Syst 213:106711","journal-title":"Knowl Based Syst"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-025-08010-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-025-08010-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-025-08010-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T21:02:29Z","timestamp":1763672549000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-025-08010-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,20]]},"references-count":84,"journal-issue":{"issue":"17","published-online":{"date-parts":[[2025,11]]}},"alternative-id":["8010"],"URL":"https:\/\/doi.org\/10.1007\/s11227-025-08010-2","relation":{},"ISSN":["1573-0484"],"issn-type":[{"type":"electronic","value":"1573-0484"}],"subject":[],"published":{"date-parts":[[2025,11,20]]},"assertion":[{"value":"26 April 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 October 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 November 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"1586"}}