{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T16:07:21Z","timestamp":1774973241170,"version":"3.50.1"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2023,3,20]],"date-time":"2023-03-20T00:00:00Z","timestamp":1679270400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,3,20]],"date-time":"2023-03-20T00:00:00Z","timestamp":1679270400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2023,6]]},"DOI":"10.1007\/s11277-023-10344-0","type":"journal-article","created":{"date-parts":[[2023,3,27]],"date-time":"2023-03-27T01:58:54Z","timestamp":1679882334000},"page":"1549-1574","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":24,"title":["Design and Development of Consensus Activation Function Enabled Neural Network-Based Smart Healthcare Using BIoT"],"prefix":"10.1007","volume":"130","author":[{"given":"Ilyas","family":"Benkhaddra","sequence":"first","affiliation":[]},{"given":"Abhishek","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Mohamed Ali","family":"Setitra","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Hang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,20]]},"reference":[{"key":"10344_CR1","doi-asserted-by":"crossref","unstructured":"Agyekum, K. O. B. O., Xia, Q., Sifah, E. B., Cobblah, C. N. A., Xia, H., Gao, J. (2021). A proxy re-encryption approach to secure data sharing in the internet of things based on blockchain. IEEE Systems Journal.","DOI":"10.1109\/JSYST.2021.3076759"},{"issue":"2","key":"10344_CR2","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1109\/CC.2014.6821746","volume":"11","author":"L Gu","year":"2014","unstructured":"Gu, L., Wang, J., & Sun, B. (2014). Trust management mechanism for Internet of Things. China Communications, 11(2), 148\u2013156.","journal-title":"China Communications"},{"issue":"3","key":"10344_CR3","doi-asserted-by":"publisher","first-page":"102528","DOI":"10.1016\/j.ipm.2021.102528","volume":"58","author":"D Pavithran","year":"2021","unstructured":"Pavithran, D., Al-Karaki, J. N., & Shaalan, K. (2021). Edge-based blockchain architecture for event-driven iot using hierarchical identity based encryption. Information Processing & Management, 58(3), 102528.","journal-title":"Information Processing & Management"},{"issue":"6","key":"10344_CR4","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1109\/MWC.001.1900083","volume":"26","author":"P Mishra","year":"2019","unstructured":"Mishra, P., Puthal, D., Tiwary, M., & Mohanty, S. P. (2019). Software defined IoT systems: Properties, state of the art, and future research. IEEE Wireless Communication Magazine, 26(6), 64\u201371.","journal-title":"IEEE Wireless Communication Magazine"},{"issue":"13","key":"10344_CR5","doi-asserted-by":"publisher","first-page":"10857","DOI":"10.1109\/JIOT.2021.3050703","volume":"8","author":"PP Ray","year":"2021","unstructured":"Ray, P. P., Chowhan, B., Kumar, N., & Almogren, A. (2021). Biothr: Electronic health record servicing scheme in IoT-blockchain ecosystem. IEEE Internet of Things Journal, 8(13), 10857\u201310872.","journal-title":"IEEE Internet of Things Journal"},{"issue":"9","key":"10344_CR6","doi-asserted-by":"publisher","first-page":"9576","DOI":"10.1007\/s11227-021-03637-3","volume":"77","author":"T Veeramakali","year":"2021","unstructured":"Veeramakali, T., Siva, R., Sivakumar, B., Senthil Mahesh, P. C., & Krishnaraj, N. (2021). An intelligent internet of things-based secure healthcare framework using blockchain technology with an optimal deep learning model. The Journal of Supercomputing, 77(9), 9576\u20139596.","journal-title":"The Journal of Supercomputing"},{"issue":"1","key":"10344_CR7","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MPOT.2018.2850541","volume":"38","author":"D Puthal","year":"2019","unstructured":"Puthal, D., & Mohanty, S. P. (2019). Proof of authentication: IoT-friendly blockchains. IEEE Potentials Mag., 38(1), 26\u201329.","journal-title":"IEEE Potentials Mag."},{"issue":"2","key":"10344_CR8","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/MITP.2018.021921652","volume":"20","author":"V Gatteschi","year":"2018","unstructured":"Gatteschi, V., Lamberti, F., Demartini, C., Pranteda, C., & Santamar\u00eda, C. (2018). To blockchain or not to blockchain: That is the question. IT Professional, 20(2), 62\u201374.","journal-title":"IT Professional"},{"issue":"6","key":"10344_CR9","doi-asserted-by":"publisher","first-page":"10332","DOI":"10.1109\/JIOT.2019.2938008","volume":"6","author":"J Li","year":"2019","unstructured":"Li, J., Ji, Y., Choo, K.-K.R., & Hogrefe, D. (2019). CL-CPPA: Certificate-less conditional privacy-preserving authentication protocol for the Internet of Vehicles. IEEE Internet of Things Journal, 6(6), 10332\u201310343.","journal-title":"IEEE Internet of Things Journal"},{"key":"10344_CR10","doi-asserted-by":"crossref","unstructured":"Ilyas, B., Kumar, A., Setitra, M. A., Bensalem, Z. A., Lei, H. (2023) Prevention of DDoS attacks using an optimized deep learning approach in blockchain technology. Transactions On Emerging Telecommunication and Technologies.","DOI":"10.1002\/ett.4729"},{"key":"10344_CR11","doi-asserted-by":"crossref","unstructured":"Ilyas, B., Kumar, A., Bensalem, Z. E. A., Hang, L. (2023). Secure transmission of secret data using optimization based embedding techniques in Blockchain. Expert Systems with Applications, 211.","DOI":"10.1016\/j.eswa.2022.118469"},{"issue":"2","key":"10344_CR12","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/MCE.2017.2776462","volume":"7","author":"SS Roy","year":"2018","unstructured":"Roy, S. S., Puthal, D., Sharma, S., Mohanty, S. P., & Zomaya, A. Y. (2018). Building a sustainable Internet of Things: Energy-efficient routing using low-power sensors will meet the need. IEEE Consumer Electronics Magazine, 7(2), 42\u201349.","journal-title":"IEEE Consumer Electronics Magazine"},{"key":"10344_CR13","doi-asserted-by":"crossref","unstructured":"Lau, C. H., Alan, K.-H. Y., Yan, F. (2018). Blockchain-based authentication in IoT networks. In Proceedings of 2018 IEEE conference on dependable and secure computing, DSC, IEEE, pp. 1\u20138.","DOI":"10.1109\/DESEC.2018.8625141"},{"key":"10344_CR14","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1016\/j.jpdc.2021.04.003","volume":"154","author":"L Vishwakarma","year":"2021","unstructured":"Vishwakarma, L., & Das, D. (2021). SCAB-IoTA: Secure communication and authentication for IoT applications using blockchain. Journal of Parallel and Distributed Computing, 154, 94\u2013105.","journal-title":"Journal of Parallel and Distributed Computing"},{"key":"10344_CR15","doi-asserted-by":"publisher","first-page":"100422","DOI":"10.1016\/j.iot.2021.100422","volume":"15","author":"S Shukla","year":"2021","unstructured":"Shukla, S., Thakur, S., Hussain, S., Breslin, J. G., & Jameel, S. M. (2021). Identification and authentication in healthcare internet-of-things using integrated fog computing based blockchain model. Internet of Things, 15, 100422.","journal-title":"Internet of Things"},{"issue":"2","key":"10344_CR16","doi-asserted-by":"publisher","first-page":"769","DOI":"10.1007\/s12652-021-02929-z","volume":"13","author":"U Narayanan","year":"2022","unstructured":"Narayanan, U., Paul, V., & Joseph, S. (2022). Decentralized blockchain based authentication for secure data sharing in Cloud-IoT. Journal of Ambient Intelligence and Humanized Computing, 13(2), 769\u2013787.","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"issue":"4","key":"10344_CR17","doi-asserted-by":"publisher","first-page":"2630","DOI":"10.1109\/JIOT.2019.2952141","volume":"7","author":"S Pal","year":"2019","unstructured":"Pal, S., Rabehaja, T., Hill, A., Hitchens, M., & Varadharajan, V. (2019). On the integration of blockchain to the internet of things for enabling access right delegation. IEEE Internet of Things Journal, 7(4), 2630\u20132639.","journal-title":"IEEE Internet of Things Journal"},{"issue":"6","key":"10344_CR18","doi-asserted-by":"publisher","first-page":"10749","DOI":"10.1109\/JIOT.2019.2941638","volume":"6","author":"Q Xia","year":"2019","unstructured":"Xia, Q., Sifah, E. B., Agyekum, K.O.-B.O., Xia, H., Acheampong, K. N., Smahi, A., Gao, J., Du, X., & Guizani, M. (2019). Secured fine-grained selective access to outsourced cloud data in IoT environments. IEEE Internet of Things Journal, 6(6), 10749\u201310762.","journal-title":"IEEE Internet of Things Journal"},{"issue":"2","key":"10344_CR19","doi-asserted-by":"publisher","first-page":"1331","DOI":"10.1007\/s10586-020-03190-3","volume":"24","author":"Y Liu","year":"2021","unstructured":"Liu, Y., Zhang, J., & Zhan, J. (2021). Privacy protection for fog computing and the internet of things data based on blockchain. Cluster Computing, 24(2), 1331\u20131345.","journal-title":"Cluster Computing"},{"key":"10344_CR20","doi-asserted-by":"publisher","first-page":"36500","DOI":"10.1109\/ACCESS.2019.2903554","volume":"7","author":"J Al-Jaroodi","year":"2019","unstructured":"Al-Jaroodi, J., & Mohamed, N. (2019). Blockchain in industries: A survey. IEEE Access, 7, 36500\u201336515.","journal-title":"IEEE Access"},{"issue":"6","key":"10344_CR21","doi-asserted-by":"publisher","first-page":"1934","DOI":"10.1109\/JIOT.2017.2690522","volume":"4","author":"Z Guan","year":"2017","unstructured":"Guan, Z., et al. (2017). Achieving efficient and secure data acquisition for cloud-supported internet of things in smart grid. IEEE Internet of Things Journal, 4(6), 1934\u20131944. https:\/\/doi.org\/10.1109\/JIOT.2017.2690522","journal-title":"IEEE Internet of Things Journal"},{"key":"10344_CR22","doi-asserted-by":"publisher","first-page":"30049","DOI":"10.1109\/ACCESS.2018.2844373","volume":"6","author":"H Cui","year":"2018","unstructured":"Cui, H., et al. (2018). Achieving scalable access control over encrypted data for edge computing networks. IEEE Access, 6, 30049\u201330059.","journal-title":"IEEE Access"},{"key":"10344_CR23","unstructured":"Efficient and privacy-preserving online fingerprint authentication scheme over outsourced data. IEEE Transactions on Cloud Computing, 6(1):1\u201311."},{"key":"10344_CR24","doi-asserted-by":"crossref","unstructured":"Integrity verification for digital Holy Quran verses using cryptographic hash function and compression. Journal of King Saud University-Computer and Information Sciences 32(1), 24\u201334.","DOI":"10.1016\/j.jksuci.2018.02.006"},{"key":"10344_CR25","unstructured":"Research on application of blockchain and identity-based cryptography. IOP Conference Series Earth and Environmental Science, 252(4)."},{"key":"10344_CR26","unstructured":"Fully homomorphic encryption using ideal lattices. In Proceedings of the forty-first annual ACM symposium on Theory of computing, 169\u2013178."},{"issue":"6","key":"10344_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s12652-021-03157-1","volume":"13","author":"R Rajavel","year":"2022","unstructured":"Rajavel, R., Ravichandran, S. K., Harimoorthy, K., Nagappan, P., & Gobichettipalayam, K. R. (2022). IoT-based smart healthcare video surveillance system using edge computing. Journal of Ambient Intelligence and Humanized Computing, 13(6), 1\u201313.","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"key":"10344_CR28","unstructured":"Pima Indians Diabetes dataset. https:\/\/www.kaggle.com\/datasets\/uciml\/pima-indians-diabetes-database\/discussion."},{"issue":"3","key":"10344_CR29","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1016\/j.engappai.2006.06.005","volume":"20","author":"PG Benardos","year":"2007","unstructured":"Benardos, P. G., & Vosniakos, G.-C. (2007). Optimizing feedforward artificial neural network architecture. Engineering Applications of Artificial Intelligence, 20(3), 365\u2013382.","journal-title":"Engineering Applications of Artificial Intelligence"},{"key":"10344_CR30","doi-asserted-by":"publisher","first-page":"107250","DOI":"10.1016\/j.cie.2021.107250","volume":"157","author":"L Abualigah","year":"2021","unstructured":"Abualigah, L., Yousri, D., Abd Elaziz, M., Ewees, A. A., Al-Qaness, M. A., & Gandomi, A. H. (2021). Aquila optimizer: A novel meta-heuristic optimization algorithm. Computers & Industrial Engineering, 157, 107250.","journal-title":"Computers & Industrial Engineering"},{"key":"10344_CR31","doi-asserted-by":"crossref","unstructured":"Yang, X.S., & Gandomi, A. H. (2012). Bat algorithm: A novel approach for global engineering optimization. Engineering Computations.","DOI":"10.1108\/02644401211235834"},{"key":"10344_CR32","unstructured":"Thilakarathne, N. N., Kagita, M. K., Lanka, D., Ahmad, H. (2020). Smart grid: a survey of architectural elements, machine learning and deep learning applications and future directions. arXiv preprint arXiv:2010.08094."},{"key":"10344_CR33","doi-asserted-by":"crossref","unstructured":"Jeong, S., Shen, J. H., Ahn, B. (2021). A study on smart healthcare monitoring using IoT based on blockchain. Wireless Communications and Mobile Computing.","DOI":"10.1155\/2021\/9932091"},{"issue":"21","key":"10344_CR34","doi-asserted-by":"publisher","first-page":"15672","DOI":"10.1109\/JIOT.2020.3029221","volume":"8","author":"KA Awan","year":"2020","unstructured":"Awan, K. A., Din, I. U., Almogren, A., Almajed, H., Mohiuddin, I., & Guizani, M. (2020). NeuroTrust\u2014artificial-neural-network-based intelligent trust management mechanism for large-scale internet of medical things. IEEE Internet of Things Journal, 8(21), 15672\u201315682.","journal-title":"IEEE Internet of Things Journal"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-023-10344-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-023-10344-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-023-10344-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,17]],"date-time":"2023-05-17T13:14:49Z","timestamp":1684329289000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-023-10344-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,20]]},"references-count":34,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,6]]}},"alternative-id":["10344"],"URL":"https:\/\/doi.org\/10.1007\/s11277-023-10344-0","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,3,20]]},"assertion":[{"value":"25 February 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 March 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}