{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T12:40:08Z","timestamp":1771850408605,"version":"3.50.1"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T00:00:00Z","timestamp":1746403200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T00:00:00Z","timestamp":1746403200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1007\/s12083-025-01982-1","type":"journal-article","created":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T04:24:45Z","timestamp":1746419085000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Message digest and blockchain based chaotic ordered cyber secured cloud of things for smart health care"],"prefix":"10.1007","volume":"18","author":[{"given":"Ashok Kumar","family":"Munnangi","sequence":"first","affiliation":[]},{"given":"Kumaresan","family":"Maruthapillai","sequence":"additional","affiliation":[]},{"given":"Sivaram","family":"Rajeyyagari","sequence":"additional","affiliation":[]},{"given":"Ramesh","family":"Sekaran","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6873-6469","authenticated-orcid":false,"given":"Vinayakumar","family":"Ravi","sequence":"additional","affiliation":[]},{"given":"Alanoud","family":"Al Mazroa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,5]]},"reference":[{"key":"1982_CR1","doi-asserted-by":"publisher","first-page":"66792","DOI":"10.1109\/ACCESS.2019.2917555","volume":"7","author":"DC Nguyen","year":"2019","unstructured":"Nguyen DC, Pathirana PN, Ding M, Seneviratne A (2019) Blockchain for secure EHRs sharing of mobile cloud based e-health systems. IEEE Access 7:66792\u201366806. https:\/\/doi.org\/10.1109\/ACCESS.2019.2917555","journal-title":"IEEE Access"},{"key":"1982_CR2","first-page":"1","volume":"141","author":"R Manikandan","year":"2020","unstructured":"Manikandan R, Patan R, Gandomi AH, Sivanesan P, Kalyanaraman H (2020) Hash polynomial two factor decision tree using IoT for smart health care scheduling. Expert Syst Appl, Elsevier 141:1\u201311","journal-title":"Expert Syst Appl, Elsevier"},{"key":"1982_CR3","doi-asserted-by":"publisher","first-page":"62998","DOI":"10.1109\/ACCESS.2023.3288332","volume":"11","author":"S Fugkeaw","year":"2023","unstructured":"Fugkeaw S, Wirz L, Hak L (2023) Secure and Lightweight Blockchain-Enabled Access Control for Fog-Assisted IoT Cloud Based Electronic Medical Records Sharing. IEEE Access 11:62998\u201363012","journal-title":"IEEE Access"},{"key":"1982_CR4","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/j.ijcip.2019.01.001","volume":"25","author":"K Kimani","year":"2019","unstructured":"Kimani K, VitaliceOduol KL (2019) Cyber Security Challenges for IoT-based Smart Grid Networks. Int Jo Crit Infrastruct Protect 25:36\u201349 (Elsevier)","journal-title":"Int Jo Crit Infrastruct Protect"},{"key":"1982_CR5","doi-asserted-by":"crossref","unstructured":"Dhingra S, Babu RM, Gandomi AH, Mahmoud Daneshmand RP (2019) Internet of Things Mobile - Air Pollution Monitoring System (IoT-Mobair). IEEE Int Things J 6(3):5577 \u2013 5584","DOI":"10.1109\/JIOT.2019.2903821"},{"key":"1982_CR6","doi-asserted-by":"publisher","unstructured":"Karthikeyan S, Patan R Balamurugan B (2019) Enhancement of Security in the Internet of Things (IoT) by Using X.509Authentication Mechanism. Recent Trends in Communication, Computing,and Electronics, Springer 217\u2013225. https:\/\/doi.org\/10.1007\/978-981-13-2685-1_22","DOI":"10.1007\/978-981-13-2685-1_22"},{"key":"1982_CR7","doi-asserted-by":"crossref","unstructured":"Roopak M, Tian GY, Chambers J (2019) Deep Learning Models for Cyber Security in IoTNetworks. IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC), pp 452\u2013457","DOI":"10.1109\/CCWC.2019.8666588"},{"key":"1982_CR8","doi-asserted-by":"crossref","unstructured":"Rahman A, Rashid M, Hossain MS, Hassanain E, Alhamid MF, Guizani M (2019) Blockchain and IoT-Based Cognitive EdgeFramework for Sharing EconomyServices in a Smart City. IEEE Access 99:1\u201312","DOI":"10.1109\/ACCESS.2019.2896065"},{"key":"1982_CR9","doi-asserted-by":"crossref","unstructured":"PremanandGhadekar, NiketDoke, SushmitaKaneri, Varsha Jha, \u201cSecure Access Control to IoT Devices using Blockchain\u201d, International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277\u20133878, Volume-8 Issue-2, July 2019, Pages 3064\u20133070","DOI":"10.35940\/ijrte.F2273.078219"},{"key":"1982_CR10","doi-asserted-by":"publisher","unstructured":"Lu Y, Xu LD (2019) Internet of Things (IoT) Cyber security Research: A Review of Current Research Topics. IEEE Int Things J 6(2):2103 \u2013 2115. https:\/\/doi.org\/10.1109\/JIOT.2018.2869847","DOI":"10.1109\/JIOT.2018.2869847"},{"key":"1982_CR11","doi-asserted-by":"publisher","unstructured":"Johnson SD, Blythe JM, Manning M, Wong GTW (2020) The impact of IoT security labelling onconsumer product choice and willingness topay. PLOS ONE. 1\u201321. https:\/\/doi.org\/10.1371\/journal.pone.0227800","DOI":"10.1371\/journal.pone.0227800"},{"key":"1982_CR12","doi-asserted-by":"publisher","first-page":"158126","DOI":"10.1109\/ACCESS.2019.2948912","volume":"7","author":"F Liang","year":"2019","unstructured":"Liang F, Hatcher WG (2019) WeixianLiaoy, Weichao Gao, and Wei Yu, \u201cMachine Learning for Security and the Internet of Things: The Good, the Bad, and the Ugly\". IEEE Access 7:158126\u2013158147","journal-title":"IEEE Access"},{"key":"1982_CR13","doi-asserted-by":"crossref","unstructured":"Mohamed Abdel-Basset, GunasekaranManogaran, MaiMohamed, Ehab Rushdy (2018) Internet of things in smart education environment: Supportiveframework in the decision-making process. Wiley, Concurrency and Computation Practice and Experience 31(5):1-12","DOI":"10.1002\/cpe.4515"},{"key":"1982_CR14","doi-asserted-by":"publisher","unstructured":"Kaur A, Nayyar A, Singh P (2020) Blockchain: A path to the future. Cryptocurrencies and Blockchain Technologies and Applications 25\u201342. https:\/\/doi.org\/10.1002\/9781119621201.ch2","DOI":"10.1002\/9781119621201.ch2"},{"key":"1982_CR15","doi-asserted-by":"crossref","unstructured":"Deebak BD, Al-Turjman F, Nayyar A (2020) Chaotic-map based authenticated security framework with privacy preservation for remote point-of-care. Multimed Tools Appl 1\u201326","DOI":"10.1007\/s11042-020-10134-x"},{"key":"1982_CR16","doi-asserted-by":"publisher","unstructured":"Deep G, Mohana R, Nayyar A, Sanjeevikumar P, Hossain E (2019) Authentication Protocol for Cloud Databases Using Blockchain Mechanism. Sensors 19(20):1-13. https:\/\/doi.org\/10.3390\/s19204444","DOI":"10.3390\/s19204444"},{"key":"1982_CR17","doi-asserted-by":"publisher","unstructured":"Amir Latif RM, Hussain K, Jhanjhi NZ, Nayyar A, Rizwan O (2020) A remix IDE: smart contract-based framework for the healthcare sector by using Blockchain technology. Multimed Tools Appl 1\u201324. https:\/\/doi.org\/10.1007\/s11042-020-10087-1","DOI":"10.1007\/s11042-020-10087-1"},{"key":"1982_CR18","doi-asserted-by":"publisher","unstructured":"Kumar A, Krishnamurthi R, Nayyar A, Sharma K, Grover V, Hossain E (2020) A Novel Smart Healthcare Design, Simulation, and Implementation Using Healthcare 4.0 Processes. IEEE Access 8: 118433 \u2013 118471. https:\/\/doi.org\/10.1109\/ACCESS.2020.3004790","DOI":"10.1109\/ACCESS.2020.3004790"},{"key":"1982_CR19","doi-asserted-by":"publisher","unstructured":"Haoxiang W, Zhihui L, Yang L, Gupta BB, Chang C (2020) Visual saliency guided complex image retrieval. Pattern Recog Lett 130: 64\u201372. https:\/\/doi.org\/10.1016\/j.patrec.2018.08.010","DOI":"10.1016\/j.patrec.2018.08.010"},{"issue":"4","key":"1982_CR20","first-page":"1","volume":"78","author":"M Alsmirat","year":"2019","unstructured":"Alsmirat M, Alalem F, Al-Ayyoub M (2019) YaserJararweh, \u201cImpact of digital fingerprint image quality on the fingerprint recognition accuracy.\u201d Multimed Tools Appl 78(4):1\u201340","journal-title":"Multimed Tools Appl"},{"key":"1982_CR21","doi-asserted-by":"publisher","unstructured":"Tewari A, Gupta BB (2020) Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework. Future Gener Comput Syst 108: 909\u2013920. https:\/\/doi.org\/10.1016\/j.future.2018.04.027","DOI":"10.1016\/j.future.2018.04.027"},{"key":"1982_CR22","doi-asserted-by":"crossref","unstructured":"Dwivedi SK, Amin R, Vollala S, Chaudhry R (2020) Blockchain-based secured event-information sharing protocol in internet of vehicles for smart cities. Comput Electr Eng 86: 1-18","DOI":"10.1016\/j.compeleceng.2020.106719"},{"key":"1982_CR23","doi-asserted-by":"crossref","unstructured":"Dwivedi SK, Amin R, Vollala S (2020) Blockchain based secured information sharing protocol in supply chain management system with key distribution mechanism. J Inf Secur Appl 54: 1-15","DOI":"10.1016\/j.jisa.2020.102554"},{"key":"1982_CR24","doi-asserted-by":"crossref","unstructured":"IqtidarNewaz AKM, Haque NI, Sikder AK, Rahman MA, SelcukUluagac A (2020) Adversarial Attacks to Machine Learning-Based Smart Healthcare Systems. Comput Sci 1\u20136","DOI":"10.1109\/GLOBECOM42002.2020.9322472"},{"key":"1982_CR25","doi-asserted-by":"crossref","unstructured":"Attia O, Khoufi I, Laouiti A, Adjih C (2019) An IoT-Blockchain Architecture Based on Hyperledger Framework for Healthcare Monitoring Application. IFIP Int New Technol, Mobil Secur (NTMS) 1\u20136","DOI":"10.1109\/NTMS.2019.8763849"},{"issue":"7","key":"1982_CR26","first-page":"5914","volume":"8","author":"A Saini","year":"2021","unstructured":"Saini A, Zhu Q, Singh N, Xiang Y, Gao L, Zhang Y (2021) A Smart Contract Based Access Control Framework for Cloud Smart Healthcare System. IEEE Int Things J 8(7):5914\u20135925","journal-title":"IEEE Int Things J"},{"key":"1982_CR27","doi-asserted-by":"publisher","first-page":"16605","DOI":"10.1109\/ACCESS.2023.3245046","volume":"11","author":"L Da Costa","year":"2023","unstructured":"Da Costa L, Pinheiro B, Cordeiro W, Ara\u00fajo R, Abel\u00e9m A (2023) Sec-Health: A Blockchain-Based Protocol for Securing Health Records. IEEE Access 11:16605\u201316620","journal-title":"IEEE Access"},{"key":"1982_CR28","doi-asserted-by":"crossref","unstructured":"Bodur H, Al Yaseen IFT (2024) An Improved blockchain-based secure medical record sharing scheme. Clust Comput 27:7981\u20138000. Springer","DOI":"10.1007\/s10586-024-04414-6"},{"key":"1982_CR29","doi-asserted-by":"publisher","unstructured":"Jayanthya S, Arunkumara A, Kovilpillaib JJA, Bhuvardhenaa M, Dinesh Pandian K (2023) Secured Health Data Sharing System using IPFS and Blockchain with Beacon Proxy. Procedia Computer Science, Elsevier 230: 788\u2013797. https:\/\/doi.org\/10.1016\/j.procs.2023.12.054","DOI":"10.1016\/j.procs.2023.12.054"},{"key":"1982_CR30","first-page":"8350","volume":"34","author":"Y Zhang","year":"2022","unstructured":"Zhang Y, Wei X, Cao J, Ning J, Ying Z, Zheng D (2022) \u201cBlockchain-Enabled decentralized Attribute-Based access control with policy hiding for smart healthcare\u201d, Journal of King Saud University \u2013 Computer and Information Sciences, Volume 34. Elsevier 34:8350\u20138361","journal-title":"Elsevier"},{"key":"1982_CR31","doi-asserted-by":"crossref","unstructured":"Wells A, Usman AB (2024) Privacy and biometrics for smart healthcare systems: attacks, and techniques. Inf SecurJ, Taylor and Francis 33(3): 307\u2013331","DOI":"10.1080\/19393555.2023.2260818"},{"key":"1982_CR32","doi-asserted-by":"publisher","unstructured":"Hassan A, Ali MdI, Ahammed R, Khan MM Nawal Alsufyani, AbdulmajeedAlsufyani (2021) Secured Insurance Framework Using Blockchain and Smart Contract. Scientific Programming, Willey 2021 1\u201311. https:\/\/doi.org\/10.1155\/2021\/6787406","DOI":"10.1155\/2021\/6787406"},{"key":"1982_CR33","doi-asserted-by":"publisher","first-page":"6693","DOI":"10.1109\/TIFS.2024.3420126","volume":"19","author":"A Yazdinejad","year":"2024","unstructured":"Yazdinejad A, Dehghantanha A, Karimipour H, Srivastava G, Parizi RM (2024) A robust privacy-preserving federated learning model against model poisoning attacks. IEEE Trans Inf Forensics Secur 19:6693\u20136708","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"11","key":"1982_CR34","doi-asserted-by":"publisher","first-page":"8356","DOI":"10.1109\/TII.2022.3168011","volume":"18","author":"A Yazdinejad","year":"2022","unstructured":"Yazdinejad A, Dehghantanha A, Parizi RM, Hammoudeh M, Karimipour H, Srivastava G (2022) Block Hunter: Federated Learning for Cyber Threat Hunting in Blockchain-based IIoT Networks. IEEE Trans Industr Inf 18(11):8356\u20138366","journal-title":"IEEE Trans Industr Inf"},{"key":"1982_CR35","doi-asserted-by":"crossref","unstructured":"Sorkhpour M, Yazdinejad A, Dehghantanha A (2024) Auto-CIDS: An Autonomous Intrusion Detection System for Vehicular Networks. CCS '24: ACM SIGSAC Conference on Computer and Communications Security 1\u201311","DOI":"10.1145\/3689933.3690837"},{"key":"1982_CR36","doi-asserted-by":"crossref","unstructured":"Dehghantanha, Yazdinejad A, Parizi RM (2024) Autonomous Cybersecurity: Evolving Challenges, Emerging Opportunities, and Future Research Trajectories. AutonomousCyber '24: Proceedings of the Workshop on Autonomous Cybersecurity 1\u201310","DOI":"10.1145\/3689933.3690832"},{"key":"1982_CR37","doi-asserted-by":"publisher","unstructured":"Yazdinejad A, Parizi RM, Dehghantanha A, Zhang Q, Choo K-KR (2020) An energy-efficient SDN controller architecture for IoT networks with blockchain-based security IEEE Trans Serv Comput 1\u201315. https:\/\/doi.org\/10.1109\/TSC.2020.2966970","DOI":"10.1109\/TSC.2020.2966970"},{"key":"1982_CR38","doi-asserted-by":"publisher","unstructured":"Yazdinejad A, Srivastava G, Parizi RM, Dehghantanha A, Choo K-KR, Aledhari M (2020) Decentralized authentication of distributed patients in hospital networks using blockchain. IEEE J Biomed Health Inf 24(8): 2146\u20132156. https:\/\/doi.org\/10.1109\/JBHI.2020.2969648","DOI":"10.1109\/JBHI.2020.2969648"},{"key":"1982_CR39","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s00521-023-09366-3","volume":"36","author":"Z Amiri","year":"2024","unstructured":"Amiri Z, Heidari A (2024) Nima Jafari Navimipour, Mansour Esmaeilpour, Yalda Yazdani, \u201cThe deep learning applications in IoT-based bio-and medical informatics: a systematic literature review.\u201d Neural Comput Appl 36:1\u201341","journal-title":"Neural Comput Appl"},{"key":"1982_CR40","doi-asserted-by":"publisher","unstructured":"Heidari A, Shishehlou H, Darbandi M, Navimipour NJ, Yalcin S (2024) A reliable method for data aggregation on the industrial internet of things using a hybrid optimization algorithm and density correlation degree. Clust Comput 1\u201319. https:\/\/doi.org\/10.1007\/s10586-024-04351-4","DOI":"10.1007\/s10586-024-04351-4"},{"key":"1982_CR41","doi-asserted-by":"crossref","unstructured":"Heidari A, Amiri Z, Jamali MAJ, Jafari N (2024) Assessment of reliability and availability of wireless sensor networks in industrial applications by considering permanent faults. Concurrency and Computation: Pract Exp 1\u201321","DOI":"10.1002\/cpe.8252"},{"key":"1982_CR42","unstructured":"MHEALTH dataset http:\/\/archive.ics.uci.edu\/ml\/datasets\/mhealth+dataset.\u00a0Accessed Jan 2024"},{"key":"1982_CR43","unstructured":"Healthcare_IOT_Data: https:\/\/www.kaggle.com\/datasets\/ziya07\/healthcare-iot-data.\u00a0Accessed Jan 2024"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-01982-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-01982-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-01982-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T15:21:18Z","timestamp":1758986478000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-01982-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,5]]},"references-count":43,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,7]]}},"alternative-id":["1982"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-01982-1","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5,5]]},"assertion":[{"value":"28 October 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 April 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 May 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"165"}}