{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T05:57:57Z","timestamp":1774591077762,"version":"3.50.1"},"reference-count":44,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2022,2,13]],"date-time":"2022-02-13T00:00:00Z","timestamp":1644710400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Digital healthcare is a composite infrastructure of networking entities that includes the Internet of Medical Things (IoMT)-based Cyber-Physical Systems (CPS), base stations, services provider, and other concerned components. In the recent decade, it has been noted that the demand for this emerging technology is gradually increased with cost-effective results. Although this technology offers extraordinary results, but at the same time, it also offers multifarious security perils that need to be handled effectively to preserve the trust among all engaged stakeholders. For this, the literature proposes several authentications and data preservation schemes, but somehow they fail to tackle this issue with effectual results. Keeping in view, these constraints, in this paper, we proposed a lightweight authentication and data preservation scheme for IoT based-CPS utilizing deep learning (DL) to facilitate decentralized authentication among legal devices. With decentralized authentication, we have depreciated the validation latency among pairing devices followed by improved communication statistics. Moreover, the experimental results were compared with the benchmark models to acknowledge the significance of our model. During the evaluation phase, the proposed model reveals incredible advancement in terms of comparative parameters in comparison with benchmark models.<\/jats:p>","DOI":"10.3390\/s22041448","type":"journal-article","created":{"date-parts":[[2022,2,13]],"date-time":"2022-02-13T20:34:45Z","timestamp":1644784485000},"page":"1448","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":145,"title":["A Novel Hybrid Trustworthy Decentralized Authentication and Data Preservation Model for Digital Healthcare IoT Based CPS"],"prefix":"10.3390","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2215-2481","authenticated-orcid":false,"given":"Mohammed Amin","family":"Almaiah","sequence":"first","affiliation":[{"name":"Department of Computer Networks and Communications, College of Computer Sciences and Information Technology, King Faisal University, Al-Ahsa 31982, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1709-5790","authenticated-orcid":false,"given":"Fahima","family":"Hajjej","sequence":"additional","affiliation":[{"name":"Department of Information Systems, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh 11671, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4853-5093","authenticated-orcid":false,"given":"Aitizaz","family":"Ali","sequence":"additional","affiliation":[{"name":"School of Information Technology, Monash University, Sunway City, Subang Jaya 47500, Malaysia"}]},{"given":"Muhammad Fermi","family":"Pasha","sequence":"additional","affiliation":[{"name":"School of Information Technology, Monash University, Sunway City, Subang Jaya 47500, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3160-6542","authenticated-orcid":false,"given":"Omar","family":"Almomani","sequence":"additional","affiliation":[{"name":"Computer Network and Information Systems Department, The World Islamic Sciences and Education University, Amman 11947, Jordan"}]}],"member":"1968","published-online":{"date-parts":[[2022,2,13]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Ali, A., Ejaz, A., Jabbar, M., Hameed, K., Mushtaq, Z., Akhter, T., and Haider, A. (2016, January 24\u201326). Performance analysis of AF, DF and DtF relaying techniques for enhanced cooperative communication. Proceedings of the 2016 Sixth International Conference on Innovative Computing Technology (INTECH), Dublin, Ireland.","DOI":"10.1109\/INTECH.2016.7845056"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Mushtaq, Z., Sani, S.S., Hamed, K., and Ali, A. (2016, January 8\u201310). Automatic Agricultural Land Irrigation System by Fuzzy Logic. Proceedings of the 2016 3rd International Conference on Information Science and Control Engineering (ICISCE), Beijing, China.","DOI":"10.1109\/ICISCE.2016.190"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Azaria, A., Ekblaw, A., Vieira, T., and Lippman, A. (2016, January 22\u201324). Medrec: Using blockchain for medical data access and permission man-agement. Proceedings of the 2016 2nd International Conference on Open and Big Data (OBD), Vienna, Austria.","DOI":"10.1109\/OBD.2016.11"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Hasnain, M., Pasha, M.F., Ghani, I., Mehboob, B., Imran, M., and Ali, A. (2020). Benchmark Dataset Selection of Web Services Technologies: A Factor Analysis, IEEE Access.","DOI":"10.1109\/ACCESS.2020.2979253"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Ali, A., Rahim, H.A., Pasha, M.F., Dowsley, R., Masud, M., Ali, J., and Baz, M. (2021). Security, Privacy, and Reliability in Digital Healthcare Systems Using Blockchain. J. Electron., 10.","DOI":"10.3390\/electronics10162034"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Ali, A., Naveed, M., Mehboob, M., Irshad, H., and Anwar, P. (2017, January 5\u20137). An interference aware multi-channel MAC protocol for WASN. Proceedings of the 2017 International Conference on 613 Innovations in Electrical Engineering and Computational Technologies (ICIEECT), Karachi, Pakistan.","DOI":"10.1109\/ICIEECT.2017.7916523"},{"key":"ref_7","unstructured":"Ali, A., and Mehboob, M. (2018, January 5\u20137). Comparative Analysis of Selected Routing Protocols for WLAN Based Wireless Sensor Networks (WSNs). Proceedings of the 2nd International Multi-Disciplinary Conference, Oxford, UK."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Ali, A., Rahim, H.A., Ali, J., Pasha, M.F., Masud, M., Rehman, A.U., Chen, C., and Baz, M. (2021). A Novel Secure Blockchain Framework for Accessing Electronic Health Records Using Multiple Certificate Authority. Appl. Sci., 11.","DOI":"10.3390\/app11219999"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Khujamatov, K., Reypnazarov, E., Akhmedov, N., and Khasanov, D. (2020, January 8\u20139). Blockchain for 5G Healthcare architecture. Proceedings of the 2020 International Conference on Information Science and Communications Technologies (ICISCT), Karachi, Pakistan.","DOI":"10.1109\/ICISCT50599.2020.9351398"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"403","DOI":"10.1007\/s12083-020-00963-w","article-title":"BIDAPSCA5G: Blockchain based Internet of Things (IoT) device to device authentication protocol for smart city applications using 5G technology","volume":"14","author":"Vivekanandan","year":"2021","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"4278","DOI":"10.1109\/JIOT.2019.2956241","article-title":"A blockchain-SDN-enabled Internet of vehicles envi-ronment for fog com- puting and 5G networks","volume":"7","author":"Gao","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1109\/MNET.001.1900658","article-title":"Pirate: A block-chain-based secure framework of distributed machine learning in 5g networks","volume":"34","author":"Zhou","year":"2020","journal-title":"IEEE Netw."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1109\/MNET.2020.9374644","article-title":"Guest Editorial: Blockchain and AI for Beyond 5G Networks","volume":"34","author":"Zhang","year":"2020","journal-title":"IEEE Netw."},{"key":"ref_14","unstructured":"Yazdinejad, A., Parizi, R.M., Dehghantanha, A., and Choo, K.-K.R. (2019). Blockchain-enabled authentication handover with efficient privacy protection in SDN-based 5G networks. arXiv."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Zhao, Y., Zhao, J., Zhai, W., Sun, S., Dusit, N., and Kwok-Yan, L. (2021, January 29\u201330). survey of 6G wireless communications: Emerging technologies. Proceedings of the Future of Information and Communication Conference, Vancouver, BC, Canada.","DOI":"10.1007\/978-3-030-73100-7_12"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Bhattacharya, P., Tanwar, S., Shah, R., and Ladha, A. (2019, January 8\u20139). Mobile edge computing-enabled blockchain framework\u2014a survey. Proceedings of the ICRIC, Jammu, India.","DOI":"10.1007\/978-3-030-29407-6_57"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Kaushik, S. (2021). Blockchain and 5G-Enabled Internet of Things: Background and Preliminaries. Blockchain for 5G-Enabled IoT, Springer.","DOI":"10.1007\/978-3-030-67490-8_1"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"106382","DOI":"10.1016\/j.ymssp.2019.106382","article-title":"Blockchain for 5G-enabled IoT for industrial automation: A systematic review, solutions, and challenges","volume":"135","author":"Mistry","year":"2020","journal-title":"Mech. Syst. Signal Process."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Budhiraja, I., Tyagi, S., Tanwar, S., Kumar, N., and Guizani, M. (2018, January 9\u201313). CR-NOMA Based Interference Mitigation Scheme for 5G Femtocells Users. Proceedings of the 2018 IEEE Global Communications Conference (GLOBECOM), Abu Dhabi, United Arab Emirates.","DOI":"10.1109\/GLOCOM.2018.8647354"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Kermanshahi, S.K., Liu, J.K., and Steinfeld, R. (2017). Multi-user Cloud-based secure keyword search. Australasian Conference on Information Security and Privacy, Springer.","DOI":"10.1007\/978-3-319-60055-0_12"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"164595","DOI":"10.1109\/ACCESS.2019.2952942","article-title":"Med-Chain: A Design of Block-chain-Based System for Medical Records Access and Permissions Management","volume":"7","author":"Daraghmi","year":"2019","journal-title":"IEEE Access"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Adil, M., Almaiah, M.A., Omar Alsayed, A., and Almomani, O. (2020). An anonymous channel categorization scheme of edge nodes to detect jamming attacks in wireless sensor networks. Sensors, 20.","DOI":"10.3390\/s20082311"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"44459","DOI":"10.1109\/ACCESS.2020.2978303","article-title":"MAC-AODV based mutual authentication scheme for constraint oriented networks","volume":"8","author":"Adil","year":"2020","journal-title":"IEEE Access"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"176495","DOI":"10.1109\/ACCESS.2020.3026939","article-title":"Improving energy efficiency with content-based adaptive and dynamic scheduling in wireless sensor networks","volume":"8","author":"Khan","year":"2020","journal-title":"IEEE Access"},{"key":"ref_25","first-page":"614","article-title":"Improved security particle swarm optimization (PSO) algorithm to detect radio jamming attacks in mobile networks","volume":"11","author":"Almaiah","year":"2020","journal-title":"Quintana"},{"key":"ref_26","first-page":"6461","article-title":"A new hybrid text encryption ap-proach over mobile ad hoc network","volume":"10","author":"Almaiah","year":"2020","journal-title":"Int. J. Electr. Comput. Eng. IJECE"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"148510","DOI":"10.1109\/ACCESS.2020.3015941","article-title":"An efficient load balancing scheme of energy gauge nodes to maximize the lifespan of constraint oriented networks","volume":"8","author":"Adil","year":"2020","journal-title":"IEEE Access"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"163209","DOI":"10.1109\/ACCESS.2020.3020310","article-title":"An energy proficient load balancing routing scheme for wireless sensor networks to maximize their lifespan in an operational environment","volume":"8","author":"Adil","year":"2020","journal-title":"IEEE Access"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Bubukayr, M.A., and Almaiah, M.A. (2021, January 13\u201314). Cybersecurity concerns in smart-phones and applications: A survey. Proceedings of the 2021 International Con-ference on Information Technology (ICIT), Amman, Jordan.","DOI":"10.1109\/ICIT52682.2021.9491691"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Almomani, O., Almaiah, M.A., Alsaaidah, A., Smadi, S., Mohammad, A.H., and Althunibat, A. (2021, January 13\u201314). Machine Learning Classifiers for Network Intrusion Detection System: Comparative Study. Proceedings of the 2021 International Conference on Information Technology (ICIT), Amman, Jordan.","DOI":"10.1109\/ICIT52682.2021.9491770"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Siam, A.I., Almaiah, M.A., Al-Zahrani, A., Elazm, A.A., El Banby, G.M., El-Shafai, W., El-Samie, F.E., and El-Bahnasawy, N.A. (2021). Secure Health Monitoring Communication Systems Based on IoT and Cloud Computing for Medical Emergency Applications. Comput. Intell. Neurosci.","DOI":"10.1155\/2021\/8016525"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Al Nafea, R., and Almaiah, M.A. (2021, January 13\u201314). Cyber security threats in cloud: Literature review. Proceedings of the 2021 International Conference on Information Technology (ICIT), Amman, Jordan.","DOI":"10.1109\/ICIT52682.2021.9491638"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"AlMedires, M., and AlMaiah, M. (2021, January 13\u201314). Cybersecurity in Industrial Control System (ICS). Proceedings of the 2021 International Conference on Information Technology (ICIT), Amman, Jordan.","DOI":"10.1109\/ICIT52682.2021.9491741"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Alamer, M., and Almaiah, M.A. (2021, January 13\u201314). Cybersecurity in Smart City: A systematic mapping study. Proceedings of the 2021 International Conference on Information Technology (ICIT), Amman, Jordan.","DOI":"10.1109\/ICIT52682.2021.9491123"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Ali, A., Almaiah, M.A., Hajjej, F., Pasha, M.F., Fang, O.H., Khan, R., Teo, J., and Zakarya, M. (2022). An Industrial IoT-Based Blockchain-Enabled Secure Searchable Encryption Approach for Healthcare Systems Using Neural Network. Sensors, 22.","DOI":"10.3390\/s22020572"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Almudaires, F., and Almaiah, M. (2021, January 13\u201314). Data an overview of cybersecurity threats on credit card companies and credit card risk mitiga-tion. Proceedings of the 2021 International Conference on Information Technology (ICIT), Amman, Jordan.","DOI":"10.1109\/ICIT52682.2021.9491114"},{"key":"ref_37","first-page":"98","article-title":"An investigation of digital forensics for shamoon attack behaviour in FOG computing and threat intelligence for incident response","volume":"15","author":"Almaiah","year":"2020","journal-title":"J. Theor. Appl. Inf. Technol."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"70531","DOI":"10.1109\/ACCESS.2021.3074125","article-title":"Multi-Agent System Combined with Distributed Data Mining for Mutual Collaboration Classification","volume":"9","author":"Qasem","year":"2021","journal-title":"IEEE Access"},{"key":"ref_39","first-page":"98","article-title":"An Investigator Digital Forensics Frequencies Particle Swarm Optimization for Dectection and Classification of Apt Attack in Fog Computing Enviroment (IDF-FPSO)","volume":"15","author":"Almaiah","year":"2020","journal-title":"J. Theor. Appl. Inf. Technol."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Almaiah, M.A. (2021). A New Scheme for Detecting Malicious Attacks in Wireless Sensor Networks Based on Blockchain Technology. Artificial Intelligence and Blockchain for Future Cybersecurity Applications, Springer.","DOI":"10.1007\/978-3-030-74575-2_12"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Almaiah, M.A., Al-Zahrani, A., Almomani, O., and Alhwaitat, A.K. (2021). Classification of Cyber Security Threats on Mobile Devices and Applications. Artificial Intelligence and Blockchain for Future Cybersecurity Applications, Springer.","DOI":"10.1007\/978-3-030-74575-2_6"},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"315","DOI":"10.30534\/ijatcse\/2020\/48912020","article-title":"Multilayer Neural Network based on MIMO and Channel Estimation for Impulsive Noise En-vironment in Mobile Wireless Networks","volume":"9","author":"Almaiah","year":"2020","journal-title":"Int. J. Adv. Trends Comput. Sci. Eng."},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Qasem, M.H., Hudaib, A., Obeid, N., Almaiah, M.A., Almomani, O., and Al-Khasawneh, A. (2022). Multi-agent Systems for Distributed Data Mining Techniques: An Overview. Big Data Intelligence for Smart Applications, Springer.","DOI":"10.1007\/978-3-030-87954-9_3"},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Ali, A., Pasha, M.F., Fang, O.H., Khan, R., Almaiah, M.A., and Al Hwaitat, A.K. (2022). Big Data Based Smart Blockchain for Information Retrieval in Privacy-Preserving Healthcare System. Big Data Intelligence for Smart Applications, Springer.","DOI":"10.1007\/978-3-030-87954-9_13"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/4\/1448\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T22:18:53Z","timestamp":1760134733000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/4\/1448"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,13]]},"references-count":44,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2022,2]]}},"alternative-id":["s22041448"],"URL":"https:\/\/doi.org\/10.3390\/s22041448","relation":{"is-referenced-by":[{"id-type":"doi","id":"10.1007\/s10586-025-05926-5","asserted-by":"object"}]},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,2,13]]}}}