Proof of Activity Protocol for IoMT Data Security

  • R. Rajadevi
  • , K. Venkatachalam
  • , Mehedi Masud
  • , Mohammed A. AlZain
  • , Mohamed Abouhawwash*
  • *Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

16 Scopus citations

Abstract

The Internet of Medical Things (IoMT) is an online device that senses and transmits medical data from users to physicians within a time interval. In, recent years, IoMT has rapidly grown in the medical field to provide healthcare services without physical appearance. With the use of sensors, IoMT applications are used in healthcare management. In such applications, one of the most important factors is data security, given that its transmission over the network may cause obtrusion. For data security in IoMT systems, blockchain is used due to its numerous blocks for secure data storage. In this study, Blockchain-assisted secure data management framework (BSDMF) and Proof of Activity (PoA) protocol using malicious code detection algorithm is used in the proposed data security for the healthcare system. The main aim is to enhance the data security over the networks. The PoA protocol enhances high security of data from the literature review. By replacing the malicious node from the block, the PoA can provide high security for medical data in the blockchain. Comparison with existing systems shows that the proposed simulation with BSD-Malicious code detection algorithm achieves higher accuracy ratio, precision ratio, security, and efficiency and less response time for Blockchain-enabled healthcare systems.

Original languageEnglish
Pages (from-to)339-350
Number of pages12
JournalComputer Systems Science and Engineering
Volume44
Issue number1
DOIs
StatePublished - 2022
Externally publishedYes

Bibliographical note

Publisher Copyright:
© 2022 CRL Publishing. All rights reserved.

Keywords

  • Blockchain
  • IoMT
  • PoA
  • data management
  • malicious code detection
  • secure data management framework
  • security

ASJC Scopus subject areas

  • Control and Systems Engineering
  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Proof of Activity Protocol for IoMT Data Security'. Together they form a unique fingerprint.

Cite this