Next Article in Journal
Magnetic Properties of Amorphous Ta/CoFeB/MgO/Ta Thin Films on Deformable Substrates with Magnetic Field Angle and Tensile Strain
Previous Article in Journal
Dynamic Gesture Recognition Based on FMCW Millimeter Wave Radar: Review of Methodologies and Results
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Interoperable IoMT Approach for Remote Diagnosis with Privacy-Preservation Perspective in Edge Systems

by
Erana Veerappa Dinesh Subramaniam
1,
Kathiravan Srinivasan
2,
Saeed Mian Qaisar
3,4 and
Paweł Pławiak
5,6,*
1
Department of Computer Science and Business Systems, Ramco Institute of Technology, Rajapalayam 626117, India
2
School of Computer Science and Engineering, Vellore Institute of Technology, Vellore 632014, India
3
CESI LINEACT, 69100 Lyon, France
4
Electrical and Computer Engineering Department, Effat University, Jeddah 22332, Saudi Arabia
5
Department of Computer Science, Faculty of Computer Science and Telecommunications, Cracow University of Technology, Warszawska 24, 31-155 Krakow, Poland
6
Institute of Theoretical and Applied Informatics, Polish Academy of Sciences, Bałtycka 5, 44-100 Gliwice, Poland
*
Author to whom correspondence should be addressed.
Sensors 2023, 23(17), 7474; https://doi.org/10.3390/s23177474
Submission received: 23 June 2023 / Revised: 11 August 2023 / Accepted: 23 August 2023 / Published: 28 August 2023
(This article belongs to the Section Internet of Things)

Abstract

:
The emergence of the Internet of Medical Things (IoMT) has brought together developers from the Industrial Internet of Things (IIoT) and healthcare providers to enable remote patient diagnosis and treatment using mobile-device-collected data. However, the utilization of traditional AI systems raises concerns about patient privacy. To address this issue, we present a privacy-enhanced approach for illness diagnosis within the IoMT framework. Our proposed interoperable IoMT implementation focuses on optimizing IoT network performance, including throughput, energy consumption, latency, packet delivery ratio, and network longevity. We achieve these improvements using techniques such as device authentication, energy-efficient clustering, environmental monitoring using Circular-based Hidden Markov Model (C-HMM), data verification using Awad’s Entropy-based Ten-Fold Cross Entropy Verification (TCEV), and data confidentiality using Twine-LiteNet-based encryption. We employ the Search and Rescue Optimization algorithm (SRO) for optimal route selection, and the encrypted data are securely stored in a cloud server. With extensive network simulations using ns-3, our approach demonstrates substantial enhancements in the specified performance metrics compared with previous works. Specifically, we observe a 20% increase in throughput, a 15% reduction in packet drop rate (PDR), a 35% improvement in network lifetime, and a 10% decrease in energy consumption and delay. These findings underscore the efficacy of our approach in enhancing IoT network interoperability and protection, fostering improved patient care and diagnostic capabilities.

1. Introduction

Interoperability is the biggest challenge in the Internet of Things (IoT). Currently, it is one of the main issues in the interconnected Internet of Industrial Things (IIoT), since industrial devices are enabled to provide seamless communication, among others. Therefore, interoperability is required [1,2]. The number of connected devices was projected to reach 20.4 billion by the year 2020, and it has been anticipated to grow to 75 billion by 2025. These interconnected devices require interoperability, security, and seamless and controlled data exchange among devices, and this is referred to as interoperability [3,4]. The energy constraint is a key issue in IIoT devices. Currently, various cluster-based networks are considered to reduce the usage of energy [5]. Still, the energy constraint is a significant issue in the IIoT [6]. Another issue is that most of the cluster-based works are executed in homogeneous environments and residual energy or distance parameters are used for cluster formation [7]. To overcome this issue, heterogeneous sensor-based clustering has been a focus of research [8]. In addition, intelligent routing is a noteworthy phenomenon to improve the quality of service (QoS) during interoperable data communication [9]. Managing the QoS to improve network performance and scalability as well as security solutions was recently addressed using blockchain technology [10]. Blockchain is a decentralized technology that addresses single-point failures [11,12]. However, resources are required to communicate with other IIoT devices. In general, insufficient resources cause huge packet loss or drop [13,14]. Artificial intelligence (AI) plays a vital role in recent IIoT networks, where data of large size are generated and collected from a variety of devices [15]. They are widely used in different smart applications, such as smart cities, healthcare, industry, and so on [16]. In this study, AI acts as an intelligent agent to learn the IIoT environment and collect data from real-world scenarios [17]. AI requires training to classify data from multiple devices, but it often does not ensure reality [18]. Due to the environmental conditions, data collected with IIoT sensors require training for accurate classification. Support Vector Machine (SVM) is one such AI algorithm created for data classification [19].
Data mining techniques for patient health analysis have focused on the application of artificial intelligence techniques for analyzing healthcare data during the COVID-19 pandemic [20]. The effectiveness of deep learning models in analyzing such data is proved and potentially offers valuable insights for diagnostics and treatment [21]. The privacy-preserving techniques used in disease prediction systems utilize deep learning, and they explore various approaches, such as cryptographic techniques, attribute-based encryption, homomorphic encryption, and hybrid methods [22].
  • To achieve interoperability for heterogeneous IIoT environments, reliable network connectivity is essential.
  • To attain the best data collection from IIoT devices, the environment must be known with precision, and the data must be captured with suitable granularity. In this case, fault data are identified.
  • To efficiently find the adaptive threshold, the sensed data should be analyzed in real time.
  • To improve the network scalability for incorporating a large number of nodes, energy-efficient clusters should be formed.

1.1. Contributions

The major contributions of this study are reported below.
The proposed research contributes to the field of the Internet of Medical Things (IoMT) by presenting a privacy-enhanced illness diagnostic process for healthcare applications, addressing the challenges of privacy protection and inference attacks. The work also demonstrates improved performance metrics, such as throughput, packet delivery ratio, network longevity, energy-consumption reduction, and decreased latency, compared with the previous approaches, making it a valuable contribution to the field.

1.2. Organization

Section 2 of this paper provides a brief overview of the relevant literature and discusses the shortcomings of previous works. Section 3 describes the proposed interoperable AI-IIoT process flowchart, pseudocode, and mathematical expression. In Section 4, the experimental outcomes and performance of the suggested approach are provided. It is shown that the present approach outperforms the baseline models. The conclusion is made in Section 5.

2. Related Works

In this section, three kinds of related works, i.e., energy-efficient network models, and network interoperability modeling using blockchain and without blockchain technology, respectively, are reviewed.

2.1. Energy-Efficient Network Models

Heterogeneous sensor networks organized into clusters employ a trustworthy energy-aware routing protocol [23]. The primary objective of this article is to reduce routing costs and increase network lifespan. The parameters of residual power, weight value for round-trip time (RTT), and hop count are used in the proposed routing strategy. However, reliable packet routing depends on CH election, and it requires a lot of power. To improve the network quality of service, the authors of [24] suggested an intelligent routing scheme. Limitations: Nearly 256 ( 4 4 ) fuzzy rules are generated for the network, which requires very large energy. CNN is used to train the network according to conditions such as bandwidth availability, congestion status, and traffic level. Initially, K-means clustering is used to partition the nodes into clusters. The K-value is necessary for this purpose. To perform CH election in a heterogeneous WSN, genetic algorithm-based optimal clustering (GAOC) was presented [25]. The choice of the CH depends on many factors, including the total amount of energy remaining, its proximity to the sink nodes, and node density. Multiple information sinks are placed in the network to decrease the distance of communication between the nodes and the sink node, thereby mitigating the hot-spot issue. GA has been considered a powerful approach to CH election, whereas it does not guarantee the attainment of an optimum solution, just like other meta-heuristics. In [26], the matrix-filling theory was presented for data collection in an energy-efficient way. The main goal of this paper is to reduce latency, and the theory proposed is considered to meet this objective. It also uses cluster formation, and time slots are assigned to each cluster for information transfer; further, it is computed using the matrix-filling theory. However, the matrix-filling theory requires huge energy to fulfill all the operations. The energy coverage ratio clustering protocol (E-CRCP) was designed by the authors in [27] to exploit the regional coverage ratio in a way that decreases the node energy consumption. The CH is selected based on the node’s area coverage, and the optimal number of clusters is determined according to the energy amount of each node. As a whole, this article helps the network to run more efficiently, distribute its load more evenly, and last longer. However, if the distance from the node is very high, high energy is needed. In such cases, interoperability fails.

2.2. Security Using Blockchain

IIoT-sensed data are trained using a machine learning algorithm called Support Vector Machine (SVM) [28]. Though SVM is typically applied in real-world applications such as disease diagnosis, it does not directly address the security concerns. To preserve the privacy of IIoT data, a secure SVM approach has been employed by utilizing blockchain-based encrypted IIoT data. Encrypted sensed data are securely transmitted to other nodes without the involvement of a trusted authority. However, it should be noted that homomorphic encryption, which can support complex sensed data, requires significant energy resources, and it may not be suitable for this scenario.

2.3. Security without Blockchain

The authors in [29] proposed a compressed data stream that is generated using low-density parity check (LDPC) code. It has an energy limit. The time it takes to transmit information from a node to a collector is substantial. The issue arises while attempting to process an encrypted data stream coming from a centralized node. The research [30] proposes a method for collecting raw data from Internet of Things gadgets, and it protects users’ anonymity. The fog nodes are trusted, and the message transmitted from the participants is found. However, data privacy is not fully given, since the attackers can easily compromise the fog nodes to obtain the participants’ data. In the study [31], three smart algorithms that can self-learn, adapt to their surroundings, and learn in small increments over time are explored in an Internet of Things setting. Ultimately, an unsupervised method based on a dynamic self-organizing map meets all the criteria. Effective lightweight integrated blockchain (ELIB) was proposed in the paper [32] to accommodate the needs of IIoT gadgets and their users. Security is employed to save sensitive information during transmission [33]. For this purpose, a secure group communication scenario in which the logical trees are constructed for each group was designed. Limitations: The most powerful node must be elected to act as the CH because it plays the main role in the group. Hence, high energy consumption is avoided. The one-way hash function is less strong than the other hashing algorithms. The authors in [34] proposed interoperable and flexible IIoT applications (e.g., smart home). This link utilizes a cloud-based infrastructure and a web of objects to function. To accomplish appliance-to-appliance communication, a Raspberry Pi-based gateway is used.

3. The Methodology

In this research, the problems that exist in the current works are overcome to achieve interoperability. To mitigate the above-mentioned challenges, the proposed model has a three-layered architecture consisting of Perception Layer, Edge Layer, and Cloud Layer, and it comprises IoMT devices (CH and CM) and Guard Nodes (GNs). Figure 1 describes the overall flow chart of the proposed work model.

3.1. Conceptual Model

The architecture of the proposed interoperable AI-IoMT model is presented in Figure 2. The model comprises three layers that explain the overall working of IoMT applications. Figure 1 shows that authentication in the IoT environment is based on Secretkey, and the clustering of sensed data is performed using the zSlices Triune Fuzzy Sets algorithm. Additionally, CH selection is performed using Hidden Markov Model (HMM), and the incorrect data are removed using Awad’s Entropy-based Ten-Fold Cross Entropy Verification, whereas the correctly sensed data packets are encrypted using Twine-LiteNet. Finally, an optimal route is selected among the CHs using the Search and Rescue Optimization algorithm for enabling secure and efficient data transmission in the IoT network.
The proposed method incorporates various security mechanisms to protect patient data and maintain privacy; these are Twine-LiteNet-based encryption and Awad’s Entropy-based Ten-Fold Cross Entropy Verification (TCEV) and may be employed to validate data integrity and reduce the risk of data tampering.

3.2. Secure Credentials (SCs)-Based Authentication

Initially, each IoMT device is authenticated with its ID, Password, and PUF (physically unclonable function). PUF is a unique identity (digital fingerprint) for each IC. During authentication, these three factors are verified. If they are valid, then the gateway generates a secret key for the device. The secret key is generated using Twine-LiteNet (Lightweight Neural Network). This authentication process is shown in Figure 3. For each authentication operation, these three factors are used as known facts and verified with a secret key for authentication. The proposed TWINE algorithm is executed in the convolutional layer of the Lightweight Neural Network is represented as Algorithm 1.
Algorithm 1: TWINE
INPUT: ID, password, PUF
OUTPUT: Secret key S K
Y ( 64 ) 1 T P
R k ( 32 ) 1 . R k ( 32 ) 35 R k ( 32 × 36 )
for i 1   t o   35 do
Y 0 ( 4 ) i Y 1 ( 4 ) i . . Y 14 ( 4 ) i Y 15 ( 4 ) i Y ( 64 ) i
R k 0 ( 4 ) i R k 1 ( 4 ) i R k 1 ( 4 ) i R k ( 32 ) i
for j 0   t o   7 do
Y 2 j + 1 i S ( Y 2 j i R k j i ) Y 2 j + 1 i
for k 0   t o   15
Y ρ [ k ] i + 1 Y k i
Y i + 1 Y 0 i + 1 Y 1 i + 1 . . Y 14 i + 1 Y 15 i + 1
for j 0   t o   7 do
Y 2 j + 1 36 S ( Y 2 j 36 R k j 36 ) Y 2 j + 1 36
S K Y 36
The TWINE algorithm is a lightweight 64-bit block cipher algorithm. It generates an 80-to-128-bit key that improves hardware efficiency. This algorithm has 16 4-bit sub-blocks. The secure credentials are encrypted using this algorithm, and a secret key S K of 64 bit in length is provided, after collecting plaintext (Tp). This algorithm of 64 bit in length provides ciphertext (CT) of 64 bit in length. It also has a round key (Rk) value of 80 to 128 bit in length that is derived from Sk. The TWINE algorithm includes a non-linear layer using a 4-bit diffusion layer and S-Boxes, and it permutes the 16 blocks. The round function is executed 36 times for providing Sk. The permutation of the block indexes is ρ : 0,1 , 15 0,1 . 15 , where the sub-block is mapped with the ρ [ j ] th subblock. We form the clusters by the information sensed from the Environment. In CH election, we consider the six factors: link quality (RSS value) F 1 , residual energy F 2 , no. of rounds reached (expected count) F 3 , fairness score according to geographical area (0-1) F 4 , coverage ratio F 5 and node degree F 6 .
The pseudocode outlines the TWINE encryption algorithm, which takes inputs such as ID, password, and physically unclonable function (PUF) to generate a secret key (S_K). The algorithm performs a series of operations, including XOR operations, substitution (S), and permutation (ρ), to derive the key from the inputs and the intermediate variables.
In Figure 3, the Fuzzy Set algorithm includes the x-axis and y-axis for generating fuzzy rules. In the present study, the third-dimension z-axis is taken for fuzzy-set generation; it is known as zSlices and provides the interval set in the third dimension. The representation of zSlices is defined as follows:
Z i = y Y i v i J i y i Z i y , v i
The membership function of the zSlices Triune Fuzzy Sets algorithm is defined as follows:
M f y = v J y , i M a x Z i v ,   J y [ 0,1 ]  
where 0 i I , which represents fuzzy set 1. The other two fuzzy-set values are also represented like this. The join operation is performed slice by slice along the x-axis. Convex zSlices-based general fuzzy sets Pi and Qi are considered with membership grades M f P y   a n d   M f Q y , and the zSlices-induced fuzzy sets are represented as follows:
M f P y = i = 0 I P i I P i , s P i Z i v P i
  M f Q y = i = 0 I v Q i I Q i , s Q i Z i v P i
The join operation between two zSlices-based fuzzy sets is used to reduce the join operation computation between both sets. The other two fuzzy sets are also calculated like this. It is an advanced version of type-2 fuzzy sets. In this approach, triple fuzzy sets are used in parallel mode. Figure 4 shows the diagram for zSlices Triune Fuzzy Sets. Table 1 illustrates the number of fuzzy rules for CH selection. Table 1 also shows the representation of fuzzy rules for cluster head (CH) selection in the proposed research. It outlines the combinations of input variables (F1 to F6) and their corresponding CH selection outcomes (Yes or No), indicating the decision-making process for CH assignment based on the given fuzzy rules.
The threshold for a node n i to become CH is computed as
T n i = p i 1     p i   ×   ( r   m o d   1 / p i ) ,   i f   n i ϵ G 0 ,   O t h e r w i s e
In this case, G is the collection of all candidates for CH who have been eliminated in earlier stages. The probability value ( p i ) of each node is computed as follows:
p i = p E i ( r ) E C , l ¯ ( r 1 )
where E ( r ) denotes the residual energy at round r and E C , l ¯ is the average regional energy of node n i in its cluster C at round r 1 . By computing the residual and average energy values, the CH selection probability is computed with the proposed method. The nodes are arranged from the highest to the lowest weight. The median weight value is then used in the following formula to obtain the cutoff value:
μ = ( W N 1 + W N 2 + + W ( N n ) ) n
Only the nodes whose weights are greater than a certain threshold (W>) are considered for the next phase. Thus, the number of nodes to be processed in the next stage is reduced based on the weight value.
After CH selection, a cluster is formed with its cluster members (CMs). All IoMT devices in the region are sensed, and their data are transmitted to the CH. In this step, environmental monitoring is learned, and it is held in the blockchain gateway using Circular-based Hidden Markov Model (C-HMM). The main aim of this algorithm is to determine the hidden state that corresponds to the output and to observe the parameters from the output. C-HMM includes a set of hidden states h = { h 1 , h 2 , h n } at time t for any state. The hidden states are determined based on the output O = ( O 1 , O 2 , O n } with time t. In the present work, C-HMM monitors the environment. Generally, C-HMM includes state emission probability and state transition probability.
State probability is the probability that is obtained from hidden state h k ( t ) at time t, and it is the transition to hidden state h j ( t + 1 ) at time t + 1, which are represented as follows:
T P = P h j t + 1 h k t = t p j k
State emission probability is a probability that is received from hidden state h j ( t ) at time t, and it emits observed states O i ( t ) , which are defined as follows:
E P = P O i t h j t = e p i j
Finally, C-HMM finds the current state of each IoMT device and updates its information to the gateway. In addition, a GN is deployed for each cluster region, and its main purpose is to hold the value of transmitted packets. Due to the energy-consumption issue of the CH, the GNs are placed, and they do not transmit any information, but they communicate with the CH for avoiding security risks.
With the use of current sensor measurements and environment data, incorrect data are identified and removed from the edge. To find this information, Awad’s Entropy-based Ten-Fold Cross Entropy Verification (TCEV) has been proposed. This method computes the entropy value for each sensed datum. To determine the current sensed data, entropy is computed and compared with the ten sets of the last transmitted data entropy values. This process is held in the CH.
Then, the correct sensed data packets ( D p ) are encrypted using a lightweight cryptography algorithm called Twine-LiteNet (Lightweight Neural Network), which is represented as Algorithm 2. LiteNet is a type of lightweight algorithm that consists of six layers: convolutional layer, LiteModule convolutional layer, dense layer 1, dense layer 2, and softmax layer. To reduce the time consumption of encryption, the aggregated sensed data are encrypted in parallel mode. The convolutional layer of the proposed LiteNet model includes a linear filter that is used to reduce the computational cost of the convolutional layers during encryption. Table 2 describes the shuffle and hexadecimal values of the S-Box. The values are used to encrypt and decrypt the input blocks.
Algorithm 2: Twine-LiteNet
INPUT: D P
OUTPUT: E D
Begin {
Initialize D P
// convolutional layer
for i from 1 to n do
for j from 1 to n do{
encrypt the data packets D P using TWINE
Y 64 1 D P
for i 1   t o   35 do
Y 2 j + 1 36 S ( Y 2 j 36 R k j 36 ) Y 2 j + 1 36
E D Y 36 }
// Fully connected layer (Lite module, 2 dense layers, and softmax layer)
for i from t to n do
temp = 0
for j from 1 to n do
t e m p = t e m p + w i j × X [ j ]
end for
Y i = t e m p
end for
end for
end for
end
The calculation of the proposed convolutional layers is defined as follows:
X n = Y ( n ) × H ( n )
m = 0 s 1 X m H n m
where X(n) represents the length of the input data packets, H(n) represents the kernel selection, and Y(n) represents the output value. In this layer, the sensed data packets are encrypted. Then, the proposed TWINE algorithm converts plaintext into ciphertext (encrypted data) of 64 bits by performing the round function. It takes 36 rounds to generate ciphertext. The S-box permutation values are defined in the table. The permutation block indexes are defined as ρ : { 0,1 , 15 } , and they are mapped with ρ [ j ] sub-block. This is also illustrated in the table.
Then, the lite module includes a 1 × 1 convolutional layer, and the filter size of the current lite module is 1 × 1 ,   1 × 2 ,   1 × 3 . The main objective of this module is to reduce the computational cost among the convolutional layers. The lite module is also used to reduce the volume efficiency of the parameters. The 1 × 1 convolutional layer is used to improve the local and cluster feature map representations. LiteNet considers the sense data packets to be input. It includes one lite module, two dense layers, and one softmax layer, which include five units that are defined as follows:
i 5 S i = 1
where i = 1 ,   2 5 and S i denotes the probability distribution.
Y i = n X n w n i
where w represents the weight values of the softmax layer and X represents the output of the upper layer. The final calculation of the softmax layer is defined as follows:
  S i = exp   ( Y i ) j 5 exp   ( Y j )
Finally, the softmax layer provides the encrypted data packets.
The pseudocode describes the encryption process using the Twine-LiteNet algorithm. It encrypts the data packets (D_P) using the TWINE algorithm; then, a fully connected layer (Lite module) is applied to produce the encrypted data (E_D). Figure 5 shows the representation of the flowchart. Later, the optimum route is selected among CHs using four factors: available bandwidth, link quality, residual energy, and path duration. It is selected by the SRO algorithm, and its performance is high when it is compared with other optimization algorithms.
Single-Objective Optimization (SRO) is chosen for route optimization to focus on optimizing a specific objective, such as minimizing travel distance or reducing delivery time, without considering the conflicting objectives. The motivation behind using SRO algorithms is to simplify the optimization process by reducing the problem to a single objective, by making it easier to find an optimal solution within limited computational time.
The optimal route is computed by the SRO algorithm. When compared with other optimization algorithms, its performance is high, due to the adoption of clue-based exploration. The clue matrix is formulated, and it consists of route selection attributes and available routes. This can be represented as
H = A R = A 11 A 1 D A N 1 A N D R 11 R 1 D R N 1 R N D
where A and R denote the attribute and available routes, respectively. The search direction of the route considering the attributes is expressed as
J D x = A x R y ,   x y
where J D x denotes the direction of the search for the x t h route, and A x &   R y denote the x t h route position and y t h attribute position, respectively. To diversify the change directions to search for a route repeatedly, the binomial crossover mechanism is adopted, and it can be represented as
A x , k = H y , k + v 1 × ( A x , k H y , k ) ,   i f   o f H y > o f ( A x ) A x , k + v 1 × A x , k H y , k ,   i f   k = k r a n d   A x , k ,   o t h e r w i s e    
where A x , k denotes the new position of the k t h dimension of the x t h route.   H y , k represents the position of the k t h dimension of the y t h attribute. o f H y and o f ( A x ) represent the objective functions for H y and A x , respectively. Let v 1 denote a random number between 0 and 1. The new position of x t h route can be formulated as
  A x = A x + v 2 × H y H r ,   x y r
If v 2 is a random number from 0 to 1, then the following holds. The boundary conditions are calculated such that the new location is optimal, and they may be expressed as
A x , k = A x , k   +   A k m a x 2 ,   i f   A x , k > A k m a x A x , k   +   A k m i n 2 ,   i f   A x , k > A k m i n ,   k = 1,2 , . . D  
where A k m a x and A k m i n denote the upper and lower boundaries of the k t h dimension.
The above equations are used to search the route in each iteration and the change of the previous position to the new position is stored in the matrix R which can be formulated as,
R n = A x ,   i f   o f A x > o f A x R n O t h e r w i s e
The changeover of position is expressed as,
A x = A x ,   i f   o f A x > o f A x A x O t h e r w i s e
The pseudo-code for the proposed route selection-based SAR algorithm is presented below as Algorithm 3.
Algorithm 3: SAR
Population initialization in the range ( A k m a x , A k m i n )
Perform sorting and determine the best solution
The routing matrix A takes the first half of the sorted solution and the remaining to matrix R
Initialize S E ,   M F , and F N = 0
While the end criterion is not fulfilled do
For   x = 1 to N do
Update   H using Equation (15)
If rand<0.5 do
Computation of the position of x t h route using Equation (17)
Else
Computation of the position of x t h route using Equation (18)
End If
Perform boundary conditions of x t h route by Equation (19)
Updation of matrix R and position of x t h route by (20)
Updation of F N
If F N > M F do
A x is replaced with a random solution using Equation (21)
End if
Perform restart strategy
End for
Compute the current best position and update the previous best
End while
Return the best solution
Finally, the encrypted data are stored in the cloud servers and securely accessed by the end users. Due to the strong edge connection in clustering and routing, interoperability is achieved in information transfer. Similarly, data collection is executed effectively with accurate environment sensing, and it dynamically identifies the fault/incorrect data. Furthermore, blockchain technology is proposed to improve scalability and decentralized communication among IoMT devices.
The above pseudocode represents the Search and Rescue Optimization (SAR) algorithm for solving a routing problem. It initializes a population, which performs sorting to determine the best solution, and updates the routes based on equations, boundary conditions, and restart strategies until the end criterion is met. The algorithm aims to optimize routing matrix A and achieve the best solution to the given problem.

4. Results and Discussion

This section discusses the experimental findings and the suggested interoperable AI-based IoMT. The simulation environment and a case study are the first topics of discussion. Then, the proposed work is contrasted with the current methods. The proposed method enhances security in IIoT environment authentication for device integrity and Twine-LiteNet-based encryption to improve the confidentiality of data packets by providing a global model for illness detection in healthcare applications within the Internet of Medical Things (IoMT) context.

4.1. Simulation Study

As part of the modeling of the suggested method, 100 IoMT devices are placed over a 100 m2 area and simulated using NS3.26. The machine runs Ubuntu 14.04 and has the NS-3 simulator loaded onto it. Initially, nodes consist of limited energy and are exhausted for each communication. Table 3 portrays the obtained simulation values for the implementation of interoperable network operations, and it represents the simulation parameters and descriptions.
In this section, a performance analysis is conducted to validate the proposed interoperable IoMT approach with two existing approaches, i.e., EIR-CIoT [35] and BDCS-IoMT [36]. For the proposed interoperable IoMT implementation, two kinds of scenarios are compared, i.e., all-information transfer (with error/fault values) and correct data (without any error readings). In Industry 4.0, fault data event generation and transmission cause a higher number of issues, such as large energy consumption, lower throughput, packet delivery ratio, etc. In the following sub-sections, the evaluation metrics and the simulation results are discussed.

4.1.1. Impact of Throughput

Throughput is defined as the average number of packets successfully received at the destination node. Figure 6 represents the impact of throughput on the number of nodes. Applying four different deep neural networks for processing the inputs decreases the throughput, and it is implemented in BDCS-IoMT. Likewise, EIR-CIoT uses interoperability and energy-aware routing for throughput optimization. The RSS-based CH is elected for information transfer. RSS with beacon message transmission increases the communication and the computational overhead; hence, the performance of throughput decreases as the number of nodes increases.
However, uncertainty in data forwarding increases this overhead and reduces the throughput level. This challenge is focused on employing the optimum route using the SRO algorithm. As the objective of routing is lower communication overhead and energy-balanced information transfer, SRO determines the global optimum solution. Further, the elimination of unauthorized nodes in the network and employing authentication decrease the overhead and increase the chance of throughput. For instance, EIRCIoT obtains 190 Kbps throughput for 40 nodes, whereas BDCS-IoMT obtains 230 Kbps throughput for 40 nodes, and 280 Kbps and 320 Kbps for throughput, respectively.

4.1.2. Impact of Energy Consumption

The ratio of the total amount of energy used during information transfer is known as the energy-consumption ratio (ECR). The remaining power of a node is calculated using this value. The ECR may be written down as
E C R = A E A D
where A E and A D denote the average energy consumption and average information transfer rate, respectively. Further, the number of messages in the buffer is estimated. This parameter is considered if a node has a large number of messages; then, all those data are dropped. This metric is defined as the number of messages that are waiting in the buffer of the node. When the number of simulation runs increases, the energy-consumption rate increases. Minimizing the energy consumption of IoMT devices requires knowledge about the specific traffic in the network and also associated end-to-end communications. Routing packets requires a certain amount of energy to store them in the buffer. Most researchers have found intelligent algorithms for routing packets that improve the network performance in the network layer. In this paper, a study of the energy-consumption usage of wireless devices is presented. The optimization of routing using a simple design in the IoMT environment addresses the energy-consumption problem. Also, IoMT devices and sensors enable not only interoperability among devices but also control in the environment.
The simulation results of energy usage per node are shown in Figure 7. The suggested work reduces power usage by eliminating the faulty data before sending them to the target node, as shown by the simulation results. Further, this is illustrated in Figure 8 based on the simulation rounds.

4.1.3. Impact of Delay

Most energy-saving solutions fail to reduce delay, as has been explored in the literature. Delays in the proposed task are kept to a minimum with the use of optimal CH selection, security provision, and routing mechanisms. Figure 9 shows a comparison of network latency from end to end. According to the findings, the suggested work outperforms prior studies in the field. This study demonstrates that minimizing end-to-end latency cannot be achieved by only cutting energy use. The inefficient information transmission of the EIR-CIoT approach causes a significant delay of up to 5 s. The proposed work has latency of 1 second in an environment of fifty packages per second, and it is much less latency than the EIR-CIoT approach. In addition, the EIR-CIoT approach is narrowly focused on RSS-based routing at the expense of other crucial factors. But with the help of authentication, appropriate CH selection, routing, and packet validation at intermediate nodes, the suggested approach improves the network’s overall performance. As a result, the proposed project achieves a shorter duration of execution than that of similar studies.

4.1.4. Impact of Packet Delivery Ratio

It is the fraction of a source node’s packets that reach its associated CH node. The PDR, or packet delivery rate, is calculated as
P D R = N S N R
The percentage of packets effectively delivered to the target node is known as the delivery success ratio. When the data are sent via the best possible route, this proportion increases. Figure 10 shows a comparison between the success rates of the suggested method and those of the existing studies. According to the results, the suggested work has a better delivery success percentage than the existing literature. The proportion of successful deliveries drops as the amount of nodes grows. This is because of the sheer volume of data packets being sent to the network when a big number of nodes is present. As the number of nodes increases, the percentage of successful deliveries decreases across all the works. While the delivery ratio drops by 40% as the number of nodes grows in EIR-CIoT, it drops by only 9% in the proposed work. This study demonstrates that the suggested approach may be scaled to a high number of sites without experiencing any loss of data.

4.1.5. Impact of Network Lifetime

The effectiveness of the suggested method may be measured, in part, by looking at how long a network lasts. If the network’s energy usage is low, this measure is high.
N L = E 0 E [ U U ] P + δ E R e p
where E 0 is the starting power used by all sensing nodes; E[UU] is the power that is anticipated to be wasted; and E[Rep] is the power that is expected to be used for reporting, and it is the typical reporting frequency of sensors. The longevity of a network may be quantified in terms of either time or rounds. The comparison of network lifetime is shown in Figure 11. Based on these findings, it seems that the suggested interoperable AI-IoMT strategy extends the lifespan of networks, as their sizes grow. In an area of 50 nodes, the network lifespan with the proposed work is 6000 s, and it is much longer than the previous efforts. As a result, the suggested approach avoids the premature death of nodes and uses less power. While the computational burden does impact the network lifespan, previous techniques such as EIR-CIoT and BDCS-IoMT demonstrate large variations in network lifetime.
The false-positive rate of the proposed method refers to the rate at which the incorrect data are mistakenly identified and removed from the network, and it serves as a measure of its effectiveness in ensuring data accuracy.
A comparison of the effectiveness of the planned and the existing works is shown in Table 4. Throughput, energy consumption, latency, packet delivery ratio, and network longevity are only a few of the metrics that are dominated by the suggested interoperable AI-IoMT solution. The proposed AI-powered method is used for interoperable and secure data collection and routing in the multivariate Industrial IoT. In this process, the obtained throughput is 35% greater than that of EIR-CIoT and 23% greater than that of the BDCS-IoMT approach. The proposed lightweight AI algorithms are suitable for environment-based data collection and transmission. The presented time-dependent consensus (TDC) model can replace PoW and PoS in blockchain technology.
Table 4 provides a comparison between the suggested method and the existing approaches in terms of performance metrics for fault data prediction and incorrect information transfer scenarios in the Internet of Medical Things (IoMT) context. The suggested method (BDCS-IoMT) offers improved throughput, lower energy consumption, reduced delay, higher packet delivery ratio, and extended network lifetime compared with the existing method (EIR-CIoT).
Ensuring the privacy of patient data in an Internet of Medical Things (IoMT) environment is crucial, as flaws in traditional AI systems can expose sensitive information. The comparison of nodes versus security is shown in Figure 12.This research tackles the challenges of energy consumption, latency, throughput, packet delivery ratio, and network longevity in the IoMT setting, and it aims to improve the overall system efficiency and performance.
The developed approach’s performance in terms of compression and computing efficiency could be further improved by including event-driven tools and prospective optimization algorithms [37,38,39]. The integration of these tools could be investigated in the future.

5. Conclusions

Devices in the IoMT environment should possess smooth connectivity and interoperability to achieve maximal efficacy in industrial applications. Moreover, security is also an important aspect to be considered in industrial data. In this paper, both security and interoperability have been achieved in the IoMT environment. Initially, the authentication of IoMT devices is carried out, and the devices are authenticated by the gateway. The clustering of devices is carried out to reduce the energy consumption of the devices, and cluster head selection is performed using the zSlices Triune Fuzzy Sets algorithm based on significant factors. Environmental monitoring is executed to facilitate the effective collection of data by the cluster head (CH), which facilitates interoperability among the devices. The collected data are further examined for correctness using Ten-Fold Cross Entropy Verification (TCEV) in which only the correct data are allowed to transmit to the cloud server. The security of correct data is ensured by implementing Twine-LiteNet, with which the consumption of time for encryption is reduced by operating in parallel mode. The routing of encrypted data to the cloud is performed using the Search and Rescue Optimization algorithm (SRO), and it is performed based on four significant factors. Compared with the counterparts, the suggested technique achieves a 20% improvement in throughput, a 15% reduction in packet drop rate (PDR), and a 35% increase in network lifespan. Furthermore, it achieves around 10% reduction in both the amount of energy used and the amount of latency. In the future, exploring the integration of blockchain technology for enhanced data immutability and privacy, along with investigating the potential of federated learning techniques to further optimize collaborative data analysis and model training, holds promising prospects for advancing the proposed method.

Author Contributions

Conceptualization, E.V.D.S., K.S. and S.M.Q.; methodology, E.V.D.S., K.S. and S.M.Q.; implementation, E.V.D.S.; validation, K.S., S.M.Q. and P.P.; investigation, E.V.D.S., K.S. and S.M.Q.; resources, K.S., S.M.Q. and P.P.; writing—original draft preparation, E.V.D.S. and K.S.; writing—review and editing, S.M.Q. and P.P.; visualization, E.V.D.S. and K.S.; supervision, K.S. and S.M.Q.; project administration, K.S., S.M.Q. and P.P.; funding acquisition, S.M.Q. and P.P. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data is contained within the article.

Acknowledgments

This work is technically supported by the Ramco Institute of Technology, Vellore Institute of Technology, Effat University, CESI LINEACT, Cracow University of Technology, and Polish Academy of Sciences. The authors are thankful to the Effat University, Cracow University of Technology and Polish Academy of Sciences for financially supporting this paper.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Ahmed, A.; Kleiner, M.; Roucoules, L. Model-Based Interoperability IoT Hub for the Supervision of Smart Gas Distribution Networks. IEEE Syst. J. 2019, 13, 1526–1533. [Google Scholar] [CrossRef]
  2. Chen, S.; Wang, Z.; Zhang, H.; Yang, G.; Wang, K. Fog-based Optimized Kronecker-Supported Compression Design for Industrial IoT. IEEE Trans. Sustain. Comput. 2020, 5, 95–106. [Google Scholar] [CrossRef]
  3. Ray, P.; Thapa, N.; Dash, D. Implementation and Performance Analysis of Interoperable and Heterogeneous IoT-Edge Gateway for Pervasive Wellness Care. IEEE Trans. Consum. Electron. 2019, 65, 464–473. [Google Scholar] [CrossRef]
  4. Jaleel, A.; Mahmood, T.; Hassan, M.; Bano, G.; Khurshid, S.K. Towards Medical Data Interoperability Through Collaboration of Healthcare Devices. IEEE Access 2020, 8, 132302–132319. [Google Scholar] [CrossRef]
  5. Jiang, D.; Wang, Y.; Lv, Z.; Wang, W.; Wang, H. An Energy-Efficient Networking Approach in Cloud Services for IIoT Networks. IEEE J. Sel. Areas Commun. 2020, 38, 928–941. [Google Scholar] [CrossRef]
  6. Wang, J.; Jiang, C.; Zhang, K.; Hou, X.; Ren, Y.; Qian, Y. Distributed Q-Learning Aided Heterogeneous Network Association for Energy-Efficient IIoT. IEEE Trans. Ind. Inform. 2020, 16, 2756–2764. [Google Scholar] [CrossRef]
  7. Awan, K.A.; Din, I.U.; Almogren, A.S.; Guizani, M.; Khan, S. StabTrust—A Stable and Centralized Trust-Based Clustering Mechanism for IoT Enabled Vehicular Ad-Hoc Networks. IEEE Access 2020, 8, 21159–21177. [Google Scholar] [CrossRef]
  8. Alami, H.E.; Najid, A. ECH: An Enhanced Clustering Hierarchy Approach to Maximize Lifetime of Wireless Sensor Networks. IEEE Access 2020, 7, 107142–107153. [Google Scholar] [CrossRef]
  9. Yu, R.; Xue, G.; Zhang, X. Provisioning QoS-Aware and Robust Applications in Internet of Things: A Network Perspective. IEEE/ACM Trans. Netw. 2019, 27, 1931–1944. [Google Scholar] [CrossRef]
  10. Viriyasitavat, W.; Xu, L.D.; Bi, Z.; Hoonsopon, D.; Charoenruk, N. Managing QoS of Internet-of-Things Services Using Blockchain. IEEE Trans. Comput. Soc. Syst. 2019, 6, 1357–1368. [Google Scholar] [CrossRef]
  11. Memon, R.A.; Li, J.; Nazeer, M.I.; Khan, A.; Ahmed, J. DualFog-IoT: Additional Fog Layer for Solving Blockchain Integration Problem in Internet of Things. IEEE Access 2019, 7, 169073–169093. [Google Scholar] [CrossRef]
  12. Zheng, J.; Dong, X.; Liu, Q.; Zhu, X.; Tong, W. Blockchain-based secure digital asset exchange scheme with QoS-aware incentive mechanism. In Proceedings of the 2019 IEEE 20th International Conference on High Performance Switching and Routing (HPSR), Xi’an, China, 26–29 May 2019; IEEE: New York, NY, USA, 2019; pp. 1–6. [Google Scholar]
  13. Kafle, V.P.; Muktadir, A.H. Intelligent and Agile Control of Edge Resources for Latency-Sensitive IoT Services. IEEE Access 2019, 8, 207991–208002. [Google Scholar] [CrossRef]
  14. Zhou, Z.; Yu, S.; Chen, W.; Chen, X. CE-IoT: Cost-Effective Cloud-Edge Resource Provisioning for Heterogeneous IoT Applications. IEEE Internet Things J. 2020, 7, 8600–8614. [Google Scholar] [CrossRef]
  15. Xu, G.; Zhao, Y.; Jiao, L.; Feng, M.; Ji, Z.; Panaousis, E.; Chen, S.; Zheng, X. TT-SVD: An Efficient Sparse Decision Making Model with Two-way Trust Recommendation in the AI Enabled IoT Systems. IEEE Internet Things J. 2020, 8, 9559–9567. [Google Scholar] [CrossRef]
  16. Firouzi, F.; Farahani, B.; Barzegari, M.; Daneshmand, M. AI-Driven Data Monetization: The other Face of Data in IoT-based Smart and Connected Health. IEEE Internet Things J. 2019, 9, 5581–5599. [Google Scholar] [CrossRef]
  17. Lin, X.; Li, J.; Wu, J.; Liang, H.; Yang, W. Making Knowledge Tradable in Edge-AI Enabled IoT: A Consortium Blockchain-Based Efficient and Incentive Approach. IEEE Trans. Ind. Inform. 2019, 15, 6367–6378. [Google Scholar] [CrossRef]
  18. García-Magariño, I.; Muttukrishnan, R.; Lloret, J. Human-Centric AI for Trustworthy IoT Systems with Explainable Multilayer Perceptrons. IEEE Access 2019, 7, 125562–125574. [Google Scholar] [CrossRef]
  19. Shen, M.; Tang, X.; Zhu, L.; Du, X.; Guizani, M. Privacy-Preserving Support Vector Machine Training Over Blockchain-Based Encrypted IoT Data in Smart Cities. IEEE Internet Things J. 2019, 6, 7702–7712. [Google Scholar] [CrossRef]
  20. Poloju, N.; Rajaram, A. Data mining techniques for patients healthcare analysis during COVID-19 pandemic conditions. J. Environ. Prot. Ecol. 2022, 23, 2105–2112. [Google Scholar]
  21. Kalaivani, K.; Kshirsagarr, P.R.; Sirisha Devi, J.; Bandela, S.R.; Colak, I.; Nageswara Rao, J.; Rajaram, A. Prediction of biomedical signals using deep learning techniques. J. Intell. Fuzzy Syst. 2023, preprint. [Google Scholar] [CrossRef]
  22. Andrew, J.; Mathew, S.S.; Mohit, B. A comprehensive analysis of privacy-preserving techniques in deep learning based disease prediction systems. J. Phys. Conf. Ser. 2019, 1362, 012070. [Google Scholar] [CrossRef]
  23. Haseeb, K.; Abbas, N.; Saleem, M.Q.; Sheta, O.E.; Awan, K.; Islam, N. RCER: Reliable Cluster-based Energy-aware Routing protocol for heterogeneous Wireless Sensor Networks. PLoS ONE 2019, 14, e0222009. [Google Scholar]
  24. Thangaramya, K.; Kulothungan, K.; Logambigai, R.; Selvi, M.; Ganapathy, S.; Kannan, A. Energy Aware Cluster and Neuro-Fuzzy Based Routing Algorithm for Wireless Sensor Networks in IoT. Comput. Netw. 2019, 151, 211–223. [Google Scholar] [CrossRef]
  25. Verma, S.; Sood, N.; Sharma, A.K. Genetic Algorithm-based Optimized Cluster Head selection for single and multiple data sinks in Heterogeneous Wireless Sensor Network. Appl. Soft Comput. 2019, 85, 105788. [Google Scholar] [CrossRef]
  26. Xiang, X.; Liu, W.; Wang, T.; Xie, M.; Li, X.; Song, H.; Liu, A.; Zhang, G. Delay and energy-efficient data collection scheme-based matrix filling theory for dynamic traffic IoT. EURASIP J. Wirel. Commun. Netw. 2019, 2019, 168. [Google Scholar] [CrossRef]
  27. Zeng, M.; Huang, X.; Zheng, B.; Fan, X. A Heterogeneous Energy Wireless Sensor Network Clustering Protocol. Wirel. Commun. Mob. Comput. 2019, 2019, 7367281. [Google Scholar] [CrossRef]
  28. Zhao, S.; Li, S.; Yao, Y. Blockchain Enabled Industrial Internet of Things Technology. IEEE Trans. Comput. Soc. Syst. 2019, 6, 1442–1453. [Google Scholar] [CrossRef]
  29. Jang, J.; Jung, I.; Park, J.H. An effective handling of secure data stream in IoT. Appl. Soft Comput. 2018, 68, 811–820. [Google Scholar] [CrossRef]
  30. Liu, Y.N.; Wang, Y.P.; Wang, X.F.; Xia, Z.; Xu, J.F. Privacy-preserving raw data collection without a trusted authority for IoT. Computer Networks. Comput. Netw. 2018, 148, 340–348. [Google Scholar] [CrossRef]
  31. Nawaratne, R.; Alahakoon, D.; De Silva, D.; Chhetri, P.; Chilamkurti, N. Self-evolving intelligent algorithms for facilitating data interoperability in IoT environments. Future Gener. Comput. Syst. 2018, 86, 421–432. [Google Scholar] [CrossRef]
  32. Mohanty, S.N.; Ramya, K.C.; Rani, S.S.; Gupta, D.; Shankar, K.; Lakshmanaprabu, S.K.; Khanna, A. An efficient Lightweight integrated Blockchain (ELIB) model for IoT security and privacy. Future Gener. Comput. Syst. 2020, 102, 1027–1037. [Google Scholar] [CrossRef]
  33. Mughal, M.A.; Shi, P.; Ullah, A.; Mahmood, K.; Abid, M.; Luo, X. Logical Tree Based Secure Rekeying Management for Smart Devices Groups in IoT Enabled WSN. IEEE Access 2019, 7, 76699–76711. [Google Scholar] [CrossRef]
  34. Iqbal, A.; Ullah, F.; Anwar, H.; Kwak, K.S.; Imran, M.; Jamal, W.; ur Rahman, A. Interoperable Internet-of-Things platform for smart home system using Web-of-Objects and cloud. Sustain. Cities Soc. 2018, 38, 636–646. [Google Scholar] [CrossRef]
  35. Abbasi, M.A.; Memon, Z.A.; Durrani, N.M.; Haider, W.; Laeeq, K.; Mallah, G.A. A multi-layer trust-based middleware framework for handling interoperability issues in heterogeneous IoTs. Clust. Comput. 2021, 24, 2133–2160. [Google Scholar] [CrossRef]
  36. Abou-Nassar, E.M.; Iliyasu, A.M.; El-Kafrawy, P.M.; Song, O.Y.; Bashir, A.K.; Abd El-Latif, A.A. DITrust chain: Towards blockchain-based trust models for sustainable healthcare IoT systems. IEEE Access 2020, 8, 111223–111238. [Google Scholar] [CrossRef]
  37. Qaisar, S.M.; Khan, S.I.; Srinivasan, K.; Krichen, M. Arrhythmia classification using multirate processing metaheuristic optimization and variational mode decomposition. J. King Saud Univ. Comput. Inf. Sci. 2023, 35, 26–37. [Google Scholar]
  38. Qaisar, S.M.; Aljefri, R. Event-driven time-domain elucidation of the power quality disturbances. Procedia Comput. Sci. 2020, 168, 217–223. [Google Scholar] [CrossRef]
  39. Qaisar, S.M. Efficient mobile systems based on adaptive rate signal processing. Comput. Electr. Eng. 2019, 79, 106462. [Google Scholar] [CrossRef]
Figure 1. Overall flow chart.
Figure 1. Overall flow chart.
Sensors 23 07474 g001
Figure 2. System model.
Figure 2. System model.
Sensors 23 07474 g002
Figure 3. zSlices Fuzzy Sets algorithm.
Figure 3. zSlices Fuzzy Sets algorithm.
Sensors 23 07474 g003
Figure 4. (a) HMM, (b) time-series state prediction, and (c) data readings for sensor nodes.
Figure 4. (a) HMM, (b) time-series state prediction, and (c) data readings for sensor nodes.
Sensors 23 07474 g004aSensors 23 07474 g004b
Figure 5. LiteNet with Twine Mode.
Figure 5. LiteNet with Twine Mode.
Sensors 23 07474 g005
Figure 6. Many nodes vs. throughput.
Figure 6. Many nodes vs. throughput.
Sensors 23 07474 g006
Figure 7. Number of nodes vs. energy consumption.
Figure 7. Number of nodes vs. energy consumption.
Sensors 23 07474 g007
Figure 8. Simulation rounds vs. energy consumption.
Figure 8. Simulation rounds vs. energy consumption.
Sensors 23 07474 g008
Figure 9. Packets per second vs. delay.
Figure 9. Packets per second vs. delay.
Sensors 23 07474 g009
Figure 10. Number of nodes vs. packet delivery ratio.
Figure 10. Number of nodes vs. packet delivery ratio.
Sensors 23 07474 g010
Figure 11. Number of nodes vs. network lifetime.
Figure 11. Number of nodes vs. network lifetime.
Sensors 23 07474 g011
Figure 12. Number of nodes vs. security.
Figure 12. Number of nodes vs. security.
Sensors 23 07474 g012
Table 1. The Fuzzy Rules.
Table 1. The Fuzzy Rules.
F1F2F3F4F5F6CH
LowLowLowLowLowLowNo
LowLowMediumMediumHighMediumYes
LowMediumHighHighMediumHighYes
LowHighMediumHighLowHighYes
LowLowLowLowMediumLowNo
LowMediumLowHighHighHighYes
MediumMediumLowLowMediumHighYes
MediumLowMediumHighHighHighYes
MediumLowLowLowLowLowNo
MediumHighMediumLowLowLowNo
MediumHighHighMediumHighMediumYes
MediumLow MediumLowLowMediumNo
HighHighHighHighHighHighYes
HighLowLowLowLowLowNo
HighHighMediumMediumLowMediumYes
HighHighLowMediumMediumHighYes
HighLowMediumLowHigh LowNo
HighLowMediumLowLowLowNo
Table 2. Shuffle and hexadecimal values of S-box.
Table 2. Shuffle and hexadecimal values of S-box.
Shuffle Values of BlockHexadecimal Values of S-Box
j ρ [ j ] ρ 1 [ j ] yS(y)
0510C
10210
21112F
3463A
47342
51205B
63969
78475
813788
961093
10913AD
11214B7
12155C1
13108DE
141115E6
151412F4
Table 3. Simulation parameters.
Table 3. Simulation parameters.
ParameterValue
Imitation zone 1000 × 1000 m
Quantity of radar node100
DeploymentRandom
MAC layerIEEE 802.15.4
Control message 20 bits
Original oomph of node750 J
Packet amount400
Retransmission amount7 (Max)
Size of packet12 KB
Interval of packet10 µS
Communication range in sensor200 m
Rate of data88 Mbps (Max)
Slots amount16
Slot period10 µS
SRO S E 0.05
M U 70 D
R5
Number of iterations100
Number of rounds100
Simulation time100 s
Table 4. Performance analysis.
Table 4. Performance analysis.
PerformanceEIR-CIoTBDCS-IoMTScenario-1Scenario-2
Throughput (Kbps) 307 ± 5.0 346.4 ± 3.0 464 ± 1.0 530 ± 1.0
Energy consumption (J)Number of nodes 0.384 ± 0.05 0.356 ± 0.03 0.322 ± 0.01 0.162 ± 0.01
Simulation rounds 30.33 ± 1.5 28.166 ± 1.0 25.833 ± 0.5 12.5 ± 0.5
Delay (s) 3.6 ± 0.5 3.41 ± 0.3 2.61 ± 0.1 1.8 ± 0.01
Packet delivery ratio (%) 59.8 ± 1.5 61.6 ± 1.0 78 ± 0.5 89.4 ± 0.5
Network lifetime (s) 2224 ± 5.0 2561.8 ± 3.0 4620 ± 1.0 5700 ± 1.0
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Subramaniam, E.V.D.; Srinivasan, K.; Qaisar, S.M.; Pławiak, P. Interoperable IoMT Approach for Remote Diagnosis with Privacy-Preservation Perspective in Edge Systems. Sensors 2023, 23, 7474. https://doi.org/10.3390/s23177474

AMA Style

Subramaniam EVD, Srinivasan K, Qaisar SM, Pławiak P. Interoperable IoMT Approach for Remote Diagnosis with Privacy-Preservation Perspective in Edge Systems. Sensors. 2023; 23(17):7474. https://doi.org/10.3390/s23177474

Chicago/Turabian Style

Subramaniam, Erana Veerappa Dinesh, Kathiravan Srinivasan, Saeed Mian Qaisar, and Paweł Pławiak. 2023. "Interoperable IoMT Approach for Remote Diagnosis with Privacy-Preservation Perspective in Edge Systems" Sensors 23, no. 17: 7474. https://doi.org/10.3390/s23177474

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop