<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.1 20151215//EN" "http://jats.nlm.nih.gov/publishing/1.1/JATS-journalpublishing1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" xml:lang="en" article-type="research-article" dtd-version="1.1">
<front>
<journal-meta>
<journal-id journal-id-type="pmc">CMC</journal-id>
<journal-id journal-id-type="nlm-ta">CMC</journal-id>
<journal-id journal-id-type="publisher-id">CMC</journal-id>
<journal-title-group>
<journal-title>Computers, Materials &#x0026; Continua</journal-title>
</journal-title-group>
<issn pub-type="epub">1546-2226</issn>
<issn pub-type="ppub">1546-2218</issn>
<publisher>
<publisher-name>Tech Science Press</publisher-name>
<publisher-loc>USA</publisher-loc>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">63077</article-id>
<article-id pub-id-type="doi">10.32604/cmc.2025.063077</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Article</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>Integrating Edge Intelligence with Blockchain-Driven Secured IoT Healthcare Optimization Model</article-title>
<alt-title alt-title-type="left-running-head">Integrating Edge Intelligence with Blockchain-Driven Secured IoT Healthcare Optimization Model</alt-title>
<alt-title alt-title-type="right-running-head">Integrating Edge Intelligence with Blockchain-Driven Secured IoT Healthcare Optimization Model</alt-title>
</title-group>
<contrib-group>
<contrib id="author-1" contrib-type="author">
<name name-style="western"><surname>Alshudukhi</surname><given-names>Khulud Salem</given-names></name><xref ref-type="aff" rid="aff-1">1</xref></contrib>
<contrib id="author-2" contrib-type="author" corresp="yes">
<name name-style="western"><surname>Humayun</surname><given-names>Mamoona</given-names></name><xref ref-type="aff" rid="aff-2">2</xref><email>mamoona.humayun@roehampton.ac.uk</email></contrib>
<contrib id="author-3" contrib-type="author">
<name name-style="western"><surname>Alwakid</surname><given-names>Ghadah Naif</given-names></name><xref ref-type="aff" rid="aff-1">1</xref></contrib>
<aff id="aff-1"><label>1</label><institution>Department of Computer Science, College of Computer and Information Sciences, Jouf University</institution>, <addr-line>Sakaka, 72388</addr-line>, <country>Saudi Arabia</country></aff>
<aff id="aff-2"><label>2</label><institution>Department of Computing, School of Arts Humanities and Social Sciences, University of Roehampton</institution>, <addr-line>London, SW15 5PH</addr-line>, <country>UK</country></aff>
</contrib-group>
<author-notes>
<corresp id="cor1"><label>&#x002A;</label>Corresponding Author: Mamoona Humayun. Email: <email>mamoona.humayun@roehampton.ac.uk</email></corresp>
</author-notes>
<pub-date date-type="collection" publication-format="electronic">
<year>2025</year>
</pub-date>
<pub-date date-type="pub" publication-format="electronic">
<day>16</day><month>04</month><year>2025</year>
</pub-date>
<volume>83</volume>
<issue>2</issue>
<fpage>1973</fpage>
<lpage>1986</lpage>
<history>
<date date-type="received">
<day>04</day>
<month>1</month>
<year>2025</year>
</date>
<date date-type="accepted">
<day>27</day>
<month>2</month>
<year>2025</year>
</date>
</history>
<permissions>
<copyright-statement>&#x00A9; 2025 The Authors.</copyright-statement>
<copyright-year>2025</copyright-year>
<copyright-holder>Published by Tech Science Press.</copyright-holder>
<license xlink:href="https://creativecommons.org/licenses/by/4.0/">
<license-p>This work is licensed under a <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution 4.0 International License</ext-link>, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.</license-p>
</license>
</permissions>
<self-uri content-type="pdf" xlink:href="TSP_CMC_63077.pdf"></self-uri>
<abstract>
<p>The Internet of Things (IoT) and edge computing have substantially contributed to the development and growth of smart cities. It handled time-constrained services and mobile devices to capture the observing environment for surveillance applications. These systems are composed of wireless cameras, digital devices, and tiny sensors to facilitate the operations of crucial healthcare services. Recently, many interactive applications have been proposed, including integrating intelligent systems to handle data processing and enable dynamic communication functionalities for crucial IoT services. Nonetheless, most solutions lack optimizing relaying methods and impose excessive overheads for maintaining devices&#x2019; connectivity. Alternatively, data integrity and trust are another vital consideration for next-generation networks. This research proposed a load-balanced trusted surveillance routing model with collaborative decisions at network edges to enhance energy management and resource balancing. It leverages graph-based optimization to enable reliable analysis of decision-making parameters. Furthermore, mobile devices integrate with the proposed model to sustain trusted routes with lightweight privacy-preserving and authentication. The proposed model analyzed its performance results in a simulation-based environment and illustrated an exceptional improvement in packet loss ratio, energy consumption, detection anomaly, and blockchain overhead than related solutions.</p>
</abstract>
<kwd-group kwd-group-type="author">
<kwd>Smart cities</kwd>
<kwd>load balancing</kwd>
<kwd>blockchain</kwd>
<kwd>health systems</kwd>
<kwd>edge computing</kwd>
</kwd-group>
<funding-group>
<award-group id="awg1">
<funding-source>Deanship of Graduate Studies and Scientific Research at Jouf University</funding-source>
<award-id>DGSSR-2024-02-02090</award-id>
</award-group>
</funding-group>
</article-meta>
</front>
<body>
<sec id="s1">
<label>1</label>
<title>Introduction</title>
<p>The rapid development of smart cities using edge technologies brings forth a demand for managing IoT data and critical operations in real-time systems [<xref ref-type="bibr" rid="ref-1">1</xref>,<xref ref-type="bibr" rid="ref-2">2</xref>]. Wireless systems and next-generation IoT are combined in different ways for significant growth in healthcare systems [<xref ref-type="bibr" rid="ref-3">3</xref>,<xref ref-type="bibr" rid="ref-4">4</xref>]. Future sensing technologies [<xref ref-type="bibr" rid="ref-5">5</xref>,<xref ref-type="bibr" rid="ref-6">6</xref>] with IoT systems observe the targeted areas and ease the rapid data analysis for health operations [<xref ref-type="bibr" rid="ref-7">7</xref>,<xref ref-type="bibr" rid="ref-8">8</xref>]. Cloud-centric data processing models have struggled to meet such applications&#x2019; dynamics, especially when balancing scalability with sustainability [<xref ref-type="bibr" rid="ref-9">9</xref>,<xref ref-type="bibr" rid="ref-10">10</xref>]. Despite advancements, several IoT-based healthcare applications rely on centralized cloud storage, vulnerable and ineffective for data breaches [<xref ref-type="bibr" rid="ref-11">11</xref>,<xref ref-type="bibr" rid="ref-12">12</xref>]. These systems often lack resilience and scalability research issues for large-scale architecture [<xref ref-type="bibr" rid="ref-13">13</xref>,<xref ref-type="bibr" rid="ref-14">14</xref>]. Consequently, due to the demands of end users, there is an increasing shift toward distributed architectures for healthcare systems with edge computing to ensure continuity and fault-tolerant communication [<xref ref-type="bibr" rid="ref-15">15</xref>&#x2013;<xref ref-type="bibr" rid="ref-17">17</xref>]. In addition, establishing trust between constrained devices is another significant way to attain a reliable monitoring system and resource optimization. In smart cities, enhancing security is crucial for avoiding malicious traffic and preventing unauthorized access to sensitive data [<xref ref-type="bibr" rid="ref-18">18</xref>,<xref ref-type="bibr" rid="ref-19">19</xref>]. It can compromise the network infrastructure and disrupt essential services, thus adapting robust and secured measurement promotes resilient communication against attacks to guarantee a trustworthy environment [<xref ref-type="bibr" rid="ref-20">20</xref>,<xref ref-type="bibr" rid="ref-21">21</xref>]. The contributions of the proposed model are highlighted as follows:
<list list-type="roman-lower">
<list-item>
<p>It investigated stochastic routing techniques with multiple factors and network uncertainties to develop a recursive decision-making system for network optimization.</p></list-item>
<list-item>
<p>It probed the blockchain transactions and intelligence of edges, with the lightweight role of validators for e-health data and effective communication cost.</p></list-item>
<list-item>
<p>Designed a cooperative-driven trusted scheme for increasing the consistency and fault tolerance of connected e-health devices.</p></list-item>
</list></p>
<p>The research work is structured as follows. <xref ref-type="sec" rid="s2">Section 2</xref> presents related work. The proposed model is described in <xref ref-type="sec" rid="s3">Section 3</xref>. <xref ref-type="sec" rid="s4">Section 4</xref> provides performance results. In the end, <xref ref-type="sec" rid="s5">Section 5</xref> concludes this research work.</p>
</sec>
<sec id="s2">
<label>2</label>
<title>Related Work</title>
<p>Edge computing with IoT systems has performed a crucial role in the growth of smart cities and sustainable development [<xref ref-type="bibr" rid="ref-22">22</xref>,<xref ref-type="bibr" rid="ref-23">23</xref>]. It enables seamless and timely interaction between wireless technologies by utilizing gateway devices and ensuring efficient communication in a real-time environment [<xref ref-type="bibr" rid="ref-24">24</xref>,<xref ref-type="bibr" rid="ref-25">25</xref>]. The rapid evolution of edge-driven processing systems, and autonomous IoT networks facilitate and support dynamic data analysis with learning techniques [<xref ref-type="bibr" rid="ref-26">26</xref>&#x2013;<xref ref-type="bibr" rid="ref-28">28</xref>]. The environment continues monitoring the targeted data and forwards it to the cloud users based on their demands to attain a real-time surveillance system. The authors in [<xref ref-type="bibr" rid="ref-29">29</xref>] proposed an IoT network architecture for energy vehicles (EV) by using a data fusion technique based on fuzzy logic. The proposed data fusion algorithm considers human input from the crowd and sensory data and computes the location-specific congestion. Moreover, an open source routing (OSRM) determines the shortest congestion-aware route by reacting to the collected real-time traffic updates. Based on fuzzy logic, authors [<xref ref-type="bibr" rid="ref-30">30</xref>] developed a Trusted Routing Protocol for Vehicular Cloud Networks (FTRP), which constructs the protected paths for the delivery of data. A node candidacy value is computed using fuzzy logic and accordingly route is either selected or rejected. Cloud assigns a confidence score to each node based on the information it obtained from other nodes. In addition to analyzing multiple factors, the proposed approach computes the trust for selecting a secure route. A novel blockchain-based framework is proposed in [<xref ref-type="bibr" rid="ref-31">31</xref>] to guarantee data security and integrity for IoT systems. It comprised various phases and integrated with diverse security mechanisms for robust security in terms of privacy and data integrity. The experimental analysis of the proposed SecPrivPreserve revealed that its performance improved than existing studies. Authors [<xref ref-type="bibr" rid="ref-32">32</xref>] introduced an intelligent approach to determine the set of optimal border nodes by exploring the Lion Swarm Optimization algorithm (LSOA). The network area is divided into clusters and determines the set of border nodes within each cluster and associated inter-cluster communication. The main factors for finding the optimal border nodes are maximum energy and minimum distance. Later, a routing mechanism is generated based on the selection of optimal border nodes. Fuzzy logic-based secure hierarchical routing scheme is proposed [<xref ref-type="bibr" rid="ref-33">33</xref>] by utilizing the firefly algorithm (FSRF). It is developed for IoT-based healthcare systems and is composed of three main frameworks. To evaluate the trust, a fuzzy logic-based trust framework is presented that tackles with different routing attacks. In addition, using various metrics, the proposed framework supports the clustering of IoT devices and identifies the effective cluster head nodes. Moreover, FSRF provides an on-demand routing framework to attain consistent and energy-efficient routes for data transmission. Authors [<xref ref-type="bibr" rid="ref-34">34</xref>] integrate software-defined networking (SDN) and blockchain technology to cope with energy efficiency and security research obstacles. Consequently, a novel energy protocol combined with a cluster structure was proposed to develop a secure and blockchain-enabled SDN controller architecture for IoT networks. Because it uses public and private blockchains for peer-to-peer (P2P) communication between IoT devices and SDN controllers, eliminating Proof-of-Work, the distributed trust architecture is suitable for resource-constrained IoT devices. Authors [<xref ref-type="bibr" rid="ref-35">35</xref>] proposed a security strategy for the detection and prevention of forwarding attacks from healthcare IoT systems, and composed of five phases. Initially, a topology is developed for finding the cluster heads and discovering the best route. In addition, to identify the selective forwarding attacks, the proposed solution performed packet validation based on the details of transmitted and received packets. <xref ref-type="table" rid="table-1">Table 1</xref> presents a benchmarking comparison of existing solutions alongside our proposed model.</p>
<table-wrap id="table-1">
<label>Table 1</label>
<caption>
<title>Benchmarking of existing solutions and proposed model</title>
</caption>
<table>
<colgroup>
<col/>
<col align="center"/>
</colgroup>
<thead>
<tr>
<th colspan="2">Highlighted discussion</th>
</tr>
</thead>
<tbody>
<tr>
<td><bold>Related work</bold></td>
<td>Healthcare applications face critical research challenges for real-time data analysis and processing. These challenges include the need for network optimization, scaling IoT systems with minimal overhead, and ensuring data trust between constrained healthcare devices by using adaptive wireless technologies. Sustainable development demands scalable and dynamic routing solutions to balance network traffic in e-health systems, reducing network emissions. Additionally, reliable solutions must incorporate appropriate security policies to ensure protected and authentic data sharing while developing a resilient and fault-tolerant healthcare system.</td>
</tr>
<tr>
<td><bold>Proposed model</bold></td>
<td>Unlike most of the existing work, our proposed methodology is composed of optimized stochastic techniques with multiple IoT healthcare systems. The generated decisions provide intelligence for constraint devices and also validate the health data before central computing. Integrated blockchain technology offers a trusted and reliable connection between e-health devices.</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="s3">
<label>3</label>
<title>Proposed Model</title>
<p>This section proposes a model for addressing the research challenges that are demanded in healthcare IoT applications. Our proposed model introduces resource optimization, enhancement in healthcare security, and lightweight processing of real-time data using intelligence of network edges. The following subsections describe the flow of the proposed model.</p>
<sec id="s3_1">
<label>3.1</label>
<title>Overview and Workflow</title>
<p>The proposed model is composed of data preprocessing, blockchain-integrated security, and optimized trusted communication stages. All stages have their contribution to the development of smart healthcare systems using IoT systems.
<list list-type="roman-lower">
<list-item>
<p>Firstly, the main roles are provided by health sensors and edge nodes. Health sensors collect real-time patient data and send it to the nearest edge node. When received, edge nodes preprocess and lightweight artificial intelligence analytics are used to detect anomalies. Based on some routing metrics, the proposed model aggregates the data on a priority basis.</p></list-item>
<list-item>
<p>Secondly, blockchain transactions are established by exploring preprocessed data, and edge devices perform the role of data validation. After the data verification, it is securely transmitted among smart contracts.</p></list-item>
<list-item>
<p>In the end, optimal routes are determined with the support of stochastic models, as a result, the proposed healthcare model decreases the usage of energy consumption and enhances consistency. In addition, using multi-factors, trust scores are also computed to maximize reliability and efficiency for medical devices.</p></list-item>
</list></p>
<p><xref ref-type="fig" rid="fig-1">Fig. 1</xref> depicts the Sequential Stages of the proposed healthcare model using Blockchain-Enabled edge intelligence. It highlights the step-by-step interaction of processes to guarantee trusted, efficient, and optimized data management for healthcare applications. Moreover, the proposed model emphasizes the smooth coordination between network edges and blockchain nodes for attaining real-time and crucial healthcare services.</p>
<fig id="fig-1">
<label>Figure 1</label>
<caption>
<title>Sequential stages of the proposed healthcare blockchain&#x002013;enabled edge intelligence model</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_63077-fig-1.tif"/>
</fig>
</sec>
<sec id="s3_2">
<label>3.2</label>
<title>Blockchain Integrated Scalable and Secured IoT-Healthcare</title>
<p>the proposed model is structured in the form of a weighted graph <inline-formula id="ieqn-1"><mml:math id="mml-ieqn-1"><mml:mi>G</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>V</mml:mi><mml:mo>,</mml:mo><mml:mi>E</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> with vertices <italic>V</italic> and edges <italic>E</italic>, where <italic>V</italic> denotes a set of sensors/edges, and <italic>E</italic> denotes a communication link. Initially, the health sensor <inline-formula id="ieqn-2"><mml:math id="mml-ieqn-2"><mml:msub><mml:mi>h</mml:mi><mml:mi>S</mml:mi></mml:msub></mml:math></inline-formula> senses the patient&#x2019;s data <inline-formula id="ieqn-3"><mml:math id="mml-ieqn-3"><mml:msub><mml:mi>P</mml:mi><mml:mi>d</mml:mi></mml:msub></mml:math></inline-formula> at regular intervals <inline-formula id="ieqn-4"><mml:math id="mml-ieqn-4"><mml:mi>&#x03B1;</mml:mi></mml:math></inline-formula>, as given in <xref ref-type="disp-formula" rid="eqn-1">Eq. (1)</xref>.
<disp-formula id="eqn-1"><label>(1)</label><mml:math id="mml-eqn-1" display="block"><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mi>d</mml:mi></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo stretchy="false">(</mml:mo><mml:mi>&#x03B1;</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:mo fence="false" stretchy="false">{</mml:mo><mml:msub><mml:mi>d</mml:mi><mml:mi>p</mml:mi></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>,</mml:mo><mml:msub><mml:mi>t</mml:mi><mml:mrow><mml:mi>S</mml:mi><mml:mi>t</mml:mi><mml:mi>a</mml:mi><mml:mi>m</mml:mi><mml:mi>p</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>,</mml:mo><mml:msub><mml:mi>P</mml:mi><mml:mrow><mml:mi>S</mml:mi><mml:mi>i</mml:mi><mml:mi>g</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>,</mml:mo><mml:mi>N</mml:mi><mml:mi>c</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo fence="false" stretchy="false">}</mml:mo></mml:mrow></mml:math></disp-formula>where:
<list list-type="bullet">
<list-item>
<p><inline-formula id="ieqn-5"><mml:math id="mml-ieqn-5"><mml:msub><mml:mi>d</mml:mi><mml:mi>p</mml:mi></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula>: Actual health data.</p></list-item>
<list-item>
<p><inline-formula id="ieqn-6"><mml:math id="mml-ieqn-6"><mml:msub><mml:mi>t</mml:mi><mml:mrow><mml:mi>S</mml:mi><mml:mi>t</mml:mi><mml:mi>a</mml:mi><mml:mi>m</mml:mi><mml:mi>p</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula>: Timestamp of data generation.</p></list-item>
<list-item>
<p><inline-formula id="ieqn-7"><mml:math id="mml-ieqn-7"><mml:msub><mml:mi>P</mml:mi><mml:mrow><mml:mi>S</mml:mi><mml:mi>i</mml:mi><mml:mi>g</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula>: Digital signature using private key.</p></list-item>
<list-item>
<p><inline-formula id="ieqn-8"><mml:math id="mml-ieqn-8"><mml:mi>N</mml:mi><mml:mi>c</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula>: Nonce for the uniqueness of healthcare.</p></list-item>
</list></p>
<p>Before data aggregation at edge nodes, each sensor needs to compute its trust factor <inline-formula id="ieqn-9"><mml:math id="mml-ieqn-9"><mml:mi>t</mml:mi><mml:mi>r</mml:mi><mml:mi>t</mml:mi></mml:math></inline-formula> using quality <italic>QL</italic> and reliability <italic>RE</italic> scores, as defined in <xref ref-type="disp-formula" rid="eqn-2">Eq. (2)</xref>. In case, any sensor generates faulty data, then it reflects the trust score and decreases its trustworthiness in the data aggregation process.
<disp-formula id="eqn-2"><label>(2)</label><mml:math id="mml-eqn-2" display="block"><mml:mrow><mml:mi>t</mml:mi><mml:mi>r</mml:mi><mml:mi>t</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:msub><mml:mi>&#x03B2;</mml:mi><mml:mn>1</mml:mn></mml:msub><mml:mo>&#x22C5;</mml:mo><mml:mi>Q</mml:mi><mml:mi>L</mml:mi><mml:mo>+</mml:mo><mml:msub><mml:mi>&#x03B2;</mml:mi><mml:mn>2</mml:mn></mml:msub><mml:mo>&#x22C5;</mml:mo><mml:mi>R</mml:mi><mml:mi>E</mml:mi></mml:mrow></mml:math></disp-formula>where:
<list list-type="bullet">
<list-item>
<p><inline-formula id="ieqn-10"><mml:math id="mml-ieqn-10"><mml:msub><mml:mi>&#x03B2;</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:math></inline-formula> and <inline-formula id="ieqn-11"><mml:math id="mml-ieqn-11"><mml:msub><mml:mi>&#x03B2;</mml:mi><mml:mn>2</mml:mn></mml:msub></mml:math></inline-formula> are weighted factors with uniform contributions.</p></list-item>
<list-item>
<p><italic>QL</italic>: Quality score</p></list-item>
<list-item>
<p><italic>RE</italic>: Reliability score</p></list-item>
</list></p>
<p><xref ref-type="disp-formula" rid="eqn-3">Eq. (3)</xref> uses packets latency <inline-formula id="ieqn-12"><mml:math id="mml-ieqn-12"><mml:msub><mml:mi>P</mml:mi><mml:mrow><mml:mi>l</mml:mi><mml:mi>e</mml:mi><mml:mi>n</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> with prefixed threshold <inline-formula id="ieqn-13"><mml:math id="mml-ieqn-13"><mml:mi>P</mml:mi><mml:mi>r</mml:mi><mml:msub><mml:mi>e</mml:mi><mml:mrow><mml:mi>t</mml:mi><mml:mi>h</mml:mi><mml:mi>r</mml:mi><mml:mi>e</mml:mi><mml:mi>s</mml:mi><mml:mi>h</mml:mi><mml:mi>o</mml:mi><mml:mi>l</mml:mi><mml:mi>d</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> to compute <italic>QL</italic>. In case, communication incurs lower latency, it results in better network performance in terms of <italic>QL</italic>.
<disp-formula id="eqn-3"><label>(3)</label><mml:math id="mml-eqn-3" display="block"><mml:mrow><mml:mi>Q</mml:mi><mml:mi>L</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn><mml:mo>&#x2212;</mml:mo><mml:mfrac><mml:msubsup><mml:mi>P</mml:mi><mml:mrow><mml:mrow><mml:mi>l</mml:mi><mml:mi>e</mml:mi><mml:mi>n</mml:mi></mml:mrow></mml:mrow><mml:mi>k</mml:mi></mml:msubsup><mml:msub><mml:mrow><mml:mi>P</mml:mi><mml:mi>r</mml:mi><mml:mi>e</mml:mi></mml:mrow><mml:mrow><mml:mrow><mml:mi>t</mml:mi><mml:mi>h</mml:mi><mml:mi>r</mml:mi><mml:mi>e</mml:mi><mml:mi>s</mml:mi><mml:mi>h</mml:mi><mml:mi>o</mml:mi><mml:mi>l</mml:mi><mml:mi>d</mml:mi></mml:mrow></mml:mrow></mml:msub></mml:mfrac></mml:mrow></mml:math></disp-formula></p>
<p><italic>RE</italic> is inversely proportional to communication disruption. Its evaluation is based on link failure <inline-formula id="ieqn-14"><mml:math id="mml-ieqn-14"><mml:mi>L</mml:mi><mml:mi>n</mml:mi><mml:msup><mml:mi>k</mml:mi><mml:mi>f</mml:mi></mml:msup></mml:math></inline-formula> and devices&#x2019; request <inline-formula id="ieqn-15"><mml:math id="mml-ieqn-15"><mml:mi>C</mml:mi><mml:mi>o</mml:mi><mml:msup><mml:mi>m</mml:mi><mml:mi>r</mml:mi></mml:msup></mml:math></inline-formula> using <xref ref-type="disp-formula" rid="eqn-4">Eq. (4)</xref>.
<disp-formula id="eqn-4"><label>(4)</label><mml:math id="mml-eqn-4" display="block"><mml:mrow><mml:mi>R</mml:mi><mml:mi>E</mml:mi><mml:mo>=</mml:mo><mml:mfrac><mml:msup><mml:mrow><mml:mi>P</mml:mi><mml:mi>a</mml:mi><mml:mi>c</mml:mi><mml:mi>k</mml:mi><mml:mi>e</mml:mi><mml:mi>t</mml:mi><mml:mi>s</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>L</mml:mi><mml:mi>n</mml:mi><mml:mi>k</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:mrow><mml:mi>f</mml:mi></mml:msup><mml:msup><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>D</mml:mi><mml:mi>e</mml:mi><mml:mi>v</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:mrow><mml:mi>r</mml:mi></mml:msup></mml:mfrac></mml:mrow></mml:math></disp-formula></p>
<p>After each sensor computes the trust factor, IoT edge devices perform the data aggregation <inline-formula id="ieqn-16"><mml:math id="mml-ieqn-16"><mml:mi>A</mml:mi><mml:msub><mml:mi>G</mml:mi><mml:mi>D</mml:mi></mml:msub></mml:math></inline-formula> function along with the trusted factors defined in <xref ref-type="disp-formula" rid="eqn-5">Eq. (5)</xref>.
<disp-formula id="eqn-5"><label>(5)</label><mml:math id="mml-eqn-5" display="block"><mml:mrow><mml:mi>A</mml:mi><mml:msub><mml:mi>G</mml:mi><mml:mi>D</mml:mi></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>E</mml:mi><mml:mi>D</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:munderover><mml:mo>&#x2211;</mml:mo><mml:mrow><mml:mi>i</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mi>N</mml:mi></mml:mrow></mml:munderover><mml:mi>T</mml:mi><mml:mi>r</mml:mi><mml:mi>t</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>&#x22C5;</mml:mo><mml:mi>D</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:math></disp-formula></p>
<p>Edge nodes create blockchain transactions <italic>TR</italic> and store the aggregated data of sensor <inline-formula id="ieqn-17"><mml:math id="mml-ieqn-17"><mml:mi>i</mml:mi></mml:math></inline-formula> using time stamp <inline-formula id="ieqn-18"><mml:math id="mml-ieqn-18"><mml:mi>T</mml:mi><mml:mi>i</mml:mi><mml:mi>m</mml:mi><mml:msub><mml:mi>e</mml:mi><mml:mi>S</mml:mi></mml:msub></mml:math></inline-formula> and other related information, as defined in <xref ref-type="disp-formula" rid="eqn-6">Eq. (6)</xref>.
<disp-formula id="eqn-6"><label>(6)</label><mml:math id="mml-eqn-6" display="block"><mml:mrow><mml:mi>T</mml:mi><mml:mi>R</mml:mi><mml:mo>=</mml:mo><mml:mo fence="false" stretchy="false">{</mml:mo><mml:msub><mml:mrow><mml:mi>I</mml:mi><mml:mi>D</mml:mi></mml:mrow><mml:mi>i</mml:mi></mml:msub><mml:mo>,</mml:mo><mml:mi>A</mml:mi><mml:msub><mml:mi>G</mml:mi><mml:mi>D</mml:mi></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>,</mml:mo><mml:mi>T</mml:mi><mml:mi>i</mml:mi><mml:mi>m</mml:mi><mml:msub><mml:mi>e</mml:mi><mml:mi>S</mml:mi></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>,</mml:mo><mml:msub><mml:mi>P</mml:mi><mml:mrow><mml:mi>S</mml:mi><mml:mi>i</mml:mi><mml:mi>g</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo fence="false" stretchy="false">}</mml:mo></mml:mrow></mml:math></disp-formula></p>
<p>It ensures that the recorded transaction log can be modified and affects its integrity due to the decentralized behavior. <xref ref-type="disp-formula" rid="eqn-7">Eq. (7)</xref> determines the efficiency of the blockchain based on the block rate <italic>BR</italic> and volume of transactions <italic>VT</italic>. The blockchain transaction&#x2019;s validation can be computed using <xref ref-type="disp-formula" rid="eqn-8">Eq. (8)</xref>, where the hash value is compared with a predefined threshold.
<disp-formula id="eqn-7"><label>(7)</label><mml:math id="mml-eqn-7" display="block"><mml:mrow><mml:msub><mml:mi>D</mml:mi><mml:mrow><mml:mrow><mml:mtext>blockchain</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mfrac><mml:mrow><mml:mi>V</mml:mi><mml:mi>T</mml:mi></mml:mrow><mml:mrow><mml:mi>B</mml:mi><mml:mi>R</mml:mi></mml:mrow></mml:mfrac></mml:mrow></mml:math></disp-formula>
<disp-formula id="eqn-8"><label>(8)</label><mml:math id="mml-eqn-8" display="block"><mml:mo stretchy="false">(</mml:mo><mml:mi>T</mml:mi><mml:msub><mml:mi>R</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:mrow><mml:mo>{</mml:mo><mml:mtable columnalign="left left" rowspacing=".2em" columnspacing="1em" displaystyle="false"><mml:mtr><mml:mtd><mml:mn>1</mml:mn></mml:mtd><mml:mtd><mml:mrow><mml:mi>i</mml:mi><mml:mi>f</mml:mi></mml:mrow><mml:mi>H</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>T</mml:mi><mml:msub><mml:mi>R</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo stretchy="false">)</mml:mo><mml:mo>&#x2264;</mml:mo><mml:mi>T</mml:mi><mml:msub><mml:mi>R</mml:mi><mml:mrow><mml:mrow><mml:mi>t</mml:mi><mml:mi>h</mml:mi><mml:mi>r</mml:mi><mml:mi>e</mml:mi><mml:mi>s</mml:mi></mml:mrow></mml:mrow></mml:msub></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mn>0</mml:mn></mml:mtd><mml:mtd><mml:mrow><mml:mi>o</mml:mi><mml:mi>t</mml:mi><mml:mi>h</mml:mi><mml:mi>e</mml:mi><mml:mi>r</mml:mi><mml:mi>w</mml:mi><mml:mi>i</mml:mi><mml:mi>s</mml:mi><mml:mi>e</mml:mi></mml:mrow></mml:mtd></mml:mtr></mml:mtable><mml:mo fence="true" stretchy="true" symmetric="true"></mml:mo></mml:mrow></mml:math></disp-formula></p>
<p>In the next phase, the stochastic cost <inline-formula id="ieqn-19"><mml:math id="mml-ieqn-19"><mml:mi>S</mml:mi><mml:mi>C</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>j</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> is analyzed for healthcare routing by utilizing multiple factors such as latency <inline-formula id="ieqn-20"><mml:math id="mml-ieqn-20"><mml:msub><mml:mi>L</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>, and trust score <inline-formula id="ieqn-21"><mml:math id="mml-ieqn-21"><mml:mi>T</mml:mi><mml:mi>r</mml:mi><mml:msub><mml:mi>t</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> as given in <xref ref-type="disp-formula" rid="eqn-9">Eq. (9)</xref>. Based on the computed stochastic cost <inline-formula id="ieqn-22"><mml:math id="mml-ieqn-22"><mml:mi>S</mml:mi><mml:mi>C</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>j</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula>, the proposed model establishes an optimal total cost multi-hop route <italic>R</italic> <inline-formula id="ieqn-23"><mml:math id="mml-ieqn-23"><mml:mi>O</mml:mi><mml:mi>T</mml:mi><mml:msub><mml:mi>C</mml:mi><mml:mrow><mml:mi>R</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> from health sensors <inline-formula id="ieqn-24"><mml:math id="mml-ieqn-24"><mml:mi>i</mml:mi></mml:math></inline-formula> to <inline-formula id="ieqn-25"><mml:math id="mml-ieqn-25"><mml:mi>j</mml:mi></mml:math></inline-formula> as given in <xref ref-type="disp-formula" rid="eqn-10">Eq. (10)</xref>.
<disp-formula id="eqn-9"><label>(9)</label><mml:math id="mml-eqn-9" display="block"><mml:mtable columnalign="right left right left right left right left right left right left" rowspacing="3pt" columnspacing="0em 2em 0em 2em 0em 2em 0em 2em 0em 2em 0em" displaystyle="true"><mml:mtr><mml:mtd /><mml:mtd><mml:mrow><mml:mi>S</mml:mi><mml:mi>C</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>j</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:msub><mml:mi>L</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>+</mml:mo><mml:mi>T</mml:mi><mml:mi>r</mml:mi><mml:msub><mml:mi>t</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>
<disp-formula id="eqn-10"><label>(10)</label><mml:math id="mml-eqn-10" display="block"><mml:mtable columnalign="right left right left right left right left right left right left" rowspacing="3pt" columnspacing="0em 2em 0em 2em 0em 2em 0em 2em 0em 2em 0em" displaystyle="true"><mml:mtr><mml:mtd /><mml:mtd><mml:mrow><mml:mi>O</mml:mi><mml:mi>T</mml:mi><mml:msub><mml:mi>C</mml:mi><mml:mrow><mml:mi>R</mml:mi></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:munder><mml:mo>&#x2211;</mml:mo><mml:mrow><mml:msub><mml:mi>e</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>&#x2208;</mml:mo><mml:mi>R</mml:mi></mml:mrow></mml:munder><mml:mi>S</mml:mi><mml:mi>C</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>j</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>&#x22C5;</mml:mo><mml:mi>R</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mi>e</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula></p>
<p>In the healthcare system, due to the patients&#x2019; sensitive data, the proposed model makes use of homomorphic encryption at the edges for further processing without decryption. Let us consider that <inline-formula id="ieqn-26"><mml:math id="mml-ieqn-26"><mml:msub><mml:mi>d</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:math></inline-formula> and <inline-formula id="ieqn-27"><mml:math id="mml-ieqn-27"><mml:msub><mml:mi>d</mml:mi><mml:mi>j</mml:mi></mml:msub></mml:math></inline-formula> are collected data, then multiplicative homomorphic encryption using key <inline-formula id="ieqn-28"><mml:math id="mml-ieqn-28"><mml:mi>k</mml:mi></mml:math></inline-formula> can be computed as defined in <xref ref-type="disp-formula" rid="eqn-11">Eq. (11)</xref>.
<disp-formula id="eqn-11"><label>(11)</label><mml:math id="mml-eqn-11" display="block"><mml:mrow><mml:mrow><mml:mi>E</mml:mi><mml:mi>n</mml:mi></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mi>d</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>&#x22C5;</mml:mo><mml:msub><mml:mi>d</mml:mi><mml:mi>j</mml:mi></mml:msub><mml:mo stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:msub><mml:mi>E</mml:mi><mml:mi>k</mml:mi></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mi>d</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo stretchy="false">)</mml:mo><mml:mo>&#x22C5;</mml:mo><mml:msub><mml:mi>E</mml:mi><mml:mi>k</mml:mi></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mi>d</mml:mi><mml:mi>j</mml:mi></mml:msub><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:math></disp-formula></p>
<p><xref ref-type="fig" rid="fig-2">Fig. 2a</xref>,<xref ref-type="fig" rid="fig-2">b</xref> depicts the flowcharts of the proposed model for the healthcare system using optimized, trusted, and blockchain-driven validation. It initiates the process of collecting e-health records from medical sensors, and after preprocessing the trust scores are computed to attain a reliable healthcare system. Later, trusted data is transmitted to edges for further analysis. Moreover, the stochastic optimization criteria are explored based on multiple parameters, and it balances the energy consumption of the health sensors with the least interruption in communication. The blockchain nodes are integrated into the transaction, and before sending the sensitive data to health users, the validation process is applied to extract the trustworthiness of forwarders. In case, malicious devices are found in blockchain transactions, then information is flooded in the network and routes are reformulated using stochastic criteria based on network conditions. Algorithm 1 optimizes the routes for health sensors using stochastic computing based on trust score and latency factors. It is designed to address the unique research challenges for healthcare applications due to the constraints of resources. Unlike many existing studies, this iterative practice selects the most efficient routes using lightweight probabilistic techniques methods to enhance the decision-making for prioritizing communication links while tacking privacy preserving of health data. It refines the routes for transmitting health data by evaluating the network conditions.</p>
<fig id="fig-2">
<label>Figure 2</label>
<caption>
<title>Flowchart of the proposed healthcare model: (<bold>a</bold>) Edge-integrated trusted healthcare system. (<bold>b</bold>) Stochastic-based optimization with blockchain-driven e-health data validation</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_63077-fig-2a.tif"/>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_63077-fig-2b.tif"/>
</fig>
<fig id="fig-7">
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_63077-fig-7.tif"/>
</fig>
<p>Algorithm 2 illustrates the integration process of health records for the sensors in blockchain ledgers. It guarantees privacy and security by establishing the transactions, and edge devices verify each transaction for onward processing and computation. The proposed model validates the blockchain nodes and ensures tamper-free and reliable communication even with malicious devices. As a result, the health system provides more authentic and consistent data-exchanging solutions over untrusted communication channels. In contrast to much existing healthcare IoT solutions, the design of the proposed algorithm ensures the validation of the transactions by computing trust scores and digital signatures. It provides a secure method for the inclusion of only authentic and trusted data into the blockchain.</p>
<fig id="fig-8">
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_63077-fig-8.tif"/>
</fig>
<p>Algorithm 3 computes trust scores for IoT sensors based on their reliability, energy consumption, and data quality. It dynamically updates these scores and adjusts communication routes, ensuring secure and optimized data transmission in the network. By leveraging blockchain technology in the proposed model, it validates and authenticates the encrypted data with unique identifiers, signatures, and timestamps. It provides integrity of health data and authentic transactions are not processed. Moreover, due to the robust methods, the routing nodes are timely informed about the compromised information increasing the fault tolerance of the IoT system. <xref ref-type="table" rid="table-2">Table 2</xref> illustrates the developed features of proposed algorithms for the trustworthiness and optimization of healthcare systems.</p>
<table-wrap id="table-2">
<label>Table 2</label>
<caption>
<title>Developed features of proposed model for securing and intelligent healthcare system</title>
</caption>
<table>
<colgroup>
<col align="center"/>
<col align="center"/>
<col align="center"/>
</colgroup>
<thead>
<tr>
<th align="center">Feature</th>
<th align="center">Resource optimization</th>
<th align="center">Mitigation against attacks</th>
</tr>
</thead>
<tbody>
<tr>
<td>Edge weights</td>
<td>Multi-factors for route selection</td>
<td>Prioritizes paths based on trust scores</td>
</tr>
<tr>
<td>Stochastic decision-making</td>
<td>Route selection with minimal cost</td>
<td>Enhances fault tolerance and reliability</td>
</tr>
<tr>
<td>Trust computing</td>
<td>Assigns trust scores and prioritize the routes</td>
<td>Detects low-trusted nodes for reliability</td>
</tr>
<tr>
<td>Security enforcement</td>
<td>Ensures data encryption and authenticates nodes</td>
<td>Prevents unauthorized access and ensures privacy</td>
</tr>
<tr>
<td>Data integrity</td>
<td>Records logs for blockchain transactions</td>
<td>Protects against tampering</td>
</tr>
<tr>
<td>Decentralized trust management</td>
<td>Utilizes blockchain nodes and authenticates the aggregated data</td>
<td>Enhances security by avoiding single-point failures</td>
</tr>
</tbody>
</table>
</table-wrap>
<fig id="fig-9">
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_63077-fig-9.tif"/>
</fig>
</sec>
</sec>
<sec id="s4">
<label>4</label>
<title>Simulations and Results</title>
<p>In this section, we evaluate the performance of the proposed model with related work through simulations. The testing environment is created in NS-3 and scripting files are used to observe the behavior of the network. The collected data from health sensors are securely transmitted through a combination of blockchain transactions and maintain privacy and data integrity. The edges are responsible for resource management, data encryption, trust evaluation, and blockchain validation. The network field is fixed to 5000 m <inline-formula id="ieqn-41"><mml:math id="mml-ieqn-41"><mml:mo>&#x00D7;</mml:mo></mml:math></inline-formula> 5000 m, populated by 50 to 200 health sensors, with 2j of initial energy level. 35 edge devices are deployed for the support of data aggregation and validation. To evaluate the real-world applicability of the proposed model, <xref ref-type="table" rid="table-3">Table 3</xref> depicted the varied key parameters.</p>
<table-wrap id="table-3">
<label>Table 3</label>
<caption>
<title>Simulation parameters</title>
</caption>
<table>
<colgroup>
<col/>
<col/>
</colgroup>
<thead>
<tr>
<th>Parameter</th>
<th>Value</th>
</tr>
</thead>
<tbody>
<tr>
<td>Simulation area</td>
<td>5000 m <inline-formula id="ieqn-42"><mml:math id="mml-ieqn-42"><mml:mo>&#x00D7;</mml:mo></mml:math></inline-formula> 5000 m</td>
</tr>
<tr>
<td>Number of edge devices</td>
<td>35</td>
</tr>
<tr>
<td>Initial energy</td>
<td>2j</td>
</tr>
<tr>
<td>Number of sensors</td>
<td>50 to 200</td>
</tr>
<tr>
<td>Transaction rate</td>
<td>10&#x2013;50 TPS</td>
</tr>
<tr>
<td>Simulations run</td>
<td>50</td>
</tr>
<tr>
<td><inline-formula id="ieqn-43"><mml:math id="mml-ieqn-43"><mml:msub><mml:mi>&#x03B2;</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:math></inline-formula>, <inline-formula id="ieqn-44"><mml:math id="mml-ieqn-44"><mml:msub><mml:mi>&#x03B2;</mml:mi><mml:mn>2</mml:mn></mml:msub></mml:math></inline-formula></td>
<td>0.5, 0.5</td>
</tr>
<tr>
<td>Probability of link failure</td>
<td>0.1 to 0.3</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>The evaluation of the packet drop ratio for the proposed model and existing solutions under varying transmission rates and bandwidth is depicted in <xref ref-type="fig" rid="fig-3">Fig. 3a</xref>,<xref ref-type="fig" rid="fig-3">b</xref>. The experimental results illustrate that the proposed model outperforms existing approaches by an average of 33% and 38%. It employs the concept of edge computing and intelligent route identification while attaining reliable communication channels for the healthcare system. Robust decision-making using stochastic optimization also decreases the chances of network disruption and enhances resource optimization in e-health operations. Furthermore, various parameters are re-computed to balance the load on the transmission links with efficient traffic distribution on the constraint devices. Additionally, edges are mobile and crucial components of the proposed model, they intelligently collected the IoT aggregated data and decreased the transmission distance with effective trust management. Moreover, the security analysis is another significant stage of the proposed model, it reduces the communication threats and provides more trustworthiness forwarding based on blockchain transactions.</p>
<fig id="fig-3">
<label>Figure 3</label>
<caption>
<title>Performance of proposed model and related approaches for packet drop ratio for data generation rate and bandwidth</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_63077-fig-3.tif"/>
</fig>
<p>The proposed model&#x2019;s experimental results compared to the existing solution are illustrated in <xref ref-type="fig" rid="fig-4">Fig. 4a</xref>,<xref ref-type="fig" rid="fig-4">b</xref>. The proposed model balances resource consumption and node congestion to optimize sensor performance with the use of distributed computing, which is based on multi-facet analysis. It was noticed that the proposed model increases the energy efficiency by an average of 41% and 52% under different transmission rates and bandwidths, owing to the selection of several criteria parameters by exploring network conditions. The network edges not only limit the transmission power of the health sensors but also eliminate congested and faulty links for data transmission. Accordingly, the next-hop is more reliable and consistent for continuous routing and offers high performance in e-health data delivery. The routing paths are continuously updated by identifying nearby trustworthy neighbors based on the trust scores, and enhancing the routes&#x2019; lifetime while decreasing traffic load on network-wide IoT devices. In addition, routes are authenticated using blockchain integration and marked as infectious entries incurred during data transmission.</p>
<fig id="fig-4">
<label>Figure 4</label>
<caption>
<title>Performance of proposed model and related approaches for energy consumption for data generation rate and bandwidth</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_63077-fig-4.tif"/>
</fig>
<p>Compared to existing solutions, the proposed model improves the computational time for varying the data generation rate and bandwidth by an average of 38% and 46%, as illustrated in <xref ref-type="fig" rid="fig-5">Fig. 5a</xref>,<xref ref-type="fig" rid="fig-5">b</xref>. This is because forwarding routes are re-evaluated at both the device and edge level. In case, any device in the route is malicious, the entire route is labeled as faulty, and the route is reformulated for transmission of e-health records. In addition, mobile edges perform a crucial role in the identification of faulty channels based on trust and blockchain integration. It copes to identify the unauthentic devices on the medium and avoid the keys or resending the fake route requests. If any channel closer to the edge device is suspicious, then the edge device announces alarming messages to inform the neighbors that fall in its proximity. In such cases, the proposed algorithm effectively manages the communication cost and latency rate.</p>
<fig id="fig-5">
<label>Figure 5</label>
<caption>
<title>Performance of proposed model and related approaches for computation time for data generation rate and bandwidth</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_63077-fig-5.tif"/>
</fig>
<p>In <xref ref-type="fig" rid="fig-6">Fig. 6a</xref>,<xref ref-type="fig" rid="fig-6">b</xref>, the performance evaluation of the proposed model is compared with existing solutions in terms of blockchain overhead. Based on the results, it was noticed that performance results improved for varying data generation rate and bandwidth by an average of 45% and 49% by utilizing a more reliable anomaly detection mechanism using integration of lightweight blockchain computation. Moreover, the support of network edges along with the lightweight cryptographic methods, dynamic thresholds, and validation patterns, ensure the proposed model for efficiently detecting misclassification of normal data traffic as communication threats. Unlike existing work, this strategy enables the optimal usage of network resources and prevents additional blockchain overhead caused by false positives. Consequently, the proposed model reduces the chances of false alerts and offers more trustworthiness in blockchain-based security mechanisms for crucial healthcare systems.</p>
<fig id="fig-6">
<label>Figure 6</label>
<caption>
<title>Performance of proposed model and related approaches for blockchain overhead for packet generation rate and bandwidth</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_63077-fig-6.tif"/>
</fig>
</sec>
<sec id="s5">
<label>5</label>
<title>Conclusion</title>
<p>Smart cities are interconnected using advanced network technologies and intermediate wireless services to observe the unpredicted environment. In crucial applications, the bounded limitation of sensors, IoT gateways, etc., are not enough to provide an earlier response in the decision-making process and raise significant challenges for network optimization. In addition, the security of distributed systems also poses another research issue in attaining data preservation and authentication. This work presents a blockchain-driven secured and load-balanced routing model for health applications with efficient data flow supported by edge intelligence. It leads to a lightweight communication system using stochastic optimization and enhances trustworthiness between connected devices despite network threats. Moreover, the proposed model secures the exchange of IoT data using integrated blockchain transactions and reduces the probabilities of anomalous behaviors. However, to enhance the robustness of the proposed model, adaptive resource allocation algorithms with lightweight encryption techniques are demanded to decrease the computing load on low-powered devices.</p>
</sec>
</body>
<back>
<ack>
<p>The authors would like to thank the support by the Deanship of Graduate Studies and Scientific Research at Jouf University under grant No. (DGSSR-2024-02-02090).</p>
</ack>
<sec>
<title>Funding Statement</title>
<p>This work was funded by the Deanship of Graduate Studies and Scientific Research at Jouf University under grant No. (DGSSR-2024-02-02090).</p>
</sec>
<sec>
<title>Author Contributions</title>
<p>The authors confirm contribution to the paper as follows: Conceptualization: Khulud Salem Alshudukhi, Mamoona Humayun; methodology: Khulud Salem Alshudukhi, Mamoona Humayun; software: Ghadah Naif Alwakid; validation: Ghadah Naif Alwakid, Mamoona Humayun; formal analysis: Ghadah Naif Alwakid; investigation: Mamoona Humayun, Ghadah Naif Alwakid; resources: Khulud Salem Alshudukhi; data curation, Mamoona Humayun; writing&#x2014;original draft preparation: Khulud Salem Alshudukhi, Mamoona Humayun; writing&#x2014;review and editing: Ghadah Naif Alwakid; visualization: Ghadah Naif Alwakid; supervision: Mamoona Humayun; project administration: Khulud Salem Alshudukhi, Ghadah Naif Alwakid; funding acquisition: Khulud Salem Alshudukhi, Mamoona Humayun. All authors reviewed the results and approved the final version of the manuscript.</p>
</sec>
<sec sec-type="data-availability">
<title>Availability of Data and Materials</title>
<p>Not applicable.</p>
</sec>
<sec>
<title>Ethics Approval</title>
<p>Not applicable.</p>
</sec>
<sec sec-type="COI-statement">
<title>Conflicts of Interest</title>
<p>The authors declare no conflicts of interest to report regarding the present study.</p>
</sec>
<ref-list content-type="authoryear">
<title>References</title>
<ref id="ref-1"><label>[1]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Alahi</surname> <given-names>MEE</given-names></string-name>, <string-name><surname>Sukkuea</surname> <given-names>A</given-names></string-name>, <string-name><surname>Tina</surname> <given-names>FW</given-names></string-name>, <string-name><surname>Nag</surname> <given-names>A</given-names></string-name>, <string-name><surname>Kurdthongmee</surname> <given-names>W</given-names></string-name>, <string-name><surname>Suwannarat</surname> <given-names>K</given-names></string-name>, <etal>et al</etal></person-group>. <article-title>Integration of IoT-enabled technologies and artificial intelligence (AI) for smart city scenario: recent advancements and future trends</article-title>. <source>Sensors</source>. <year>2023</year>;<volume>23</volume>(<issue>11</issue>):<fpage>5206</fpage>. doi:<pub-id pub-id-type="doi">10.3390/s23115206</pub-id>; <pub-id pub-id-type="pmid">37299934</pub-id></mixed-citation></ref>
<ref id="ref-2"><label>[2]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Hussain</surname> <given-names>I</given-names></string-name>, <string-name><surname>Elomri</surname> <given-names>A</given-names></string-name>, <string-name><surname>Kerbache</surname> <given-names>L</given-names></string-name>, <string-name><surname>El Omri</surname> <given-names>A</given-names></string-name></person-group>. <article-title>Smart city solutions: comparative analysis of waste management models in IoT-enabled environments using multiagent simulation</article-title>. <source>Sustain Cities Soc</source>. <year>2024</year>;<volume>103</volume>(<issue>6</issue>):<fpage>105247</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.scs.2024.105247</pub-id>.</mixed-citation></ref>
<ref id="ref-3"><label>[3]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Ahad</surname> <given-names>A</given-names></string-name>, <string-name><surname>Jiangbina</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Tahir</surname> <given-names>M</given-names></string-name>, <string-name><surname>Shayea</surname> <given-names>I</given-names></string-name>, <string-name><surname>Sheikh</surname> <given-names>MA</given-names></string-name>, <string-name><surname>Rasheed</surname> <given-names>F</given-names></string-name></person-group>. <article-title>6G and intelligent healthcare: taxonomy, technologies, open issues and future research directions</article-title>. <source>Internet Things</source>. <year>2024</year>;<volume>25</volume>(<issue>7</issue>):<fpage>101068</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.iot.2024.101068</pub-id>.</mixed-citation></ref>
<ref id="ref-4"><label>[4]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Nissar</surname> <given-names>G</given-names></string-name>, <string-name><surname>Khan</surname> <given-names>RA</given-names></string-name>, <string-name><surname>Mushtaq</surname> <given-names>S</given-names></string-name>, <string-name><surname>Lone</surname> <given-names>SA</given-names></string-name>, <string-name><surname>Moon</surname> <given-names>AH</given-names></string-name></person-group>. <article-title>IoT in healthcare: a review of services, applications, key technologies, security concerns, and emerging trends</article-title>. <source>Multimed Tools Appl</source>. <year>2024</year>;<volume>83</volume>(<issue>33</issue>):<fpage>80283</fpage>. doi:<pub-id pub-id-type="doi">10.1007/s11042-024-18580-7</pub-id>.</mixed-citation></ref>
<ref id="ref-5"><label>[5]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Krishnamoorthy</surname> <given-names>S</given-names></string-name>, <string-name><surname>Dua</surname> <given-names>A</given-names></string-name>, <string-name><surname>Gupta</surname> <given-names>S</given-names></string-name></person-group>. <article-title>Role of emerging technologies in future IoT-driven Healthcare 4.0 technologies: a survey, current challenges and future directions</article-title>. <source>J Ambient Intell Humaniz Comput</source>. <year>2023</year>;<volume>14</volume>(<issue>1</issue>):<fpage>361</fpage>&#x2013;<lpage>407</lpage>. doi:<pub-id pub-id-type="doi">10.1007/s12652-021-03302-w</pub-id>.</mixed-citation></ref>
<ref id="ref-6"><label>[6]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Morchid</surname> <given-names>A</given-names></string-name>, <string-name><surname>El Alami</surname> <given-names>R</given-names></string-name>, <string-name><surname>Raezah</surname> <given-names>AA</given-names></string-name>, <string-name><surname>Sabbar</surname> <given-names>Y</given-names></string-name></person-group>. <article-title>Applications of internet of things (IoT) and sensors technology to increase food security and agricultural sustainability: benefits and challenges</article-title>. <source>Ain Shams Eng J</source>. <year>2024</year>;<volume>15</volume>(<issue>3</issue>):<fpage>102509</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.asej.2023.102509</pub-id>.</mixed-citation></ref>
<ref id="ref-7"><label>[7]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Alotaibi</surname> <given-names>A</given-names></string-name>, <string-name><surname>Barnawi</surname> <given-names>A</given-names></string-name></person-group>. <article-title>Securing massive IoT in 6G: recent solutions, architectures, future directions</article-title>. <source>Internet Things</source>. <year>2023</year>;<volume>22</volume>(<issue>1</issue>):<fpage>100715</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.iot.2023.100715</pub-id>.</mixed-citation></ref>
<ref id="ref-8"><label>[8]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Benlloch-Caballero</surname> <given-names>P</given-names></string-name>, <string-name><surname>Wang</surname> <given-names>Q</given-names></string-name>, <string-name><surname>Calero</surname> <given-names>JMA</given-names></string-name></person-group>. <article-title>Distributed dual-layer autonomous closed loops for self-protection of 5G/6G IoT networks from distributed denial of service attacks</article-title>. <source>Comput Netw</source>. <year>2023</year>;<volume>222</volume>(<issue>2</issue>):<fpage>109526</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.comnet.2022.109526</pub-id>.</mixed-citation></ref>
<ref id="ref-9"><label>[9]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Hazra</surname> <given-names>A</given-names></string-name>, <string-name><surname>Rana</surname> <given-names>P</given-names></string-name>, <string-name><surname>Adhikari</surname> <given-names>M</given-names></string-name>, <string-name><surname>Amgoth</surname> <given-names>T</given-names></string-name></person-group>. <article-title>Fog computing for next-generation internet of things: fundamental, state-of-the-art and research challenges</article-title>. <source>Comput Sci Rev</source>. <year>2023</year>;<volume>48</volume>(<issue>5</issue>):<fpage>100549</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.cosrev.2023.100549</pub-id>.</mixed-citation></ref>
<ref id="ref-10"><label>[10]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Ahmad</surname> <given-names>T</given-names></string-name>, <string-name><surname>Madonski</surname> <given-names>R</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>D</given-names></string-name>, <string-name><surname>Huang</surname> <given-names>C</given-names></string-name>, <string-name><surname>Mujeeb</surname> <given-names>A</given-names></string-name></person-group>. <article-title>Data-driven probabilistic machine learning in sustainable smart energy/smart energy systems: key developments, challenges, and future research opportunities in the context of smart grid paradigm</article-title>. <source>Renew Sustain Energ Rev</source>. <year>2022</year>;<volume>160</volume>(<issue>1</issue>):<fpage>112128</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.rser.2022.112128</pub-id>.</mixed-citation></ref>
<ref id="ref-11"><label>[11]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Heng</surname> <given-names>L</given-names></string-name>, <string-name><surname>Yin</surname> <given-names>G</given-names></string-name>, <string-name><surname>Zhao</surname> <given-names>X</given-names></string-name></person-group>. <article-title>Energy aware cloud-edge service placement approaches in the Internet of Things communications</article-title>. <source>Int J Commun Syst</source>. <year>2022</year>;<volume>35</volume>(<issue>1</issue>):<fpage>e4899</fpage>. doi:<pub-id pub-id-type="doi">10.1002/dac.4899</pub-id>.</mixed-citation></ref>
<ref id="ref-12"><label>[12]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Poojara</surname> <given-names>SR</given-names></string-name>, <string-name><surname>Dehury</surname> <given-names>CK</given-names></string-name>, <string-name><surname>Jakovits</surname> <given-names>P</given-names></string-name>, <string-name><surname>Srirama</surname> <given-names>SN</given-names></string-name></person-group>. <article-title>Serverless data pipeline approaches for IoT data in fog and cloud computing</article-title>. <source>Future Gener Comput Syst</source>. <year>2022</year>;<volume>130</volume>(<issue>8</issue>):<fpage>91</fpage>&#x2013;<lpage>105</lpage>. doi:<pub-id pub-id-type="doi">10.1016/j.future.2021.12.012</pub-id>.</mixed-citation></ref>
<ref id="ref-13"><label>[13]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Prokhorenko</surname> <given-names>V</given-names></string-name>, <string-name><surname>Babar</surname> <given-names>MA</given-names></string-name></person-group>. <article-title>Architectural resilience in cloud, fog and edge systems: a survey</article-title>. <source>IEEE Access</source>. <year>2020</year>;<volume>8</volume>:<fpage>28078</fpage>&#x2013;<lpage>95</lpage>. doi:<pub-id pub-id-type="doi">10.1109/ACCESS.2020.2971007</pub-id>.</mixed-citation></ref>
<ref id="ref-14"><label>[14]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Alsadie</surname> <given-names>D</given-names></string-name></person-group>. <article-title>Artificial intelligence techniques for securing fog computing environments: trends, challenges, and future directions</article-title>. <source>IEEE Access</source>. <year>2024</year>;<volume>12</volume>(<issue>4</issue>):<fpage>151598</fpage>&#x2013;<lpage>648</lpage>. doi:<pub-id pub-id-type="doi">10.1109/ACCESS.2024.3463791</pub-id>.</mixed-citation></ref>
<ref id="ref-15"><label>[15]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Golpayegani</surname> <given-names>F</given-names></string-name>, <string-name><surname>Chen</surname> <given-names>N</given-names></string-name>, <string-name><surname>Afraz</surname> <given-names>N</given-names></string-name>, <string-name><surname>Gyamfi</surname> <given-names>E</given-names></string-name>, <string-name><surname>Malekjafarian</surname> <given-names>A</given-names></string-name>, <string-name><surname>Sch&#x00E4;fer</surname> <given-names>D</given-names></string-name>, <etal>et al</etal></person-group>. <article-title>Adaptation in edge computing: a review on design principles and research challenges</article-title>. <source>ACM Trans Auton Adapt Syst</source>. <year>2024</year>;<volume>19</volume>(<issue>3</issue>):<fpage>1</fpage>&#x2013;<lpage>43</lpage>. doi:<pub-id pub-id-type="doi">10.1145/3664200</pub-id>.</mixed-citation></ref>
<ref id="ref-16"><label>[16]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Duan</surname> <given-names>S</given-names></string-name>, <string-name><surname>Wang</surname> <given-names>D</given-names></string-name>, <string-name><surname>Ren</surname> <given-names>J</given-names></string-name>, <string-name><surname>Lyu</surname> <given-names>F</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Wu</surname> <given-names>H</given-names></string-name>, <etal>et al</etal></person-group>. <article-title>Distributed artificial intelligence empowered by end-edge-cloud computing: a survey</article-title>. <source>IEEE Commun Surv Tutor</source>. <year>2022</year>;<volume>25</volume>(<issue>1</issue>):<fpage>591</fpage>&#x2013;<lpage>624</lpage>. doi:<pub-id pub-id-type="doi">10.1109/COMST.2022.3218527</pub-id>.</mixed-citation></ref>
<ref id="ref-17"><label>[17]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Rana</surname> <given-names>B</given-names></string-name>, <string-name><surname>Singh</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Singh</surname> <given-names>PK</given-names></string-name>, <string-name><surname>Hong</surname> <given-names>WC</given-names></string-name></person-group>. <article-title>A priority based energy-efficient metaheuristic routing approach for smart healthcare system (SHS)</article-title>. <source>IEEE Access</source>. <year>2024</year>;<volume>12</volume>:<fpage>85694</fpage>&#x2013;<lpage>708</lpage>. doi:<pub-id pub-id-type="doi">10.1109/ACCESS.2024.3411564</pub-id>.</mixed-citation></ref>
<ref id="ref-18"><label>[18]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Haseeb</surname> <given-names>K</given-names></string-name>, <string-name><surname>Alzahrani</surname> <given-names>FA</given-names></string-name>, <string-name><surname>Siraj</surname> <given-names>M</given-names></string-name>, <string-name><surname>Ullah</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Lloret</surname> <given-names>J</given-names></string-name></person-group>. <article-title>Energy-aware next-generation mobile routing chains with fog computing for emerging applications</article-title>. <source>Electronics</source>. <year>2023</year>;<volume>12</volume>(<issue>3</issue>):<fpage>574</fpage>. doi:<pub-id pub-id-type="doi">10.3390/electronics12030574</pub-id>.</mixed-citation></ref>
<ref id="ref-19"><label>[19]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Haque</surname> <given-names>AB</given-names></string-name>, <string-name><surname>Bhushan</surname> <given-names>B</given-names></string-name>, <string-name><surname>Dhiman</surname> <given-names>G</given-names></string-name></person-group>. <article-title>Conceptualizing smart city applications: requirements, architecture, security issues, and emerging trends</article-title>. <source>Expert Syst</source>. <year>2022</year>;<volume>39</volume>(<issue>5</issue>):<fpage>e12753</fpage>. doi:<pub-id pub-id-type="doi">10.1111/exsy.12753</pub-id>.</mixed-citation></ref>
<ref id="ref-20"><label>[20]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Batista</surname> <given-names>ADS</given-names></string-name>, <string-name><surname>Dos Santos</surname> <given-names>AL</given-names></string-name></person-group>. <article-title>A survey on resilience in information sharing on networks: taxonomy and applied techniques</article-title>. <source>ACM Comput Surv</source>. <year>2024</year>;<volume>56</volume>(<issue>12</issue>):<fpage>1</fpage>&#x2013;<lpage>36</lpage>.</mixed-citation></ref>
<ref id="ref-21"><label>[21]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Berger</surname> <given-names>C</given-names></string-name>, <string-name><surname>Eichhammer</surname> <given-names>P</given-names></string-name>, <string-name><surname>Reiser</surname> <given-names>HP</given-names></string-name>, <string-name><surname>Domaschka</surname> <given-names>J</given-names></string-name>, <string-name><surname>Hauck</surname> <given-names>FJ</given-names></string-name>, <string-name><surname>Habiger</surname> <given-names>G</given-names></string-name></person-group>. <article-title>A survey on resilience in the iot: taxonomy, classification, and discussion of resilience mechanisms</article-title>. <source>ACM Comput Surv</source>. <year>2021</year>;<volume>54</volume>(<issue>7</issue>):<fpage>1</fpage>&#x2013;<lpage>39</lpage>.</mixed-citation></ref>
<ref id="ref-22"><label>[22]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Xue</surname> <given-names>H</given-names></string-name>, <string-name><surname>Chen</surname> <given-names>D</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>N</given-names></string-name>, <string-name><surname>Dai</surname> <given-names>HN</given-names></string-name>, <string-name><surname>Yu</surname> <given-names>K</given-names></string-name></person-group>. <article-title>Integration of blockchain and edge computing in internet of things: a survey</article-title>. <source>Future Gener Comput Syst</source>. <year>2023</year>;<volume>144</volume>(<issue>1</issue>):<fpage>307</fpage>&#x2013;<lpage>26</lpage>. doi:<pub-id pub-id-type="doi">10.1016/j.future.2022.10.029</pub-id>.</mixed-citation></ref>
<ref id="ref-23"><label>[23]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Rahmani</surname> <given-names>AM</given-names></string-name>, <string-name><surname>Tanveer</surname> <given-names>J</given-names></string-name>, <string-name><surname>Gharehchopogh</surname> <given-names>FS</given-names></string-name>, <string-name><surname>Rajabi</surname> <given-names>S</given-names></string-name>, <string-name><surname>Hosseinzadeh</surname> <given-names>M</given-names></string-name></person-group>. <article-title>A novel offloading strategy for multi-user optimization in blockchain-enabled mobile edge computing networks for improved internet of things performance</article-title>. <source>Comput Electr Eng</source>. <year>2024</year>;<volume>119</volume>(<issue>2</issue>):<fpage>109514</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.compeleceng.2024.109514</pub-id>.</mixed-citation></ref>
<ref id="ref-24"><label>[24]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Xu</surname> <given-names>M</given-names></string-name>, <string-name><surname>Ng</surname> <given-names>WC</given-names></string-name>, <string-name><surname>Lim</surname> <given-names>WYB</given-names></string-name>, <string-name><surname>Kang</surname> <given-names>J</given-names></string-name>, <string-name><surname>Xiong</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Niyato</surname> <given-names>D</given-names></string-name>, <etal>et al</etal></person-group>. <article-title>A full dive into realizing the edge-enabled metaverse: visions, enabling technologies, and challenges</article-title>. <source>IEEE Commun Surv Tutor</source>. <year>2022</year>;<volume>25</volume>(<issue>1</issue>):<fpage>656</fpage>&#x2013;<lpage>700</lpage>. doi:<pub-id pub-id-type="doi">10.1109/COMST.2022.3221119</pub-id>.</mixed-citation></ref>
<ref id="ref-25"><label>[25]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Tripathi</surname> <given-names>A</given-names></string-name>, <string-name><surname>Singh</surname> <given-names>AK</given-names></string-name>, <string-name><surname>Choudhary</surname> <given-names>P</given-names></string-name>, <string-name><surname>Vashist</surname> <given-names>PC</given-names></string-name>, <string-name><surname>Mishra</surname> <given-names>K</given-names></string-name></person-group>. <article-title>Significance of wireless technology in Internet of Things (IoT)</article-title>. <source>In: Machine learning and cognitive computing for mobile communications and wireless networks. Scrivener Publishing LLC</source>. <year>2020</year>;<fpage>131</fpage>&#x2013;<lpage>54</lpage>. doi:<pub-id pub-id-type="doi">10.1002/9781119640554.ch6</pub-id>.</mixed-citation></ref>
<ref id="ref-26"><label>[26]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Firouzi</surname> <given-names>F</given-names></string-name>, <string-name><surname>Farahani</surname> <given-names>B</given-names></string-name>, <string-name><surname>Marin&#x0161;ek</surname> <given-names>A</given-names></string-name></person-group>. <article-title>The convergence and interplay of edge, fog, and cloud in the AI-driven Internet of Things (IoT)</article-title>. <source>Inf Syst</source>. <year>2022</year>;<volume>107</volume>(<issue>12</issue>):<fpage>101840</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.is.2021.101840</pub-id>.</mixed-citation></ref>
<ref id="ref-27"><label>[27]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Yan</surname> <given-names>W</given-names></string-name>, <string-name><surname>Wang</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Wang</surname> <given-names>H</given-names></string-name>, <string-name><surname>Wang</surname> <given-names>W</given-names></string-name>, <string-name><surname>Li</surname> <given-names>J</given-names></string-name>, <string-name><surname>Gui</surname> <given-names>X</given-names></string-name></person-group>. <article-title>Survey on recent smart gateways for smart home: systems, technologies, and challenges</article-title>. <source>Trans Emerg Telecomm Technol</source>. <year>2022</year>;<volume>33</volume>(<issue>6</issue>):<fpage>e4067</fpage>. doi:<pub-id pub-id-type="doi">10.1002/ett.4067</pub-id>.</mixed-citation></ref>
<ref id="ref-28"><label>[28]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Haseeb</surname> <given-names>K</given-names></string-name>, <string-name><surname>Din</surname> <given-names>IU</given-names></string-name>, <string-name><surname>Almogren</surname> <given-names>A</given-names></string-name>, <string-name><surname>Ahmed</surname> <given-names>I</given-names></string-name>, <string-name><surname>Guizani</surname> <given-names>M</given-names></string-name></person-group>. <article-title>Intelligent and secure edge-enabled computing model for sustainable cities using green internet of things</article-title>. <source>Sustain Cities Soc</source>. <year>2021</year>;<volume>68</volume>(<issue>6</issue>):<fpage>102779</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.scs.2021.102779</pub-id>.</mixed-citation></ref>
<ref id="ref-29"><label>[29]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Rout</surname> <given-names>RR</given-names></string-name>, <string-name><surname>Vemireddy</surname> <given-names>S</given-names></string-name>, <string-name><surname>Raul</surname> <given-names>SK</given-names></string-name>, <string-name><surname>Somayajulu</surname> <given-names>DV</given-names></string-name></person-group>. <article-title>Fuzzy logic-based emergency vehicle routing: an IoT system development for smart city applications</article-title>. <source>Comput Electr Eng</source>. <year>2020</year>;<volume>88</volume>(<issue>4</issue>):<fpage>106839</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.compeleceng.2020.106839</pub-id>.</mixed-citation></ref>
<ref id="ref-30"><label>[30]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Kait</surname> <given-names>R</given-names></string-name>, <string-name><surname>Kaur</surname> <given-names>S</given-names></string-name>, <string-name><surname>Sharma</surname> <given-names>P</given-names></string-name>, <string-name><surname>Ankita</surname> <given-names>C</given-names></string-name>, <string-name><surname>Kumar</surname> <given-names>T</given-names></string-name>, <string-name><surname>Cheng</surname> <given-names>X</given-names></string-name></person-group>. <article-title>Fuzzy logic-based trusted routing protocol using vehicular cloud networks for smart cities</article-title>. <source>Expert Syst</source>. <year>2024</year>;<volume>42</volume>(<issue>1</issue>):<fpage>e13561</fpage>. doi:<pub-id pub-id-type="doi">10.1111/exsy.13561</pub-id>.</mixed-citation></ref>
<ref id="ref-31"><label>[31]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Padma</surname> <given-names>A</given-names></string-name>, <string-name><surname>Ramaiah</surname> <given-names>M</given-names></string-name></person-group>. <article-title>Blockchain based an efficient and secure privacy preserved framework for smart cities</article-title>. <source>IEEE Access</source>. <year>2024</year>;<volume>12</volume>:<fpage>21985</fpage>&#x2013;<lpage>2002</lpage>. doi:<pub-id pub-id-type="doi">10.1109/ACCESS.2024.3364078</pub-id>.</mixed-citation></ref>
<ref id="ref-32"><label>[32]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Keshari</surname> <given-names>SK</given-names></string-name>, <string-name><surname>Kansal</surname> <given-names>V</given-names></string-name>, <string-name><surname>Kumar</surname> <given-names>S</given-names></string-name>, <string-name><surname>Bansal</surname> <given-names>P</given-names></string-name></person-group>. <article-title>An intelligent energy efficient optimized approach to control the traffic flow in Software-Defined IoT networks</article-title>. <source>Sustain Energy Technol Assess</source>. <year>2023</year>;<volume>55</volume>(<issue>3</issue>):<fpage>102952</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.seta.2022.102952</pub-id>.</mixed-citation></ref>
<ref id="ref-33"><label>[33]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Hosseinzadeh</surname> <given-names>M</given-names></string-name>, <string-name><surname>Yoo</surname> <given-names>J</given-names></string-name>, <string-name><surname>Ali</surname> <given-names>S</given-names></string-name>, <string-name><surname>Lansky</surname> <given-names>J</given-names></string-name>, <string-name><surname>Mildeova</surname> <given-names>S</given-names></string-name>, <string-name><surname>Yousefpoor</surname> <given-names>MS</given-names></string-name>, <etal>et al</etal></person-group>. <article-title>A fuzzy logic-based secure hierarchical routing scheme using firefly algorithm in Internet of Things for healthcare</article-title>. <source>Sci Rep</source>. <year>2023</year>;<volume>13</volume>(<issue>1</issue>):<fpage>11058</fpage>. doi:<pub-id pub-id-type="doi">10.1038/s41598-023-38203-9</pub-id>; <pub-id pub-id-type="pmid">37422490</pub-id></mixed-citation></ref>
<ref id="ref-34"><label>[34]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Yazdinejad</surname> <given-names>A</given-names></string-name>, <string-name><surname>Parizi</surname> <given-names>RM</given-names></string-name>, <string-name><surname>Dehghantanha</surname> <given-names>A</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>Q</given-names></string-name>, <string-name><surname>Choo</surname> <given-names>KKR</given-names></string-name></person-group>. <article-title>An energy-efficient SDN controller architecture for IoT networks with blockchain-based security</article-title>. <source>IEEE Trans Serv Comput</source>. <year>2020</year>;<volume>13</volume>(<issue>4</issue>):<fpage>625</fpage>&#x2013;<lpage>38</lpage>. doi:<pub-id pub-id-type="doi">10.1109/TSC.2020.2966970</pub-id>.</mixed-citation></ref>
<ref id="ref-35"><label>[35]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Srinivas</surname> <given-names>TAS</given-names></string-name>, <string-name><surname>Manivannan</surname> <given-names>S</given-names></string-name></person-group>. <article-title>Black hole and selective forwarding attack detection and prevention in IoT in health care sector: hybrid meta-heuristic-based shortest path routing</article-title>. <source>J Ambient Intell Smart Environ</source>. <year>2021</year>;<volume>13</volume>(<issue>2</issue>):<fpage>133</fpage>&#x2013;<lpage>56</lpage>. doi:<pub-id pub-id-type="doi">10.3233/AIS-210591</pub-id>.</mixed-citation></ref>
</ref-list>
</back></article>








