Generative AI-Enabled Quantum Encryption Algorithm for Securing IoT-Based Healthcare Application Using Blockchain

The integration of artificial intelligence (AI) with the Internet of Things (IoT) has transformed numerous domains through the AI of Things (AIoT). Nonetheless, AIoT encounters issues related to energy usage and carbon emissions as mobile technology continues to progress. Generative AI (GAI) possess...

Full description

Saved in:
Bibliographic Details
Published inIEEE internet of things journal Vol. 12; no. 13; pp. 24541 - 24551
Main Authors Prajapat, Sunil, Kumar, Pankaj, Das, Ashok Kumar, Muhammad, Ghulam
Format Journal Article
LanguageEnglish
Published Piscataway IEEE 01.07.2025
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text
ISSN2327-4662
2327-4662
DOI10.1109/JIOT.2025.3555159

Cover

Abstract The integration of artificial intelligence (AI) with the Internet of Things (IoT) has transformed numerous domains through the AI of Things (AIoT). Nonetheless, AIoT encounters issues related to energy usage and carbon emissions as mobile technology continues to progress. Generative AI (GAI) possesses significant potential to mitigate carbon emissions associated with AIoT, owing to its higher reasoning and generative powers. Conventional security protocols frequently encounter issues with computational efficiency, latency, and overall security comprehensiveness. Blockchain technology, characterized by its decentralized and immutable properties, is a viable approach for improving electronic healthcare data transmission and node authentication in IoT networks. This research examines secure data transmission and node encryption in IoT systems, with a particular emphasis on data management. Conventional approaches encounter constraints in computational efficiency, latency, and comprehensive security. This study presents a novel protocol that combines GAI and blockchain technology with quantum encryption to enhance authentication and ensure secure data transmission. The algorithm comprises multiple consecutive processes, including the encoding and transmission of node requests, followed by the authentication process utilizing hash functions and digital signatures. The authentication approach utilizes a challenge-response technique, guaranteeing that only nodes with authentic credentials can advance. Thereafter, a dynamic key exchange protocol and quantum encryption method provide secure data delivery. The results indicate the procedure's effectiveness in ensuring secure and regulated access to patient data, underscoring its significance in medical facilities. The system's functionalities are augmented by a thorough evaluation employing machine learning. The findings indicate that the system exhibits an accuracy of 99.4%, precision of 99.10%, recall of 98.66%, F1-score of 98.50%, and security of 99.2%. An extensive analysis and comparison with the state-of-the-art methods demonstrate the significant advancements of the suggested method in tackling cryptographic security challenges. The algorithm offers a thorough approach to protecting IoT applications, especially in managing healthcare data.
AbstractList The integration of artificial intelligence (AI) with the Internet of Things (IoT) has transformed numerous domains through the AI of Things (AIoT). Nonetheless, AIoT encounters issues related to energy usage and carbon emissions as mobile technology continues to progress. Generative AI (GAI) possesses significant potential to mitigate carbon emissions associated with AIoT, owing to its higher reasoning and generative powers. Conventional security protocols frequently encounter issues with computational efficiency, latency, and overall security comprehensiveness. Blockchain technology, characterized by its decentralized and immutable properties, is a viable approach for improving electronic healthcare data transmission and node authentication in IoT networks. This research examines secure data transmission and node encryption in IoT systems, with a particular emphasis on data management. Conventional approaches encounter constraints in computational efficiency, latency, and comprehensive security. This study presents a novel protocol that combines GAI and blockchain technology with quantum encryption to enhance authentication and ensure secure data transmission. The algorithm comprises multiple consecutive processes, including the encoding and transmission of node requests, followed by the authentication process utilizing hash functions and digital signatures. The authentication approach utilizes a challenge-response technique, guaranteeing that only nodes with authentic credentials can advance. Thereafter, a dynamic key exchange protocol and quantum encryption method provide secure data delivery. The results indicate the procedure’s effectiveness in ensuring secure and regulated access to patient data, underscoring its significance in medical facilities. The system’s functionalities are augmented by a thorough evaluation employing machine learning. The findings indicate that the system exhibits an accuracy of 99.4%, precision of 99.10%, recall of 98.66%, F1-score of 98.50%, and security of 99.2%. An extensive analysis and comparison with the state-of-the-art methods demonstrate the significant advancements of the suggested method in tackling cryptographic security challenges. The algorithm offers a thorough approach to protecting IoT applications, especially in managing healthcare data.
Author Prajapat, Sunil
Muhammad, Ghulam
Kumar, Pankaj
Das, Ashok Kumar
Author_xml – sequence: 1
  givenname: Sunil
  orcidid: 0000-0001-9343-5182
  surname: Prajapat
  fullname: Prajapat, Sunil
  email: sunilprajapat645@gmail.com
  organization: Srinivasa Ramanujan Department of Mathematics, Central University of Himachal Pradesh, Dharamshala, India
– sequence: 2
  givenname: Pankaj
  orcidid: 0000-0002-4589-3573
  surname: Kumar
  fullname: Kumar, Pankaj
  email: pkumar240183@gmail.com
  organization: Srinivasa Ramanujan Department of Mathematics, Central University of Himachal Pradesh, Dharamshala, India
– sequence: 3
  givenname: Ashok Kumar
  orcidid: 0000-0002-5196-9589
  surname: Das
  fullname: Das, Ashok Kumar
  email: iitkgp.akdas@gmail.com
  organization: Center for Security, Theory and Algorithmic Research, International Institute of Information Technology Hyderabad, Hyderabad, India
– sequence: 4
  givenname: Ghulam
  orcidid: 0000-0002-9781-3969
  surname: Muhammad
  fullname: Muhammad, Ghulam
  email: ghulam@ksu.edu.sa
  organization: Department of Computer Engineering, College of Computer and Information Sciences, King Saud University, Riyadh, Saudi Arabia
BookMark eNpNkEFrwjAYhsNwMOf8AYMdCjvXJWnSNEcVpx2CjOk5xPhV62pS03bgv187d_D0vYfneT94H1HPOgsIPRM8IgTLt490tR5RTPko4pwTLu9Qn0ZUhCyOae8mP6BhVR0xxq3GiYz76DwHC17X-Q8E4zScWb0tYBd8NtrWzSmYWeMvZZ07G4yLvfN5fTgFmfPBF5jG53YfpG4dTnTVOgvQRX0w2rdNZVnkRv95m6rDJoUz3-agc_uE7jNdVDD8vwO0eZ-tp4twuZqn0_EyNJQldbgDnsktE0nGOPBEG8YEpyQzJNZkpxmNkwgnmmEQkoidYKwNGKTkYitwBtEAvV57S-_ODVS1OrrG2_aliiilscAJS1qKXCnjXVV5yFTp85P2F0Ww6sZV3biqG1f9j9s6L1cnB4AbXkaJFCL6BZJWd2c
CODEN IITJAU
Cites_doi 10.1109/JSYST.2020.2963840
10.1016/j.future.2024.107581
10.1109/ACCESS.2017.2730843
10.32604/cmc.2022.029637
10.1109/MNET.2024.3401159
10.1109/ACCESS.2020.2973178
10.1109/ACCESS.2018.2871170
10.1038/s41598-024-51578-7
10.1109/ACCESS.2022.3147795
10.1007/978-981-15-9547-9_6
10.3390/fi14070216
10.1038/s41598-024-75708-3
10.1109/ACCESS.2024.3424685
10.1109/GLOCOM.2018.8647221
10.1038/s41893-023-01206-5
10.1109/MWC.007.2300582
10.1109/MeditCom49071.2021.9647521
10.1007/s42979-024-02660-4
10.1007/s10586-024-04411-9
10.1007/s12083-024-01786-9
10.1016/j.ijin.2024.03.001
10.1109/JIOT.2018.2812239
10.1109/JIOT.2018.2882794
10.1109/ACCESS.2021.3051602
10.1145/3360774.3360822
10.1109/JIOT.2020.3008906
10.1155/2022/4741923
10.3390/s22020572
10.1109/OJCOMS.2024.3522000
10.1109/PIMRC.2017.8292361
10.1016/j.future.2017.11.022
10.1109/ACCESS.2019.2917555
10.1016/j.jii.2019.05.002
10.1109/MNET.011.2000147
10.1007/s10586-021-03260-0
10.3390/jsan8010015
10.1007/s11227-023-05577-6
10.1007/s10586-024-04412-8
10.1109/JIOT.2024.3448212
10.3390/app11041772
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2025
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2025
DBID 97E
RIA
RIE
AAYXX
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
DOI 10.1109/JIOT.2025.3555159
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Computer and Information Systems Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Computer and Information Systems Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Advanced Technologies Database with Aerospace
ProQuest Computer Science Collection
Computer and Information Systems Abstracts Professional
DatabaseTitleList Computer and Information Systems Abstracts

Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 2327-4662
EndPage 24551
ExternalDocumentID 10_1109_JIOT_2025_3555159
10938977
Genre orig-research
GrantInformation_xml – fundername: King Saud University, Riyadh, Saudi Arabia
  grantid: ORF-2025-34
GroupedDBID 0R~
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABJNI
ABQJQ
ABVLG
AGQYO
AHBIQ
AKJIK
AKQYR
ALMA_UNASSIGNED_HOLDINGS
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
EBS
IFIPE
IPLJI
JAVBF
M43
OCL
PQQKQ
RIA
RIE
AAYXX
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c248t-de5f9b478f45e58ac447521fc16a1da4268308a40e7917d744e790e9957b70fe3
IEDL.DBID RIE
ISSN 2327-4662
IngestDate Sun Oct 26 20:43:05 EDT 2025
Wed Oct 01 05:48:13 EDT 2025
Wed Jul 16 07:57:37 EDT 2025
IsPeerReviewed false
IsScholarly true
Issue 13
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
https://doi.org/10.15223/policy-029
https://doi.org/10.15223/policy-037
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c248t-de5f9b478f45e58ac447521fc16a1da4268308a40e7917d744e790e9957b70fe3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0001-9343-5182
0000-0002-9781-3969
0000-0002-4589-3573
0000-0002-5196-9589
PQID 3222670848
PQPubID 2040421
PageCount 11
ParticipantIDs crossref_primary_10_1109_JIOT_2025_3555159
ieee_primary_10938977
proquest_journals_3222670848
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2025-07-01
PublicationDateYYYYMMDD 2025-07-01
PublicationDate_xml – month: 07
  year: 2025
  text: 2025-07-01
  day: 01
PublicationDecade 2020
PublicationPlace Piscataway
PublicationPlace_xml – name: Piscataway
PublicationTitle IEEE internet of things journal
PublicationTitleAbbrev JIoT
PublicationYear 2025
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref13
ref35
ref12
ref34
ref15
ref37
ref36
ref31
ref30
ref11
ref33
ref10
ref32
ref2
ref1
ref17
ref39
ref16
ref38
ref19
ref18
Baliga (ref14) 2017; 4
ref24
ref23
ref26
ref25
ref20
ref41
ref22
ref21
ref28
ref27
ref29
ref8
ref7
ref9
ref4
ref3
ref6
ref5
ref40
References_xml – ident: ref10
  doi: 10.1109/JSYST.2020.2963840
– ident: ref19
  doi: 10.1016/j.future.2024.107581
– ident: ref34
  doi: 10.1109/ACCESS.2017.2730843
– ident: ref24
  doi: 10.32604/cmc.2022.029637
– ident: ref3
  doi: 10.1109/MNET.2024.3401159
– ident: ref28
  doi: 10.1109/ACCESS.2020.2973178
– ident: ref32
  doi: 10.1109/ACCESS.2018.2871170
– ident: ref38
  doi: 10.1038/s41598-024-51578-7
– ident: ref22
  doi: 10.1109/ACCESS.2022.3147795
– ident: ref25
  doi: 10.1007/978-981-15-9547-9_6
– ident: ref21
  doi: 10.3390/fi14070216
– ident: ref39
  doi: 10.1038/s41598-024-75708-3
– ident: ref41
  doi: 10.1109/ACCESS.2024.3424685
– ident: ref33
  doi: 10.1109/GLOCOM.2018.8647221
– ident: ref1
  doi: 10.1038/s41893-023-01206-5
– ident: ref2
  doi: 10.1109/MWC.007.2300582
– ident: ref27
  doi: 10.1109/MeditCom49071.2021.9647521
– ident: ref7
  doi: 10.1007/s42979-024-02660-4
– ident: ref9
  doi: 10.1007/s10586-024-04411-9
– ident: ref37
  doi: 10.1007/s12083-024-01786-9
– ident: ref40
  doi: 10.1016/j.ijin.2024.03.001
– ident: ref15
  doi: 10.1109/JIOT.2018.2812239
– ident: ref36
  doi: 10.1109/JIOT.2018.2882794
– ident: ref18
  doi: 10.1109/ACCESS.2021.3051602
– ident: ref13
  doi: 10.1145/3360774.3360822
– ident: ref29
  doi: 10.1109/JIOT.2020.3008906
– ident: ref4
  doi: 10.1155/2022/4741923
– ident: ref30
  doi: 10.3390/s22020572
– ident: ref20
  doi: 10.1109/OJCOMS.2024.3522000
– ident: ref35
  doi: 10.1109/PIMRC.2017.8292361
– ident: ref6
  doi: 10.1016/j.future.2017.11.022
– ident: ref31
  doi: 10.1109/ACCESS.2019.2917555
– ident: ref8
  doi: 10.1016/j.jii.2019.05.002
– ident: ref11
  doi: 10.1109/MNET.011.2000147
– ident: ref23
  doi: 10.1007/s10586-021-03260-0
– ident: ref12
  doi: 10.3390/jsan8010015
– ident: ref5
  doi: 10.1007/s11227-023-05577-6
– ident: ref17
  doi: 10.1007/s10586-024-04412-8
– volume: 4
  start-page: 14
  issue: 1
  year: 2017
  ident: ref14
  article-title: Understanding blockchain consensus models
  publication-title: Persistent
– ident: ref16
  doi: 10.1109/JIOT.2024.3448212
– ident: ref26
  doi: 10.3390/app11041772
SSID ssj0001105196
Score 2.3468635
Snippet The integration of artificial intelligence (AI) with the Internet of Things (IoT) has transformed numerous domains through the AI of Things (AIoT)....
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Index Database
Publisher
StartPage 24541
SubjectTerms Algorithms
Artificial intelligence
Authentication
Blockchain
Blockchains
Carbon
Carbon dioxide
Computational efficiency
Cryptography
Cybersecurity
Data communication
Data management
Data transmission
Digital signatures
Emissions
Encryption
Energy consumption
Generative artificial intelligence
generative artificial intelligence (GAI)
Hash based algorithms
Health care
Internet of Things
Internet of Things (IoT)
Machine learning
machine learning (ML)
Medical services
Network latency
Nodes
Protocols
quantum computing
quantum encryption
Security
Title Generative AI-Enabled Quantum Encryption Algorithm for Securing IoT-Based Healthcare Application Using Blockchain
URI https://ieeexplore.ieee.org/document/10938977
https://www.proquest.com/docview/3222670848
Volume 12
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVIEE
  databaseName: IEEE Electronic Library (IEL)
  customDbUrl:
  eissn: 2327-4662
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0001105196
  issn: 2327-4662
  databaseCode: RIE
  dateStart: 20140101
  isFulltext: true
  titleUrlDefault: https://ieeexplore.ieee.org/
  providerName: IEEE
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV05T8MwFLagEws3olCQByaktEnwlbFFRW2HIqRWYot8vLQISKEkA_x6bCflFBKbFT1Hlp_t790PoTN7lyOdWCWHCEkDIg0EiWZRAABZrLgIGfgA2TEbTMnolt7Wyeo-F8YS-eAzaLuh9-WbhS6dqazjSh8JK7Cso3UuWJWs9WlQiZw0wmrPpSXtjIbXE6sBxrRtQdXh9jfs8c1Ufr3AHlauttB4taAqmuS-XRaqrd9-1Gr894q30WYtYOJudSJ20Brku2hr1bwB13d5Dz1XBafda4e7w6Dvc6gMvintVpePuJ_r5at_TnD3YbZY3hXzR2wFXFwb6Gd4uJgEPYuBBg8-Yshw99Mfjn00Au5ZtLzXc3mX76PpVX9yOQjq_guBjokoAgM0SxThIiMUqJDaFQeMo0xHTEZGWmwXF6GQJARulT7DCbGDEJKEcsXDDC4OUCNf5HCIsGJEUjAmohwIoUrFCbHflIRQMZC8ic5XnEmfqjIbqVdPwiR1bEwdG9OajU2073b6C2G1yU3UWjEzrW_iS-o8SYy7rgFHf0w7Rhvu71UMbgs1imUJJ1bSKNSpP2HvizrSuQ
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT9wwEB6120N7YSmlYnm0PnCqlCUJdpwcF7Rol9JFlRaJW-THBBCQhSU5wK9n7GR5tELiZkVjxfLY_uY9ANt0lyOTkZLDUyUCriwGmUmiABGLWMs0TNAHyE6S0Qk_PBWnbbK6z4UhIh98hn039L58OzO1M5XtuNJHKQksH-GT4JyLJl3r2aQSOXkkaX2XRLxzOD6ekg4Yiz7BqkPuV-jj26n89wZ7YDnowmSxpCae5LJfV7pvHv6p1vjuNS_DUitiskFzJr7CByxXoLto38Da2_wNbpuS0-69Y4NxMPRZVJb9rWmz62s2LM383j8obHB1NptfVOfXjERc1proz9h4Ng32CAUtGz1FkbHBs0ec-XgEtkd4eWnO1UW5CicHw-n-KGg7MAQm5mkVWBRFprlMCy5QpMq48oBxVJgoUZFVhO7pbpgqHqIktc9KzmkQYpYJqWVY4O536JSzEteA6YQrgdZGQiKxTus44_RNKwx1gkr24NeCM_lNU2gj9wpKmOWOjbljY96ysQerbqdfEDab3IPNBTPz9i7e5c6XlEjXN2D9jWk_4fNo-ucoPxpPfm_AF_enJiJ3EzrVvMYtkjsq_cOftke7mtYG
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Generative+AI-Enabled+Quantum+Encryption+Algorithm+for+Securing+IoT-Based+Healthcare+Application+Using+Blockchain&rft.jtitle=IEEE+internet+of+things+journal&rft.au=Prajapat%2C+Sunil&rft.au=Kumar%2C+Pankaj&rft.au=Das%2C+Ashok+Kumar&rft.au=Muhammad%2C+Ghulam&rft.date=2025-07-01&rft.pub=The+Institute+of+Electrical+and+Electronics+Engineers%2C+Inc.+%28IEEE%29&rft.eissn=2327-4662&rft.volume=12&rft.issue=21&rft.spage=24541&rft.epage=24551&rft_id=info:doi/10.1109%2FJIOT.2025.3555159&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2327-4662&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2327-4662&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2327-4662&client=summon