Generative AI-Enabled Quantum Encryption Algorithm for Securing IoT-Based Healthcare Application Using Blockchain
The integration of artificial intelligence (AI) with the Internet of Things (IoT) has transformed numerous domains through the AI of Things (AIoT). Nonetheless, AIoT encounters issues related to energy usage and carbon emissions as mobile technology continues to progress. Generative AI (GAI) possess...
Saved in:
| Published in | IEEE internet of things journal Vol. 12; no. 13; pp. 24541 - 24551 |
|---|---|
| Main Authors | , , , |
| Format | Journal Article |
| Language | English |
| Published |
Piscataway
IEEE
01.07.2025
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Subjects | |
| Online Access | Get full text |
| ISSN | 2327-4662 2327-4662 |
| DOI | 10.1109/JIOT.2025.3555159 |
Cover
| Abstract | The integration of artificial intelligence (AI) with the Internet of Things (IoT) has transformed numerous domains through the AI of Things (AIoT). Nonetheless, AIoT encounters issues related to energy usage and carbon emissions as mobile technology continues to progress. Generative AI (GAI) possesses significant potential to mitigate carbon emissions associated with AIoT, owing to its higher reasoning and generative powers. Conventional security protocols frequently encounter issues with computational efficiency, latency, and overall security comprehensiveness. Blockchain technology, characterized by its decentralized and immutable properties, is a viable approach for improving electronic healthcare data transmission and node authentication in IoT networks. This research examines secure data transmission and node encryption in IoT systems, with a particular emphasis on data management. Conventional approaches encounter constraints in computational efficiency, latency, and comprehensive security. This study presents a novel protocol that combines GAI and blockchain technology with quantum encryption to enhance authentication and ensure secure data transmission. The algorithm comprises multiple consecutive processes, including the encoding and transmission of node requests, followed by the authentication process utilizing hash functions and digital signatures. The authentication approach utilizes a challenge-response technique, guaranteeing that only nodes with authentic credentials can advance. Thereafter, a dynamic key exchange protocol and quantum encryption method provide secure data delivery. The results indicate the procedure's effectiveness in ensuring secure and regulated access to patient data, underscoring its significance in medical facilities. The system's functionalities are augmented by a thorough evaluation employing machine learning. The findings indicate that the system exhibits an accuracy of 99.4%, precision of 99.10%, recall of 98.66%, F1-score of 98.50%, and security of 99.2%. An extensive analysis and comparison with the state-of-the-art methods demonstrate the significant advancements of the suggested method in tackling cryptographic security challenges. The algorithm offers a thorough approach to protecting IoT applications, especially in managing healthcare data. |
|---|---|
| AbstractList | The integration of artificial intelligence (AI) with the Internet of Things (IoT) has transformed numerous domains through the AI of Things (AIoT). Nonetheless, AIoT encounters issues related to energy usage and carbon emissions as mobile technology continues to progress. Generative AI (GAI) possesses significant potential to mitigate carbon emissions associated with AIoT, owing to its higher reasoning and generative powers. Conventional security protocols frequently encounter issues with computational efficiency, latency, and overall security comprehensiveness. Blockchain technology, characterized by its decentralized and immutable properties, is a viable approach for improving electronic healthcare data transmission and node authentication in IoT networks. This research examines secure data transmission and node encryption in IoT systems, with a particular emphasis on data management. Conventional approaches encounter constraints in computational efficiency, latency, and comprehensive security. This study presents a novel protocol that combines GAI and blockchain technology with quantum encryption to enhance authentication and ensure secure data transmission. The algorithm comprises multiple consecutive processes, including the encoding and transmission of node requests, followed by the authentication process utilizing hash functions and digital signatures. The authentication approach utilizes a challenge-response technique, guaranteeing that only nodes with authentic credentials can advance. Thereafter, a dynamic key exchange protocol and quantum encryption method provide secure data delivery. The results indicate the procedure’s effectiveness in ensuring secure and regulated access to patient data, underscoring its significance in medical facilities. The system’s functionalities are augmented by a thorough evaluation employing machine learning. The findings indicate that the system exhibits an accuracy of 99.4%, precision of 99.10%, recall of 98.66%, F1-score of 98.50%, and security of 99.2%. An extensive analysis and comparison with the state-of-the-art methods demonstrate the significant advancements of the suggested method in tackling cryptographic security challenges. The algorithm offers a thorough approach to protecting IoT applications, especially in managing healthcare data. |
| Author | Prajapat, Sunil Muhammad, Ghulam Kumar, Pankaj Das, Ashok Kumar |
| Author_xml | – sequence: 1 givenname: Sunil orcidid: 0000-0001-9343-5182 surname: Prajapat fullname: Prajapat, Sunil email: sunilprajapat645@gmail.com organization: Srinivasa Ramanujan Department of Mathematics, Central University of Himachal Pradesh, Dharamshala, India – sequence: 2 givenname: Pankaj orcidid: 0000-0002-4589-3573 surname: Kumar fullname: Kumar, Pankaj email: pkumar240183@gmail.com organization: Srinivasa Ramanujan Department of Mathematics, Central University of Himachal Pradesh, Dharamshala, India – sequence: 3 givenname: Ashok Kumar orcidid: 0000-0002-5196-9589 surname: Das fullname: Das, Ashok Kumar email: iitkgp.akdas@gmail.com organization: Center for Security, Theory and Algorithmic Research, International Institute of Information Technology Hyderabad, Hyderabad, India – sequence: 4 givenname: Ghulam orcidid: 0000-0002-9781-3969 surname: Muhammad fullname: Muhammad, Ghulam email: ghulam@ksu.edu.sa organization: Department of Computer Engineering, College of Computer and Information Sciences, King Saud University, Riyadh, Saudi Arabia |
| BookMark | eNpNkEFrwjAYhsNwMOf8AYMdCjvXJWnSNEcVpx2CjOk5xPhV62pS03bgv187d_D0vYfneT94H1HPOgsIPRM8IgTLt490tR5RTPko4pwTLu9Qn0ZUhCyOae8mP6BhVR0xxq3GiYz76DwHC17X-Q8E4zScWb0tYBd8NtrWzSmYWeMvZZ07G4yLvfN5fTgFmfPBF5jG53YfpG4dTnTVOgvQRX0w2rdNZVnkRv95m6rDJoUz3-agc_uE7jNdVDD8vwO0eZ-tp4twuZqn0_EyNJQldbgDnsktE0nGOPBEG8YEpyQzJNZkpxmNkwgnmmEQkoidYKwNGKTkYitwBtEAvV57S-_ODVS1OrrG2_aliiilscAJS1qKXCnjXVV5yFTp85P2F0Ww6sZV3biqG1f9j9s6L1cnB4AbXkaJFCL6BZJWd2c |
| CODEN | IITJAU |
| Cites_doi | 10.1109/JSYST.2020.2963840 10.1016/j.future.2024.107581 10.1109/ACCESS.2017.2730843 10.32604/cmc.2022.029637 10.1109/MNET.2024.3401159 10.1109/ACCESS.2020.2973178 10.1109/ACCESS.2018.2871170 10.1038/s41598-024-51578-7 10.1109/ACCESS.2022.3147795 10.1007/978-981-15-9547-9_6 10.3390/fi14070216 10.1038/s41598-024-75708-3 10.1109/ACCESS.2024.3424685 10.1109/GLOCOM.2018.8647221 10.1038/s41893-023-01206-5 10.1109/MWC.007.2300582 10.1109/MeditCom49071.2021.9647521 10.1007/s42979-024-02660-4 10.1007/s10586-024-04411-9 10.1007/s12083-024-01786-9 10.1016/j.ijin.2024.03.001 10.1109/JIOT.2018.2812239 10.1109/JIOT.2018.2882794 10.1109/ACCESS.2021.3051602 10.1145/3360774.3360822 10.1109/JIOT.2020.3008906 10.1155/2022/4741923 10.3390/s22020572 10.1109/OJCOMS.2024.3522000 10.1109/PIMRC.2017.8292361 10.1016/j.future.2017.11.022 10.1109/ACCESS.2019.2917555 10.1016/j.jii.2019.05.002 10.1109/MNET.011.2000147 10.1007/s10586-021-03260-0 10.3390/jsan8010015 10.1007/s11227-023-05577-6 10.1007/s10586-024-04412-8 10.1109/JIOT.2024.3448212 10.3390/app11041772 |
| ContentType | Journal Article |
| Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2025 |
| Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2025 |
| DBID | 97E RIA RIE AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D |
| DOI | 10.1109/JIOT.2025.3555159 |
| DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
| DatabaseTitle | CrossRef Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace ProQuest Computer Science Collection Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | Computer and Information Systems Abstracts |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 2327-4662 |
| EndPage | 24551 |
| ExternalDocumentID | 10_1109_JIOT_2025_3555159 10938977 |
| Genre | orig-research |
| GrantInformation_xml | – fundername: King Saud University, Riyadh, Saudi Arabia grantid: ORF-2025-34 |
| GroupedDBID | 0R~ 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABJNI ABQJQ ABVLG AGQYO AHBIQ AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ EBS IFIPE IPLJI JAVBF M43 OCL PQQKQ RIA RIE AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D |
| ID | FETCH-LOGICAL-c248t-de5f9b478f45e58ac447521fc16a1da4268308a40e7917d744e790e9957b70fe3 |
| IEDL.DBID | RIE |
| ISSN | 2327-4662 |
| IngestDate | Sun Oct 26 20:43:05 EDT 2025 Wed Oct 01 05:48:13 EDT 2025 Wed Jul 16 07:57:37 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | true |
| Issue | 13 |
| Language | English |
| License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html https://doi.org/10.15223/policy-029 https://doi.org/10.15223/policy-037 |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c248t-de5f9b478f45e58ac447521fc16a1da4268308a40e7917d744e790e9957b70fe3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0001-9343-5182 0000-0002-9781-3969 0000-0002-4589-3573 0000-0002-5196-9589 |
| PQID | 3222670848 |
| PQPubID | 2040421 |
| PageCount | 11 |
| ParticipantIDs | crossref_primary_10_1109_JIOT_2025_3555159 ieee_primary_10938977 proquest_journals_3222670848 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 2025-07-01 |
| PublicationDateYYYYMMDD | 2025-07-01 |
| PublicationDate_xml | – month: 07 year: 2025 text: 2025-07-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationPlace | Piscataway |
| PublicationPlace_xml | – name: Piscataway |
| PublicationTitle | IEEE internet of things journal |
| PublicationTitleAbbrev | JIoT |
| PublicationYear | 2025 |
| Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| References | ref13 ref35 ref12 ref34 ref15 ref37 ref36 ref31 ref30 ref11 ref33 ref10 ref32 ref2 ref1 ref17 ref39 ref16 ref38 ref19 ref18 Baliga (ref14) 2017; 4 ref24 ref23 ref26 ref25 ref20 ref41 ref22 ref21 ref28 ref27 ref29 ref8 ref7 ref9 ref4 ref3 ref6 ref5 ref40 |
| References_xml | – ident: ref10 doi: 10.1109/JSYST.2020.2963840 – ident: ref19 doi: 10.1016/j.future.2024.107581 – ident: ref34 doi: 10.1109/ACCESS.2017.2730843 – ident: ref24 doi: 10.32604/cmc.2022.029637 – ident: ref3 doi: 10.1109/MNET.2024.3401159 – ident: ref28 doi: 10.1109/ACCESS.2020.2973178 – ident: ref32 doi: 10.1109/ACCESS.2018.2871170 – ident: ref38 doi: 10.1038/s41598-024-51578-7 – ident: ref22 doi: 10.1109/ACCESS.2022.3147795 – ident: ref25 doi: 10.1007/978-981-15-9547-9_6 – ident: ref21 doi: 10.3390/fi14070216 – ident: ref39 doi: 10.1038/s41598-024-75708-3 – ident: ref41 doi: 10.1109/ACCESS.2024.3424685 – ident: ref33 doi: 10.1109/GLOCOM.2018.8647221 – ident: ref1 doi: 10.1038/s41893-023-01206-5 – ident: ref2 doi: 10.1109/MWC.007.2300582 – ident: ref27 doi: 10.1109/MeditCom49071.2021.9647521 – ident: ref7 doi: 10.1007/s42979-024-02660-4 – ident: ref9 doi: 10.1007/s10586-024-04411-9 – ident: ref37 doi: 10.1007/s12083-024-01786-9 – ident: ref40 doi: 10.1016/j.ijin.2024.03.001 – ident: ref15 doi: 10.1109/JIOT.2018.2812239 – ident: ref36 doi: 10.1109/JIOT.2018.2882794 – ident: ref18 doi: 10.1109/ACCESS.2021.3051602 – ident: ref13 doi: 10.1145/3360774.3360822 – ident: ref29 doi: 10.1109/JIOT.2020.3008906 – ident: ref4 doi: 10.1155/2022/4741923 – ident: ref30 doi: 10.3390/s22020572 – ident: ref20 doi: 10.1109/OJCOMS.2024.3522000 – ident: ref35 doi: 10.1109/PIMRC.2017.8292361 – ident: ref6 doi: 10.1016/j.future.2017.11.022 – ident: ref31 doi: 10.1109/ACCESS.2019.2917555 – ident: ref8 doi: 10.1016/j.jii.2019.05.002 – ident: ref11 doi: 10.1109/MNET.011.2000147 – ident: ref23 doi: 10.1007/s10586-021-03260-0 – ident: ref12 doi: 10.3390/jsan8010015 – ident: ref5 doi: 10.1007/s11227-023-05577-6 – ident: ref17 doi: 10.1007/s10586-024-04412-8 – volume: 4 start-page: 14 issue: 1 year: 2017 ident: ref14 article-title: Understanding blockchain consensus models publication-title: Persistent – ident: ref16 doi: 10.1109/JIOT.2024.3448212 – ident: ref26 doi: 10.3390/app11041772 |
| SSID | ssj0001105196 |
| Score | 2.3468635 |
| Snippet | The integration of artificial intelligence (AI) with the Internet of Things (IoT) has transformed numerous domains through the AI of Things (AIoT).... |
| SourceID | proquest crossref ieee |
| SourceType | Aggregation Database Index Database Publisher |
| StartPage | 24541 |
| SubjectTerms | Algorithms Artificial intelligence Authentication Blockchain Blockchains Carbon Carbon dioxide Computational efficiency Cryptography Cybersecurity Data communication Data management Data transmission Digital signatures Emissions Encryption Energy consumption Generative artificial intelligence generative artificial intelligence (GAI) Hash based algorithms Health care Internet of Things Internet of Things (IoT) Machine learning machine learning (ML) Medical services Network latency Nodes Protocols quantum computing quantum encryption Security |
| Title | Generative AI-Enabled Quantum Encryption Algorithm for Securing IoT-Based Healthcare Application Using Blockchain |
| URI | https://ieeexplore.ieee.org/document/10938977 https://www.proquest.com/docview/3222670848 |
| Volume | 12 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVIEE databaseName: IEEE Electronic Library (IEL) customDbUrl: eissn: 2327-4662 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0001105196 issn: 2327-4662 databaseCode: RIE dateStart: 20140101 isFulltext: true titleUrlDefault: https://ieeexplore.ieee.org/ providerName: IEEE |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV05T8MwFLagEws3olCQByaktEnwlbFFRW2HIqRWYot8vLQISKEkA_x6bCflFBKbFT1Hlp_t790PoTN7lyOdWCWHCEkDIg0EiWZRAABZrLgIGfgA2TEbTMnolt7Wyeo-F8YS-eAzaLuh9-WbhS6dqazjSh8JK7Cso3UuWJWs9WlQiZw0wmrPpSXtjIbXE6sBxrRtQdXh9jfs8c1Ufr3AHlauttB4taAqmuS-XRaqrd9-1Gr894q30WYtYOJudSJ20Brku2hr1bwB13d5Dz1XBafda4e7w6Dvc6gMvintVpePuJ_r5at_TnD3YbZY3hXzR2wFXFwb6Gd4uJgEPYuBBg8-Yshw99Mfjn00Au5ZtLzXc3mX76PpVX9yOQjq_guBjokoAgM0SxThIiMUqJDaFQeMo0xHTEZGWmwXF6GQJARulT7DCbGDEJKEcsXDDC4OUCNf5HCIsGJEUjAmohwIoUrFCbHflIRQMZC8ic5XnEmfqjIbqVdPwiR1bEwdG9OajU2073b6C2G1yU3UWjEzrW_iS-o8SYy7rgFHf0w7Rhvu71UMbgs1imUJJ1bSKNSpP2HvizrSuQ |
| linkProvider | IEEE |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT9wwEB6120N7YSmlYnm0PnCqlCUJdpwcF7Rol9JFlRaJW-THBBCQhSU5wK9n7GR5tELiZkVjxfLY_uY9ANt0lyOTkZLDUyUCriwGmUmiABGLWMs0TNAHyE6S0Qk_PBWnbbK6z4UhIh98hn039L58OzO1M5XtuNJHKQksH-GT4JyLJl3r2aQSOXkkaX2XRLxzOD6ekg4Yiz7BqkPuV-jj26n89wZ7YDnowmSxpCae5LJfV7pvHv6p1vjuNS_DUitiskFzJr7CByxXoLto38Da2_wNbpuS0-69Y4NxMPRZVJb9rWmz62s2LM383j8obHB1NptfVOfXjERc1proz9h4Ng32CAUtGz1FkbHBs0ec-XgEtkd4eWnO1UW5CicHw-n-KGg7MAQm5mkVWBRFprlMCy5QpMq48oBxVJgoUZFVhO7pbpgqHqIktc9KzmkQYpYJqWVY4O536JSzEteA6YQrgdZGQiKxTus44_RNKwx1gkr24NeCM_lNU2gj9wpKmOWOjbljY96ysQerbqdfEDab3IPNBTPz9i7e5c6XlEjXN2D9jWk_4fNo-ucoPxpPfm_AF_enJiJ3EzrVvMYtkjsq_cOftke7mtYG |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Generative+AI-Enabled+Quantum+Encryption+Algorithm+for+Securing+IoT-Based+Healthcare+Application+Using+Blockchain&rft.jtitle=IEEE+internet+of+things+journal&rft.au=Prajapat%2C+Sunil&rft.au=Kumar%2C+Pankaj&rft.au=Das%2C+Ashok+Kumar&rft.au=Muhammad%2C+Ghulam&rft.date=2025-07-01&rft.pub=The+Institute+of+Electrical+and+Electronics+Engineers%2C+Inc.+%28IEEE%29&rft.eissn=2327-4662&rft.volume=12&rft.issue=21&rft.spage=24541&rft.epage=24551&rft_id=info:doi/10.1109%2FJIOT.2025.3555159&rft.externalDBID=NO_FULL_TEXT |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2327-4662&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2327-4662&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2327-4662&client=summon |