{"id":"https://openalex.org/W7121649070","doi":"https://doi.org/10.1007/s10586-025-05932-7","title":"Energy-efficient threat detection in IoT healthcare using AI and blockchain-enhanced fog\u2013cloud architecture","display_name":"Energy-efficient threat detection in IoT healthcare using AI and blockchain-enhanced fog\u2013cloud architecture","publication_year":2026,"publication_date":"2026-01-10","ids":{"openalex":"https://openalex.org/W7121649070","doi":"https://doi.org/10.1007/s10586-025-05932-7"},"language":"en","primary_location":{"id":"doi:10.1007/s10586-025-05932-7","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10586-025-05932-7","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10586-025-05932-7.pdf","source":{"id":"https://openalex.org/S106148199","display_name":"Cluster Computing","issn_l":"1386-7857","issn":["1386-7857","1573-7543"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cluster Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s10586-025-05932-7.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5051474198","display_name":"Malak Alamri","orcid":"https://orcid.org/0000-0002-3484-0994"},"institutions":[{"id":"https://openalex.org/I199702508","display_name":"Jouf University","ror":"https://ror.org/02zsyt821","country_code":"SA","type":"education","lineage":["https://openalex.org/I199702508"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Malak Alamri","raw_affiliation_strings":["Department of Computer Science, College of Computer and Information Science, Jouf University, Sakaka, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, College of Computer and Information Science, Jouf University, Sakaka, Saudi Arabia","institution_ids":["https://openalex.org/I199702508"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008277736","display_name":"Noshina Tariq","orcid":"https://orcid.org/0000-0002-9754-253X"},"institutions":[{"id":"https://openalex.org/I201384688","display_name":"National University of Computer and Emerging Sciences","ror":"https://ror.org/003eyb898","country_code":"PK","type":"education","lineage":["https://openalex.org/I201384688"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Noshina Tariq","raw_affiliation_strings":["Department of Artificial Intelligence and Data Science, National University of Computer and Emerging Sciences, Islamabad, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Artificial Intelligence and Data Science, National University of Computer and Emerging Sciences, Islamabad, Pakistan","institution_ids":["https://openalex.org/I201384688"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Mamoona Humayun","orcid":null},"institutions":[{"id":"https://openalex.org/I877107187","display_name":"University of Roehampton","ror":"https://ror.org/043071f54","country_code":"GB","type":"education","lineage":["https://openalex.org/I877107187"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Mamoona Humayun","raw_affiliation_strings":["Department of Computing, School of Arts Humanities and Social Sciences, University of Roehampton, London, SW15 5PJ, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Department of Computing, School of Arts Humanities and Social Sciences, University of Roehampton, London, SW15 5PJ, United Kingdom","institution_ids":["https://openalex.org/I877107187"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5039175525","display_name":"Menwa Alshammeri","orcid":"https://orcid.org/0000-0002-4645-3991"},"institutions":[{"id":"https://openalex.org/I199702508","display_name":"Jouf University","ror":"https://ror.org/02zsyt821","country_code":"SA","type":"education","lineage":["https://openalex.org/I199702508"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Menwa Alshammeri","raw_affiliation_strings":["Department of Computer Science, College of Computer and Information Science, Jouf University, Sakaka, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, College of Computer and Information Science, Jouf University, Sakaka, Saudi Arabia","institution_ids":["https://openalex.org/I199702508"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I877107187"],"apc_list":{"value":2190,"currency":"EUR","value_usd":2790},"apc_paid":{"value":2190,"currency":"EUR","value_usd":2790},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.07449738,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"29","issue":"2","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.3928000032901764,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.3928000032901764,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.04690000042319298,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.039000000804662704,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.7590000033378601},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6815000176429749},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.6194999814033508},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.5856000185012817},{"id":"https://openalex.org/keywords/trustworthiness","display_name":"Trustworthiness","score":0.5853999853134155},{"id":"https://openalex.org/keywords/latency","display_name":"Latency (audio)","score":0.553600013256073},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5361999869346619},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.43560001254081726},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.41179999709129333}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.9085000157356262},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.7590000033378601},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6815000176429749},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.6194999814033508},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.5856000185012817},{"id":"https://openalex.org/C153701036","wikidata":"https://www.wikidata.org/wiki/Q659974","display_name":"Trustworthiness","level":2,"score":0.5853999853134155},{"id":"https://openalex.org/C82876162","wikidata":"https://www.wikidata.org/wiki/Q17096504","display_name":"Latency (audio)","level":2,"score":0.553600013256073},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5361999869346619},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.44999998807907104},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.43560001254081726},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.41179999709129333},{"id":"https://openalex.org/C138236772","wikidata":"https://www.wikidata.org/wiki/Q25098575","display_name":"Edge device","level":3,"score":0.4018000066280365},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.38199999928474426},{"id":"https://openalex.org/C2742236","wikidata":"https://www.wikidata.org/wiki/Q924713","display_name":"Efficient energy use","level":2,"score":0.3499000072479248},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3375000059604645},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.32409998774528503},{"id":"https://openalex.org/C118524514","wikidata":"https://www.wikidata.org/wiki/Q173212","display_name":"Computer architecture","level":1,"score":0.319599986076355},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3158999979496002},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.3068999946117401},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.30390000343322754},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.303600013256073},{"id":"https://openalex.org/C160735492","wikidata":"https://www.wikidata.org/wiki/Q31207","display_name":"Health care","level":2,"score":0.2939000129699707},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.2865999937057495},{"id":"https://openalex.org/C2779227376","wikidata":"https://www.wikidata.org/wiki/Q6505497","display_name":"Layer (electronics)","level":2,"score":0.2809000015258789},{"id":"https://openalex.org/C53619493","wikidata":"https://www.wikidata.org/wiki/Q4787093","display_name":"Architecture framework","level":3,"score":0.2806999981403351},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.2782000005245209},{"id":"https://openalex.org/C199521495","wikidata":"https://www.wikidata.org/wiki/Q181487","display_name":"Audit","level":2,"score":0.27379998564720154},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.26669999957084656},{"id":"https://openalex.org/C190793597","wikidata":"https://www.wikidata.org/wiki/Q189768","display_name":"Application layer","level":3,"score":0.26660001277923584},{"id":"https://openalex.org/C98025372","wikidata":"https://www.wikidata.org/wiki/Q477538","display_name":"Systems architecture","level":3,"score":0.2558000087738037},{"id":"https://openalex.org/C146222976","wikidata":"https://www.wikidata.org/wiki/Q1204997","display_name":"Business logic","level":2,"score":0.2533000111579895}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s10586-025-05932-7","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10586-025-05932-7","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10586-025-05932-7.pdf","source":{"id":"https://openalex.org/S106148199","display_name":"Cluster Computing","issn_l":"1386-7857","issn":["1386-7857","1573-7543"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cluster Computing","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1007/s10586-025-05932-7","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10586-025-05932-7","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10586-025-05932-7.pdf","source":{"id":"https://openalex.org/S106148199","display_name":"Cluster Computing","issn_l":"1386-7857","issn":["1386-7857","1573-7543"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cluster Computing","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Affordable and clean energy","id":"https://metadata.un.org/sdg/7","score":0.41710975766181946}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7121649070.pdf","grobid_xml":"https://content.openalex.org/works/W7121649070.grobid-xml"},"referenced_works_count":35,"referenced_works":["https://openalex.org/W2982426954","https://openalex.org/W3017752721","https://openalex.org/W3040552057","https://openalex.org/W3086579950","https://openalex.org/W3111288713","https://openalex.org/W3154485088","https://openalex.org/W3157985671","https://openalex.org/W3164721774","https://openalex.org/W3173461253","https://openalex.org/W4220792723","https://openalex.org/W4283591786","https://openalex.org/W4283724342","https://openalex.org/W4285128558","https://openalex.org/W4288057708","https://openalex.org/W4295788744","https://openalex.org/W4308529607","https://openalex.org/W4309741570","https://openalex.org/W4317038427","https://openalex.org/W4323913801","https://openalex.org/W4365513113","https://openalex.org/W4386386840","https://openalex.org/W4387132419","https://openalex.org/W4387885951","https://openalex.org/W4391811701","https://openalex.org/W4391824073","https://openalex.org/W4405688496","https://openalex.org/W4405758217","https://openalex.org/W4407930014","https://openalex.org/W4407949472","https://openalex.org/W4408841715","https://openalex.org/W4410283722","https://openalex.org/W4410429137","https://openalex.org/W4410533595","https://openalex.org/W4412414539","https://openalex.org/W4412788400"],"related_works":[],"abstract_inverted_index":{"Abstract":[0],"Intrusion":[1],"detection":[2,32,185],"in":[3,10,28,96,166],"Internet":[4],"of":[5,124,168],"Things":[6],"(IoT)":[7],"networks,":[8],"particularly":[9],"healthcare":[11,187],"settings,":[12],"poses":[13],"critical":[14],"challenges":[15],"due":[16],"to":[17,36,79,93,108,159],"latency":[18,170],"constraints,":[19],"limited":[20],"resources,":[21],"and":[22,66,73,113,131,171,182],"the":[23,90,160],"need":[24],"for":[25,54,98,186,194],"trustworthy":[26],"auditing":[27],"distributed":[29],"environments.":[30],"Centralized":[31],"models":[33],"often":[34],"fail":[35],"deliver":[37],"timely":[38],"or":[39],"scalable":[40,183],"responses":[41],"under":[42,125],"real-world":[43],"IoT":[44,56,188],"conditions.":[45],"This":[46],"study":[47],"proposes":[48],"a":[49,191],"hybrid":[50],"fog\u2013cloud":[51,177],"architecture":[52,63],"tailored":[53],"healthcare-oriented":[55],"threat":[57,184],"detection,":[58],"incorporating":[59],"blockchain-based":[60],"auditability.":[61],"The":[62,116,143,174],"utilizes":[64],"fog-":[65],"cloud-level":[67],"XGBoost":[68],"classifiers":[69],"trained":[70],"on":[71],"BoT-IoT":[72],"ToN-IoT":[74],"datasets,":[75],"with":[76,128],"SMOTE":[77],"applied":[78],"mitigate":[80],"class":[81],"imbalance.":[82],"A":[83],"lightweight":[84],"blockchain":[85,114],"module":[86],"is":[87],"integrated":[88],"at":[89],"fog":[91],"layer":[92],"log":[94],"predictions":[95],"real-time":[97],"tamper-evident":[99],"traceability.":[100],"Simulations":[101],"were":[102],"performed":[103],"using":[104],"50":[105],"fog-predicted":[106],"events":[107],"evaluate":[109],"performance,":[110],"energy":[111],"usage,":[112],"entropy.":[115],"system":[117],"achieved":[118,146],"an":[119],"average":[120],"block":[121],"creation":[122],"time":[123],"20":[126],"ms":[127],"minimal":[129],"CPU":[130],"memory":[132],"overhead.":[133],"It":[134],"also":[135],"demonstrated":[136],"robustness":[137],"against":[138],"tampering,":[139],"preserving":[140],"data":[141],"integrity.":[142],"fog-level":[144],"model":[145],"competitive":[147],"metrics":[148],"(AUC":[149],"=":[150,153,156],"1,":[151],"F1-score":[152],"98.70%,":[154],"Accuracy":[155],"99.80%)":[157],"compared":[158],"cloud":[161],"model,":[162],"while":[163],"outperforming":[164],"it":[165],"terms":[167],"response":[169],"localized":[172],"decision-making.":[173],"proposed":[175],"blockchain-integrated":[176],"framework":[178],"enables":[179],"secure,":[180],"low-latency,":[181],"systems,":[189],"offering":[190],"promising":[192],"foundation":[193],"privacy-aware":[195],"edge":[196],"intelligence.":[197]},"counts_by_year":[],"updated_date":"2026-03-25T23:56:10.502304","created_date":"2026-01-11T00:00:00"}
