Open Access iconOpen Access


Proof of Activity Protocol for IoMT Data Security

R. Rajadevi1, K. Venkatachalam2, Mehedi Masud3, Mohammed A. AlZain4, Mohamed Abouhawwash5,6,*

1 Department of Information Technology, Kongu Engineering College, Erode, 638060, Tamilnadu, India
2 Department of Applied Cybernetics, Faculty of Science, University of Hradec Králové, Hradec Králové, 50003, Czech Republic
3 Department of Computer Science, College of Computers and Information Technology, Taif University, Taif, 21944, Saudi Arabia
4 Department of Information Technology, College of Computers and Information Technology, Taif University, Taif, 21944, Saudi Arabia
5 Department of Mathematics, Faculty of Science, Mansoura University, Mansoura, 35516, Egypt
6 Department of Computational Mathematics, Science, and Engineering (CMSE), Michigan State University, East Lansing, MI, 48824, USA

* Corresponding Author: Mohamed Abouhawwash. Email: email

Computer Systems Science and Engineering 2023, 44(1), 339-350.


The Internet of Medical Things (IoMT) is an online device that senses and transmits medical data from users to physicians within a time interval. In, recent years, IoMT has rapidly grown in the medical field to provide healthcare services without physical appearance. With the use of sensors, IoMT applications are used in healthcare management. In such applications, one of the most important factors is data security, given that its transmission over the network may cause obtrusion. For data security in IoMT systems, blockchain is used due to its numerous blocks for secure data storage. In this study, Blockchain-assisted secure data management framework (BSDMF) and Proof of Activity (PoA) protocol using malicious code detection algorithm is used in the proposed data security for the healthcare system. The main aim is to enhance the data security over the networks. The PoA protocol enhances high security of data from the literature review. By replacing the malicious node from the block, the PoA can provide high security for medical data in the blockchain. Comparison with existing systems shows that the proposed simulation with BSD-Malicious code detection algorithm achieves higher accuracy ratio, precision ratio, security, and efficiency and less response time for Blockchain-enabled healthcare systems.


Cite This Article

APA Style
Rajadevi, R., Venkatachalam, K., Masud, M., AlZain, M.A., Abouhawwash, M. (2023). Proof of activity protocol for iomt data security. Computer Systems Science and Engineering, 44(1), 339-350.
Vancouver Style
Rajadevi R, Venkatachalam K, Masud M, AlZain MA, Abouhawwash M. Proof of activity protocol for iomt data security. Comput Syst Sci Eng. 2023;44(1):339-350
IEEE Style
R. Rajadevi, K. Venkatachalam, M. Masud, M.A. AlZain, and M. Abouhawwash "Proof of Activity Protocol for IoMT Data Security," Comput. Syst. Sci. Eng., vol. 44, no. 1, pp. 339-350. 2023.

cc This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1653


  • 639


  • 0


Share Link