Open Access iconOpen Access



Crypto Hash Based Malware Detection in IoMT Framework

R Punithavathi1, K Venkatachalam2, Mehedi Masud3, Mohammed A. AlZain4, Mohamed Abouhawwash5,6,*

1Department of Information Technology, M. Kumarasamy College of Engineering, Karur, 639113, India
2 Department of Applied Cybernetics, Faculty of Science, University of Hradec Králové, Hradec Králové, 50003, Czech Republic
3 Department of Computer Science, College of Computers and Information Technology, Taif University, Taif, 21944, Saudi Arabia
4 Department of Information Technology, College of Computers and Information Technology, Taif University, Taif, 21944, Saudi Arabia
5 Department of Mathematics, Faculty of Science, Mansoura University, Mansoura, 35516, Egypt
6 Department of Computational Mathematics, Science, and Engineering (CMSE), Michigan State University, East Lansing, MI, 48824, USA

* Corresponding Author: Mohamed Abouhawwash. Email: email

Intelligent Automation & Soft Computing 2022, 34(1), 559-574.


The challenges in providing e-health services with the help of Internet of Medical Things (IoMT) is done by connecting to the smart medical devices. Through IoMT sensor devices/smart devices, physicians share the sensitive information of the patient. However, protecting the patient health care details from malware attack is necessary in this advanced digital scenario. Therefore, it is needed to implement cryptographic algorithm to enhance security, safety, reliability, preventing details from malware attacks and privacy of medical data. Nowadays blockchain has become a prominent technology for storing medical data securely and transmit through IoMT concept. The issues in the existing research works are in terms of insecurity, non-reliability, remote hijacking, hacking of password and Denial of Service (DoS) attacks. In order to overcome these issues, this work is focused on the double layer encryption model using PoW consensus with Crypto Hash algorithm (PoW-CHA). This proposed work concentrates on secured storage of medical data via IoMT transmission. It ensures transparency, decentralization, security, immutability and preserving privacy, and precisely detecting the malware attack. The accuracy of PoW-CHA is 98% compared to PoW and Crypto Hash algorithm. Moreover, it takes minimum computation time for PoW-CHA.


Cite This Article

APA Style
Punithavathi, R., Venkatachalam, K., Masud, M., AlZain, M.A., Abouhawwash, M. (2022). Crypto hash based malware detection in iomt framework. Intelligent Automation & Soft Computing, 34(1), 559-574.
Vancouver Style
Punithavathi R, Venkatachalam K, Masud M, AlZain MA, Abouhawwash M. Crypto hash based malware detection in iomt framework. Intell Automat Soft Comput . 2022;34(1):559-574
IEEE Style
R. Punithavathi, K. Venkatachalam, M. Masud, M.A. AlZain, and M. Abouhawwash "Crypto Hash Based Malware Detection in IoMT Framework," Intell. Automat. Soft Comput. , vol. 34, no. 1, pp. 559-574. 2022.

cc This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1112


  • 830


  • 0


Share Link