CA-HBCA: A Software Engineering Framework for Secure, Scalable, and Adaptive Healthcare Blockchain Systems

Authors

  • Mustafa Moosa Qasim University of Basrah
  • Jalal M. H. Altmemi Southern Technical University
  • Akram Hussain Abd Ali University of Basrah
  • ‪Mahmood A. Al-Shareeda‬‏ Southern Technical University
  • Mohammed Amin Almaiah The University of Jordan
  • Rami Shehab King Faisal University

DOI:

https://doi.org/10.18196/jrc.v6i4.26643

Keywords:

Software Engineering, Blockchain in Healthcare, FHIR Interoperability, Smart Contracts, Energy Optimization, Anomaly Detection

Abstract

Secure, scalable, and compliant solutions are becoming a requirement for healthcare systems handling sensitive medical data. Blockchain presents unique opportunities to create transparency and trust that is decentralized, yet has inherent challenges posed by scalability, sustainability and regulation. This study presents CA-HBCA, a Cognitive and Adaptive Software Engineering Framework for intelligent healthcare blockchain applications. The novel contribution of the research is the combination of four sledging modules, such as an AIbased cognitive security layer that triggers real-time anomaly detection, an adaptive sustainability engine that optimises energyperformance, a DevSecOps-based continuous delivery pipline, and a HL7/FHIR-compliant interoperability and consent management layer. Methodologically, the FEACAN was realized with Solidity, TensorFlow, and Ethereum/Hyperledger testnets, and tested by simulating healthcare scenarios such as EHR exchange, and adversary search. We obtained 93.2% precision of anomaly detection, 17.6% reduction of energy consumption, 42 transactions per second throughput in Hyperledger, and 98.7% of success rate of HL7-FHIR transformation, etc. The framework also demonstrated 100% smart contract–based consent compliance under test cases. The results indicate that CA-HBCA can be employed for the establishment of secure, sustainable and regulation-compliant blockchains in digital health infrastructures. In the future, we will also carry out validation with clinical real data sets and investigate the scalability in a variety of healthcare settings.

References

A. Haleem, M. Javaid, R. P. Singh, R. Suman, and S. Rab, “Blockchain technology applications in healthcare: An overview,” International Journal of Intelligent Networks, vol. 2, pp. 130–139, 2021, doi: 10.1016/j.ijin.2021.09.005.

M. A. Al-Shareeda, T. Gaber, M. A. Alqarni, M. H. Alkinani, A. A. Almazroey and A. A. Almazroi, “Chebyshev Polynomial Based Emergency Conditions with Authentication Scheme for 5G-Assisted Vehicular Fog Computing,” in IEEE Transactions on Dependable and Secure Computing, 2025, doi: 10.1109/TDSC.2025.3553868.

A. Alabdulatif, I. Khalil, and M. Saidur Rahman, “Security of blockchain and ai-empowered smart healthcare: application-based analysis,” Applied Sciences, vol. 12, no. 21, 2022, doi: 10.3390/app122111039.

A. I. Khan, A. ALGhamdi, F. J. Alsolami, Y. B. Abushark, A. Almalawi, A. M. Ali, A. Agrawal, R. Kumar, and R. A. Khan, “Integrating blockchain technology into healthcare through an intelligent computing technique,” Computers, Materials & Continua, vol. 70, no. 2, pp. 2835– 2860, 2022, doi: 10.32604/cmc.2022.020342.

C. Forde-Johnston, D. Butcher, and H. Aveyard, “An integrative review exploring the impact of electronic health records (ehr) on the quality of nurse–patient interactions and communication,” Journal of Advanced Nursing, vol. 79, no. 1, pp. 48–67, 2023, doi: 10.1111/jan.15484.

S. Upadhyay and H.-f. Hu, “A qualitative analysis of the impact of electronic health records (ehr) on healthcare quality and safety: clinicians’ lived experiences,” Health Services Insights, vol. 15, 2022, doi: 10.1177/11786329211070722.

A. O. Adeniyi, J. O. Arowoogun, R. Chidi, C. A. Okolo, and O. Babawarun, “The impact of electronic health records on patient care and outcomes: A comprehensive review,” World Journal of Advanced Research and Reviews, vol. 21, no. 2, pp. 1446–1455, 2024, doi: 10.30574/wjarr.2024.21.2.0592.

G. Habib, S. Sharma, S. Ibrahim, I. Ahmad, S. Qureshi, and M. Ishfaq, “Blockchain technology: benefits, challenges, applications, and integration of blockchain technology with cloud computing,” Future Internet, vol. 14, no. 11, 2022, doi: 10.3390/fi14110341.

A. S. Rajasekaran, M. Azees, and F. Al-Turjman, “A comprehensive survey on blockchain technology,” Sustainable Energy Technologies and Assessments, vol. 52, 2022, doi: 10.1016/j.seta.2022.102039.

B. A. Mohammed, M. A. Al-Shareeda, Z. G. Al-Mekhlafi, J. S. Alshudukhi and K. A. Al-Dhlan, “HAFC: Handover Authentication Scheme Based on Fog Computing for 5G-Assisted Vehicular Blockchain Networks,” in IEEE Access, vol. 12, pp. 6251-6261, 2024, doi: 10.1109/ACCESS.2024.3351278.

M. Halimuzzaman, J. Sharma, T. Bhattacharjee, B. Mallik, R. Rahman, M. R. Karim, M. M. Ikram, and M. F. Islam, “Blockchain technology for integrating electronic records of digital healthcare system,” Journal of Angiotherapy, vol. 8, no. 7, pp. 1–11, 2024, doi: 10.25163/angiotherapy.879740.

I. Boumezbeur et al., “Privacy-preserving and access control for sharing electronic health record using blockchain technology,” Acta Informatica Pragensia, vol. 11, no. 1, pp. 105–122, 2022.

A. G. Gad, D. T. Mosa, L. Abualigah, and A. A. Abohany, “Emerging trends in blockchain technology and applications: A review and outlook,” Journal of King Saud University-Computer and Information Sciences, vol. 34, no. 9, pp. 6719–6742, 2022, doi: 10.1016/j.jksuci.2022.03.007.

S. Otoom, “Risk auditing for digital twins in cyber physical systems: A systematic review,” Journal of Cyber Security and Risk Auditing, vol. 2025, no. 1, pp. 22–35, 2025, doi: 10.63180/jcsra.thestap.2025.1.3.

Y. Han, Y. Zhang, and S. H. Vermund, “Blockchain technology for electronic health records,” International journal of environmental research and public health, vol. 19, no. 23, 2022, doi: 10.3390/ijerph192315577.

M. Ramachandran, “S3ef-hbcas: Secure and sustainable software engineering framework for healthcare blockchain applications,” Blockchain in Healthcare Today, vol. 6, 2023, doi: 10.30953/bhty.v6.286.

M. A. Al-Shareeda, M. A. Saare, and S. Manickam, “Unmanned aerial vehicle: a review and future directions,” Indonesian Journal of Electrical Engineering and Computer Science (IJEECS), vol. 30, no. 2, pp. 778–786, 2023, doi: 10.11591/ijeecs.v30.i2.pp778-786.

E. Alotaibi, R. B. Sulaiman, and M. Almaiah, “Assessment of cybersecurity threats and defense mechanisms in wireless sensor networks,” Journal of Cyber Security and Risk Auditing, vol. 2025, no. 1, pp. 47–59, 2025, doi: 10.63180/jcsra.thestap.2025.1.5.

Z. Ghaleb Al-Mekhlafi et al., “Oblivious Transfer-Based Authentication and Privacy-Preserving Protocol for 5G-Enabled Vehicular Fog Computing,” in IEEE Access, vol. 12, pp. 100152-100166, 2024, doi: 10.1109/ACCESS.2024.3429179.

Z. AlZamili, K. M. Danach and M. Frikha, “Deep Learning-Based PatchWise Illumination Estimation for Enhanced Multi-Exposure Fusion,” in IEEE Access, vol. 11, pp. 120642-120653, 2023, doi: 10.1109/ACCESS.2023.3328579.

Z. Alzamili, K. Danach, and M. Frikha, “Revolutionizing covid-19 diagnosis: Advancements in chest x-ray analysis through customized convolutional neural networks and image fusion data augmentation,” BIO Web of Conferences, 2024.

Z. Alzamli, K. Danach and M. Frikha, “Machine Learning Techniques in Service of COVID-19: Data Augmentation Based on Multi-Exposure Image FusionTowards Anomaly Prediction,” 2022 4th International Conference on Current Research in Engineering and Science Applications (ICCRESA), pp. 54-58, 2022, doi: 10.1109/ICCRESA57091.2022.10352482.

O. O. Abiona, O. J. Oladapo, O. T. Modupe, O. C. Oyeniran, A. O. Adewusi, and A. M. Komolafe, “The emergence and importance of devsecops: Integrating and reviewing security practices within the devops pipeline,” World Journal of Advanced Engineering Technology and Sciences, vol. 11, no. 2, pp. 127–133, 2024, doi: 10.30574/wjaets.2024.11.2.0093.

A. Alshuaibi, M. Almaayah, and A. Ali, “Machine learning for cybersecurity issues: A systematic review,” Journal of Cyber Security and Risk Auditing, vol. 2025, no. 1, pp. 36–46, 2025, doi: 10.63180/jcsra.thestap.2025.1.4.

R. N. Rajapakse, M. Zahedi, M. A. Babar, and H. Shen, “Challenges and solutions when adopting devsecops: A systematic review,” Information and software technology, vol. 141, 2022, doi: 10.1016/j.infsof.2021.106700.

R. S. Mousa and R. Shehab, “Applying risk analysis for determining threats and countermeasures in workstation domain,” Journal of Cyber Security and Risk Auditing, vol. 2025, no. 1, pp. 12–21, 2025, doi: 10.63180/jcsra.thestap.2025.1.2.

B. N. Alhasnawi and B. H. Jasim, “SCADA controlled smart home using Raspberry Pi3,” 2018 International Conference on Advance of Sustainable Engineering and its Application (ICASEA), pp. 1-6, 2018, doi: 10.1109/ICASEA.2018.8370946.

A. Sen, “Devops, devsecops, aiops-paradigms to it operations,” in Evolving Technologies for Computing, Communication and Smart World: Proceedings of ETCCS 2020, vol. 694, pp. 211–221, 2020, doi :10.1007/978- 981-15-7804-5_16.

B. N. Alhasnawi, M. Zanker, and V. Bures, “A new smart charging electric ˇ vehicle and optimal dg placement in active distribution networks with optimal operation of batteries,” Results in Engineering, vol. 25, 2025, doi: 10.1016/j.rineng.2025.104521.

B. N. Alhasnawi et al., “A novel efficient energy optimization in smart urban buildings based on optimal demand side management,” Energy Strategy Reviews, vol. 54, 2024, doi: 10.1016/j.esr.2024.101461.

M. A. Saare, A. Hussain, and W. S. Yue, “Relationships between the older adult’s cognitive decline and quality of life: The mediating role of the assistive mobile health applications,” International Journal of Interactive Mobile Technologies (iJIM), vol. 13, pp. 42–55, 2019, doi: 10.3991/ijim.v13i10.11288.

B. N. Alhasnawi, S. M. M. Almutoki, F. F. K. Hussain, A. Harrison, B. Bazooyar, M. Zanker, and V. Bures, “A new methodology for ˇ reducing carbon emissions using multi-renewable energy systems and artificial intelligence,” Sustainable Cities and Society, vol. 114, 2024, doi: 10.1016/j.scs.2024.105721.

M. A. Al-Shareeda, M. A. Saare, and S. Manickam, “The blockchain internet of things: review, opportunities, challenges, and recommendations,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 31, no. 3, pp. 1673–1683, 2023, doi: 10.11591/ijeecs.v31.i3.pp1673-1683.

B. N. Alhasnawi, M. Zanker, and V. Bures, “A smart electricity markets ˇ for a decarbonized microgrid system,” Electrical Engineering, vol. 107, pp. 5405–5425, 2025, doi: 10.1007/s00202-024-02699-9.

M. Yousif, B. Al-Khateeb and B. Garcia-Zapirain, “A New Quantum Circuits of Quantum Convolutional Neural Network for X-Ray Images Classification,” in IEEE Access, vol. 12, pp. 65660-65671, 2024, doi: 10.1109/ACCESS.2024.3396411.

G. Chen, Q. Chen, S. Long, W. Zhu, Z. Yuan, and Y. Wu, “Quantum convolutional neural network for image classification,” Pattern Analysis and Applications, vol. 26, pp. 655–667, 2023, doi: 10.1007/s10044-022- 01113-z.

B. Al-Khateeb and M. Yousif, “Solving multiple traveling salesman problem by meerkat swarm optimization algorithm,” Journal of Southwest Jiaotong University, vol. 54, no. 3, 2019, doi: 10.35741/issn.0258- 2724.54.3.16.

V. R. Prybutok et al., “Theoretical and practical applications of blockchain in healthcare information management,” Information & Management, vol. 59, no. 6, 2022, doi: 10.1016/j.im.2022.103649.

A. Ekblaw, A. Azaria, J. D. Halamka, and A. Lippman, “A case study for blockchain in healthcare:“medrec” prototype for electronic health records and medical research data,” in Proceedings of IEEE open & big data conference, vol. 13, 2016.

M. Manickam and G. G. Devarajan, “A three-factor mutual authentication scheme for telecare medical information system based on ecc,” Cyber Security and Applications, vol. 2, 2024, doi: 10.1016/j.csa.2024.100035.

X. Li, A. Lei, L. Zhu, and M. Ban, “Improving kalman filter for cyber physical systems subject to replay attacks: An attack-detection-based compensation strategy,” Applied Mathematics and Computation, vol. 466, 2024, doi: 10.1016/j.amc.2023.128444.

Z. Xu, G. Zhu, Y. Xu, and L. Ding, “Periodic event-triggered adaptive neural control of usvs under replay attacks,” Ocean Engineering, vol. 306, 2024, doi: 10.1016/j.oceaneng.2024.118022.

M. Badr, H. A. Talebi and M. A. Khosravi, “A Novel Approach for Discriminating Faults and Replay Attacks in Hybrid Systems,” in IEEE Access, vol. 12, pp. 40064-40074, 2024, doi: 10.1109/ACCESS.2024.3368398.

R. Agrawal and K. P. Patil, “Blockchain Technology for Medical Records Security Using Fit Viability Approach,” 2024 2nd International Conference on Advancement in Computation & Computer Technologies (InCACCT), pp. 805-810, 2024, doi: 10.1109/InCACCT61598.2024.10551119.

M. R. Alboalebrah and S. Al-augby, “Unveiling the causes of fatal road accidents in iraq: An association rule mining approach using the apriori algorithm,” Journal of Cyber Security and Risk Auditing, vol. 2025, no. 2, pp. 1–11, 2025, doi: 10.63180/jcsra.thestap.2025.2.1.

M. A. Al-shareeda, M. Anbar, S. Manickam, I. H. Hasbullah, N. Abdullah, M. M. Hamdi, and A. S. Al-Hiti, “Ne-cppa: A new and efficient conditional privacy-preserving authentication scheme for vehicular ad hoc networks (vanets),” Applied Mathematics & Information Sciences, vol. 14, no. 6, pp. 1–10, 2020, doi: 10.18576/amis/140602.

M. A. Al-Shareeda, A. M. Ali, M. A. Hammoud, Z. H. M. Kazem, and M. A. Hussein, “Secure iot-based real-time water level monitoring system using esp32 for critical infrastructure,” Journal of Cyber Security and Risk Auditing, vol. 2025, no. 2, pp. 44–52, 2025, doi: 10.63180/jcsra.thestap.2025.2.4.

M. A. Al-Shareeda, S. Manickam, M. A. Saare, and N. C. Arjuman, “Proposed security mechanism for preventing fake router advertisement attack in ipv6 link-local network,” Indonesian Journal of Electrical Engineering and Computer Science (IJEECS), vol. 29, pp. 518–526, 2023, doi: 10.11591/ijeecs.v29.i1.pp518-526.

P. Baniya, A. Agrawal, P. Nand, B. Bhushan, and P. Bhattacharya, “Blockchain-based security sustainable framework for iomt applications and industry 5.0,” Soft Computing in Industry 5.0 for Sustainability, pp. 377–406, 2024, doi: 10.1007/978-3-031-69336-6_17.

D. Zhao, B. Yang, Y. Li and H. Zhang, “Replay Attack Detection for Cyber-Physical Control Systems: A Dynamical Delay Estimation Method,” in IEEE Transactions on Industrial Electronics, vol. 72, no. 1, pp. 867-875, 2025, doi: 10.1109/TIE.2024.3406859.

C. -M. Chen, Z. Chen, S. Kumari, M. S. Obaidat, J. J. P. C. Rodrigues and M. K. Khan, “Blockchain-Based Mutual Authentication Protocol for IoT-Enabled Decentralized Healthcare Environment,” in IEEE Internet of Things Journal, vol. 11, no. 14, pp. 25394-25412, 2024, doi: 10.1109/JIOT.2024.3396488.

J. Tian, Y. Wang and Y. Shen, “An Identity-Based Authentication Scheme With Full Anonymity and Unlinkability for Mobile Edge Computing,” in IEEE Internet of Things Journal, vol. 11, no. 13, pp. 23561-23576, 2024, doi: 10.1109/JIOT.2024.3385095.

J. K. Liu, M. H. Au, W. Susilo and J. Zhou, “Linkable Ring Signature with Unconditional Anonymity,” in IEEE Transactions on Knowledge and Data Engineering, vol. 26, no. 1, pp. 157-165, 2014, doi: 10.1109/TKDE.2013.17.

O. Aljumaiah, W. Jiang, S. R. Addula, and M. A. Almaiah, “Analyzing cybersecurity risks and threats in it infrastructure based on nist framework,” Journal of Cyber Security and Risk Auditing, vol. 2025, no. 2, pp. 12–26, 2025, doi: 10.63180/jcsra.thestap.2025.2.2.

R. Almanasir, D. Al-solomon, S. Indrawes, M. A. Almaiah, U. Islam, and M. Alshar’e, “Classification of threats and countermeasures of cloud computing,” Journal of Cyber Security and Risk Auditing, vol. 2025, no. 2, pp. 27–42, 2025, doi: 10.63180/jcsra.thestap.2025.2.3.

M. Knott and S. -M. Fezzani, “Designing Inclusive Technology Solutions for Global Communities,” 2024 IEEE International Conference on Blockchain (Blockchain), pp. 625-630, 2024, doi: 10.1109/Blockchain62396.2024.00092.

A. Garg, A. Jain, M. Singh, and F. Al-Turjman, Smart Global Value Chain: Future Innovations, CRC Press, 2024.

M. B. Singh, H. Singh and A. Pratap, “Energy-Efficient and PrivacyPreserving Blockchain Based Federated Learning for Smart Healthcare System,” in IEEE Transactions on Services Computing, vol. 17, no. 5, pp. 2392-2403, 2024, doi: 10.1109/TSC.2023.3332955.

S. Otoom, “Risk auditing for digital twins in cyber physical systems: A systematic review,” Journal of Cyber Security and Risk Auditing, vol. 2025, no. 1, pp. 22–35, 2025, doi: 10.63180/jcsra.thestap.2025.1.3.

N. H. Tawfeeq, M. Yousif, M. A. Al-Shareeda, M. A. Almaiah, and R. Shehab, “Lightweight and quantum-resistant authentication for the internet of drones (iod) using dilithium signatures,” international journal of innovative research and scientific studies, vol. 8, no. 2, pp. 2842–2853, 2025, doi: 10.53894/ijirss.v8i2.5825.

C. K. K. Reddy, A. Nag, M. Ouaissa, B. Bhushan, and M. M. Hanafiah, The Rise of Quantum Computing in Industry 6.0 Towards Sustainability, Spring Cham, 2024, doi: 10.1007/978-3-031-73350-5.

A. A. A. K. Kadhim, Z. M. Alzamili, M. A. Al-Shareeda, and M. Amin, “Nova: A hybrid detection framework for misbehavior in vehicular networks,” international journal of innovative research and scientific studies, vol. 8, no. 2, pp. 1611–1624, 2025, doi: 10.53894/ijirss.v8i2.5521.

M. A. Akbar, V. Leiva, S. Rafi, S. F. Qadri, S. Mahmood, and A. Alsanad, “Towards roadmap to implement blockchain in healthcare systems based on a maturity model,” Journal of Software: Evolution and Process, vol. 34, 2022, doi: 10.1002/smr.2500.

S. Upadhyay, S. Agarwal, A. Chaudhary, P. Singh and R. Sharma, ”Blockchain in Healthcare Systems: A Systematic Review,” 2024 2nd International Conference on Disruptive Technologies (ICDT), pp. 140- 147, 2024, doi: 10.1109/ICDT61202.2024.10489533.

D. Khan, T. J. Low and V. T. B. Dang, “Challenges and Application of Blockchain in Healthcare Systems,” 2022 International Conference on Digital Transformation and Intelligence (ICDI), pp. 15-20, 2022, doi: 10.1109/ICDI57181.2022.10007295.

A. Kumar, A. Shukla, V. Thada, V. Chole, J. Moolchandani and S. Sahu, “Comparative Analysis of IoT and Blockchain Technologies in Enhancing Security and Efficiency in Healthcare Systems,” 2024 4th International Conference on Technological Advancements in Computational Sciences (ICTACS), pp. 1976-1981, 2024, doi: 10.1109/ICTACS62700.2024.10841246.

V. Sharma, A. Gupta, N. U. Hasan, M. Shabaz, and I. Ofori, “Blockchain in secure healthcare systems: State of the art, limitations, and future directions,” Security and Communication Networks, 2023, doi: 10.1155/2023/9827513.

A. E. Hamzah, M. S. D. Zan, M. E. Hamzah, M. M. Fadhel, N. M. Sapiee and A. A. A. Bakar, “Fast and Accurate Measurement in BOTDA Fiber Sensor Through the Application of Filtering Techniques in Frequency and Time Domains,” in IEEE Sensors Journal, vol. 24, no. 4, pp. 4531-4541, 2024, doi: 10.1109/JSEN.2023.3347307.

M. M. Rashid, S.-H. Lee, P. Choi, and K.-R. Kwon, “A blockchainbased approach in healthcare supply chain using smart contracts and decentralized storage systems,” Proceedings of the 2022 ACM Conference on Information Technology for Social Good, pp. 300-307, 2022, doi: 10.1145/3524458.3547251.

M. S. D. Zan et al., “Spatial Resolution Enhancement of Time Domain Multiplexing Fiber Bragg Grating Sensor by Employing Differential Golay Codes,” 2020 IEEE 8th International Conference on Photonics (ICP), pp. 54-55, 2020, doi: 10.1109/ICP46580.2020.9206502.

A. A. Almuqren, “Cybersecurity threats, countermeasures and mitigation techniques on the iot: Future research directions,” Journal of Cyber Security and Risk Auditing, vol. 1, no. 1, pp. 1–11, 2025, doi: 10.63180/jcsra.thestap.2025.1.1.

A. E. Hamzah et al., “Advancing the measurement speed and accuracy of conventional botda fiber sensor systems via soc data acquisition,” Optical Fiber Technology, vol. 84, 2024, doi: 10.1016/j.yofte.2024.103712.

R. P. Puneeth and G. Parthasarathy, “Seamless data exchange: Advancing healthcare with cross-chain interoperability in blockchain for electronic health records,” International Journal of Advanced Computer Science and Applications, vol. 14, no. 1, 2023.

K. Anil and M. Kamble, “Health block: A blockchain based secure healthcare data storage and retrieval system for cloud computing,” International Journal on Recent and Innovation Trends in Computing and Communication, 2023.

R. Manoj and S. Joshi, “Ensuring wallet application security by resolving reentrancy attacks in blockchain smart contracts,” Journal of Discrete Mathematical Sciences & Cryptography, vol. 26, no. 2, pp. 927–937, 2023, doi: 10.47974/JDMSC-1779.

A. Hajdu ´ et al., “Using Fault Injection to Assess Blockchain Systems in Presence of Faulty Smart Contracts,” in IEEE Access, vol. 8, pp. 190760- 190783, 2020, doi: 10.1109/ACCESS.2020.3032239.

M. MohammadAmini, M. Jesus, D. F. Sheikholeslami, P. Alves, A. H. Benam, and F. Hariri, “Artificial intelligence ethics and challenges in healthcare applications: A comprehensive review in the context of the european gdpr mandate,” Machine learning & knowledge extraction, vol. 5, pp. 1023–1035, 2023, doi: 10.3390/make5030053.

K. Ider, “Assessment of the quality of user awareness of GDPR in healthcare IOT,” 2021 International Conference on Biomedical Innovations and Applications (BIA), pp. 25-28, 2022, doi: 10.1109/BIA52594.2022.9831287.

F. Fatehi, F. Hassandoust, R. K. L. Ko, and S. Akhlaghpour, “General data protection regulation (gdpr) in healthcare: Hot topics and research fronts,” Studies in health technology and informatics, vol. 270, pp. 1118–1122, 2020, doi: 10.3233/SHTI200336.

R. Lin, H. Qiu, J. Wang, Z. Zhang, L. Wu and F. Shu, “Physical-Layer Security Enhancement in Energy-Harvesting-Based Cognitive Internet of Things: A GAN-Powered Deep Reinforcement Learning Approach,” in IEEE Internet of Things Journal, vol. 11, no. 3, pp. 4899-4913, 2024, doi: 10.1109/JIOT.2023.3300770.

P. P. Hema and A. V. Babu, “Full-duplex jamming for physical layer security improvement in noma-enabled overlay cognitive radio networks,” Security and Privacy, vol. 7, no. 3, 2024, doi: 10.1002/spy2.371.

P. Yan, W. Duan, Q. Sun, G. Zhang, J. Zhang and P. -H. Ho, “Improving Physical-Layer Security for Cognitive Networks via Artificial NoiseAided Rate Splitting,” in IEEE Internet of Things Journal, vol. 11, no. 10, pp. 18932-18933, 2024, doi: 10.1109/JIOT.2024.3367889.

M. Niranjan et al., “Cooperative sensing assisted cross layer qos assured routing in cognitive radio adhoc networks: Ensuring security and privacy,” International Journal of Intelligent Engineering and Systems, vol. 17, no. 1, 2024, doi: 10.22266/ijies2024.0229.53.

M. Ndiaye, K. Konate and E. H. M. Ndoye, “Anomaly Detection Algorithm Based on Smart Contracts Behaviours in Ethereum Ecosystem,” 2023 3rd International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME), pp. 1-7, 2023, doi: 10.1109/ICECCME57830.2023.10252520.

C. M. K. Reddy, R. Chandrashekar, K. N. Kannan, H. Pal Thethi, S. Dharmireddi and R. Bajaj, “Smart Contracts and Anomaly Detection in SDN environment using Cloud-Edge Integration Model,” 2023 International Conference on Emerging Research in Computational Science (ICERCS), pp. 1-6, 2023, doi: 10.1109/ICERCS57948.2023.10434076.

S. Hisham et al., “Anomaly detection in smart contracts based on optimal relevance hybrid features analysis in the ethereum blockchain employing ensemble learning,” International Journal of Advanced Technology and Engineering Exploration, vol. 10, no. 109, pp. 1552, 1579, 2023, doi: 10.19101/IJATEE.2023.10102216.

G. Airlangga, “Anomaly detection in blockchain transactions: A machine learning approach within the open metaverse,” Jurnal Informatika Ekonomi Bisnis, vol. 6, nol. 2, pp. 308–312, 2024, doi: 10.37034/infeb.v6i2.864.

M. A. Fouly, T. H. A. Soliman and A. I. Taloba, “Machine Learning Techniques for Detecting Abnormal Behaviors in Blockchain Technologies: A Methodological Review,” 2024 International Conference on Computer and Applications (ICCA), pp. 1-6, 2024, doi: 10.1109/ICCA62237.2024.10927796.

J. Kim et al., “A Machine Learning Approach to Anomaly Detection Based on Traffic Monitoring for Secure Blockchain Networking,” in IEEE Transactions on Network and Service Management, vol. 19, no. 3, pp. 3619-3632, 2022, doi: 10.1109/TNSM.2022.3173598.

D. R. Kotoju and M. A. Khan, “Cognitive cyber threat intelligence: Aidriven behavioural profiling for proactive security,” international journal of engineering technology and management sciences, 2025.

P. Balasubramanian, S. Nazari, D. K. Kholgh, A. B. Z. Mahmoodi, J. Seby, and P. Kostakos, “A cognitive platform for collecting cyber threat intelligence and real-time detection using cloud computing,” Decision Analytics Journal, vol. 14, 2025, doi: 10.1016/j.dajour.2025.100545.

E. Kalyabin, “The method of threat assessment and interference distribution within the framework of cognitive electronic warfare,” Radioengineering, 2024.

Downloads

Published

2025-08-09

How to Cite

[1]
M. M. Qasim, J. M. H. Altmemi, A. H. A. Ali, ‪Mahmood A. Al-Shareeda‬‏, M. A. Almaiah, and R. Shehab, “CA-HBCA: A Software Engineering Framework for Secure, Scalable, and Adaptive Healthcare Blockchain Systems”, J Robot Control (JRC), vol. 6, no. 4, pp. 2052–2063, Aug. 2025.

Issue

Section

Articles

Most read articles by the same author(s)