Abstract
In recent years, the rapid integration of Internet of Things (IoT) devices into the healthcare sector has brought about revolutionary advancements in patient care and data management. While these technological innovations hold immense promise, they concurrently raise critical security concerns, particularly in safeguarding medical data against potential cyber threats. The sensitive nature of health-related information requires robust measures to ensure patient data's confidentiality, integrity, and availability within IoT-enabled medical environments. Addressing the imperative need for enhanced security in IoT-based healthcare systems, we propose a comprehensive method encompassing three distinct phases. In the first phase, we implement blockchain-enabled request and transaction encryption to fortify the security of data transactions, providing an immutable and transparent framework. Subsequently, in the second phase, we introduce request pattern recognition check, leveraging diverse data sources to identify and thwart potential unauthorized access attempts. Finally, the third phase incorporates feature selection and the BiLSTM network to enhance the accuracy and efficiency of intrusion detection through advanced machine-learning techniques. We compared the simulation results of the proposed method with three recent related methods, namely AIBPSF-IoMT, OMLIDS-PBIoT, and AIMMFIDS. The evaluation criteria encompass detection rates, false alarm rates, precision, recall, and accuracy, crucial benchmarks in assessing the overall performance of intrusion detection systems. Notably, our findings reveal that the proposed method outperforms these existing methods across all evaluated criteria, underscoring its superiority in enhancing the security posture of IoT-based healthcare systems.













Similar content being viewed by others
Data availability
No datasets were generated or analyzed during the current study.
References
Cai J, Liang W, Li X, Li K, Gui Z, Khan MK (2023) GTxChain: a secure IoT smart blockchain architecture based on graph neural network. IEEE Internet Things J. https://doi.org/10.1109/JIOT.2023.3296469
Saheed KY, Usman AA, Sukat FD, Abdulrahman M (2023) A novel hybrid autoencoder and modified particle swarm optimization feature selection for intrusion detection in the internet of things network. Front Comput Sci. https://doi.org/10.3389/fcomp.2023.997159
Saheed YK, Misra S (2024) A voting gray wolf optimizer-based ensemble learning models for intrusion detection in the Internet of Things. Int J Inf Secur. https://doi.org/10.1007/s10207-023-00803-x
Alshammari BM (2023) AIBPSF-IoMT: artificial intelligence and blockchain-based predictive security framework for IoMT technologies. Electronics 12(23):4806
Shrestha A, Mahmood A (2019) Review of deep learning algorithms and architectures. IEEE Access 7:53040–53065
Alzubaidi L, Zhang J, Humaidi AJ, Al-Dujaili A, Duan Y, Al-Shamma O, Santamaría J, Fadhel MA, Al-Amidie M, Farhan L (2021) Review of deep learning: concepts, CNN architectures, challenges, applications, future directions. J Big Data 8:1–74
Ayyoubzadeh SM, Ayyoubzadeh SM, Zahedi H, Ahmadi M, Kalhori SRN (2020) Predicting COVID-19 incidence through analysis of google trends data in Iran: data mining and deep learning pilot study. JMIR Public Health Surveill 6(2):e18828
Ahmad RW, Salah K, Jayaraman R, Yaqoob I, Ellahham S, Omar M (2021) The role of blockchain technology in telehealth and telemedicine. Int J Med Inform 148:104399
Afaq Y, Manocha A (2023) Blockchain and deep learning integration for various application: a review. J Comput Inf Syst. https://doi.org/10.1080/08874417.2023.2173330
Shafay M, Ahmad RW, Salah K, Yaqoob I, Jayaraman R, Omar M (2023) Blockchain for deep learning: review and open challenges. Clust Comput 26(1):197–221
Khubrani MM (2023) Artificial rabbits optimizer with deep learning model for blockchain-assisted secure smart healthcare system. Int J Adv Comput Sci Appl. https://doi.org/10.14569/IJACSA.2023.0140998
Srinivasu PN, Bhoi AK, Nayak SR, Bhutta MR, Woźniak M (2021) Blockchain technology for secured healthcare data communication among the non-terminal nodes in IoT architecture in 5G network. Electronics 10(12):1437
Zheng Z, Xie S, Dai HN, Chen W, Chen X, Weng J, Imran M (2020) An overview on smart contracts: challenges, advances and platforms. Future Gener Comput Syst 105:475–491
Mudassir M, Unal D, Hammoudeh M, Azzedin F (2022) Detection of botnet attacks against industrial IoT systems by multilayer deep learning approaches. Wirel Commun Mob Comput. https://doi.org/10.1155/2022/2845446
Azbeg K, Ouchetto O, Andaloussi SJ (2022) BlockMedCare: a healthcare system based on IoT, Blockchain and IPFS for data management security. Egypt Inform J 23(2):329–343
Sudhakaran P (2022) Energy efficient distributed lightweight authentication and encryption technique for IoT security. Int J Commun Syst 35(2):e4198
Yin C, Zhang S, Wang J, Xiong NN (2020) Anomaly detection based on convolutional recurrent autoencoder for IoT time series. IEEE Trans Syst Man Cybern Syst 52(1):112–122
Xu Z, Liang W, Li KC, Xu J, Jin H (2021) A blockchain-based roadside unit-assisted authentication and key agreement protocol for internet of vehicles. J Parallel Distrib Comput 149:29–39
Liang W, Ning Z, Xie S, Hu Y, Lu S, Zhang D (2021) Secure fusion approach for the internet of things in smart autonomous multi-robot systems. Inf Sci 579:468–482
Khalaf OI, Abdulsahib GM (2021) Optimized dynamic storage of data (ODSD) in IoT based on blockchain for wireless sensor networks. Peer Peer Netw Appl 14:2858–2873
Zhang J (2021) Distributed network security framework of energy internet based on internet of things. Sustain Energy Technol Assess 44:101051
Li Y, Chen C, Liu N, Huang H, Zheng Z, Yan Q (2020) A blockchain-based decentralized federated learning framework with committee consensus. IEEE Netw 35(1):234–241
Philip AO, Saravanaguru RK (2020) Secure incident & evidence management framework (SIEMF) for internet of vehicles using deep learning and blockchain. Open Comput Sci 10(1):408–421
AlKadi O, Moustafa N, Turnbull B, Choo KKR (2019) Mixture localization-based outliers models for securing data migration in cloud centers. IEEE Access 7:114607–114618
Liang G, Weller SR, Luo F, Zhao J, Dong ZY (2018) Distributed blockchain-based data protection framework for modern power systems against cyber attacks. IEEE Trans Smart Grid 10(3):3162–3173
Liu X, Muhammad K, Lloret J, Chen YW, Yuan SM (2019) Elastic and cost-effective data carrier architecture for smart contract in blockchain. Future Gener Comput Syst 100:590–599
Rathore S, Park JH (2018) Semi-supervised learning based distributed attack detection framework for IoT. Appl Soft Comput 72:79–89
Wang Z (2018) Deep learning-based intrusion detection with adversaries. IEEE Access 6:38367–38384
Tavallaee M, Bagheri E, Lu W, Ghorbani AA (2009) A detailed analysis of the KDD CUP 99 data set. In: 2009 IEEE Symposium On Computational Intelligence for Security and Defense Applications. IEEE, pp 1–6
Moustafa N, Slay J (2015) UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: 2015 Military Communications and Information Systems Conference (MilCIS). IEEE, pp 1–6
Hady AA, Ghubaish A, Salman T, Unal D, Jain R (2020) Intrusion detection system for healthcare systems using medical and network data: a comparison study. IEEE Access 8:106576–106584
Al-Qarafi A, Alrowais F, Alotaibi S, Nemri N, Al-Wesabi FN, Al Duhayyim M, Marzouk R, Othman M, Al-Shabi M (2022) Optimal machine learning based privacy preserving blockchain assisted internet of things with smart cities environment. Appl Sci 12:5893
Alohali MA, Al-Wesabi FN, Hilal AM, Goel S, Gupta D, Khanna A (2022) Artificial intelligence enabled intrusion detection systems for cognitive cyber-physical systems in industry 4.0 environment. Cogn Neurodyn 16(5):1045–1057
Acknowledgements
Dear Editors-in-Chief, Prof. Hamid R. Arabnia We are grateful to the editors and reviewers for their time and constructive comments on our manuscript: Fusion of Machine Learning and Blockchain-based Privacy-Preserving Approach for Health Care Data in the Internet of Things. We have implemented their comments and suggestions and wish to submit a revised version of the manuscript for further consideration in the journal. Changes in the initial version of the manuscript are highlighted for added sentences. Below, we also provide a point-by-point response explaining how we have addressed each of the editor’s or reviewers’ comments. We look forward to the outcome of your assessment. Kind regards, Seyyed Hamid Ghafouri, Ph.D.
Funding
No funds.
Author information
Authors and Affiliations
Contributions
Behnam Rezaei Bezanjani contributed to the conceptualization, data curation, investigation, methodology, resources, software, validation, visualization, writing—original draft, and writing—review and editing. Seyyed Hamid Ghafouri was involved in the formal analysis, investigation, methodology, resources, software, supervision, visualization, and writing—review and editing.
Corresponding author
Ethics declarations
Conflict of interest
The authors declare no competing interests.
Ethical approval
Not applicable.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Bezanjani, B.R., Ghafouri, S.H. & Gholamrezaei, R. Fusion of machine learning and blockchain-based privacy-preserving approach for healthcare data in the Internet of Things. J Supercomput 80, 24975–25003 (2024). https://doi.org/10.1007/s11227-024-06392-3
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-024-06392-3