Abstract
To improve the security of the Internet of Medical Things (IoMT) in healthcare, this paper offers a Federated Learning (FL)-guided Intrusion Detection System (IDS) and an Artificial Neural Network (ANN)-based key exchange mechanism inside a blockchain framework. The IDS are essential for spotting network anomalies and taking preventative action to guarantee the secure and dependable functioning of IoMT systems. The suggested method integrates FL-IDS with a blockchain-based ANN-based key exchange mechanism, providing several important benefits: (1) FL-based IDS creates a shared ledger that aggregates nearby weights and transmits historical weights that have been averaged, lowering computing effort, eliminating poisoning attacks, and improving data visibility and integrity throughout the shared database. (2) The system uses edge-based detection techniques to protect the cloud in the case of a security breach, enabling quicker threat recognition with less computational and processing resource usage. FL’s effectiveness with fewer data samples plays a part in this benefit. (3) The bidirectional alignment of ANNs ensures a strong security framework and facilitates the production of keys inside the IoMT network on the blockchain. (4) Mutual learning approaches synchronize ANNs, making it easier for IoMT devices to distribute synchronized keys. (5) XGBoost and ANN models were put to the test using BoT-IoT datasets to gauge how successful the suggested method is. The findings show that ANN demonstrates greater performance and dependability when dealing with heterogeneous data available in IoMT, such as ICU (Intensive Care Unit) data in the medical profession, compared to alternative approaches studied in this study. Overall, this method demonstrates increased security measures and performance, making it an appealing option for protecting IoMT systems, especially in demanding medical settings like ICUs.

















Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Data availability
Data will be made available on request.
References
Agrawal S, Sarkar S, Aouedi O et al (2021) Federated learning for intrusion detection system. Concepts, challenges and future directions. arXiv
Aldhaheri S, Alghazzawi D, Cheng L et al (2020) DeepDCA: novel network-based detection of IoT attacks using artificial immune system. Appl Sci 10:1909
Alkadi O, Moustafa N, Turnbull B et al (2020) A deep blockchain framework-enabled collaborative intrusion detection for protecting IoT and cloud networks. IEEE Internet Things J 8:9463–9472
Alwarafy A, Al-Thelaya KA, Abdallah M et al (2020) A survey on security and privacy issues in edge computingassisted internet of things. IEEE Internet Things J 8:4004–4022
Amer M, Hay G, Baset EH, Abd El Azim Mohamed M (2021) Development machine learning techniques to enhance cyber security algorithms (Dept E). Mansoura Eng J 46:36–46
Antonakakis M, April T, Bailey M et al (2017) Understanding the Mirai Botnet. In: Proceedings of the 26th USENIX security symposium (USENIX Security 17), pp 16–18
Aujla GS, Jindal A (2020) A decoupled blockchain approach for edge-envisioned IoT-based healthcare monitoring. IEEE J Select Areas Commun 39:491–499
Bagdasaryan E, Veit A, Hua Y et al (2020) How to backdoor federated learning. In: Proceedings of the international conference on artificial intelligence and statistics, online pp 26–28
Balaha HM, Saif M, Tamer A et al (2022) Hybrid deep learning and genetic algorithms approach (HMB-DLGAHA) for the early ultrasound diagnoses of breast cancer. Neural Comput Appl 2022:8671–8695
Cai R, Tang J, Deng C et al (2019) Violence against health care workers in China, 2013–2016: evidence from the national judgment documents. Hum Resour Health 17(1):103–103
Cassales GW, Senger H, Faria ERD et al (2019) An intrusion detection system architecture for IoT networks. In: Proceedings of the 2019 IEEE symposium on computers and communications (ISCC)
Chaabouni N, Mosbah M, Zemmari A et al (2019) Network intrusion detection for IoT security based on learning techniques. IEEE Commun Surv Tutor 21:2671–2701
Chen Z, Lv N, Liu P et al (2020) Intrusion detection for wireless edge networks based on federated learning. IEEE Access 8:217463–217472
Dhasaratha C (2024) Data privacy model using blockchain reinforcement federated learning approach for scalable internet of medical things. CAAI Trans Intell Technol. https://doi.org/10.1049/cit2.12287
Dias LP, Cerqueira JD, Assis KD et al (2017) Using artificial neural network in intrusion detection systems to computer networks. In: Proceedings of the 9th computer science and electronic engineering (CEEC), pp 27–29
Ding Y, Zhang W, Zhou X et al (2021) FraudTrip: taxi fraudulent trip detection from corresponding trajectories. IEEE Internet Things J 8(16):12505–12517
Dolecki M, Kozera R (2015) The impact of the TPM weights distribution on network synchronization time. Comput Inf Syst Ind Manag 9339:451–460
Dong T, Huang T (2020) Neural cryptography based on complex-valued neural network. IEEE Trans Neural Netw Learn Syst 31(11):4999–5004. https://doi.org/10.1109/TNNLS.2019.2955165
Doriguzzi-Corin R, Millar S, Scott-Hayward S et al (2020) LUCID: a practical, lightweight deep learning solution for DDoS attack detection. IEEE Trans Netw Serv Manag 17:876–889
Fatani A, Elaziz MA, Dahou A et al (2021) IoT intrusion detection system using deep learning and enhanced transient search optimization. IEEE Access 9:123448–123464
Ferrag MA, Maglaras L (2019) DeepCoin: a novel deep learning and blockchain-based energy exchange framework for smart grids. IEEE Trans Eng Manag 67:1285–1297
Ferrag MA, Maglaras L, Moschoyiannis S et al (2020) Deep learning for cyber security intrusion detection: approaches, datasets, and comparative study. J Inf Secur Appl 50:102419–102419
Fu Y, Li C, Yu FR et al (2023) An incentive mechanism of incorporating supervision game for federated learning in autonomous driving. IEEE Trans Intell Transp Syst 24(12):14800–14812
Hai T, Sarkar A, Karmakar R et al (2023) Neural session key exchange in the industrial internet of things using hyperchaotic-guided vector-valued artificial neural synchronization. Eng Appl Artif Intell 125:106683
Hai T, Sarkar A, Aksoy M et al (2024) Complex-valued hyperchaos-assisted vector-valued artificial neural key coordination for improving security in the industrial internet of things. Eng Appl Artif Intell 128:107561–107561
Hao J, Chen P, Chen J et al (2024) Multi-task federated learning-based system anomaly detection and multi-classification for microservices architecture. Future Gener Comput Syst 159:77–90
He H, Li X, Chen P et al (2024) Efficiently localizing system anomalies for cloud infrastructures: a novel dynamic graph transformer based parallel framework. J Cloud Comput 13(1):115–115
Huang R, Li Y, Wu H et al (2023) 68Ga-PSMA-11 PET/CT versus 68Ga-PSMA-11 PET/MRI for the detection of biochemically recurrent prostate cancer: a systematic review and meta-analysis. Front Oncol 13:1216894–1216894
Huong TT, Bac TP, Long DM et al (2021) Lockedge: low-complexity cyberattack detection in IoT edge computing. IEEE Access 9:29696–29710
Hussain F, Abbas SG, Shah GA et al (2021) A framework for malicious traffic detection in IoT healthcare environment. Sensors 21:3025
Jamil F, Ahmad S, Iqbal N et al (2020) Towards a remote monitoring of patient vital signs based on IoT-based blockchain integrity management platforms in smart hospitals. Sensors 20:2195
Jeong S, Park C, Hong D et al (2021) Neural cryptography based on generalized tree parity machine for real-life systems. Secur Commun Netw. https://doi.org/10.1155/2021/6680782
Jiang H, Wang M, Zhao P et al (2021) A utility-aware general framework with quantifiable privacy preservation for destination prediction in LBSs. IEEE/ACM Trans Netw 29(5):2228–2241
Kairouz P, Mcmahan HB, Avent B et al (2021) Advances and open problems in federated learning. Found Trends Mach Learn 14:1–210
Karakaya B, Gülten A, Frasca M (2019) A true random bit generator based on a memristive chaotic circuit: analysis, design and FPGA implementation. Chaos Solitons Fract 119:143–149
Khan AMZ, Sarkar A (2023) Memristive hyperchaotic system-based complex-valued artificial neural synchronization for secured communication in industrial internet of things. Eng Appl Artif Intell 123:106357
Koroniotis N, Moustafa N, Sitnikova E et al (2019) Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: BoT-IoT dataset. Future Gener Comput Syst 100:779–796
Koroniotis N, Moustafa N, Sitnikova E (2020) A new network forensic framework based on deep learning for internet of things networks: a particle deep framework. Future Gener Comput Syst 110:91–106
Koroniotis N, Moustafa N, Sitnikova E et al (2021) https://research.unsw.edu.au/projects/bot-iot-dataset
Kumar P, Kumar R, Gupta GP et al (2021) A distributed framework for detecting DDoS attacks in smart contract-based Blockchain-IoT Systems by leveraging Fog computing. Trans Emerg Telecommun Technol. https://doi.org/10.1002/ett.4112
Latif S, Zou Z, Idrees Z et al (2020) A novel attack detection scheme for the industrial internet of things using a lightweight random neural network. IEEE Access 8:89337–89350
Lesne A (2014) Shannon entropy: a rigorous notion at the crossroads between probability, information theory, dynamical systems and statistical physics. Math Struct Comput Sci. https://doi.org/10.1017/S0960129512000783
Li H, Yang X, Wang H et al (2022) A controllable secure blockchain-based electronic healthcare records sharing scheme. J Healthc Eng 2022:2058497
Li J, Huang C, Yang Y et al (2023) How nursing students’ risk perception affected their professional commitment during the COVID-19 pandemic: the mediating effects of negative emotions and moderating effects of psychological capital. Humanit Soc Sci Commun 10(1):195–195
Li M, Cui H, Liu C et al (2023) A four-dimensional space-based data multi-embedding mechanism for network services. IEEE Trans Netw Serv Manag. https://doi.org/10.1109/TNSM.2023.3339674
Li Q, You T, Chen J et al (2024) LI-EMRSQL: linking information enhanced Text2SQL parsing on complex electronic medical records. IEEE Trans Reliab. https://doi.org/10.1109/TR.2023.3336330
Li T, Braud T, Li Y et al (2021) Lifecycle-aware online video caching. IEEE Trans Mob Comput 20(8):2624–2636
Li T, Zhang M, Li Y et al (2021) The impact of covid-19 on smartphone usage. IEEE Internet Things J 8(23):16723–16733
Li W, Susilo W, Xia C et al (2024) Secure data integrity check based on verified public key encryption with equality test for multi-cloud storage. IEEE Trans Depend Secur Comput. https://doi.org/10.1109/TDSC.2024.3375369
Lim WY, Luong NC, Hoang DT et al (2020) Federated learning in mobile edge networks: a comprehensive survey. IEEE Commun Surv Tutor 22:2031–2063
Lin F, Zhou Y, An X et al (2018) Fair resource allocation in an intrusion-detection system for edge computing: ensuring the security of Internet of Things devices. IEEE Consum Electron Mag 7:45–50
Liu P, Zeng Z, Wang J (2019) Global synchronization of coupled fractional-order recurrent neural networks. IEEE Trans Neural Netw Learn Syst 30(8):2358–2368
Liu X, Zhao J, Li J et al (2022) Federated neural architecture search for medical data security. IEEE Trans Ind Inform 18(8):5628–5636
Lyu T, Xu H, Zhang L et al (2024) Source selection and resource allocation in wireless-powered relay networks: an adaptive dynamic programming-based approach. IEEE Internet Things J 11(5):8973–8988
Ma J, Hu J (2022) Safe consensus control of cooperative-competitive multi-agent systems via differential privacy. Kybernetika 58(3):426–439
Mcmahan HB, Moore E, Ramage D et al (2016) Federated learning of deep networks using model averaging. arXiv 2016, pp 5629–5629. arXiv:1602.05629
Mohapatra S, Parija S (2020) Brief understanding of IoT health care service model over remotely cloud connected environment. Advances in intelligent computing and communication. Springer, Singapore, pp 46–51
Moustafa A (2020) Internet of medical things (IoMT) security: a survey on threats, security mechanisms, and challenges. J Netw Comput Appl 160:2020–2020
Nguyen TD, Rieger P, Miettinen M et al (2020) Poisoning attacks on federated learning-based IoT intrusion detection system. In: Proceedings of the workshop on decentralized IoT systems and security (DISS), 2020, pp 23–26
Pokhrel S, Abbas R, BA (2021) IoT Security: botnet detection in iot using machine learning. arXiv 2021. arXiv:2104.02231
Preuveneers D, Rimmer V, Tsingenopoulos I, Ilie-Zudor E (2018) Chained anomaly detection models for federated learning: an intrusion detection case study. Appl Sci 8(12):2663
Rajendran S, Obeid JS, Binol H et al (2021) Cloud-based federated learning implementation across medical centers. JCO Clin Cancer Inform 5:1–11
Rieke N, Hancox J, Li W et al (2020) The future of digital health with federated learning. NPJ Digit Med 3:1–7
Rohokale VM, Prasad NR, Prasad R (2011) A cooperative internet of things (IoT) for rural healthcare monitoring and control. In: Proceedings of the 2nd international conference on wireless communication, vehicular technology, information theory and aerospace & electronic systems technology (wireless VITAE)
Sahoo M, Singhar SS, Nayak B et al (2019) A blockchain based framework secured by ECDSA to curb drug counterfeiting. In: Proceedings of the 10th International Conference on computing, communication and networking technologies (ICCCNT), pp 6–8
Sarkar A (2021) Deep learning guided double hidden layer neural synchronization through mutual. Learning 53:1355–1384. https://doi.org/10.1007/s11063-021-10443-8
Sarkar A, Daripa K, Khan MZ et al (2022) Cloud enabled blockchain-based secured communication in mutual intelligent transportation using neural synchronization. Veh Commun 38:100533–100533. https://doi.org/10.1016/j.vehcom.2022.100533
Sarkar A, Daripa K, Khan MZ (2024) An efficient group synchronization of chaos-tuned neural networks for exchange of common secret key. Soft Comput 28:4413–4433
Shafiq M, Tian Z, Bashir AK et al (2020) A malicious bot-IoT traffic detection method in IoT network using machine-learning techniques. IEEE Internet Things J 8:3242–3254
Shaikh S, Chitre V (2017) Healthcare monitoring system using IoT. In: Proceedings of the 2017 international conference on trends in electronics and informatics (ICEI), pp 11–12
Sharma P, Borah MD, Namasudra S (2021) Improving security of medical big data by using Blockchain technology. Comput Electr Eng 96:107529
Shen B, Guo J, Yang Y (2019) MedChain: efficient healthcare data sharing via blockchain. Appl Sci 9:1207–1207
Shenfield A, Day D, Ayesh A (2018) Intelligent intrusion detection systems using artificial neural networks. ICT Express 4:95–99
Sun G, Li Y, Liao D et al (2018) Service function chain orchestration across multiple domains: a full mesh aggregation approach. IEEE Trans Netw Serv Manag 15(3):1175–1191
Sun G, Liao D, Zhao D et al (2018) Live migration for multiple correlated virtual machines in cloud-based data centers. IEEE Trans Serv Comput 11(2):279–291
Suzuki K (2011) Artificial neural networks: methodological advances and biomedical applications. BoD-Books on Demand, Norderstedt
Teodoro A, Gomes O, Saadi M (2021) An FPGA-based performance evaluation of artificial neural network architecture algorithm for IoT. Wirel Pers Commun. https://doi.org/10.1007/s11277-021-08566-1
UCI (1999) Kdd Cup 1999. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html
UNB (2021) Botnet dataset. https://www.unb.ca/cic/datasets/botnet.html
UNB (2021) CSE-CIC-IDS2018 dataset. https://www.unb.ca/cic/datasets/ids-2018.html
Walker-Roberts S, Hammoudeh M, Aldabbas O et al (2020) Threats on the horizon: understanding security threats in the era of cyber-physical systems. J Supercomput 76:2643–2664
Wang (2020) Blockchain-based secure key management for the internet of things. IEEE Internet Things J 7(1):37–46
Wang D, Zhang W, Wu W et al (2023) Soft-label for multi-domain fake news detection. IEEE Access 11:98596–98606
Wang N, Chen J, Chen W et al (2022) The effectiveness of case management for cancer patients: an umbrella review. BMC Health Serv Res 22(1):1247–1247
Wang Q, Hu J, Wu Y et al (2023) Output synchronization of wide-area heterogeneous multi-agent systems over intermittent clustered networks. Inf Sci 619:263–275
Wang S, Tuor T, Salonidis T et al (2019) Adaptive federated learning in resource constrained edge computing systems. IEEE J Select Areas Commun 37:1205–1221
Wazid (2019) Blockchain for internet of things (IoT) applications: a comprehensive survey. IEEE Access 7:165462–165499
Wu Z, Liu G, Wu J et al (2023) Are neighbors alike? A semisupervised probabilistic collaborative learning model for online review spammers detection. Information Systems Research
Xiao Y, Wu J, Lin Z et al (2018) A deep learning-based multi-model ensemble method for cancer prediction. Comput Methods Programs Biomed 153:1–9
Xie G, Hou G, Pei Q et al (2024) Lightweight privacy protection via adversarial sample. Electronics 13(7):1230–1230
Xu H, Zhang L, Onireti O et al (2020) Blockchain-enabled privacy-preserving contact tracing for COVID-19 pandemic and beyond. IEEE Internet Things J 8:3915–3929
Xu H, Han S, Li X et al (2023) Anomaly traffic detection based on communication-efficient federated learning in space-air-ground integration network. IEEE Trans Wirel Commun 22(12):9346–9360
Yaqoob I, Salah K, Jayaraman R et al (2021) Blockchain for healthcare data management: opportunities, challenges, and future recommendations. Neural Comput Appl 8:1–16
Yin L, Luo X, Zhu C et al (2019) Disrupting C &C communication of IoT-based botnet through fast detection of anomalous domain queries. IEEE Trans Ind Inform 16:1373–1384
Zhang H, Mi Y, Liu X et al (2023) A differential game approach for real-time security defense decision in scale-free networks. Comput Netw 224:109635–109635
Zhang J, Chen J, Wu D et al (2019) Poisoning attack in federated learning using generative adversarial nets. In: Proceedings of the 18th IEEE international conference on trust, security and privacy in computing and communications/13th IEEE international conference on big data science and engineering, pp 5–8
Zhao P (2021) Federated learning for anomaly detection in industrial control systems. IEEE Syst J 15(4):4183–4196
Zhao Y, Chen J, Wu D et al (2019) Multi-task network anomaly detection using federated learning. In: Proceedings of the tenth international symposium on information and communication technology, pp 4–6
Zheng W, Lu S, Cai Z et al (2024) PAL-BERT: an improved question answering model. Comput Model Eng Sci. https://doi.org/10.32604/cmes.2023.046692
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Zhong, C., Sarkar, A., Manna, S. et al. Federated learning-guided intrusion detection and neural key exchange for safeguarding patient data on the internet of medical things. Int. J. Mach. Learn. & Cyber. 15, 5635–5665 (2024). https://doi.org/10.1007/s13042-024-02269-2
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s13042-024-02269-2