Skip to main content
Log in

Federated learning-guided intrusion detection and neural key exchange for safeguarding patient data on the internet of medical things

  • Original Article
  • Published:
International Journal of Machine Learning and Cybernetics Aims and scope Submit manuscript

Abstract

To improve the security of the Internet of Medical Things (IoMT) in healthcare, this paper offers a Federated Learning (FL)-guided Intrusion Detection System (IDS) and an Artificial Neural Network (ANN)-based key exchange mechanism inside a blockchain framework. The IDS are essential for spotting network anomalies and taking preventative action to guarantee the secure and dependable functioning of IoMT systems. The suggested method integrates FL-IDS with a blockchain-based ANN-based key exchange mechanism, providing several important benefits: (1) FL-based IDS creates a shared ledger that aggregates nearby weights and transmits historical weights that have been averaged, lowering computing effort, eliminating poisoning attacks, and improving data visibility and integrity throughout the shared database. (2) The system uses edge-based detection techniques to protect the cloud in the case of a security breach, enabling quicker threat recognition with less computational and processing resource usage. FL’s effectiveness with fewer data samples plays a part in this benefit. (3) The bidirectional alignment of ANNs ensures a strong security framework and facilitates the production of keys inside the IoMT network on the blockchain. (4) Mutual learning approaches synchronize ANNs, making it easier for IoMT devices to distribute synchronized keys. (5) XGBoost and ANN models were put to the test using BoT-IoT datasets to gauge how successful the suggested method is. The findings show that ANN demonstrates greater performance and dependability when dealing with heterogeneous data available in IoMT, such as ICU (Intensive Care Unit) data in the medical profession, compared to alternative approaches studied in this study. Overall, this method demonstrates increased security measures and performance, making it an appealing option for protecting IoMT systems, especially in demanding medical settings like ICUs.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

Data availability

Data will be made available on request.

References

  1. Agrawal S, Sarkar S, Aouedi O et al (2021) Federated learning for intrusion detection system. Concepts, challenges and future directions. arXiv

  2. Aldhaheri S, Alghazzawi D, Cheng L et al (2020) DeepDCA: novel network-based detection of IoT attacks using artificial immune system. Appl Sci 10:1909

    Google Scholar 

  3. Alkadi O, Moustafa N, Turnbull B et al (2020) A deep blockchain framework-enabled collaborative intrusion detection for protecting IoT and cloud networks. IEEE Internet Things J 8:9463–9472

    Google Scholar 

  4. Alwarafy A, Al-Thelaya KA, Abdallah M et al (2020) A survey on security and privacy issues in edge computingassisted internet of things. IEEE Internet Things J 8:4004–4022

    Google Scholar 

  5. Amer M, Hay G, Baset EH, Abd El Azim Mohamed M (2021) Development machine learning techniques to enhance cyber security algorithms (Dept E). Mansoura Eng J 46:36–46

    Google Scholar 

  6. Antonakakis M, April T, Bailey M et al (2017) Understanding the Mirai Botnet. In: Proceedings of the 26th USENIX security symposium (USENIX Security 17), pp 16–18

  7. Aujla GS, Jindal A (2020) A decoupled blockchain approach for edge-envisioned IoT-based healthcare monitoring. IEEE J Select Areas Commun 39:491–499

    Google Scholar 

  8. Bagdasaryan E, Veit A, Hua Y et al (2020) How to backdoor federated learning. In: Proceedings of the international conference on artificial intelligence and statistics, online pp 26–28

  9. Balaha HM, Saif M, Tamer A et al (2022) Hybrid deep learning and genetic algorithms approach (HMB-DLGAHA) for the early ultrasound diagnoses of breast cancer. Neural Comput Appl 2022:8671–8695

    Google Scholar 

  10. Cai R, Tang J, Deng C et al (2019) Violence against health care workers in China, 2013–2016: evidence from the national judgment documents. Hum Resour Health 17(1):103–103

    Google Scholar 

  11. Cassales GW, Senger H, Faria ERD et al (2019) An intrusion detection system architecture for IoT networks. In: Proceedings of the 2019 IEEE symposium on computers and communications (ISCC)

  12. Chaabouni N, Mosbah M, Zemmari A et al (2019) Network intrusion detection for IoT security based on learning techniques. IEEE Commun Surv Tutor 21:2671–2701

    Google Scholar 

  13. Chen Z, Lv N, Liu P et al (2020) Intrusion detection for wireless edge networks based on federated learning. IEEE Access 8:217463–217472

    Google Scholar 

  14. Dhasaratha C (2024) Data privacy model using blockchain reinforcement federated learning approach for scalable internet of medical things. CAAI Trans Intell Technol. https://doi.org/10.1049/cit2.12287

    Article  Google Scholar 

  15. Dias LP, Cerqueira JD, Assis KD et al (2017) Using artificial neural network in intrusion detection systems to computer networks. In: Proceedings of the 9th computer science and electronic engineering (CEEC), pp 27–29

  16. Ding Y, Zhang W, Zhou X et al (2021) FraudTrip: taxi fraudulent trip detection from corresponding trajectories. IEEE Internet Things J 8(16):12505–12517

    Google Scholar 

  17. Dolecki M, Kozera R (2015) The impact of the TPM weights distribution on network synchronization time. Comput Inf Syst Ind Manag 9339:451–460

    Google Scholar 

  18. Dong T, Huang T (2020) Neural cryptography based on complex-valued neural network. IEEE Trans Neural Netw Learn Syst 31(11):4999–5004. https://doi.org/10.1109/TNNLS.2019.2955165

    Article  MathSciNet  Google Scholar 

  19. Doriguzzi-Corin R, Millar S, Scott-Hayward S et al (2020) LUCID: a practical, lightweight deep learning solution for DDoS attack detection. IEEE Trans Netw Serv Manag 17:876–889

    Google Scholar 

  20. Fatani A, Elaziz MA, Dahou A et al (2021) IoT intrusion detection system using deep learning and enhanced transient search optimization. IEEE Access 9:123448–123464

    Google Scholar 

  21. Ferrag MA, Maglaras L (2019) DeepCoin: a novel deep learning and blockchain-based energy exchange framework for smart grids. IEEE Trans Eng Manag 67:1285–1297

    Google Scholar 

  22. Ferrag MA, Maglaras L, Moschoyiannis S et al (2020) Deep learning for cyber security intrusion detection: approaches, datasets, and comparative study. J Inf Secur Appl 50:102419–102419

    Google Scholar 

  23. Fu Y, Li C, Yu FR et al (2023) An incentive mechanism of incorporating supervision game for federated learning in autonomous driving. IEEE Trans Intell Transp Syst 24(12):14800–14812

    Google Scholar 

  24. Hai T, Sarkar A, Karmakar R et al (2023) Neural session key exchange in the industrial internet of things using hyperchaotic-guided vector-valued artificial neural synchronization. Eng Appl Artif Intell 125:106683

    Google Scholar 

  25. Hai T, Sarkar A, Aksoy M et al (2024) Complex-valued hyperchaos-assisted vector-valued artificial neural key coordination for improving security in the industrial internet of things. Eng Appl Artif Intell 128:107561–107561

    Google Scholar 

  26. Hao J, Chen P, Chen J et al (2024) Multi-task federated learning-based system anomaly detection and multi-classification for microservices architecture. Future Gener Comput Syst 159:77–90

    Google Scholar 

  27. He H, Li X, Chen P et al (2024) Efficiently localizing system anomalies for cloud infrastructures: a novel dynamic graph transformer based parallel framework. J Cloud Comput 13(1):115–115

    Google Scholar 

  28. Huang R, Li Y, Wu H et al (2023) 68Ga-PSMA-11 PET/CT versus 68Ga-PSMA-11 PET/MRI for the detection of biochemically recurrent prostate cancer: a systematic review and meta-analysis. Front Oncol 13:1216894–1216894

    Google Scholar 

  29. Huong TT, Bac TP, Long DM et al (2021) Lockedge: low-complexity cyberattack detection in IoT edge computing. IEEE Access 9:29696–29710

    Google Scholar 

  30. Hussain F, Abbas SG, Shah GA et al (2021) A framework for malicious traffic detection in IoT healthcare environment. Sensors 21:3025

    Google Scholar 

  31. Jamil F, Ahmad S, Iqbal N et al (2020) Towards a remote monitoring of patient vital signs based on IoT-based blockchain integrity management platforms in smart hospitals. Sensors 20:2195

    Google Scholar 

  32. Jeong S, Park C, Hong D et al (2021) Neural cryptography based on generalized tree parity machine for real-life systems. Secur Commun Netw. https://doi.org/10.1155/2021/6680782

    Article  Google Scholar 

  33. Jiang H, Wang M, Zhao P et al (2021) A utility-aware general framework with quantifiable privacy preservation for destination prediction in LBSs. IEEE/ACM Trans Netw 29(5):2228–2241

    Google Scholar 

  34. Kairouz P, Mcmahan HB, Avent B et al (2021) Advances and open problems in federated learning. Found Trends Mach Learn 14:1–210

    Google Scholar 

  35. Karakaya B, Gülten A, Frasca M (2019) A true random bit generator based on a memristive chaotic circuit: analysis, design and FPGA implementation. Chaos Solitons Fract 119:143–149

    Google Scholar 

  36. Khan AMZ, Sarkar A (2023) Memristive hyperchaotic system-based complex-valued artificial neural synchronization for secured communication in industrial internet of things. Eng Appl Artif Intell 123:106357

    Google Scholar 

  37. Koroniotis N, Moustafa N, Sitnikova E et al (2019) Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: BoT-IoT dataset. Future Gener Comput Syst 100:779–796

    Google Scholar 

  38. Koroniotis N, Moustafa N, Sitnikova E (2020) A new network forensic framework based on deep learning for internet of things networks: a particle deep framework. Future Gener Comput Syst 110:91–106

    Google Scholar 

  39. Koroniotis N, Moustafa N, Sitnikova E et al (2021) https://research.unsw.edu.au/projects/bot-iot-dataset

  40. Kumar P, Kumar R, Gupta GP et al (2021) A distributed framework for detecting DDoS attacks in smart contract-based Blockchain-IoT Systems by leveraging Fog computing. Trans Emerg Telecommun Technol. https://doi.org/10.1002/ett.4112

    Article  Google Scholar 

  41. Latif S, Zou Z, Idrees Z et al (2020) A novel attack detection scheme for the industrial internet of things using a lightweight random neural network. IEEE Access 8:89337–89350

    Google Scholar 

  42. Lesne A (2014) Shannon entropy: a rigorous notion at the crossroads between probability, information theory, dynamical systems and statistical physics. Math Struct Comput Sci. https://doi.org/10.1017/S0960129512000783

    Article  MathSciNet  Google Scholar 

  43. Li H, Yang X, Wang H et al (2022) A controllable secure blockchain-based electronic healthcare records sharing scheme. J Healthc Eng 2022:2058497

    Google Scholar 

  44. Li J, Huang C, Yang Y et al (2023) How nursing students’ risk perception affected their professional commitment during the COVID-19 pandemic: the mediating effects of negative emotions and moderating effects of psychological capital. Humanit Soc Sci Commun 10(1):195–195

    Google Scholar 

  45. Li M, Cui H, Liu C et al (2023) A four-dimensional space-based data multi-embedding mechanism for network services. IEEE Trans Netw Serv Manag. https://doi.org/10.1109/TNSM.2023.3339674

    Article  Google Scholar 

  46. Li Q, You T, Chen J et al (2024) LI-EMRSQL: linking information enhanced Text2SQL parsing on complex electronic medical records. IEEE Trans Reliab. https://doi.org/10.1109/TR.2023.3336330

    Article  Google Scholar 

  47. Li T, Braud T, Li Y et al (2021) Lifecycle-aware online video caching. IEEE Trans Mob Comput 20(8):2624–2636

    Google Scholar 

  48. Li T, Zhang M, Li Y et al (2021) The impact of covid-19 on smartphone usage. IEEE Internet Things J 8(23):16723–16733

    Google Scholar 

  49. Li W, Susilo W, Xia C et al (2024) Secure data integrity check based on verified public key encryption with equality test for multi-cloud storage. IEEE Trans Depend Secur Comput. https://doi.org/10.1109/TDSC.2024.3375369

    Article  Google Scholar 

  50. Lim WY, Luong NC, Hoang DT et al (2020) Federated learning in mobile edge networks: a comprehensive survey. IEEE Commun Surv Tutor 22:2031–2063

    Google Scholar 

  51. Lin F, Zhou Y, An X et al (2018) Fair resource allocation in an intrusion-detection system for edge computing: ensuring the security of Internet of Things devices. IEEE Consum Electron Mag 7:45–50

    Google Scholar 

  52. Liu P, Zeng Z, Wang J (2019) Global synchronization of coupled fractional-order recurrent neural networks. IEEE Trans Neural Netw Learn Syst 30(8):2358–2368

    MathSciNet  Google Scholar 

  53. Liu X, Zhao J, Li J et al (2022) Federated neural architecture search for medical data security. IEEE Trans Ind Inform 18(8):5628–5636

    Google Scholar 

  54. Lyu T, Xu H, Zhang L et al (2024) Source selection and resource allocation in wireless-powered relay networks: an adaptive dynamic programming-based approach. IEEE Internet Things J 11(5):8973–8988

    Google Scholar 

  55. Ma J, Hu J (2022) Safe consensus control of cooperative-competitive multi-agent systems via differential privacy. Kybernetika 58(3):426–439

    MathSciNet  Google Scholar 

  56. Mcmahan HB, Moore E, Ramage D et al (2016) Federated learning of deep networks using model averaging. arXiv 2016, pp 5629–5629. arXiv:1602.05629

  57. Mohapatra S, Parija S (2020) Brief understanding of IoT health care service model over remotely cloud connected environment. Advances in intelligent computing and communication. Springer, Singapore, pp 46–51

    Google Scholar 

  58. Moustafa A (2020) Internet of medical things (IoMT) security: a survey on threats, security mechanisms, and challenges. J Netw Comput Appl 160:2020–2020

    Google Scholar 

  59. Nguyen TD, Rieger P, Miettinen M et al (2020) Poisoning attacks on federated learning-based IoT intrusion detection system. In: Proceedings of the workshop on decentralized IoT systems and security (DISS), 2020, pp 23–26

  60. Pokhrel S, Abbas R, BA (2021) IoT Security: botnet detection in iot using machine learning. arXiv 2021. arXiv:2104.02231

  61. Preuveneers D, Rimmer V, Tsingenopoulos I, Ilie-Zudor E (2018) Chained anomaly detection models for federated learning: an intrusion detection case study. Appl Sci 8(12):2663

    Google Scholar 

  62. Rajendran S, Obeid JS, Binol H et al (2021) Cloud-based federated learning implementation across medical centers. JCO Clin Cancer Inform 5:1–11

    Google Scholar 

  63. Rieke N, Hancox J, Li W et al (2020) The future of digital health with federated learning. NPJ Digit Med 3:1–7

    Google Scholar 

  64. Rohokale VM, Prasad NR, Prasad R (2011) A cooperative internet of things (IoT) for rural healthcare monitoring and control. In: Proceedings of the 2nd international conference on wireless communication, vehicular technology, information theory and aerospace & electronic systems technology (wireless VITAE)

  65. Sahoo M, Singhar SS, Nayak B et al (2019) A blockchain based framework secured by ECDSA to curb drug counterfeiting. In: Proceedings of the 10th International Conference on computing, communication and networking technologies (ICCCNT), pp 6–8

  66. Sarkar A (2021) Deep learning guided double hidden layer neural synchronization through mutual. Learning 53:1355–1384. https://doi.org/10.1007/s11063-021-10443-8

    Article  Google Scholar 

  67. Sarkar A, Daripa K, Khan MZ et al (2022) Cloud enabled blockchain-based secured communication in mutual intelligent transportation using neural synchronization. Veh Commun 38:100533–100533. https://doi.org/10.1016/j.vehcom.2022.100533

    Article  Google Scholar 

  68. Sarkar A, Daripa K, Khan MZ (2024) An efficient group synchronization of chaos-tuned neural networks for exchange of common secret key. Soft Comput 28:4413–4433

    Google Scholar 

  69. Shafiq M, Tian Z, Bashir AK et al (2020) A malicious bot-IoT traffic detection method in IoT network using machine-learning techniques. IEEE Internet Things J 8:3242–3254

    Google Scholar 

  70. Shaikh S, Chitre V (2017) Healthcare monitoring system using IoT. In: Proceedings of the 2017 international conference on trends in electronics and informatics (ICEI), pp 11–12

  71. Sharma P, Borah MD, Namasudra S (2021) Improving security of medical big data by using Blockchain technology. Comput Electr Eng 96:107529

    Google Scholar 

  72. Shen B, Guo J, Yang Y (2019) MedChain: efficient healthcare data sharing via blockchain. Appl Sci 9:1207–1207

    Google Scholar 

  73. Shenfield A, Day D, Ayesh A (2018) Intelligent intrusion detection systems using artificial neural networks. ICT Express 4:95–99

    Google Scholar 

  74. Sun G, Li Y, Liao D et al (2018) Service function chain orchestration across multiple domains: a full mesh aggregation approach. IEEE Trans Netw Serv Manag 15(3):1175–1191

    Google Scholar 

  75. Sun G, Liao D, Zhao D et al (2018) Live migration for multiple correlated virtual machines in cloud-based data centers. IEEE Trans Serv Comput 11(2):279–291

    Google Scholar 

  76. Suzuki K (2011) Artificial neural networks: methodological advances and biomedical applications. BoD-Books on Demand, Norderstedt

    Google Scholar 

  77. Teodoro A, Gomes O, Saadi M (2021) An FPGA-based performance evaluation of artificial neural network architecture algorithm for IoT. Wirel Pers Commun. https://doi.org/10.1007/s11277-021-08566-1

    Article  Google Scholar 

  78. UCI (1999) Kdd Cup 1999. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html

  79. UNB (2021) Botnet dataset. https://www.unb.ca/cic/datasets/botnet.html

  80. UNB (2021) CSE-CIC-IDS2018 dataset. https://www.unb.ca/cic/datasets/ids-2018.html

  81. Walker-Roberts S, Hammoudeh M, Aldabbas O et al (2020) Threats on the horizon: understanding security threats in the era of cyber-physical systems. J Supercomput 76:2643–2664

    Google Scholar 

  82. Wang (2020) Blockchain-based secure key management for the internet of things. IEEE Internet Things J 7(1):37–46

    Google Scholar 

  83. Wang D, Zhang W, Wu W et al (2023) Soft-label for multi-domain fake news detection. IEEE Access 11:98596–98606

    Google Scholar 

  84. Wang N, Chen J, Chen W et al (2022) The effectiveness of case management for cancer patients: an umbrella review. BMC Health Serv Res 22(1):1247–1247

    Google Scholar 

  85. Wang Q, Hu J, Wu Y et al (2023) Output synchronization of wide-area heterogeneous multi-agent systems over intermittent clustered networks. Inf Sci 619:263–275

    Google Scholar 

  86. Wang S, Tuor T, Salonidis T et al (2019) Adaptive federated learning in resource constrained edge computing systems. IEEE J Select Areas Commun 37:1205–1221

    Google Scholar 

  87. Wazid (2019) Blockchain for internet of things (IoT) applications: a comprehensive survey. IEEE Access 7:165462–165499

    Google Scholar 

  88. Wu Z, Liu G, Wu J et al (2023) Are neighbors alike? A semisupervised probabilistic collaborative learning model for online review spammers detection. Information Systems Research

  89. Xiao Y, Wu J, Lin Z et al (2018) A deep learning-based multi-model ensemble method for cancer prediction. Comput Methods Programs Biomed 153:1–9

    Google Scholar 

  90. Xie G, Hou G, Pei Q et al (2024) Lightweight privacy protection via adversarial sample. Electronics 13(7):1230–1230

    Google Scholar 

  91. Xu H, Zhang L, Onireti O et al (2020) Blockchain-enabled privacy-preserving contact tracing for COVID-19 pandemic and beyond. IEEE Internet Things J 8:3915–3929

    Google Scholar 

  92. Xu H, Han S, Li X et al (2023) Anomaly traffic detection based on communication-efficient federated learning in space-air-ground integration network. IEEE Trans Wirel Commun 22(12):9346–9360

    Google Scholar 

  93. Yaqoob I, Salah K, Jayaraman R et al (2021) Blockchain for healthcare data management: opportunities, challenges, and future recommendations. Neural Comput Appl 8:1–16

    Google Scholar 

  94. Yin L, Luo X, Zhu C et al (2019) Disrupting C &C communication of IoT-based botnet through fast detection of anomalous domain queries. IEEE Trans Ind Inform 16:1373–1384

    Google Scholar 

  95. Zhang H, Mi Y, Liu X et al (2023) A differential game approach for real-time security defense decision in scale-free networks. Comput Netw 224:109635–109635

    Google Scholar 

  96. Zhang J, Chen J, Wu D et al (2019) Poisoning attack in federated learning using generative adversarial nets. In: Proceedings of the 18th IEEE international conference on trust, security and privacy in computing and communications/13th IEEE international conference on big data science and engineering, pp 5–8

  97. Zhao P (2021) Federated learning for anomaly detection in industrial control systems. IEEE Syst J 15(4):4183–4196

    Google Scholar 

  98. Zhao Y, Chen J, Wu D et al (2019) Multi-task network anomaly detection using federated learning. In: Proceedings of the tenth international symposium on information and communication technology, pp 4–6

  99. Zheng W, Lu S, Cai Z et al (2024) PAL-BERT: an improved question answering model. Comput Model Eng Sci. https://doi.org/10.32604/cmes.2023.046692

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Arindam Sarkar.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhong, C., Sarkar, A., Manna, S. et al. Federated learning-guided intrusion detection and neural key exchange for safeguarding patient data on the internet of medical things. Int. J. Mach. Learn. & Cyber. 15, 5635–5665 (2024). https://doi.org/10.1007/s13042-024-02269-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13042-024-02269-2

Keywords