
INTERNATIONAL JOURNAL OF LATEST TECHNOLOGY IN ENGINEERING,
MANAGEMENT & APPLIED SCIENCE (IJLTEMAS)
ISSN 2278-2540 | DOI: 10.51583/IJLTEMAS | Volume XV, Issue II, February 2026
www.rsisinternational.org
Manual / Heuristic
Selection
Convolution Neural
Network
Correlation-based
Selection
Recursive Feature
Elimination (RFE)
Long Short-Term
Memory (LSTM)
Network
Federated Learning +
Blockchain
CONCLUSION
According to a review of the literature, the majority of cyber security frameworks for IoT and healthcare settings
now in use rely on centralized AI models, which presents significant issues with regard to data privacy,
regulatory compliance, and susceptibility to significant breaches. Despite their high detection accuracy, deep
learning models like CNNs, RNNs, and GANs are computationally demanding and ill-suited for deployment on
edge devices with limited resources. Because it allows for collaborative model training without the need to share
raw patient data, federated learning has become a potential option. Nevertheless, many FL-based systems still
lack secure aggregation, trust management, and auditability.These holes are filled by block chain and medium-
chain technologies, which offer safe routing, immutable records, and decentralized validation, although they
frequently present latency and scalability issues. Moreover, generic statistical or PCA-based approaches are
usually used for feature selection in intrusion detection systems that are currently in use, ignoring the behavioral
impact and interdependencies of attack features. Although swarm intelligence and optimization techniques
enhance performance, they are infrequently used in healthcare IoT situations in conjunction with block chain
and federated learning. The suggested LSTM with federated Learning is intended to fill the gaps in the literature
by providing an integrated framework that simultaneously guarantees privacy, trust, computational efficiency,
and accurate temporal attack detection.
REFERENCES
1. Goffer, M. A., et al., “AI-Enhanced Cyber Threat Detection and Response: Advancing National Security
in Critical Infrastructure,” Journal of Posthumanism, vol. 5, no. 3, pp. 1667–1689, 2025.
2. Virk, A., et al., “Digital Health Policy and Cybersecurity Regulations Regarding Artificial Intelligence
(AI) Implementation in Healthcare,” Cureus, vol. 17, no. 3, 2025.
3. Gupta, S., Kamboj, S., and Bag, S., “Role of Risks in the Development of Responsible Artificial
Intelligence in the Digital Healthcare Domain,” Information Systems Frontiers, vol. 25, no. 6, pp. 2257–
2274, 2023.
4. Gabriel, O. T., Data Privacy and Ethical Issues in Collecting Health Care Data Using Artificial
Intelligence Among Health Workers, M.S. Thesis, Center for Bioethics and Research, 2023.
5. Bashir, A. K., et al., “Federated Learning for the Healthcare Metaverse: Concepts, Applications,
Challenges, and Future Directions,” IEEE Internet of Things Journal, vol. 10, no. 24, pp. 21873–21891,
2023.
6. Singh, K., and Sevukamoorthy, L., “Blockchain and AI-Based Threat Detection for Enhanced Security in
Financial Networks,” in Proc. IEEE TEMSCON-ASPAC, 2023, pp. 1–5.
7. Mansour, R. F., “Artificial Intelligence Based Optimization with Deep Learning Model for Blockchain-
Enabled Intrusion Detection in CPS Environment,” Scientific Reports, vol. 12, no. 1, Art. no. 12937, 2022.
8. Karn, A. L., et al., “Applying the Defense Model to Strengthen Information Security with Artificial
Intelligence in Computer Networks of the Financial Services Sector,” Scientific Reports, vol. 15, no. 1,
Art. no. 30292, 2025.