A Review of Privacy-Preserving Intrusion Detection for Healthcare Edge-IOT
Article Sidebar
Main Article Content
The rapid adoption of Edge Computing and Internet of Things (IoT) technologies in healthcare has enabled real-time patient monitoring and low-latency clinical decision support. However, the distributed and resource-constrained nature of Edge-IoT systems makes them highly vulnerable to cyber-attacks such as data breaches, ransomware, and denial-of-service, which threaten patient privacy and system reliability. Traditional centralized AI-based intrusion detection systems (IDS) face limitations in privacy preservation, scalability, and suitability for edge environments. To address these challenges, this paper proposes a secure and privacy-preserving cyber-attack detection framework that integrates an optimized LSTM Gated Multi-Layer Perceptron Neural Network (LSTMG-MLPNN) with Federated Learning (FL) and Med-Chain block chain technology. Federated Learning enables collaborative model training without sharing raw patient data, and Med-Chain with lattice encryption ensures secure aggregation, trust management, and auditability.The proposed system provides an effective, scalable, and privacy-aware solution for cyber-attack detection in healthcare Edge-IoT environments.
Downloads
References
Goffer, M. A., et al., “AI-Enhanced Cyber Threat Detection and Response: Advancing National Security in Critical Infrastructure,” Journal of Posthumanism, vol. 5, no. 3, pp. 1667–1689, 2025.
Virk, A., et al., “Digital Health Policy and Cybersecurity Regulations Regarding Artificial Intelligence (AI) Implementation in Healthcare,” Cureus, vol. 17, no. 3, 2025.
Gupta, S., Kamboj, S., and Bag, S., “Role of Risks in the Development of Responsible Artificial Intelligence in the Digital Healthcare Domain,” Information Systems Frontiers, vol. 25, no. 6, pp. 2257–2274, 2023.
Gabriel, O. T., Data Privacy and Ethical Issues in Collecting Health Care Data Using Artificial Intelligence Among Health Workers, M.S. Thesis, Center for Bioethics and Research, 2023.
Bashir, A. K., et al., “Federated Learning for the Healthcare Metaverse: Concepts, Applications, Challenges, and Future Directions,” IEEE Internet of Things Journal, vol. 10, no. 24, pp. 21873–21891, 2023.
Singh, K., and Sevukamoorthy, L., “Blockchain and AI-Based Threat Detection for Enhanced Security in Financial Networks,” in Proc. IEEE TEMSCON-ASPAC, 2023, pp. 1–5.
Mansour, R. F., “Artificial Intelligence Based Optimization with Deep Learning Model for Blockchain-Enabled Intrusion Detection in CPS Environment,” Scientific Reports, vol. 12, no. 1, Art. no. 12937, 2022.
Karn, A. L., et al., “Applying the Defense Model to Strengthen Information Security with Artificial Intelligence in Computer Networks of the Financial Services Sector,” Scientific Reports, vol. 15, no. 1, Art. no. 30292, 2025.
Bhambri, P., and Starostka-Patyk, M., “Integrating AI with Blockchain for Decentralized Security and Threat Prevention,” in Handbook of AI-Driven Threat Detection and Prevention, CRC Press, 2025, pp. 353–370.
Awotunde, J. B., et al., “Privacy and Security Enhancement of Smart Cities Using Hybrid Deep Learning-Enabled Blockchain,” Scalable Computing: Practice and Experience, vol. 24, no. 3, pp. 561–584, 2023.
Konstantinos P. Ferentinos.,”Deep learning models for plant disease detection and diagnosis” https://doi.org/10.1016/j.compag.2018.01.009
G.L. Grinblat et al. Deep learning for plant identification using vein morphological patterns Comput. Electron. Agric. (2016)
G. Singh and D. s. Chabra, "Plant Disease Detection using Convolution Neural Network Approach," 2023 International Conference on Inventive Computation Technologies (ICICT), Lalitpur, Nepal, 2023, pp. 352-355, doi: 10.1109/ICICT57646.2023.10134217.
Yang Lu et.al.,Identification of rice diseases using deep convolutional neural networks Neurocomputing 6 December 2017, Agricultural and Food Sciences, Computer Science.
Too EC, Yujian L, Njuki S, Yingchun L. A comparative study of fine-tuning deep learning models for plant disease identification. Computers and Electronics in Agriculture. 2019 Jun 1;161:272-279.
Moustafa, N., Slay, J“UNSW-NB15: A Comprehensive Data Set for Network Intrusion Detection Systems”Military Communications and Information Systems Conference, 2015.
Shone, N., et al.“A Deep Learning Approach to Network Intrusion Detection.”IEEE Transactions on Emerging Topics in Computational Intelligence, 2018.
Doshi, R., Apthorpe, N., Feamster, N.“Machine Learning DDoS Detection for Consumer Internet of Things Devices.”IEEE Security and Privacy Workshops, 2018.
Kim, G., Lee, S., Kim, S.“A Novel Hybrid Intrusion Detection Method Integrating Anomaly Detection with Misuse Detection.”Expert Systems with Applications, vol. 41, 2014.
Yin, C., Zhu, Y., Fei, J., He, X.“A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks.”IEEE Access, vol. 5, pp. 21954–21961, 2017.
Hochreiter, S., Schmidhuber, J.“Long Short-Term Memory.”Neural Computation, vol. 9, no. 8, pp. 1735–1780, 1997.
Neil Sahota, “What Is Deep Learning? Definition and Techniques [With Examples],” LinkedIn, Jan 17, 2023 visual summary of deep learning models.

This work is licensed under a Creative Commons Attribution 4.0 International License.
All articles published in our journal are licensed under CC-BY 4.0, which permits authors to retain copyright of their work. This license allows for unrestricted use, sharing, and reproduction of the articles, provided that proper credit is given to the original authors and the source.