A Review of Privacy-Preserving Intrusion Detection for Healthcare Edge-IOT

Article Sidebar

Main Article Content

P. Revathi
Dr. Sumathy Kingslin

The rapid adoption of Edge Computing and Internet of Things (IoT) technologies in healthcare has enabled real-time patient monitoring and low-latency clinical decision support. However, the distributed and resource-constrained nature of Edge-IoT systems makes them highly vulnerable to cyber-attacks such as data breaches, ransomware, and denial-of-service, which threaten patient privacy and system reliability. Traditional centralized AI-based intrusion detection systems (IDS) face limitations in privacy preservation, scalability, and suitability for edge environments. To address these challenges, this paper proposes a secure and privacy-preserving cyber-attack detection framework that integrates an optimized LSTM Gated Multi-Layer Perceptron Neural Network (LSTMG-MLPNN) with Federated Learning (FL) and Med-Chain block chain technology. Federated Learning enables collaborative model training without sharing raw patient data, and Med-Chain with lattice encryption ensures secure aggregation, trust management, and auditability.The proposed system provides an effective, scalable, and privacy-aware solution for cyber-attack detection in healthcare Edge-IoT environments.

A Review of Privacy-Preserving Intrusion Detection for Healthcare Edge-IOT. (2026). International Journal of Latest Technology in Engineering Management & Applied Science, 15(2), 300-306. https://doi.org/10.51583/IJLTEMAS.2026.15020000029

Downloads

References

Goffer, M. A., et al., “AI-Enhanced Cyber Threat Detection and Response: Advancing National Security in Critical Infrastructure,” Journal of Posthumanism, vol. 5, no. 3, pp. 1667–1689, 2025.

Virk, A., et al., “Digital Health Policy and Cybersecurity Regulations Regarding Artificial Intelligence (AI) Implementation in Healthcare,” Cureus, vol. 17, no. 3, 2025.

Gupta, S., Kamboj, S., and Bag, S., “Role of Risks in the Development of Responsible Artificial Intelligence in the Digital Healthcare Domain,” Information Systems Frontiers, vol. 25, no. 6, pp. 2257–2274, 2023.

Gabriel, O. T., Data Privacy and Ethical Issues in Collecting Health Care Data Using Artificial Intelligence Among Health Workers, M.S. Thesis, Center for Bioethics and Research, 2023.

Bashir, A. K., et al., “Federated Learning for the Healthcare Metaverse: Concepts, Applications, Challenges, and Future Directions,” IEEE Internet of Things Journal, vol. 10, no. 24, pp. 21873–21891, 2023.

Singh, K., and Sevukamoorthy, L., “Blockchain and AI-Based Threat Detection for Enhanced Security in Financial Networks,” in Proc. IEEE TEMSCON-ASPAC, 2023, pp. 1–5.

Mansour, R. F., “Artificial Intelligence Based Optimization with Deep Learning Model for Blockchain-Enabled Intrusion Detection in CPS Environment,” Scientific Reports, vol. 12, no. 1, Art. no. 12937, 2022.

Karn, A. L., et al., “Applying the Defense Model to Strengthen Information Security with Artificial Intelligence in Computer Networks of the Financial Services Sector,” Scientific Reports, vol. 15, no. 1, Art. no. 30292, 2025.

Bhambri, P., and Starostka-Patyk, M., “Integrating AI with Blockchain for Decentralized Security and Threat Prevention,” in Handbook of AI-Driven Threat Detection and Prevention, CRC Press, 2025, pp. 353–370.

Awotunde, J. B., et al., “Privacy and Security Enhancement of Smart Cities Using Hybrid Deep Learning-Enabled Blockchain,” Scalable Computing: Practice and Experience, vol. 24, no. 3, pp. 561–584, 2023.

Konstantinos P. Ferentinos.,”Deep learning models for plant disease detection and diagnosis” https://doi.org/10.1016/j.compag.2018.01.009

G.L. Grinblat et al. Deep learning for plant identification using vein morphological patterns Comput. Electron. Agric. (2016)

G. Singh and D. s. Chabra, "Plant Disease Detection using Convolution Neural Network Approach," 2023 International Conference on Inventive Computation Technologies (ICICT), Lalitpur, Nepal, 2023, pp. 352-355, doi: 10.1109/ICICT57646.2023.10134217.

Yang Lu et.al.,Identification of rice diseases using deep convolutional neural networks Neurocomputing 6 December 2017, Agricultural and Food Sciences, Computer Science.

Too EC, Yujian L, Njuki S, Yingchun L. A comparative study of fine-tuning deep learning models for plant disease identification. Computers and Electronics in Agriculture. 2019 Jun 1;161:272-279.

Moustafa, N., Slay, J“UNSW-NB15: A Comprehensive Data Set for Network Intrusion Detection Systems”Military Communications and Information Systems Conference, 2015.

Shone, N., et al.“A Deep Learning Approach to Network Intrusion Detection.”IEEE Transactions on Emerging Topics in Computational Intelligence, 2018.

Doshi, R., Apthorpe, N., Feamster, N.“Machine Learning DDoS Detection for Consumer Internet of Things Devices.”IEEE Security and Privacy Workshops, 2018.

Kim, G., Lee, S., Kim, S.“A Novel Hybrid Intrusion Detection Method Integrating Anomaly Detection with Misuse Detection.”Expert Systems with Applications, vol. 41, 2014.

Yin, C., Zhu, Y., Fei, J., He, X.“A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks.”IEEE Access, vol. 5, pp. 21954–21961, 2017.

Hochreiter, S., Schmidhuber, J.“Long Short-Term Memory.”Neural Computation, vol. 9, no. 8, pp. 1735–1780, 1997.

Neil Sahota, “What Is Deep Learning? Definition and Techniques [With Examples],” LinkedIn, Jan 17, 2023 visual summary of deep learning models.

Article Details

How to Cite

A Review of Privacy-Preserving Intrusion Detection for Healthcare Edge-IOT. (2026). International Journal of Latest Technology in Engineering Management & Applied Science, 15(2), 300-306. https://doi.org/10.51583/IJLTEMAS.2026.15020000029