Fog-Assisted Anomaly Detection in Healthcare IoT Networks using Lightweight Blockchain and Collaborative Intrusion Detection Systems

Authors

  • R. Mageswaran, Ponnam Lalitha, Y.M.Mahaboob John,G. Vennila, R. Kesavan, N. Kumaran

Keywords:

Internet Of Things (IoT), Internet Of Medical Things (IoMT), Fog Computing, Blockchain Approach, Intrusion Detection System (IDS), Lion Salp Swarm Optimization Algorithm, Metaheuristic Algorithm and Healthcare.

Abstract

The Internet of Things (IoT) has its footprint in each and every industry all over the world. Most industries are using IoT predominantly for its eminent performance, and the Internet of Medical Things (IoMT) is specifically used in Medical industries for providing effective and timely healthcare systems. Each and every data is counted as a precious thing in the medical field because a single alteration or modification in a patient’s data will lead to wrong treatment and may cause serious issues in the patient’s life. In the proposed work fog, fog-based anomaly detection is incorporated by using a lightweight blockchain approach. The raw data in a network is initially stored in local blocks, and after performing data aggregation and filtration, the selective blocks are transferred to the global block. These are further used for analysis purposes. The lightweight blockchain reduces the latency and improves efficiency. These blocks can be easily corrupted by malicious users or attackers. So, to enhance the security of the system, we have implemented a collaborative intrusion detection system based on the Lion Salp swarm optimization algorithm, which is a branch of the Metaheuristic algorithm. The proposed system has achieved 99.7% accuracy and 99.2% precision. This shows that the proposed work outperformed all other existing algorithms.

Downloads

Download data is not yet available.

References

W. A. N. A. Al-Nbhany, A. T. Zahary and A. A. Al-Shargabi, "Blockchain-IoT Healthcare Applications and Trends: A Review," in IEEE Access, vol. 12, pp. 4178-4212, 2024, doi: 10.1109/ACCESS.2023.3349187.

A. Subrahmannian and S. K. Behera, "Chipless RFID Sensors for IoT-Based Healthcare Applications: A Review of State of the Art," in IEEE Transactions on Instrumentation and Measurement, vol. 71, pp. 1-20, 2022, Art no. 8003920, doi: 10.1109/TIM.2022.3180422.

N. Taimoor and S. Rehman, "Reliable and Resilient AI and IoT-Based Personalised Healthcare Services: A Survey," in IEEE Access, vol. 10, pp. 535-563, 2022, doi: 10.1109/ACCESS.2021.3137364.

S. Wang, X. Zhou, K. Wen, B. Weng and P. Zeng, "Security Analysis of a User Authentication Scheme for IoT-Based Healthcare," in IEEE Internet of Things Journal, vol. 10, no. 7, pp. 6527-6530, 1 April1, 2023, doi: 10.1109/JIOT.2022.3228921.

U. Demirbaga and G. S. Aujla, "MapChain: A Blockchain-Based Verifiable Healthcare Service Management in IoT-Based Big Data Ecosystem," in IEEE Transactions on Network and Service Management, vol. 19, no. 4, pp. 3896-3907, Dec. 2022, doi: 10.1109/TNSM.2022.3204851.

S. Zaman, M. R. A. Khandaker, R. T. Khan, F. Tariq and K. -K. Wong, "Thinking Out of the Blocks: Holochain for Distributed Security in IoT Healthcare," in IEEE Access, vol. 10, pp. 37064-37081, 2022, doi: 10.1109/ACCESS.2022.3163580.

M. Naveed, S. M. Usman, M. I. Satti, S. Aleshaiker and A. Anwar, "Intrusion Detection in Smart IoT Devices for People with Disabilities," 2022 IEEE International Smart Cities Conference (ISC2), Pafos, Cyprus, 2022, pp. 1-5, doi: 10.1109/ISC255366.2022.9921991.

O. A. Mahdi, A. Alazab, S. Bevinakoppa, N. Ali and A. Khraisat, "Enhancing IoT Intrusion Detection System Performance with the Diversity Measure as a Novel Drift Detection Method," 2023 9th International Conference on Information Technology Trends (ITT), Dubai, United Arab Emirates, 2023, pp. 50-54, doi: 10.1109/ITT59889.2023.10184268.

G. Zachos, G. Mantas, I. Essop, K. Porfyrakis, J. C. Ribeiro and J. Rodriguez, "Prototyping an Anomaly-Based Intrusion Detection System for Internet of Medical Things Networks," 2022 IEEE 27th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Paris, France, 2022, pp. 179-183, doi: 10.1109/CAMAD55695.2022.9966912.

T. Saba, "Intrusion Detection in Smart City Hospitals using Ensemble Classifiers," 2020 13th International Conference on Developments in eSystems Engineering (DeSE), Liverpool, United Kingdom, 2020, pp. 418-422, doi: 10.1109/DeSE51703.2020.9450247.

H. Alamro et al., "Modeling of Blockchain Assisted Intrusion Detection on IoT Healthcare System Using Ant Lion Optimizer With Hybrid Deep Learning," in IEEE Access, vol. 11, pp. 82199-82207, 2023, doi: 10.1109/ACCESS.2023.3299589.

S. Racherla, P. Sripathi, N. Faruqui, M. Alamgir Kabir, M. Whaiduzzaman and S. Aziz Shah, "Deep-IDS: A Real-Time Intrusion Detector for IoT Nodes Using Deep Learning," in IEEE Access, vol. 12, pp. 63584-63597, 2024, doi: 10.1109/ACCESS.2024.3396461.

M. Fouda, R. Ksantini and W. Elmedany, "A Novel Intrusion Detection System for Internet of Healthcare Things Based on Deep Subclasses Dispersion Information," in IEEE Internet of Things Journal, vol. 10, no. 10, pp. 8395-8407, 15 May15, 2023, doi: 10.1109/JIOT.2022.3230694.

S. Arisdakessian, O. A. Wahab, A. Mourad, H. Otrok and M. Guizani, "A Survey on IoT Intrusion Detection: Federated Learning, Game Theory, Social Psychology, and Explainable AI as Future Directions," in IEEE Internet of Things Journal, vol. 10, no. 5, pp. 4059-4092, 1 March1, 2023, doi: 10.1109/JIOT.2022.3203249.

D. Breitenbacher, I. Homoliak, Y. L. Aung, Y. Elovici and N. O. Tippenhauer, "HADES-IoT: A Practical and Effective Host-Based Anomaly Detection System for IoT Devices (Extended Version)," in IEEE Internet of Things Journal, vol. 9, no. 12, pp. 9640-9658, 15 June15, 2022, doi: 10.1109/JIOT.2021.3135789.

M. Wazid, J. Singh, A. K. Das and J. J. P. C. Rodrigues, "An Ensemble-Based Machine Learning-Envisioned Intrusion Detection in Industry 5.0-Driven Healthcare Applications," in IEEE Transactions on Consumer Electronics, vol. 70, no. 1, pp. 1903-1912, Feb. 2024, doi: 10.1109/TCE.2023.3318850

A. Ghourabi, "A Security Model Based on LightGBM and Transformer to Protect Healthcare Systems From Cyberattacks," in IEEE Access, vol. 10, pp. 48890-48903, 2022, doi: 10.1109/ACCESS.2022.3172432.

M. A. Khatun, S. F. Memon, C. Eising and L. L. Dhirani, "Machine Learning for Healthcare-IoT Security: A Review and Risk Mitigation," in IEEE Access, vol. 11, pp. 145869-145896, 2023, doi: 10.1109/ACCESS.2023.3346320.

Alsalman, "A Comparative Study of Anomaly Detection Techniques for IoT Security Using Adaptive Machine Learning for IoT Threats," in IEEE Access, vol. 12, pp. 14719-14730, 2024, doi: 10.1109/ACCESS.2024.3359033.

M. M. Alani and A. I. Awad, "An Intelligent Two-Layer Intrusion Detection System for the Internet of Things," in IEEE Transactions on Industrial Informatics, vol. 19, no. 1, pp. 683-692, Jan. 2023, doi: 10.1109/TII.2022.3192035.

Perumal, G., Subburayalu, G., Abbas, Q., Naqi, S. M., & Qureshi, I. (2023). VBQ-Net: A Novel Vectorization-Based Boost Quantized Network Model for Maximizing the Security Level of IoT System to Prevent Intrusions. Systems, 11(8), 436.

Hemanand, D., Reddy, G. V., Babu, S. S., Balmuri, K. R., Chitra, T., & Gopalakrishnan, S. (2022). An intelligent intrusion detection and classification system using CSGO-LSVM model for wireless sensor networks (WSNs). International Journal of Intelligent Systems and Applications in Engineering, 10(3), 285-293.

Downloads

Published

06.08.2024

How to Cite

R. Mageswaran. (2024). Fog-Assisted Anomaly Detection in Healthcare IoT Networks using Lightweight Blockchain and Collaborative Intrusion Detection Systems. International Journal of Intelligent Systems and Applications in Engineering, 12(23s), 17–28. Retrieved from https://www.ijisae.org/index.php/IJISAE/article/view/6429

Issue

Section

Research Article