Fog-Assisted Anomaly Detection in Healthcare IoT Networks using Lightweight Blockchain and Collaborative Intrusion Detection Systems
Keywords:
Internet Of Things (IoT), Internet Of Medical Things (IoMT), Fog Computing, Blockchain Approach, Intrusion Detection System (IDS), Lion Salp Swarm Optimization Algorithm, Metaheuristic Algorithm and Healthcare.Abstract
The Internet of Things (IoT) has its footprint in each and every industry all over the world. Most industries are using IoT predominantly for its eminent performance, and the Internet of Medical Things (IoMT) is specifically used in Medical industries for providing effective and timely healthcare systems. Each and every data is counted as a precious thing in the medical field because a single alteration or modification in a patient’s data will lead to wrong treatment and may cause serious issues in the patient’s life. In the proposed work fog, fog-based anomaly detection is incorporated by using a lightweight blockchain approach. The raw data in a network is initially stored in local blocks, and after performing data aggregation and filtration, the selective blocks are transferred to the global block. These are further used for analysis purposes. The lightweight blockchain reduces the latency and improves efficiency. These blocks can be easily corrupted by malicious users or attackers. So, to enhance the security of the system, we have implemented a collaborative intrusion detection system based on the Lion Salp swarm optimization algorithm, which is a branch of the Metaheuristic algorithm. The proposed system has achieved 99.7% accuracy and 99.2% precision. This shows that the proposed work outperformed all other existing algorithms.
Downloads
References
W. A. N. A. Al-Nbhany, A. T. Zahary and A. A. Al-Shargabi, "Blockchain-IoT Healthcare Applications and Trends: A Review," in IEEE Access, vol. 12, pp. 4178-4212, 2024, doi: 10.1109/ACCESS.2023.3349187.
A. Subrahmannian and S. K. Behera, "Chipless RFID Sensors for IoT-Based Healthcare Applications: A Review of State of the Art," in IEEE Transactions on Instrumentation and Measurement, vol. 71, pp. 1-20, 2022, Art no. 8003920, doi: 10.1109/TIM.2022.3180422.
N. Taimoor and S. Rehman, "Reliable and Resilient AI and IoT-Based Personalised Healthcare Services: A Survey," in IEEE Access, vol. 10, pp. 535-563, 2022, doi: 10.1109/ACCESS.2021.3137364.
S. Wang, X. Zhou, K. Wen, B. Weng and P. Zeng, "Security Analysis of a User Authentication Scheme for IoT-Based Healthcare," in IEEE Internet of Things Journal, vol. 10, no. 7, pp. 6527-6530, 1 April1, 2023, doi: 10.1109/JIOT.2022.3228921.
U. Demirbaga and G. S. Aujla, "MapChain: A Blockchain-Based Verifiable Healthcare Service Management in IoT-Based Big Data Ecosystem," in IEEE Transactions on Network and Service Management, vol. 19, no. 4, pp. 3896-3907, Dec. 2022, doi: 10.1109/TNSM.2022.3204851.
S. Zaman, M. R. A. Khandaker, R. T. Khan, F. Tariq and K. -K. Wong, "Thinking Out of the Blocks: Holochain for Distributed Security in IoT Healthcare," in IEEE Access, vol. 10, pp. 37064-37081, 2022, doi: 10.1109/ACCESS.2022.3163580.
M. Naveed, S. M. Usman, M. I. Satti, S. Aleshaiker and A. Anwar, "Intrusion Detection in Smart IoT Devices for People with Disabilities," 2022 IEEE International Smart Cities Conference (ISC2), Pafos, Cyprus, 2022, pp. 1-5, doi: 10.1109/ISC255366.2022.9921991.
O. A. Mahdi, A. Alazab, S. Bevinakoppa, N. Ali and A. Khraisat, "Enhancing IoT Intrusion Detection System Performance with the Diversity Measure as a Novel Drift Detection Method," 2023 9th International Conference on Information Technology Trends (ITT), Dubai, United Arab Emirates, 2023, pp. 50-54, doi: 10.1109/ITT59889.2023.10184268.
G. Zachos, G. Mantas, I. Essop, K. Porfyrakis, J. C. Ribeiro and J. Rodriguez, "Prototyping an Anomaly-Based Intrusion Detection System for Internet of Medical Things Networks," 2022 IEEE 27th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Paris, France, 2022, pp. 179-183, doi: 10.1109/CAMAD55695.2022.9966912.
T. Saba, "Intrusion Detection in Smart City Hospitals using Ensemble Classifiers," 2020 13th International Conference on Developments in eSystems Engineering (DeSE), Liverpool, United Kingdom, 2020, pp. 418-422, doi: 10.1109/DeSE51703.2020.9450247.
H. Alamro et al., "Modeling of Blockchain Assisted Intrusion Detection on IoT Healthcare System Using Ant Lion Optimizer With Hybrid Deep Learning," in IEEE Access, vol. 11, pp. 82199-82207, 2023, doi: 10.1109/ACCESS.2023.3299589.
S. Racherla, P. Sripathi, N. Faruqui, M. Alamgir Kabir, M. Whaiduzzaman and S. Aziz Shah, "Deep-IDS: A Real-Time Intrusion Detector for IoT Nodes Using Deep Learning," in IEEE Access, vol. 12, pp. 63584-63597, 2024, doi: 10.1109/ACCESS.2024.3396461.
M. Fouda, R. Ksantini and W. Elmedany, "A Novel Intrusion Detection System for Internet of Healthcare Things Based on Deep Subclasses Dispersion Information," in IEEE Internet of Things Journal, vol. 10, no. 10, pp. 8395-8407, 15 May15, 2023, doi: 10.1109/JIOT.2022.3230694.
S. Arisdakessian, O. A. Wahab, A. Mourad, H. Otrok and M. Guizani, "A Survey on IoT Intrusion Detection: Federated Learning, Game Theory, Social Psychology, and Explainable AI as Future Directions," in IEEE Internet of Things Journal, vol. 10, no. 5, pp. 4059-4092, 1 March1, 2023, doi: 10.1109/JIOT.2022.3203249.
D. Breitenbacher, I. Homoliak, Y. L. Aung, Y. Elovici and N. O. Tippenhauer, "HADES-IoT: A Practical and Effective Host-Based Anomaly Detection System for IoT Devices (Extended Version)," in IEEE Internet of Things Journal, vol. 9, no. 12, pp. 9640-9658, 15 June15, 2022, doi: 10.1109/JIOT.2021.3135789.
M. Wazid, J. Singh, A. K. Das and J. J. P. C. Rodrigues, "An Ensemble-Based Machine Learning-Envisioned Intrusion Detection in Industry 5.0-Driven Healthcare Applications," in IEEE Transactions on Consumer Electronics, vol. 70, no. 1, pp. 1903-1912, Feb. 2024, doi: 10.1109/TCE.2023.3318850
A. Ghourabi, "A Security Model Based on LightGBM and Transformer to Protect Healthcare Systems From Cyberattacks," in IEEE Access, vol. 10, pp. 48890-48903, 2022, doi: 10.1109/ACCESS.2022.3172432.
M. A. Khatun, S. F. Memon, C. Eising and L. L. Dhirani, "Machine Learning for Healthcare-IoT Security: A Review and Risk Mitigation," in IEEE Access, vol. 11, pp. 145869-145896, 2023, doi: 10.1109/ACCESS.2023.3346320.
Alsalman, "A Comparative Study of Anomaly Detection Techniques for IoT Security Using Adaptive Machine Learning for IoT Threats," in IEEE Access, vol. 12, pp. 14719-14730, 2024, doi: 10.1109/ACCESS.2024.3359033.
M. M. Alani and A. I. Awad, "An Intelligent Two-Layer Intrusion Detection System for the Internet of Things," in IEEE Transactions on Industrial Informatics, vol. 19, no. 1, pp. 683-692, Jan. 2023, doi: 10.1109/TII.2022.3192035.
Perumal, G., Subburayalu, G., Abbas, Q., Naqi, S. M., & Qureshi, I. (2023). VBQ-Net: A Novel Vectorization-Based Boost Quantized Network Model for Maximizing the Security Level of IoT System to Prevent Intrusions. Systems, 11(8), 436.
Hemanand, D., Reddy, G. V., Babu, S. S., Balmuri, K. R., Chitra, T., & Gopalakrishnan, S. (2022). An intelligent intrusion detection and classification system using CSGO-LSVM model for wireless sensor networks (WSNs). International Journal of Intelligent Systems and Applications in Engineering, 10(3), 285-293.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.