A Review on Network Intrusion detection systems based on Machine Learning, Deep Learning and Blockchain for IoT-based healthcare systems

Authors

DOI:

https://doi.org/10.21015/vtse.v13i4.2233

Abstract

The fast development of the Internet of Things (IoT) in the healthcare sector has raised the issues of data privacy, security, and system integrity. This review deals with a narrative-comparative study of machine learning and deep learning-driven intrusion detection systems (IDS), blockchain-based security architectures, and cryptographic methods to protect IoT-based healthcare settings. The review summarizes the recent studies with the help of synthesis of the findings and mentions the strengths and limitations of each method: While ML/DL-based IDS offer high detection accuracy, they suffer from high false-positive rates and by computational resources; but scalability and latency remain significant challenges and cryptographic methods ensure confidentiality but have to be optimized to address the limited resources of IoT devices. The review has identified substantial research gaps, including the need to have lightweight real-time security models, standardized healthcare specific IoT databank, and enhanced integration of hybrid security frameworks. This work adds the synthesized comparison of methods available to date and presents the perspectives of the research in the future to create an efficient and scalable and multi-layered security solution of IoT-based healthcare systems.

References

A. Almalawi and A. Almutairi, “Managing security of healthcare data for a modern healthcare system,” International Journal of Information Security, vol. 12, no. 3, pp. 225–240, 2023.

W. Alosaimi and H. Almutairi, “An intrusion detection system using BoT-IoT dataset,” Journal of Cybersecurity Research, vol. 8, no. 2, pp. 101–118, 2023.

S. Chidambaranathan and R. Geetha, “A framework for malicious traffic detection in IoT healthcare environment,” Healthcare Cybersecurity Review, vol. 9, no. 1, pp. 65–82, 2024.

J. Hadly and R. Kshirsagar, “Securing medical image privacy in cloud using deep learning network,” IEEE Transactions on Cloud Security, vol. 28, no. 4, pp. 332–349, 2020.

S. Hady and M. Hussain, “A survey on healthcare data: A security perspective,” Journal of Medical Informatics and Security, vol. 15, no. 2, pp. 77–95, 2020.

F. Hussain and T. Saba, “A survey of machine and deep learning methods for privacy protection in IoT,” Security and Privacy in IoT Systems, vol. 14, no. 5, pp. 199–218, 2021.

A. Nimbalkar and P. Kshirsagar, “Feature selection for intrusion detection system in IoT,” Advances in Computer Security Research, vol. 7, no. 3, pp. 154–172, 2021.

T. Saba and H. Faisal, “Intrusion detection system for healthcare systems using medical and network data: A comparison study,” Journal of Network Security & Healthcare Applications, vol. 10, no. 1, pp. 203–219, 2022.

“Deep learning enabled blockchain-based electronic healthcare data attack detection for smart health systems,” Blockchain & AI in Healthcare, vol. 18, no. 4, pp. 125–140, 2023.

“Anomaly-based intrusion detection system for IoT networks through deep learning model,” Cybersecurity and IoT Security Journal, vol. 6, no. 2, pp. 95–110, 2021.

T. M. Booij, I. Chiscop, E. Meeuwissen, N. Moustafa, and F. T. H. den Hartog, “ToN IoT: The role of heterogeneity and the need for standardization of features and attack types in IoT network intrusion data sets,” IEEE Internet of Things Journal, vol. 9, no. 1, pp. 485–496, 2022, doi: 10.1109/JIOT.2021.3085194.

N. Agarwal, A. K. Singh, and P. K. Singh, “Survey of robust and imperceptible watermarking,” Multimedia Tools and Applications, vol. 78, no. 7, pp. 8603–8633, 2019, doi: 10.1007/s11042-018-7128-5.

R. J. Alzahrani and A. Alzahrani, “A novel multi-algorithm approach to identify network anomalies in the IoT using fog computing and a model to distinguish between IoT and non-IoT devices,” Journal of Sensors and Actuator Networks, vol. 12, no. 19, 2023, doi: 10.3390/jsan12020019.

V. R. Balasaraswathi, M. Sugumaran, and Y. Hamid, “Feature selection techniques for intrusion detection using non-bio-inspired and bio-inspired optimization algorithms,” Journal of Communication and Information Networks, vol. 2, no. 4, pp. 107–119, 2017.

S. Chopra, R. Hadsell, and Y. LeCun, “Learning a similarity metric discriminatively, with application to face verification,” in Proc. IEEE Conf. Computer Vision and Pattern Recognition (CVPR), 2005, pp. 539–546.

P. Duessel, C. Gehl, U. Flegel, S. Dietrich, and M. Meier, “Detecting zero-day attacks using context-aware anomaly detection at the application-layer,” International Journal of Information Security, vol. 16, pp. 475–490, 2017, doi: 10.1007/s10207-016-0344-y.

G. B. Huang, M. Mattar, T. Berg, and E. Learned-Miller, “Labeled faces in the wild: A database for studying face recognition in unconstrained environments,” in Workshop on Faces in Real-Life Images, 2008, pp. 1–8.

A. K. Jain, P. Flynn, and A. Ross, Handbook of Biometrics. Springer, 2008.

J. Katz and Y. Lindell, Introduction to Modern Cryptography. CRC Press, 2020.

N. Koroniotis, N. Moustafa, E. Sitnikova, and B. Turnbull, “Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-IoT dataset,” Future Generation Computer Systems, vol. 100, pp. 779–796, 2019, doi: 10.1016/j.future.2019.06.017.

R. Mothi and M. Karthikeyan, “Protection of biomedical iris image using watermarking and cryptography with WPT,” Measurement, vol. 136, pp. 67–73, 2019, doi: 10.1016/j.measurement.2018.12.030.

S. A. Osia et al., “A hybrid deep learning architecture for privacy-preserving mobile analytics,” IEEE Internet of Things Journal, vol. 7, pp. 4505–4518, 2020, doi: 10.1109/JIOT.2020.2969682.

R. Pandey, A. K. Singh, B. Kumar, and A. Mohan, “Iris-based secure NROI multiple eye image watermarking for teleophthalmology,” Multimedia Tools and Applications, vol. 75, no. 22, pp. 14381–14397, 2016, doi: 10.1007/s11042-016-3536-6.

M. Ramesh Kumar and P. Sudhakaran, “Comprehensive survey on detecting security attacks of IoT intrusion detection systems,” Advances in Science and Technology, vol. 124, pp. 738–747, 2023.

K. S. Sankaran et al., “Image watermarking using DWT to encapsulate data in medical images,” in Proc. IEEE Int. Conf. Communications and Signal Processing, 2019, pp. 568–571, doi: 10.1109/ICCSP.2019.8698057.

K. A. Shakil et al., “BAMHealthCloud: A biometric authentication and data management system for healthcare data in cloud,” Journal of King Saud University – Computer and Information Sciences, vol. 32, no. 1, pp. 57–64, 2020, doi: 10.1016/j.jksuci.2017.07.001.

M. Shen et al., “Privacy-preserving support vector machine training over blockchain-based encrypted IoT data in smart cities,” IEEE Internet of Things Journal, vol. 6, pp. 7702–7712, 2019, doi: 10.1109/JIOT.2019.2932834.

D. Thakur et al., “Nature and biologically inspired image segmentation techniques,” Archives of Computational Methods in Engineering, pp. 1–28, 2021, doi: 10.1007/s11831-021-09617-1.

X. Zhou et al., “A secure and privacy-preserving machine learning model sharing scheme for edge-enabled IoT,” IEEE Access, vol. 9, pp. 17256–17265, 2021, doi: 10.1109/ACCESS.2021.3050498.

M. Tavallaee et al., “A detailed analysis of the KDD CUP 99 data set,” in Proc. IEEE Symp. Computational Intelligence for Security and Defense Applications, 2009, pp. 1–6.

N. Moustafa and J. Slay, “UNSW-NB15: A comprehensive data set for network intrusion detection systems,” in Proc. Military Communications and Information Systems Conf., 2015, pp. 1–6.

I. Sharafaldin et al., “Towards a reliable intrusion detection benchmark dataset,” Software Networking, vol. 2018, no. 1, pp. 177–200, 2018.

A. Guerra-Manzanares et al., “MedBIoT: Generation of an IoT botnet dataset in a medium-sized IoT network,” in Proc. Int. Conf. on Security and Cryptography, 2020, doi: 10.5220/0009187802070218.

Z. Chen, “Deep learning for cybersecurity: A review,” in Proc. Int. Conf. on Computing and Data Science (CDS), 2020, pp. 7–18.

F. Oscar et al., “Cybersecurity approaches to IoT platforms in e-healthcare systems: Artificial intelligence application,” in AI-Driven Healthcare Cybersecurity and Privacy. IGI Global, 2025, pp. 89–124.

Downloads

Published

2025-12-31

How to Cite

Shoaib, M., Zulqarnain, M., Ahmed, A., Abdullah, S., & Alturki, N. (2025). A Review on Network Intrusion detection systems based on Machine Learning, Deep Learning and Blockchain for IoT-based healthcare systems. VFAST Transactions on Software Engineering, 13(4), 200–216. https://doi.org/10.21015/vtse.v13i4.2233