{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T13:34:36Z","timestamp":1778160876454,"version":"3.51.4"},"reference-count":40,"publisher":"Wiley","issue":"7","license":[{"start":{"date-parts":[[2025,6,22]],"date-time":"2025-06-22T00:00:00Z","timestamp":1750550400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Trans Emerging Tel Tech"],"published-print":{"date-parts":[[2025,7]]},"abstract":"<jats:title>ABSTRACT<\/jats:title><jats:p>Recently, healthcare industries faced severe cybersecurity problems due to the widespread amalgamation of technologies into a smart healthcare environment. As the number of attacks increased, the crucial healthcare sectors were targeted by cyber attackers. Conventional cybersecurity operations were not very effective due to their heterogeneity and complexity, respectively. In this research, we propose a novel privacy\u2010preserving and attack detection framework named Privacy Enhanced Federated Cyber Physical and Attack Detection (PEF\u2010CAPD) for the healthcare environment. The proposed research exploits edge computing, cloud computing, and federated learning technologies, respectively, to enhance the applicability and privacy in the healthcare environment. Initially, the medical data from the medical devices are securely encrypted and provided to the CMS. Note that the medical devices are connected in a MESH structure to enable self\u2010healing, scalability, and reliability properties. In the CMS, the collected data are subjected to pre\u2010processing, in which the pre\u2010processed data are fed to the ES, where the patient\u2010specific local models are generated using Skipped Dense Neural Network (SDNN) from local attack detection datasets. The generated local models are provided to the BCS for global model aggregation using the Novel Federated Aggregation Model (NFAM). From the aggregated global model, the Advanced Explainable Support Vector Machine (AEX\u2010SVM) detects the possible attacks in the healthcare environment. The proposed work is validated on benchmark datasets that are generated from varied healthcare environments. The validation results show that the proposed approach demonstrates noteworthy accuracy of 99.92% compared to the state\u2010of\u2010the\u2010art works.<\/jats:p>","DOI":"10.1002\/ett.70187","type":"journal-article","created":{"date-parts":[[2025,6,22]],"date-time":"2025-06-22T21:50:26Z","timestamp":1750629026000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["<scp>PEF<\/scp>\u2010<scp>CAPD<\/scp>: A Privacy Enhanced Federated Cyber Physical and Attack Detection Framework for Edge\u2010Cloud\u2010Blockchain Enabled Smart Healthcare Environment"],"prefix":"10.1002","volume":"36","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-8232-7463","authenticated-orcid":false,"given":"Muthu Pandeeswari","family":"Rajagopal","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering Sri Venkateswara College of Engineering  Chennai Tamil Nadu India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3820-6744","authenticated-orcid":false,"given":"Gobalakrishnan","family":"Natesan","sequence":"additional","affiliation":[{"name":"Department of Computer Science Engineering Saveetha Engineering College  Chennai Tamil Nadu India"}]}],"member":"311","published-online":{"date-parts":[[2025,6,22]]},"reference":[{"key":"e_1_2_11_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3142095"},{"key":"e_1_2_11_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3204851"},{"key":"e_1_2_11_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-021-05926-8"},{"key":"e_1_2_11_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2023.108636"},{"key":"e_1_2_11_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2021.3122807"},{"key":"e_1_2_11_7_1","first-page":"234","volume-title":"A Resilient and Robust Edge\u2010Cloud Network System Supporting CPS","author":"Sen T.","year":"2021"},{"key":"e_1_2_11_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/OJIES.2022.3152725"},{"key":"e_1_2_11_9_1","doi-asserted-by":"publisher","DOI":"10.3390\/s22041377"},{"key":"e_1_2_11_10_1","doi-asserted-by":"publisher","DOI":"10.32604\/iasc.2022.023763"},{"key":"e_1_2_11_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-022-03658-4"},{"key":"e_1_2_11_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2022.3192648"},{"key":"e_1_2_11_13_1","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/4376418"},{"key":"e_1_2_11_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-021-03157-1"},{"key":"e_1_2_11_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3052067"},{"key":"e_1_2_11_16_1","doi-asserted-by":"publisher","DOI":"10.3390\/app122111039"},{"key":"e_1_2_11_17_1","doi-asserted-by":"publisher","DOI":"10.48084\/etasr.4245"},{"key":"e_1_2_11_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3140090"},{"key":"e_1_2_11_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/MysuruCon55714.2022.9972679"},{"key":"e_1_2_11_20_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11193070"},{"key":"e_1_2_11_21_1","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/1747077"},{"key":"e_1_2_11_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2022.3175945"},{"key":"e_1_2_11_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3172432"},{"key":"e_1_2_11_24_1","first-page":"1550","article-title":"Intelligent Ai\u2010Based Healthcare Cyber Security System Using Multi\u2010Source Transfer Learning Method","author":"Chakraborty C.","year":"2023","journal-title":"ACM Transactions on Sensor Networks"},{"key":"e_1_2_11_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2022.3185327"},{"key":"e_1_2_11_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3161631"},{"key":"e_1_2_11_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2023.3282955"},{"key":"e_1_2_11_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3098010"},{"key":"e_1_2_11_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS54753.2022.9798196"},{"key":"e_1_2_11_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-022-03717-w"},{"key":"e_1_2_11_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3217039"},{"key":"e_1_2_11_32_1","doi-asserted-by":"publisher","DOI":"10.3390\/su15010735"},{"key":"e_1_2_11_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCBB.2022.3230053"},{"key":"e_1_2_11_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3070544"},{"key":"e_1_2_11_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3177211"},{"key":"e_1_2_11_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2021.3092519"},{"key":"e_1_2_11_37_1","doi-asserted-by":"publisher","DOI":"10.3390\/s21124093"},{"key":"e_1_2_11_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3194195"},{"key":"e_1_2_11_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3149046"},{"key":"e_1_2_11_40_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10060719"},{"key":"e_1_2_11_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3181614"}],"container-title":["Transactions on Emerging Telecommunications Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/ett.70187","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,17]],"date-time":"2025-07-17T23:12:37Z","timestamp":1752793957000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/ett.70187"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,22]]},"references-count":40,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2025,7]]}},"alternative-id":["10.1002\/ett.70187"],"URL":"https:\/\/doi.org\/10.1002\/ett.70187","archive":["Portico"],"relation":{},"ISSN":["2161-3915","2161-3915"],"issn-type":[{"value":"2161-3915","type":"print"},{"value":"2161-3915","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,22]]},"assertion":[{"value":"2024-11-19","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-05-22","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-06-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"e70187"}}