{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T02:31:36Z","timestamp":1771468296586,"version":"3.50.1"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T00:00:00Z","timestamp":1750723200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T00:00:00Z","timestamp":1750723200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100004242","name":"Princess Nourah Bint Abdulrahman University","doi-asserted-by":"publisher","award":["RPFAP-93-1445"],"award-info":[{"award-number":["RPFAP-93-1445"]}],"id":[{"id":"10.13039\/501100004242","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1007\/s10586-024-05049-3","type":"journal-article","created":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T11:53:29Z","timestamp":1750766009000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["AI-driven security framework for medical sensor networks: enhancing privacy and trust in smart healthcare systems"],"prefix":"10.1007","volume":"28","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6720-9955","authenticated-orcid":false,"given":"Shaha","family":"Al-Otaibi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5662-6238","authenticated-orcid":false,"given":"Sarra","family":"Ayouni","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8681-6382","authenticated-orcid":false,"given":"Nadeem","family":"Sarwar","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0594-5877","authenticated-orcid":false,"given":"Asma","family":"Irshad","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6009-6153","authenticated-orcid":false,"given":"Faizan","family":"Ullah","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,24]]},"reference":[{"key":"5049_CR1","unstructured":"Sikdar, S., Guha, S.: Advancements of healthcare technologies: Paradigm towards smart healthcare systems. In: Recent trends in image and signal processing in computer vision, pp. 113\u2013132 (2020)."},{"key":"5049_CR2","doi-asserted-by":"publisher","first-page":"1185","DOI":"10.30574\/wjarr.2023.18.3.1240","volume":"18","author":"J Auko","year":"2023","unstructured":"Auko, J.: Current security and privacy posture in wireless body area networks. World J. Adv. Res. Rev. 18, 1185\u20131206 (2023)","journal-title":"World J. Adv. Res. Rev."},{"key":"5049_CR3","unstructured":"Salam, A., Abrar, M., Amin, F., Ullah, F., Khan, I. A., Alkhamees, B. F., et al.: Securing smart manufacturing by integrating anomaly detection with zero-knowledge proofs. IEEE Access (2024)."},{"key":"5049_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2024.114184","volume":"180","author":"X Xiang","year":"2024","unstructured":"Xiang, X., Cao, J., Fan, W., Xiang, S., Wang, G.: Blockchain-enabled dynamic trust management method for the internet of medical things. Decis. Support Syst. 180, 114184 (2024)","journal-title":"Decis. Support Syst."},{"key":"5049_CR5","unstructured":"Girija, D., Rashmi, M., William, P., Yogeesh, N.: Framework for integrating the synergies of blockchain with AI and IoT for secure distributed systems. In: International conference on data analytics and insights, pp. 257\u2013267 (2023)."},{"key":"5049_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3376915","volume":"53","author":"EJ De Aguiar","year":"2020","unstructured":"De Aguiar, E.J., Fai\u00e7al, B.S., Krishnamachari, B., Ueyama, J.: A survey of blockchain-based strategies for healthcare. ACM Comput. Surv. (CSUR) 53, 1\u201327 (2020)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"5049_CR7","doi-asserted-by":"publisher","first-page":"294","DOI":"10.3390\/s23010294","volume":"23","author":"R Bocu","year":"2022","unstructured":"Bocu, R., Bocu, D., Iavich, M.: An extended review concerning the relevance of deep learning and privacy techniques for data-driven soft sensors. Sensors 23, 294 (2022)","journal-title":"Sensors"},{"key":"5049_CR8","doi-asserted-by":"publisher","first-page":"106576","DOI":"10.1109\/ACCESS.2020.3000421","volume":"8","author":"AA Hady","year":"2020","unstructured":"Hady, A.A., Ghubaish, A., Salman, T., Unal, D., Jain, R.: Intrusion detection system for healthcare systems using medical and network data: a comparison study. IEEE Access 8, 106576\u2013106584 (2020)","journal-title":"IEEE Access"},{"key":"5049_CR9","doi-asserted-by":"publisher","first-page":"10430","DOI":"10.1109\/JIOT.2021.3057419","volume":"8","author":"B Jiang","year":"2021","unstructured":"Jiang, B., Li, J., Yue, G., Song, H.: Differential privacy for industrial Internet of things: opportunities, applications, and challenges. IEEE Internet Things J. 8, 10430\u201310451 (2021)","journal-title":"IEEE Internet Things J."},{"key":"5049_CR10","unstructured":"Ali, S., Abdullah, Armand, T. P. T., Athar, A., Hussain, A., Ali, M., et al.: Metaverse in healthcare integrated with explainable AI and blockchain: enabling immersiveness, ensuring trust, and providing patient data security. Sensors, 23, 565 (2023)."},{"key":"5049_CR11","unstructured":"Rathore, H., Mohamed, A., Guizani, M.: Blockchain applications for healthcare. In: Energy efficiency of medical devices and healthcare application. Elsevier, Amsterdam, pp. 153\u2013166 (2020."},{"key":"5049_CR12","unstructured":"Chaki, S., Bandyopadhyay, S.: Cyber threat intelligence for lightweight trust architectures in medical IoT environments. In: Lightweight digital trust architectures in the Internet of Medical Things (IoMT). IGI Global, pp. 73\u201383 (2024)."},{"key":"5049_CR13","unstructured":"Elayan, H., Shubair, R. M., Kiourti, A.: Wireless sensors for medical applications: Current status and future challenges. In: 2017 11th European Conference on antennas and propagation (EUCAP), pp. 2478\u20132482 (2017)."},{"key":"5049_CR14","doi-asserted-by":"publisher","first-page":"55","DOI":"10.3390\/s120100055","volume":"12","author":"P Kumar","year":"2011","unstructured":"Kumar, P., Lee, H.-J.: Security issues in healthcare applications using wireless medical sensor networks: a survey. Sensors 12, 55\u201391 (2011)","journal-title":"Sensors"},{"key":"5049_CR15","first-page":"1","volume":"2","author":"P Tyagi","year":"2023","unstructured":"Tyagi, P.: Using federated artificial intelligence system of intrusion detection for IoT healthcare system based on blockchain. Int. J. Data Inform. Intell. Comput. 2, 1\u201310 (2023)","journal-title":"Int. J. Data Inform. Intell. Comput."},{"key":"5049_CR16","first-page":"371","volume":"8","author":"VU Rani","year":"2014","unstructured":"Rani, V.U., Sundaram, K.S.: Review of trust models in wireless sensor networks. Int. J. Comput. Inform. Eng. 8, 371\u2013377 (2014)","journal-title":"Int. J. Comput. Inform. Eng."},{"key":"5049_CR17","doi-asserted-by":"publisher","first-page":"2050","DOI":"10.3390\/electronics12092050","volume":"12","author":"M Kumar","year":"2023","unstructured":"Kumar, M., Kumar, A., Verma, S., Bhattacharya, P., Ghimire, D., Kim, S.-H., et al.: Healthcare Internet of Things (H-IoT): current trends, prospects, applications, challenges, and security issues. Electronics 12, 2050 (2023)","journal-title":"Electronics"},{"key":"5049_CR18","unstructured":"Li, C., Raghunathan, A., Jha, N. K.: Hijacking an insulin pump: Security attacks and defences for a diabetes therapy system. In: 2011 IEEE 13th International Conference on e-health Networking, Applications and Services, pp. 150\u2013156 (2011)."},{"key":"5049_CR19","doi-asserted-by":"publisher","first-page":"31306","DOI":"10.1109\/ACCESS.2022.3159235","volume":"10","author":"M Aledhari","year":"2022","unstructured":"Aledhari, M., Razzak, R., Qolomany, B., Al-Fuqaha, A., Saeed, F.: Biomedical IoT: enabling technologies, architectural elements, challenges, and future directions. IEEE Access 10, 31306\u201331339 (2022)","journal-title":"IEEE Access"},{"key":"5049_CR20","unstructured":"Priyadarshani, R., Park, K.-H., Ata, Y., Alouini, M.-S.: Jamming intrusions in extreme bandwidth communication: a comprehensive overview. arXiv preprint arXiv:2403.19868 (2024)."},{"key":"5049_CR21","unstructured":"Somasundaram, R., Thirugnanam, M.: Review on communication security issues in IoT medical devices. In: The Internet of things (IoT). CRC Press, Boca Raton, pp. 189\u2013210 (2017)."},{"key":"5049_CR22","first-page":"1161","volume":"36","author":"HSG Pussewalage","year":"2016","unstructured":"Pussewalage, H.S.G., Oleshchuk, V.A.: Privacy-preserving mechanisms for enforcing security and privacy requirements in E-health solutions. Int. J. Inf. Manage. 36, 1161\u20131173 (2016)","journal-title":"Int. J. Inf. Manage."},{"key":"5049_CR23","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1016\/j.comcom.2022.11.001","volume":"198","author":"Y Guo","year":"2023","unstructured":"Guo, Y.: A review of machine learning-based zero-day attack detection: challenges and future directions. Comput. Commun. 198, 175\u2013185 (2023)","journal-title":"Comput. Commun."},{"key":"5049_CR24","doi-asserted-by":"publisher","unstructured":"Al-Ashwal, N.H., Al Soufy, K.A.M., Hamza, M.E., Swillam, M.A.: Deep learning for optical sensor applications: a review. Sensors. 23(14), 6486. https:\/\/doi.org\/10.3390\/s23146486","DOI":"10.3390\/s23146486"},{"key":"5049_CR25","doi-asserted-by":"publisher","first-page":"279","DOI":"10.3390\/info11050279","volume":"11","author":"B Susilo","year":"2020","unstructured":"Susilo, B., Sari, R.F.: Intrusion detection in IoT networks using deep learning algorithm. Information 11, 279 (2020)","journal-title":"Information"},{"key":"5049_CR26","unstructured":"Khan, M. A., Kim, Y.: Deep learning-based hybrid intelligent intrusion detection system. Comput. Mater. Continua,  68 (2021)."},{"key":"5049_CR27","first-page":"8845833","volume":"2020","author":"F Ullah","year":"2020","unstructured":"Ullah, F., Javaid, Q., Salam, A., Ahmad, M., Sarwar, N., Shah, D., et al.: Modified decision tree technique for ransomware detection at runtime through API calls. Sci. Program. 2020, 8845833 (2020)","journal-title":"Sci. Program."},{"key":"5049_CR28","unstructured":"Kumar, P., Gupta, G. P., Tripathi, R.: A review on intrusion detection systems and cyber threat intelligence for secure IoT-Enabled networks: challenges and directions. In: Big data analytics in fog-enabled IoT networks, pp. 51\u201376 (2023)."},{"key":"5049_CR29","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1016\/j.jnca.2014.01.014","volume":"42","author":"Z Yan","year":"2014","unstructured":"Yan, Z., Zhang, P., Vasilakos, A.V.: A survey on trust management for Internet of Things. J. Netw. Comput. Appl. 42, 120\u2013134 (2014)","journal-title":"J. Netw. Comput. Appl."},{"key":"5049_CR30","doi-asserted-by":"publisher","first-page":"1037","DOI":"10.1007\/s11277-015-2636-3","volume":"87","author":"N Labraoui","year":"2016","unstructured":"Labraoui, N., Gueroui, M., Sekhri, L.: A risk-aware reputation-based trust management in wireless sensor networks. Wireless Pers. Commun. 87, 1037\u20131055 (2016)","journal-title":"Wireless Pers. Commun."},{"key":"5049_CR31","doi-asserted-by":"publisher","first-page":"7664","DOI":"10.1109\/JIOT.2021.3139989","volume":"9","author":"L Wei","year":"2022","unstructured":"Wei, L., Yang, Y., Wu, J., Long, C., Li, B.: Trust management for Internet of Things: a comprehensive study. IEEE Internet Things J. 9, 7664\u20137679 (2022)","journal-title":"IEEE Internet Things J."},{"key":"5049_CR32","doi-asserted-by":"publisher","first-page":"637","DOI":"10.3390\/math11030637","volume":"11","author":"D Jadav","year":"2023","unstructured":"Jadav, D., Jadav, N.K., Gupta, R., Tanwar, S., Alfarraj, O., Tolba, A., et al.: A trustworthy healthcare management framework using an amalgamation of AI and blockchain network. Mathematics 11, 637 (2023)","journal-title":"Mathematics"},{"key":"5049_CR33","unstructured":"Kumari, S., Kumar, S., Venugopal, R.: Trust management in social Internet of Things: challenges and future directions. Int. J. Comput. Digital Syst. 14, 1\u2013xx (2023)."},{"key":"5049_CR34","unstructured":"NSL-KDD Dataset. Available at: https:\/\/www.kaggle.com\/datasets\/hassan06\/nslkdd."},{"key":"5049_CR35","first-page":"10","volume":"2013","author":"JS White","year":"2013","unstructured":"White, J.S., Fitzsimmons, T., Matthews, J.N.: Quantitative analysis of intrusion detection systems: Snort and Suricata. Cyber sensing 2013, 10\u201321 (2013)","journal-title":"Cyber sensing"},{"key":"5049_CR36","unstructured":"Thongkanchorn, K., Ngamsuriyaroj, S., Visoottiviseth, V.: Evaluation studies of three intrusion detection systems under various attacks and rule sets. In: 2013 IEEE International Conference of IEEE Region 10 (TENCON 2013), pp. 1\u20134 (2013)."},{"key":"5049_CR37","unstructured":"El Farissi, I., Saber, M., Chadli, S., Emharraf, M., Belkasmi, M. G.: The analysis performance of an intrusion detection systems based on neural network. In: 2016 4th IEEE international colloquium on information science and technology (CiSt), pp. 145\u2013151 (2016)."},{"key":"5049_CR38","unstructured":"Saber, M., El Farissi, I., Chadli, S., Emharraf, M., Belkasmi, M. G.: Performance analysis of an intrusion detection systems based on artificial neural network. In: Europe and MENA Cooperation Advances in Information and Communication Technologies, pp. 511\u2013521 (2017)."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-05049-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-024-05049-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-05049-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,3]],"date-time":"2025-09-03T20:21:09Z","timestamp":1756930869000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-024-05049-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,24]]},"references-count":38,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["5049"],"URL":"https:\/\/doi.org\/10.1007\/s10586-024-05049-3","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,24]]},"assertion":[{"value":"27 August 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 December 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 December 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 June 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}}],"article-number":"408"}}