{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T15:38:26Z","timestamp":1767713906699,"version":"3.48.0"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T00:00:00Z","timestamp":1767657600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T00:00:00Z","timestamp":1767657600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2026,4]]},"DOI":"10.1007\/s10586-025-05836-6","type":"journal-article","created":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T15:32:41Z","timestamp":1767713561000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Enhancing IoMT security: a novel blockchain-based anomaly detection framework leveraging explainable AI"],"prefix":"10.1007","volume":"29","author":[{"given":"Aashima","family":"Sharma","sequence":"first","affiliation":[]},{"given":"Swastik","family":"Sharma","sequence":"additional","affiliation":[]},{"given":"Simarjit","family":"Kaur","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,6]]},"reference":[{"key":"5836_CR1","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/j.urolonc.2023.11.019","volume":"42","author":"BZ Wubineh","year":"2024","unstructured":"Wubineh, B.Z., Deriba, F.G., Woldeyohannis, M.M.: Exploring the opportunities and challenges of implementing artificial intelligence in healthcare: a systematic literature review. Urol. Oncol. 42, 48\u201356 (2024)","journal-title":"Urol. Oncol."},{"issue":"4","key":"5836_CR2","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1016\/j.jiph.2024.01.013","volume":"17","author":"DM Mathkor","year":"2024","unstructured":"Mathkor, D.M., Mathkor, N., Bassfar, Z., Bantun, F., Slama, P., Ahmad, F., Haque, S.: multirole of the internet of medical things (iomt) in biomedical systems for managing smart healthcare systems: an overview of current and future innovative trends. J. Infect. Public Health 17(4), 559\u2013572 (2024)","journal-title":"J. Infect. Public Health"},{"key":"5836_CR3","unstructured":"Research, G.V.: Internet of Medical Things (IoMT) Market Report. Accessed: March 26, 2025 (2025). https:\/\/www.grandviewresearch.com\/industry-analysis\/internet-of-medical-things-iomt-market-rep"},{"key":"5836_CR4","doi-asserted-by":"crossref","unstructured":"Kumar, N., Miglani, A.: Probabilistic Data Structures for Blockchain-based Internet of Things Applications. CRC Press, ??? (2021)","DOI":"10.1201\/9781003080046"},{"issue":"1","key":"5836_CR5","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/s11276-024-03764-8","volume":"31","author":"AA El-Saleh","year":"2025","unstructured":"El-Saleh, A.A., Sheikh, A.M., Albreem, M.A., Honnurvali, M.S.: The internet of medical things (iomt): opportunities and challenges. Wireless Netw. 31(1), 327\u2013344 (2025)","journal-title":"Wireless Netw."},{"key":"5836_CR6","doi-asserted-by":"publisher","first-page":"127368","DOI":"10.1109\/ACCESS.2025.3590159","volume":"13","author":"P Jain","year":"2025","unstructured":"Jain, P., Rathour, A., Sharma, A., Chhabra, G.S.: Bridging explainability and security: an xai-enhanced hybrid deep learning framework for iot device identification and attack detection. IEEE Access 13, 127368\u2013127390 (2025). https:\/\/doi.org\/10.1109\/ACCESS.2025.3590159","journal-title":"IEEE Access"},{"issue":"2","key":"5836_CR7","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1093\/comjnl\/bxac183","volume":"67","author":"A Abid","year":"2024","unstructured":"Abid, A., Cheikhrouhou, S., Kallel, S., Tari, Z., Jmaiel, M.: A smart contract-based access control framework for smart healthcare systems. Comput. J. 67(2), 407\u2013422 (2024)","journal-title":"Comput. J."},{"issue":"9","key":"5836_CR8","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-024-10873-5","volume":"57","author":"A Bathula","year":"2024","unstructured":"Bathula, A., Gupta, S.K., Merugu, S., Saba, L., Khanna, N.N., Laird, J.R., Sanagala, S.S., Singh, R., Garg, D., Fouda, M.M., et al.: Blockchain, artificial intelligence, and healthcare: the tripod of future\u2014a narrative review. Artif. Intell. Rev. 57(9), 238 (2024)","journal-title":"Artif. Intell. Rev."},{"key":"5836_CR9","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-022-03573-8","author":"S Kaur","year":"2022","unstructured":"Kaur, S., Parashar, A., et al.: Intelligent energy aware approaches for residential buildings: state-of-the-art review and future directions. Cluster Computing (2022). https:\/\/doi.org\/10.1007\/s10586-022-03573-8","journal-title":"Cluster Computing"},{"issue":"1","key":"5836_CR10","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4884","volume":"35","author":"R Shinde","year":"2024","unstructured":"Shinde, R., Patil, S., Kotecha, K., Potdar, V., Selvachandran, G., Abraham, A.: Securing ai-based healthcare systems using blockchain technology: a state-of-the-art systematic literature review and future research directions. Transactions on Emerging Telecommunications Technologies 35(1), 4884 (2024)","journal-title":"Transactions on Emerging Telecommunications Technologies"},{"issue":"8","key":"5836_CR11","doi-asserted-by":"publisher","first-page":"250","DOI":"10.3390\/fi15080250","volume":"15","author":"MA Mohammed","year":"2023","unstructured":"Mohammed, M.A., Boujelben, M., Abid, M.: A novel approach for fraud detection in blockchain-based healthcare networks using machine learning. Future Internet 15(8), 250 (2023)","journal-title":"Future Internet"},{"key":"5836_CR12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3460428","author":"OP Olawale","year":"2024","unstructured":"Olawale, O.P., Ebadinezhad, S.: Cybersecurity anomaly detection: Ai and ethereum blockchain for a secure and tamperproof ioht data management. IEEE Access (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3460428","journal-title":"IEEE Access"},{"key":"5836_CR13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3396461","author":"S Racherla","year":"2024","unstructured":"Racherla, S., Sripathi, P., Faruqui, N., Kabir, M.A., Whaiduzzaman, M., Shah, S.A.: Deep-ids: A real-time intrusion detector for iot nodes using deep learning. IEEE Access (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3396461","journal-title":"IEEE Access"},{"key":"5836_CR14","first-page":"1","volume":"15","author":"S Kaur","year":"2023","unstructured":"Kaur, S., Bala, A., Parashar, A.: Ga-bilstm: an intelligent energy prediction and optimization approach for individual home appliances. Evolving Systems 15, 1 (2023)","journal-title":"Evolving Systems"},{"key":"5836_CR15","doi-asserted-by":"crossref","unstructured":"Areia, J., Bispo, I., Santos, L., Costa, R.L.d.C.: Iomt-trafficdata: Dataset and tools for benchmarking intrusion detection in internet of medical things. IEEE Access (2024)","DOI":"10.1109\/ACCESS.2024.3437214"},{"issue":"3","key":"5836_CR16","first-page":"1333","volume":"14","author":"S Ray","year":"2022","unstructured":"Ray, S., Mishra, K.N., Dutta, S.: Detection and prevention of ddos attacks on m-healthcare sensitive data: a novel approach. Int. J. Inf. Technol. 14(3), 1333\u20131341 (2022)","journal-title":"Int. J. Inf. Technol."},{"key":"5836_CR17","doi-asserted-by":"crossref","unstructured":"Sangeetha, S.B., Selvarathi, C., Mathivanan, S.K., Cho, J., Easwaramoorthy, S.V.: Secure healthcare access control system (shacs) for anomaly detection and enhanced security in cloud-based healthcare applications. IEEE Access (2024)","DOI":"10.1109\/ACCESS.2024.3492024"},{"issue":"1","key":"5836_CR18","doi-asserted-by":"publisher","first-page":"1903","DOI":"10.1109\/TCE.2023.3318850","volume":"70","author":"M Wazid","year":"2023","unstructured":"Wazid, M., Singh, J., Das, A.K., Rodrigues, J.J.: An ensemble-based machine learning-envisioned intrusion detection in industry 5.0-driven healthcare applications. IEEE Trans. Consumer Elec. 70(1), 1903\u20131912 (2023)","journal-title":"IEEE Trans. Consumer Elec."},{"key":"5836_CR19","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1016\/j.ins.2022.10.060","volume":"617","author":"J Wang","year":"2022","unstructured":"Wang, J., Jin, H., Chen, J., Tan, J., Zhong, K.: Anomaly detection in internet of medical things with blockchain from the perspective of deep neural network. Inf. Sci. 617, 133\u2013149 (2022)","journal-title":"Inf. Sci."},{"issue":"5","key":"5836_CR20","doi-asserted-by":"publisher","first-page":"2419","DOI":"10.1109\/TNSE.2023.3273301","volume":"10","author":"A Sharma","year":"2023","unstructured":"Sharma, A., Rani, S., Shah, S.H., Sharma, R., Yu, F., Hassan, M.M.: An efficient hybrid deep learning model for denial of service detection in cyber physical systems. IEEE Trans. Netw. Sci. Eng. 10(5), 2419\u20132428 (2023)","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"5836_CR21","doi-asserted-by":"publisher","unstructured":"Mazid, A., Pawar, V., Yadav, A.S.: Blockchain enabled federated learning framework for privacy-preserved electronic health record. IEEE Communications Standards Magazine, 1\u20131 (2025) https:\/\/doi.org\/10.1109\/MCOMSTD.2025.3573063","DOI":"10.1109\/MCOMSTD.2025.3573063"},{"key":"5836_CR22","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/s10586-024-04896-4","volume":"28","author":"A Mazid","year":"2025","unstructured":"Mazid, A., Kirmani, S., Abid, M., et al.: A secure and efficient framework for internet of medical things through blockchain driven customized federated learning. Clust. Comput. 28, 225 (2025). https:\/\/doi.org\/10.1007\/s10586-024-04896-4","journal-title":"Clust. Comput."},{"issue":"15","key":"5836_CR23","doi-asserted-by":"publisher","first-page":"25454","DOI":"10.1109\/JIOT.2023.3327024","volume":"11","author":"A Aljuhani","year":"2023","unstructured":"Aljuhani, A., Alamri, A., Kumar, P., Jolfaei, A.: An intelligent and explainable saas-based intrusion detection system for resource-constrained iomt. IEEE Internet Things J. 11(15), 25454\u201325463 (2023)","journal-title":"IEEE Internet Things J."},{"issue":"1","key":"5836_CR24","doi-asserted-by":"publisher","first-page":"683","DOI":"10.1109\/TII.2022.3192035","volume":"19","author":"MM Alani","year":"2022","unstructured":"Alani, M.M., Awad, A.I.: An intelligent two-layer intrusion detection system for the internet of things. IEEE Trans. Industr. Inf. 19(1), 683\u2013692 (2022)","journal-title":"IEEE Trans. Industr. Inf."},{"issue":"10","key":"5836_CR25","doi-asserted-by":"publisher","first-page":"8395","DOI":"10.1109\/JIOT.2022.3230694","volume":"10","author":"M Fouda","year":"2022","unstructured":"Fouda, M., Ksantini, R., Elmedany, W.: A novel intrusion detection system for internet of healthcare things based on deep subclasses dispersion information. IEEE Internet Things J. 10(10), 8395\u20138407 (2022)","journal-title":"IEEE Internet Things J."},{"issue":"14","key":"5836_CR26","doi-asserted-by":"publisher","DOI":"10.3390\/s24144591","volume":"24","author":"K Begum","year":"2024","unstructured":"Begum, K., Mozumder, M.A.I., Joo, M.-I., Kim, H.-C.: Bflids: blockchain-driven federated learning for intrusion detection in iomt networks. Sensors 24(14), 4591 (2024)","journal-title":"Sensors"},{"key":"5836_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2025.107711","volume":"166","author":"M Kumar","year":"2025","unstructured":"Kumar, M., Singh, S.K., Kim, S.: Hybrid deep learning-based cyberthreat detection and iomt data authentication model in smart healthcare. Future Generation Computer Systems 166, 107711 (2025)","journal-title":"Future Generation Computer Systems"},{"issue":"1","key":"5836_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11227-024-06782-7","volume":"81","author":"AA Khan","year":"2025","unstructured":"Khan, A.A., Laghari, A.A., Baqasah, A.M., Bacarra, R., Alroobaea, R., Alsafyani, M., Alsayaydeh, J.A.J.: Bdlt-iomt\u2014a novel architecture: svm machine learning for robust and secure data processing in internet of medical things with blockchain cybersecurity. J. Supercomput. 81(1), 1\u201322 (2025)","journal-title":"J. Supercomput."},{"issue":"2","key":"5836_CR29","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1016\/j.icte.2023.10.001","volume":"10","author":"S Rani","year":"2024","unstructured":"Rani, S., Kumar, S., Kataria, A., Min, H.: Smarthealth: an intelligent framework to secure iomt service applications using machine learning. ICT Express 10(2), 425\u2013430 (2024)","journal-title":"ICT Express"},{"key":"5836_CR30","unstructured":"Canadian Institute for Cybersecurity: CICIOMT Dataset Link. [Online; accessed DATE] (2024). https:\/\/www.unb.ca\/cic\/datasets\/iomt-dataset-2024.html"},{"key":"5836_CR31","doi-asserted-by":"crossref","unstructured":"Jamil, M., Creutzburg, R.: Enhancing cybersecurity in critical infrastructure: utilizing random forest ai model for threat detection. In: Future of Information and Communication Conference, pp. 388\u2013398 (2025). Springer","DOI":"10.1007\/978-3-031-85363-0_24"},{"key":"5836_CR32","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2023.103808","volume":"89","author":"B Kolukisa","year":"2024","unstructured":"Kolukisa, B., Dedeturk, B.K., Hacilar, H., Gungor, V.C.: An efficient network intrusion detection approach based on logistic regression model and parallel artificial bee colony algorithm. Computer Standards Interfaces 89, 103808 (2024)","journal-title":"Computer Standards Interfaces"},{"key":"5836_CR33","doi-asserted-by":"crossref","unstructured":"Allal, Z., Noura, H., Salman, O., Chehab, A.: Advanced anomaly detection in energy control systems using machine learning and feature engineering. In: 2024 8th Cyber Security in Networking Conference (CSNet), pp. 15\u201321 (2024). IEEE","DOI":"10.1109\/CSNet64211.2024.10851741"},{"key":"5836_CR34","doi-asserted-by":"crossref","unstructured":"Reddy, D.K.K., Behera, H.: Catboosting approach for anomaly detection in iot-based smart home environment. In: Computational Intelligence in Data Mining: Proceedings of ICCIDM 2021, pp. 753\u2013764. Springer, ??? (2022)","DOI":"10.1007\/978-981-16-9447-9_56"},{"key":"5836_CR35","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3413600","author":"KA Awan","year":"2024","unstructured":"Awan, K.A., Din, I.U., Almogren, A., Kim, B.-S., Guizani, M.: Enhancing iot security with trust management using ensemble xgboost and adaboost techniques. IEEE Access (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3413600","journal-title":"IEEE Access"},{"issue":"9","key":"5836_CR36","doi-asserted-by":"publisher","first-page":"12579","DOI":"10.1007\/s13369-024-08787-z","volume":"49","author":"N Nabil","year":"2024","unstructured":"Nabil, N., Najib, N., Abdellah, J.: Leveraging artificial neural networks and lightgbm for enhanced intrusion detection in automotive systems. Arab. J. Sci. Eng. 49(9), 12579\u201312587 (2024)","journal-title":"Arab. J. Sci. Eng."},{"issue":"1","key":"5836_CR37","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4917","volume":"35","author":"A Sharma","year":"2024","unstructured":"Sharma, A., Kaur, S., Singh, M.: A secure blockchain framework for the internet of medical things. Trans. Emerging Telecommun. Tech. 35(1), 4917 (2024)","journal-title":"Trans. Emerging Telecommun. Tech."},{"issue":"22","key":"5836_CR38","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.8213","volume":"36","author":"A Sharma","year":"2024","unstructured":"Sharma, A., Kaur, S., Singh, M.: Enhancing healthcare security: time-based authentication for privacy-preserving iomt sensor monitoring framework leveraging blockchain technology. Concurrency and Computation: Practice and Experience 36(22), 8213 (2024)","journal-title":"Concurrency and Computation: Practice and Experience"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05836-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-025-05836-6","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05836-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T15:32:44Z","timestamp":1767713564000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-025-05836-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,6]]},"references-count":38,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2026,4]]}},"alternative-id":["5836"],"URL":"https:\/\/doi.org\/10.1007\/s10586-025-05836-6","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,6]]},"assertion":[{"value":"4 April 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 October 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 October 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 January 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This research did not involve any human participants or animals. All data used in this study were obtained from publicly available sources or generated in a controlled experimental environment. Theauthors confirmthattheworkadheres totheethicalstandards of research and publication.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"Not applicable.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}],"article-number":"87"}}