Effectual Energy Optimization, Fault-Tolerant Attack Detection, and Data Aggregation in Healthcare IoT Using Enhanced Waterwheel Archimedes and Deep Siamese Maxout Forward Harmonic Networks
DOI:
https://doi.org/10.18196/jrc.v6i2.25181Keywords:
Internet of Medical Things, Cluster Head Selection, Secure Routing, Siamese Neural Network, Deep Maxout NetworkAbstract
The Internet of Medical Things (IoMT) has emerged as a transformative technology for improving healthcare delivery and patient outcomes. However, IoMT systems face significant challenges, including high latency, energy inefficiency, and vulnerability to cyberattacks, which compromise data security and patient privacy. Existing methods for attack detection and secure routing in IoMT often suffer from high latency, limited fault tolerance, and insufficient accuracy in identifying sophisticated attacks. To address these challenges, this paper proposes two novel approaches: the Improved Waterwheel Archimedes Optimization Algorithm (WWAOA) for secure routing and the Deep Siamese Maxout Forward Harmonic Network (DSMFHN) for attack detection in healthcare IoT. The Improved WWAOA integrates the Waterwheel Plant Algorithm (WWPA) with the Archimedes Optimization Algorithm (AOA) to optimize cluster head (CH) selection and secure routing. It considers key fitness parameters such as energy consumption, link lifetime (LLT), trust, delay, distance, and fault tolerance to enhance network efficiency and resilience. The DSMFHN combines Siamese Neural Networks (SNN) and Deep Maxout Networks (DMN) with forward harmonic analysis to detect attacks with high accuracy and low false positive rates. Additionally, data aggregation is performed using Bidirectional Long Short-Term Memory (BiLSTM) with adaptive weightage based on fault and malicious node detection. Experimental results demonstrate that the proposed methods outperform existing techniques. The Improved WWAOA achieves a minimal delay of 0.557 ms, maximal energy efficiency of 0.182 J, a packet delivery ratio (PDR) of 93.894%, and a trust value of 87.152. Meanwhile, the DSMFHN achieves a high accuracy of 92.598%, a true positive rate (TPR) of 91.643%, and a low false positive rate (FPR) of 0.156. These results highlight the effectiveness of the proposed methods in addressing the critical challenges of latency, energy efficiency, and security in healthcare IoT systems.
References
A. Ghubaish, T. Salman, M. Zolanvari, D. Unal, A. Al-Ali, and R. Jain, "Recent Advances in the Internet-of-Medical-Things (IoMT) Systems Security," in IEEE Internet of Things Journal, vol. 8, no. 11, pp. 8707-8718, 2021, doi: 10.1109/JIOT.2020.3045653.
S. Razdan and S. Sharma, “Internet of medical things (IoMT): Overview, emerging technologies, and case studies,” IETE technical review, vol. 39, no. 4, pp. 775-788, 2022.
N. Dilawar, M. Rizwan, F. Ahmad, and S. Akram, “Blockchain: securing internet of medical things (IoMT),” International Journal of Advanced Computer Science and Applications, vol. 10, no. 1, 2019.
A. Gatouillat, Y. Badr, B. Massot, and E. Sejdić, "Internet of Medical Things: A Review of Recent Contributions Dealing With Cyber-Physical Systems in Medicine," in IEEE Internet of Things Journal, vol. 5, no. 5, pp. 3810-3822, 2018, doi: 10.1109/JIOT.2018.2849014.
M. Papaioannou, M. Karageorgou, G. Mantas, V. Sucasas, I. Essop, J. Rodriguez, and D. Lymberopoulos, “A survey on security threats and countermeasures in internet of medical things (IoMT),” Trans. Emerg. Telecommun. Technol., vol. 33, no. 6, p. e4049, 2022.
J. P. A. Yaacoub et al., "Securing internet of medical things systems: Limitations, issues and recommendations," Future Generation Computer Systems, vol. 105, pp. 581-606, 2020.
J. K. R. Sastry, B. Ch, and R. R. Budaraju, “Implementing Dual Base Stations within an IoT Network for Sustaining the Fault Tolerance of an IoT Network through an Efficient Path Finding Algorithm,” Sensors, vol. 23, no. 8, p. 4032, 2023.
P. Sharma and P. K. Gupta, "Optimization of IoT-fog network path and fault tolerance in fog computing based environment," Procedia Computer Science, vol. 218, pp. 2494-2503, 2023.
Z. Zeng, L. Chang, and Y. Liu, "A fault tolerance data aggregation scheme for fog computing," International Journal of Information and Computer Security, vol. 17, no. 3-4, pp. 351-364, 2022.
O. I. Abiodun, E. O. Abiodun, M. Alawida, R. S. Alkhawaldeh, and H. Arshad, "A Review on the Security of the Internet of Things: Challenges and Solutions," Wireless Pers. Commun., vol. 119, no. 3, pp. 2603–2637, 2021, doi: 10.1007/s11277-021-08348-9.
J. Liu, Y. Liu, and Y. Zhang, "A Clustering-Based Data Collection Wireless Sensor Network Using Concurrent Transmission," in IEEE Access, vol. 12, pp. 135398-135410, 2024, doi: 10.1109/ACCESS.2024.3462743
M. Sadrishojaei, N. J. Navimipour, M. Reshadi, and M. Hosseinzadeh, “A new preventive routing method based on clustering and location prediction in the mobile internet of things,” IEEE Internet of Things Journal, vol. 8, no. 13, pp. 10652-10664, 2021.
S. M. Amini and A. Karimi, “Two-level distributed clustering routing algorithm based on unequal clusters for large-scale Internet of Things networks,” The Journal of Supercomputing, vol. 76, no. 3, pp. 2158-2190, 2020.
M. Esmaeili, S. H. Goki, B. H. K. Masjidi, M. Sameh, H. Gharagozlou, and A. S. Mohammed, “Ml-ddosnet: Iot intrusion detection based on denial-of-service attacks using machine learning methods and nsl-kdd,” Wireless Communications and Mobile Computing, vol. 2022, no. 1, p. 8481452, 2022.
J. Kim, J. Kim, H. Kim, M. Shim, and E. Choi, "CNN-based network intrusion detection against denial-of-service attacks," Electronics, vol. 9, no. 6, p. 916, 2020.
J. Wang, L. Wu, S. Zeadally, M. K. Khan, and D. He, “Privacy-preserving data aggregation against malicious data mining attack for IoT-enabled smart grid,” ACM Transactions on Sensor Networks (TOSN), vol. 17, no. 3, pp. 1-25, 2021.
R. Kozik, M. Choraś, M. Ficco, and F. Palmieri, "A scalable distributed machine learning approach for attack detection in edge computing environments," Journal of Parallel and Distributed Computing, vol. 119, pp. 18-26, 2019.
S. Sadhwani, B. Manibalan, R. Muthalagu, and P. Pawar, “A lightweight model for DDoS attack detection using machine learning techniques,” Applied Sciences, vol. 13, no. 17, p. 9937, 2023.
J. Wang, Y. Liu, and H. Feng, "IFACNN: efficient DDoS attack detection based on improved firefly algorithm to optimize convolutional neural networks," Math. Biosci. Eng, vol. 19, no. 2, pp. 1280-1303, 2022.
T. V. Khoa et al., "Deep Transfer Learning: A Novel Collaborative Learning Model for Cyberattack Detection Systems in IoT Networks," in IEEE Internet of Things Journal, vol. 10, no. 10, pp. 8578-8589, 2023.
S. Kavitha and N. Uma Maheswari, "Network anomaly detection for NSL-KDD dataset using deep learning,” Information Technology in Industry, vol. 9, no. 2, pp. 821-827, 2021.
S. Abbasian Dehkordi, K. Farajzadeh, J. Rezazadeh, R. Farahbakhsh, K. Sandrasegaran, and M. Abbasian Dehkordi, “A survey on data aggregation techniques in IoT sensor networks,” Wireless Networks, vol. 26, no. 2, pp. 1243-1263, 2020.
P. Nalayini and V. Meena, “Optimization based Data Aggregation and Fault Tolerance with Energy Management for Fog Enabled Heterogeneous IoT Environment,” Research Square, 2024.
M. M. Vanani and P. K. Dehkordi, “FTRTA: Fault Tolerance and Reliable Transmissions Algorithm for IoT,” Research Square, 2022.
K. Aravind and P. K. R. Maddikunta, “Dingo optimization based cluster based routing in internet of things,” Sensors, vol. 22, no. 20, p. 8064, 2022.
A. A. J. Al-Abadi, M. B. Mohamed, and A. Fakhfakh, "Enhanced Random Forest Classifier with K-Means Clustering (ERF-KMC) for Detecting and Preventing Distributed-Denial-of-Service and Man-in-the-Middle Attacks in Internet-of-Medical-Things Networks," Computers, vol. 12, no. 12, p. 262, 2023.
M. Kumar, M. Sethi, S. Rani, D. K. Sah, S. A. AlQahtani, and M. S. Al-Rakhami, "Secure Data Aggregation Based on End-to-End Homomorphic Encryption in IoT-Based Wireless Sensor Networks," Sensors, vol. 23, no. 13, p. 6181, 2023
M. Dener, "SDA-RDOS: A New Secure Data Aggregation Protocol for Wireless Sensor Networks in IoT Resistant to DOS Attacks," Electronics, vol. 11, p. 4194, 2022.
H. Peng, C. Wu, and Y. Xiao, "CBF-IDS: Addressing Class Imbalance Using CNN-BiLSTM with Focal Loss in Network Intrusion Detection System," Applied Sciences, vol. 13, no. 21, p. 11629, 2023.
S. Moustakidis and P. Karlsson, "A novel feature extraction methodology using Siamese convolutional neural networks for intrusion detection," Cybersecurity, vol. 3, no. 1, p. 16, 2020.
S. Saif, N. Yasmin, and S. Biswas, "Feature Engineering Based Performance Analysis of ML and DL Algorithms for Botnet Attack Detection in IoMT," International Journal of System Assurance Engineering and Management, vol. 14, pp. 512–522, 2023.
M. Narang, A. Jatain, and N. Punetha, "A Study on Cyberattack Detection in IoMT Using Machine Learning Techniques," SSRN Electronic Journal, 2023.
F. Khan et al., "A Secure Ensemble Learning-Based Fog-Cloud Approach for Cyberattack Detection in IoMT," IEEE Transactions on Industrial Informatics, vol. 19, pp. 10125–10132, 2023.
S. S. Hameed et al., "A Hybrid Lightweight System for Early Attack Detection in the IoMT Fog," Sensors (Basel, Switzerland), vol. 21, 2021.
R. Punithavathi et al., "Crypto Hash Based Malware Detection in IoMT Framework," Intelligent Automation & Soft Computing, 2022.
J. Nayak et al., "Extreme Learning Machine and Bayesian Optimization-Driven Intelligent Framework for IoMT Cyberattack Detection," Journal of Supercomputing, vol. 78, pp. 14866–14891, 2022.
H. Alavizadeh, H. Alavizadeh, and J. Jang-Jaccard, "Deep q-learning based reinforcement learning approach for network intrusion detection", Computers, vol. 11, no. 3, p. 41, 2022.
Z. Askari et al., "Energy-Efficient and Real-Time NOMA Scheduling in IoMT-Based Three-Tier WBANs," IEEE Internet of Things Journal, vol. 8, pp. 13975–13990, 2021.
G. N. K. Reddy, M. S. Manikandan, N. V. L. N. Murty, and L. R. Cenkeramaddi, "Unified Quality-Aware Compression and Pulse-Respiration Rates Estimation Framework for Reducing Energy Consumption and False Alarms of Wearable PPG Monitoring Devices," IEEE Access, vol. 11, pp. 41708-41740, 2023.
Z. A. Jaaz et al., "Optimization Technique Based on Cluster Head Selection Algorithm for 5G-Enabled IoMT Smart Healthcare Framework for Industry," Paladyn, Journal of Behavioral Robotics, vol. 13, pp. 99–109, 2022.
H. A. Babaeer and S. A. Al-Ahmadi, "Efficient and Secure Data Transmission and Sinkhole Detection in a Multi-Clustering Wireless Sensor Network Based on Homomorphic Encryption and Watermarking," in IEEE Access, vol. 8, pp. 92098-92109, 2020.
M. S. Yousefpoor, E. Yousefpoor, H. Barati, A. Barati, A. Movaghar, and M. Hosseinzadeh, “Secure data aggregation methods and countermeasures against various attacks in wireless sensor networks: A comprehensive review,” Journal of Network and Computer Applications, vol. 190, p. 103118, 2021.
R. Chaganti, A. Mourade, V. Ravi, N. Vemprala, A. Dua, and B. Bhushan, "A particle swarm optimization and deep learning approach for intrusion detection system in internet of medical things," Sustainability, vol. 14, no. 19, p. 12828, 2022.
S. Hao, Y. Hong, and Y. He, "An Energy-Efficient Routing Algorithm Based on Greedy Strategy for Energy Harvesting Wireless Sensor Networks," Sensors, vol. 22, no. 4, p. 1645, 2022.
Y. Pramitarini, R. H. Y. Perdana, K. Shim, and B. An, "DLSMR: Deep Learning-Based Secure Multicast Routing Protocol against Wormhole Attack in Flying Ad Hoc Networks with Cell-Free Massive Multiple-Input Multiple-Output," Sensors, vol. 23, no. 18, p. 7960, 2023.
M. Z. Hussain, Z. M. Hanapi, A. Abdullah, M. Hussin, and M. I. H. Ninggal, "An efficient secure and energy resilient trust-based system for detection and mitigation of sybil attack detection (SAN)," PeerJ Computer Science, vol. 10, p. e2231, 2024.
S. Azad, M. Mahmud, K. Z. Zamli, M. S. Kaiser, S. Jahan, and M. A. Razzaque, "iBUST: An Intelligent Behavioural Trust Model for Securing Industrial Cyber-Physical Systems," Expert Systems with Applications, vol. 238, pp. 121676, 2024
K. Muthulakshmi, K. Kalirajan, J. Jean Justus, and P. Sivamalar, "QoS Aware Data Congestion Control Routing in Mobile Ad Hoc Networks for Intelligent Transportation Systems," Tehnički vjesnik, vol. 31, no. 1, pp. 240-246, 2024.
J. Hu, X. Yang, and L.-X. Yang, "A Framework for Detecting False Data Injection Attacks in Large-Scale Wireless Sensor Networks," Sensors, vol. 24, no. 5, p. 1643, 2024.
A. A. Abdelhamid et al., “Waterwheel plant algorithm: A novel metaheuristic optimization method,” Processes, vol. 11, no. 5, p. 1502, 2023.
F. A. Hashim, K. Hussain, E. H. Houssein, M. S. Mabrouk, and W. Al-Atabany, “Archimedes optimization algorithm: a new metaheuristic algorithm for solving optimization problems,” Applied intelligence, vol. 51, pp. 1531-1551, 2021.
S. V. Pingale and S. R. Sutar, "Remora based Deep Maxout Network model for network intrusion detection using Convolutional Neural Network features," Computers and Electrical Engineering, vol. 110, p. 108831, 2023.
B. Alnajjar, A. M. Kadim, R. A. Jaber, N. A. Hasan, E. Q. Ahmed, M. S. M. Altaei, and A. L. Khalaf, "Wireless Sensor Network Optimization Using Genetic Algorithm," Journal of Robotics and Control (JRC), vol. 3, no. 6, pp. 827-835, Nov. 2022.
X. Zhao, L. Wang, M. Yang, Y. Chen, and J. Xiang, "A Novel Small-Sample Fault Diagnosis Method for Rolling Bearings via Continuous Wavelet Transform and Siamese Neural Network," in IEEE Sensors Journal, vol. 24, no. 15, pp. 24988-24996, 2024.
W. Sun, F. Su, and L. Wang, "Improving deep neural networks with multi-layer maxout networks and a novel initialization method," Neurocomputing, vol. 278, pp. 34-40, 2019.
Y. Fang, J. Gao, Z. Liu, and C. Huang, "Detecting Cyber Threat Event from Twitter Using IDCNN and BiLSTM," Applied Sciences, vol. 10, no. 17, p. 5922, 2020.
S. Arora, I. Batra, A. Malik, A. K. Luhach, W. S. Alnumay, and P. Chatterjee, "SEED: Secure and energy efficient data-collection method for IoT network," Multimedia Tools and Applications, vol. 82, no. 2, pp. 3139-3153, 2023.
A. Tehrani, M. Yadollahzadeh-Tabari, A. Zehtab-Salmasi, and R. Enayatifar, "Wearable sensor-based human activity recognition system employing bi-LSTM algorithm," The Computer Journal, vol. 67, no. 3, pp. 961-975, 2024.
H. F. Mahdi and B. J. Khadhim, "Enhancing IoT Security: A Deep Learning and Active Learning Approach to Intrusion Detection," Journal of Robotics and Control (JRC), vol. 5, no. 5, pp. 1525-1535, 2024.
A. Jaddoa, "Integration of Convolutional Neural Networks and Grey Wolf Optimization for Advanced Cybersecurity in IoT Systems," Journal of Robotics and Control (JRC), vol. 5, no. 4, pp. 1189-1202, 2024.
BoT-IoT dataset is taken from “https://ieee-dataport.org/documents/bot-iot-dataset", accessed on July 2024.
NSL-KDD dataset is taken from, "https://www.unb.ca/cic/datasets/nsl.html", accessed on July 2024.
M. Anwer, S. M. Khan, and M. U. Farooq, "Attack detection in IoT using machine learning. Engineering," Technology & Applied Science Research, vol. 11, no. 3, pp. 7273-7278, 2021.
M. Maray, S. M. Rizwan, E. Mustafa, and J. Shuja, "Microservices enabled bidirectional fault-tolerance scheme for healthcare internet of things," Cluster Computing, vol. 27, pp. 4621–4633, 2024.
G. Sripriyanka and A. Mahendran, "Securing IoMT: A Hybrid Model for DDoS Attack Detection and COVID-19 Classification," IEEE Access, vol. 12, pp. 17328-17348, 2024.
Y. Y. Ghadi et al., "Machine Learning Solutions for the Security of Wireless Sensor Networks: A Review," in IEEE Access, vol. 12, pp. 12699-12719, 2024.
Y. Y. Ghadi et al., "The role of blockchain to secure internet of medical things," Scientific Reports, vol. 14, pp. 18422, 2024.
T. Mazhar, S. F. A. Shah, S. A. Inam, J. B. Awotunde, M. M. Saeed, and H. Hamam, "Analysis of integration of IoMT with blockchain: issues, challenges and solutions," Discover Internet of Things, vol. 4, no. 21, 2024.
T. Mazhar et al., "Analysis of IoT Security Challenges and Its Solutions Using Artificial Intelligence," Brain Sciences, vol. 13, no. 4, p. 683, 2023.
T. Mazhar et al., "Analysis of Cyber Security Attacks and Its Solutions for the Smart grid Using Machine Learning and Blockchain Methods," Future Internet, vol. 15, no. 2, p. 83, 2023.
Y. Y. Ghadi, S. F. A. Shah, T. Mazhar, T. Shahzad, K. Ouahada, and H. Hamam, "Enhancing patient healthcare with mobile edge computing and 5G: challenges and solutions for secure online health tools," Journal of Cloud Computing, vol. 13, 2024.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Ganesh Shetty

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
This journal is based on the work at https://journal.umy.ac.id/index.php/jrc under license from Creative Commons Attribution-ShareAlike 4.0 International License. You are free to:
- Share – copy and redistribute the material in any medium or format.
- Adapt – remix, transform, and build upon the material for any purpose, even comercially.
The licensor cannot revoke these freedoms as long as you follow the license terms, which include the following:
- Attribution. You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- ShareAlike. If you remix, transform, or build upon the material, you must distribute your contributions under the same license as the original.
- No additional restrictions. You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
• Creative Commons Attribution-ShareAlike (CC BY-SA)
JRC is licensed under an International License