key: cord-0180275-9hcr6qwy authors: Ali, Mansoor; Naeem, Faisal; Tariq, Muhammad; Kaddoum, Geroges title: Federated Learning for Privacy Preservation in Smart Healthcare Systems: A Comprehensive Survey date: 2022-03-18 journal: nan DOI: nan sha: 3c6f7ec37cedd2d487c42ce58a6da2c9293cbdd9 doc_id: 180275 cord_uid: 9hcr6qwy Recent advances in electronic devices and communication infrastructure have revolutionized the traditional healthcare system into a smart healthcare system by using IoMT devices. However, due to the centralized training approach of artificial intelligence (AI), the use of mobile and wearable IoMT devices raises privacy concerns with respect to the information that has been communicated between hospitals and end users. The information conveyed by the IoMT devices is highly confidential and can be exposed to adversaries. In this regard, federated learning (FL), a distributive AI paradigm has opened up new opportunities for privacy-preservation in IoMT without accessing the confidential data of the participants. Further, FL provides privacy to end users as only gradients are shared during training. For these specific properties of FL, in this paper we present privacy related issues in IoMT. Afterwards, we present the role of FL in IoMT networks for privacy preservation and introduce some advanced FL architectures incorporating deep reinforcement learning (DRL), digital twin, and generative adversarial networks (GANs) for detecting privacy threats. Subsequently, we present some practical opportunities of FL in smart healthcare systems. At the end, we conclude this survey by providing open research challenges for FL that can be used in future smart healthcare systems Internet of medical things (IoMT) has transformed healthcare systems into personalized, user-centric, precise, and ubiquitous services by providing improved healthcare management, supervision and procedure by improving the quality of life and human well-being [1] . The smart healthcare system consists of IoMT devices widely used to monitor medical traffic continuously. The healthcare traffic is forwarded to artificial intelligence (AI) enabled framework to realize a plethora of emerging intelligent healthcare systems, such as disease prediction and remote health monitoring [2] . The future healthcare systems will be based on applications such as holographic communication, telesurgery, Hospital-to-Home (H2H), and Quality of Life (QoL) services. In particular, telesurgery and holographic communication will have stringent and real-time performance requirements. Due to low data rates, existing wireless architectures such as 5G cannot support intelligent healthcare applications. The 6G is expected to play a vital role in completely revolutionizing the existing healthcare system and overcoming the communication barriers of the existing wireless architecture. Traditionally, healthcare traffic management techniques rely on a centralized AI framework that is located in the data center or cloud for health data analytics and learning. Given the growth of IoMT devices and large volumes of health traffic in modern smart health care systems, the centralized architecture results in scalability issues [3] . Furthermore, the reliance on centralized servers for data learning makes them vulnerable and exposed to various types of security threats and thus, poses a significant threat to patient's safety and privacy [4] . For example, adversaries and intruders can hack the IoMT devices and modify the patient has stored data resulting in a threat to the patient's life. Moreover, the centralized AI framework for future adaptive healthcare systems may not be practical because health traffic will be distributed over heterogeneous and large-scale healthcare systems. As a result, for the successful deployment of intelligent healthcare systems, a distributed AI-based framework is needed for enabling privacy-preserving and scalable healthcare applications. In this context, the emerging concept of federated learning (FL) has shown promising solutions for providing privacy protection in smart-healthcare networks [5] , [6] . FL is a type of distributed AI that enables the models' distributed training by averaging the local model updates from multiple IoMT networks without accessing the local data. As a result, potential risks of disclosing user preferences and sensitive patient information can be mitigated by using the FL approach. Moreover, the FL approach improves the training performance of the health by collecting large datasets and computation resources from local IoMT devices, which might not be possible in the case of using the centralized AI approach [6] . Driven by recent advances in FL, many researchers have surveyed the area of FL in healthcare systems. The work in [7] conducted a detailed comparative analysis of applications of FL related to security in IoT networks. The paper in [8] Reference Area of focus Our contributions [7] Outlines the applications of FL in security and privacy in IoT networks. This survey provides a holistic taxonomies and a comprehensive survey on the applications of FL in IoMT network from the perspective of privacy preservation. [ 8] In the survey paper, FL is explored within the healthcare framework, but privacy and security concerns are not addressed. [9] Focuses on the role of FL in Industrial Internet of Things (IIoT) and discussion of FL in healthcare is very limited. [10] A discussion of the requirements and technical issues of FL in digital health. [6] Summarizes the requirements and role of FL in healthcare. performed a survey of FL in the area of healthcare networks. However, the security perspective is not covered. Meanwhile, the role of FL in technical implementation in digital health is explored in detail in [10] . Moreover, a recent paper [6] discussed the role of FL in intelligent healthcare and covered some aspects of privacy. However, the recent advances of the FL in privacy-preserving schemes, including the recent development of AI techniques such as reinforcement learning (RL), digital twin (DT), and generative adversarial network (GAN), have not been explored to the best of our knowledge. The overall comparison of this work with the recent surveys is summarized in Table 1 . The remainder of the survey is organized as follows. Section II presents the security and privacy issues in IoMT; Section II describes FL's motivation and architecture in IoMT networks. Section IV introduces some advanced architectures of FL from the privacy perspective. In Section V, we have described the application of FL followed by Section VI, where research directions are given. Finally, the survey has concluded Section VII. Many researchers in the last decade have addressed the literature concerning IoT privacy and security. It has been observed that addressing the security issues was primarily focused [11] ; however, more attention needs to be paid to the protection of end-user privacy in modern electronic health care systems [12] , [13] . In the modern era, the health care system is transformed into a new domain by incorporating advanced digital technologies such as IoT, high computing devices to store and process data, personal health records, and more. Through these advanced countermeasures, it has been observed that IoMT can significantly improve the efficiency of the healthcare system by ensuring the safety of patients [14] , [15] . Despite all of these advantages, cybersecurity of the healthcare system is an important issue that needs to be tackled [16] . Due to poor defense systems for information security, electronic healthcare systems are considered an easy target for attackers. An adversary can hack into the system, making it paralyzed using ransomware, getting patient information from hospitals and selling it, and blackmailing patients into releasing their personal data. Furthermore, it has been observed that attack-able vulnerabilities points are more prevalent in the electronic healthcare system. One such instance can be found in [17] , where the attackers intercept the operation of digital insulin pumps. The security operator reported such an attack by analyzing the communication protocols. Thus, it is observed that before deploying any security and privacy algorithm, risk analysis of the system is the foremost priority. Henceforth, security and privacy issues pose a significant threat to modern healthcare systems and need to be addressed for the effective operation of IoMT systems. Moreover, the secure network must fulfill all the system requirements under constraints and must be adaptable to changes in the healthcare system to meet future needs. In today's world securing the network is not sufficient for its effective operation. Protection of networks from a privacy perspective is also important, specifically for electronic healthcare systems. Here, in this section, we will provide a brief description of privacy threats and relative effective protection schemes. 1) Private data: In IoMT based applications, an abundant amount of data is being communicated among different operating systems connected to the network, raising privacy concerns. Therefore, various standard protocols such as ISO/IEC 27018 [18] , and 29100 [19] are designed to tackle these issues to some extent. The information type that is used to present the data regarding the specific individual is referred to as Personal Identifiable Information (PII) [19] . Based on that, the user data can be classified into three categories such as sensitive personal data, general data, and statistical data, respectively. As its name implies, sensitive personal information requires the highest level of privacy, while general and statistical data require moderate protection since they are primarily used for surveys and statistical analysis. The PII owner is the one to whom the information belongs, and they have complete authority over it. In contrast, a PIIassociated processor is an organization to whom the person has given the rights to access their personal information and use them for various purposes. Nevertheless, the processor might share the information with a third party after getting consent from the PII owner for certain specific functionalities. If any violation involves using the personal information for any unauthorized purpose, the contracted processor and third party will be held liable. 2) Prevention mechanisms: Malicious events that compromise the privacy of PII could include tampering with the connection between smart devices in the home or access to private information via wearable health monitoring devices [20] , [21] . Thus, private data must be protected before sharing and storing it. However, there is some protection mechanism that can be adopted to protect the data throughout its processing steps from collection to storage and analysis. The data that is collected for monitoring purposes from patients is abundant; hence for IoMT related devices, definite control steps must be deployed [22] . For instance, the data collection that is requested by the healthcare application must be reduced to reduce computation costs. Moreover, storing all data must be minimized for an extended period and enforcing data to store for a short period. Furthermore, encouraging data processing on edge servers to reduce computation time and process more data while protecting user identity. For privacy concerns, it is more suitable to adopt anonymization on user data to hide PII personal information to secure data leakage to unintended users. 3) Privacy of IoMT using identification and anonymity: The main concern of any preservation techniques adopted for privacy is to secure the user identity and information. The adversary may get the user information by analyzing the data flow among different individuals. For this purpose, the users may choose to maintain their anonymity from the network operator for some applications and access services while preserving their privacy. The three types of secure access that users can adopt are: adopting login bases authentication of the user, using a pseudonym, and utilizing anonymity. The user is aware of the fact that the services provider might track the user identity if login-based privacy is used. Based on this fact, third parties might use the available user information. In such circumstances, to avoid data leakage, data encryption is highly recommended. The users can hide their critical data by utilizing pseudonyms, providing privacy protection of high levels for many applications. However, the adversary can infer information of an entity by using context-based knowledge algorithms. For instance, the hospital operators can identify whether the users are employees, patients, or other personnel related to the patient that put the hospital services request. Moreover, the personnel can be identified as staff operators if they use IoT-enabled hospital services almost daily. Furthermore, if the user is accessing the services from remote locations, then the adversary can easily deduce that the user is using the facilities from their home and will try to get the identity of the users through context-based identification algorithms. Henceforth, more prevention mechanisms are needed for location-based services (LBS), especially where the IoT network is involved [23] . In order to overcome the loopholes in pseudonyms, more robust mechanisms like cloaking areas and k-anonymity were adopted in [24] , [25] . Cloaking areas imply that pseudonyms for various users are interchanged in a random manner when passing through a particular area. For instance, in IoT environments where smart cars are included, anonymization is usually performed in areas where more cars are gathered, like traffic signals or road crossings. However, it was observed that by using a context-aware knowledge algorithm, the user identity could be inferred [26] . Hence, more robust protection methods like semantic obfuscation algorithms are adopted to counter these attacks [27] . By adopting K-anonymity, the user identity can be blurred from the service provider by the intermediate entity. However, the intermediate entity must be carefully selected and should be trustworthy among the users. Furthermore, for privacy and security purposes, the different functional operations are mostly carried out on user devices; hence the resources of active participants are only used. Nevertheless, by adopting k-anonymity, the privacy protection levels can be controlled and quantified, which is the main advantage of the anonymity algorithm [28] . The introduction of the machine learning (ML) algorithm is gaining more attraction because of its complex modeling capability from large datasets stored on a central server [29] . In traditional ML, the data is mostly stored at a central location without considering any privacy prevention countermeasures and data transmission costs. For that purpose, privacy assurance can be achieved by using Blockchain, and authentication algorithms [30] , [31] . Moreover, it has been observed that ML-based intrusion detection algorithms can also be used for the identification of adversary actions [32] , [33] . Nowadays, ML-based privacy preservation is mostly used due to its efficiency [34] , and the more preferable technique is federated learning (FL). Initially, Google used FL as a means to combat the privacy concerns with traditional ML, as FL works collaboratively on end devices [35] . However, traditional FL has privacy issues as local model updation depends upon central model parameters. If the central global model is compromised, the overall efficiency of the whole FL framework suffers [36] - [38] . Moreover, there are constraints associated with individual IoT devices, such as power and resources, limiting the FL operation. These constraints need to be optimized to ensure efficient operation of FL [39] . The applications of FL are found in various major fields such as in network optimization [40] , Google advanced keyboard for prediction [41] , in healthcare systems like COVID-19 detection [42] and in intrusion detection [43] . However, finding the appropriate testing model for privacy and security algorithms for IoMT is still an open research issue, and researchers are finding it difficult to either use a centralized or FL-based model to test [44] . The main difference between centralized ML and FL is that in centralized ML the learning data is uploaded to the central server, where processing is performed and information is shared among different users. However, the main issue with that learning is privacy and management of the massive flux of data transmitted by IoMT devices. In contrast to centralized ML, in FL, the learning is iv [38] . The basis architecture framework in which FL can be incorporated is shown in Fig. 1 . The generalized FL-enabled healthcare system comprises certain steps. In the initial step, the central server selects different network parameters related to healthcare systems, such as deciding the task, whether medical image processing or some other human-related application and identifying the algorithm based on prediction or classification task. Moreover, the learning rates and different configurable parameters related to ML are selected. Furthermore, the central server decides the clients participating in the FL process. Once the central server decides the number of end nodes to participate in FL, then it shares the initial models among the nodes. The end nodes then train the model based on their local data, and the updated model is then shared back with a central model for aggregation. For instance, we can use a federated average model for aggregation, where the weights are assigned to local model parameters based on the data size availability [45] . In the end, the new global model is computed and is shared back with the end nodes. The learning process is continuous in an iterative manner until the desired accuracy is achieved. Some of the limitations, especially from a privacy perspective and traditional ML, are already discussed in Section. II. In this subsection, we will be discussing some other limitations that hinder the implementation of IoMT in realworld applications. For instance, in traditional ML approaches for healthcare data analysis, the data is stored on a central cloud and is vulnerable to adversary attacks. Moreover, a thirdparty platform is used for data processing and storage, which can access the data and may infer private information [46] . In a real-world healthcare system, the data gathered from a single medical lab is not enough, and the ML model based on that dataset will not give promising results [47] . Thus, to tackle that, in most cases, manual analysis of the data is performed, which is an inefficient way of data processing. For this purpose, one possible way is by sharing data among different medical institutes, but given the fact of privacy, it is not easy to get the data for training the network. Moreover, insufficient data makes it impossible to train an accurate model since the input data is imbalanced and lacks enough feature information. The new advanced features of collaborative learning in FL enable its application in various sectors, especially in smart IoMT. By adopting FL algorithms in IoMT, the local model parameters are communicated while the host data remains within the local nodes. This increases privacy and reduces information leakage scenarios. Moreover, the training of networks on diverse data increases the generalization capability v of FL. Furthermore, the communication cost is reduced by uploading only gradients rather than larger datasets [48] . These actions adopted by FL enable efficient bandwidth utilization and avoid network congestion in massive IoMT networks. Although FL opens a new domain for effective utilization of IoMT networks in the actual domain. There are some privacy issues associated with FL. For example, if an adversary gets access to the central server, then user information can be extracted, as shown in Fig. 1 . Moreover, the detailed analysis of privacy issues in FL based IoMT network and proposed prevention algorithms are discussed in the subsequent sections. In this section, we will discuss advanced FL architectures for IoMT networks from different perspectives that will be summarized in Table. 2. The adoption of FL can resolve many privacy-concentrated issues in IoMT, but FL does have some privacy problems. For instance, the global model updates itself based on local model data from IoMT devices. The adversary can attack and get the user information by using construction attacks [49] . Furthermore, by using an inference attack by the malicious user, the adversary can get what kind of information is being shared. This might include blood samples, type of disease and other relevant data [50] . Moreover, the detailed literature regarding intrusion attacks can be found in [51] , [52] . Thus before developing any privacy mechanism, , the nature of IoMT attacks must be considered. 1) Information leakage: The issue of information leakage by adopting a collaborative machine learning algorithm was addressed by authors in [53] . In [53] , the authors generated the attacks patterns by using generative adversary networks (GANs) against which the protection mechanism is designed. To tackle this attack, the robust FL mechanism called EaST-FLy was proposed in [54] and was verified against IoT networks. In the EaSTFLy algorithm, two different privacy protocols, such as Paillier homomorphic encryption (PHE) and Shamir's threshold secret sharing (TSS), are used to prevent the information leakage issue in FL algorithms. 2) Poisoning attack: In this kind of attack, the adversary tempered the local model updates parameters to reduce the aggregator accuracy. The authors in [55] go one step ahead and introduce two types of poisoning attack, namely, data and model poisoning. In a data poisoning attack, the training data is tempered, while model parameters are attacked in model poisoning. To tackle such type of attack, GANs based prevention mechanism was introduced in [56] . The proposed algorithm performs data auditing generated by GANS and performs comparative analysis to detect the malicious user. 3) Byzantine attack: The adversary or malicious node participation in FL shares the fake model parameters with neighbor nodes in this attack. Moreover, the attacker may reduce the convergence time and accuracy of the model by sharing false data. For this reason, Blockchain incorporated FL was presented in [57] for prevention against Byzantine type of attacks. Moreover, in [58] digital twin enabled FL was proposed, where FL even incorporated the malicious data into consideration to successfully prevent the privacy threats. In distributed FL, the model updates communicated with central servers by IoMT devices keep leaking some training data information. By initiating the differential attack, the adversary can find out whether the end devices are dedicated to a particular task or not. If so, the malicious user will get that information and use it for other purposes. The privacy prevention algorithm, composed of reinforcement learning, blockchain, and differential privacy, was presented in [59] in order to combat these attack scenarios. The privacy prevention algorithm is deployed in a central aggregator to prevent privacy leakage attacks. This attack is mostly based on data mining. During this attack, the adversary implements data mining techniques to analyze the data and get some useful information from the data. The authors in [60] adopted a privacy-preserving FL scheme to prevent such attacks, which ensured the security of the data of end devices both before and after training. Going one step further, differential privacy and homomorphic encryption-based federated gradient boost algorithm are proposed in [61] to handle these inference-based attacks. Moreover, deep neural network (DNN) was adopted to detect cyber-attacks in IoMT [62] . The major known technique that is mostly used to enhance privacy preservation in many areas is based on differential privacy. This property to prevent privacy leakage motivated many researchers to initiate working on differential privacybased FL systems for IoMT and many other major areas. One of its applications can be found in [63] , where the authors proposed a mechanism to deliberately add noise to the IoMT devices dataset to protect user private information. Moreover, a multi-dimensional incentive mechanism is designed based on cost optimization. For that purpose, three types of cost parameters are considered: computation, network communication, and privacy level cost, respectively. Through experimental analysis, it was concluded that multi-dimensional incentive mechanisms could give high accuracy by reducing training loss compared to the vanilla FL algorithm. Similarly, the work where differential privacy is adopted for federated IoMT applications can be found in [64] . In [64] , the authors proposed a methodology where stochastic gradient descent based differential privacy is used for distributed health data. To further secure private information, homomorphic encryption was adopted for aggregation. From a privacy preservation perspective, another application of differential privacy-based FL is investigated in [65] . Based on the data, two parameters are used, including the effect of drugs prescribed and mortality rate and their probability of occurrence. It has been observed from the analysis of the results that by increasing privacy, the accuracy of the training algorithm is reduced. Hence, more research is needed to devise an FL algorithm that successfully increases the privacy and accuracy of the model on available data. In vanilla FL algorithms, all the IoMT devices must participate in the training process and share their aggregation model, but in most cases, this does not occur. Due to the limited computation capability of IoMT devices and the privacy and trustworthiness of third-party platforms, IoMT devices do not show any willingness to contribute to FL approaches. To involve all the devices, incentives-based FL techniques are proposed. In a broad sense, the incentive mechanism for FL can be classified into three categories: incentive allocation based on end-device data, device participation, and resources available at end devices [66] . For designing incentive mechanisms for mobile network applications, game theory-based approaches are expected to be a good tool. Motivated by the good features of game-theoretic approaches different incentive mechanisms are proposed for FL in IoMT systems. For instance, the Stackelberg game was adopted to model the dynamic variation in end devices computation resources and stable connection between IoMT devices and central aggregator in hospital [67] . The drawback with this algorithm is that one needs complete knowledge of FL devices and networks to deploy it fully. To tackle that drawback, a deep reinforcement learning (DRL) based algorithm is presented in [68] , where DRL is responsible for allocation awards at the aggregator and selecting devices to suggest the learning model for their data. Furthermore, motivating different hospitals and companies to build the global model on the third-party server by contributing their resources to promote social welfare is an open problem. The authors in [69] find the solution to this problem by arising two questions: how hospitals allocate resources to end devices and how other agencies participating in this program will compensate for the resources used by other hospitals. In this context, the problem is treated as non-convex optimization, and distributed techniques are investigated to solve such problems. From an effective incentive mechanism perspective, it was observed in [70] that by using the Shapley value algorithm, the cost related to computing resources increases as the number of end devices and data used for training by them increases. It is now possible to find the application of digital twins (DT) in many fields, and one such application is discussed in [71] in the area of IoMT. DT is said to be the digital replica of physical process and there is continuous data and information sharing between both entities. From the IoMT perspective, through DT virtual environment containing patients can be created and the doctors can test their prescribed medication in a virtual environment before using them on real-world patients. Furthermore, the incorporation of DT in IoMT enables secure remote patient monitoring (RPM). The long short term memory (LSTM) based anomaly detection was built-in [71] and FL based DT was used for preventing adversaries from getting private information. V. APPLICATION OF FL IN SMART HEALTHCARE IOMT SYSTEMS We have discussed privacy issues in IoMT and some of the prevention techniques based on FL in IoMT. In this section, we will explore some applications of FL in IoMT. The digital information that is stored in EHR, in most cases ML algorithms are used on these records for health assessment and diagnosis. However, traditional ML techniques have privacy concerns, which could lead to sensitive data being leaked during analysis. For security purposes, the patient name is removed from health records, but this solution is not sufficient as hospitals and agencies work in collaboration to find the solution of new diseases, and they commonly share a single central server where patient data is stored. In such circumstances, FL-based techniques provide a more reliable intelligent solution to EHR management while preserving the privacy of patient data, especially where multiple cooperation data is involved. One such example was presented in [72] in which privacy and optimal resource usage-based protocol schemes were presented for FL to analyze EHR. To further enhance the privacy in local model parameters, perturbation of training data is performed to prevent memorization attacks. The main advantage of this technique is that even if the adversary can get information about perturbations in EHR, the original information will remain safe and secured. Nowadays, ML is used in many healthcare applications, such as in medical image processing. However, due to privacy concerns, many institutions avoid sharing their private data for processing. In such a case scenario, FL-based algorithms are considered to be the most viable option, as the model is trained on multiple datasets without sharing their private information. The application of FL-based image processing is found in [73] . In this paper, the authors try to develop a single image from different images of clients using FL at the global server. This process enables the building of diffusion coefficient-based images depending on different sources and classifications. Moreover, GAN is used to create raw image datasets by multiple hospitals and then share those raw imprints rather than actual images for privacy preservation. It has been observed using experimental analysis that the algorithm provides 97% accuracy on cancer datasets and outperforms other non-FL-based schemes. The application of FL for brain imaging is presented in [74] . The client has enough data related to a brain tumor as well as enough resources to train a deep neural networks (DNN) model and share updated model parameters for aggregation at the central server. However, there is a risk of leaking the model data during communication between the server and local clients. So, to counter that issue, differential privacy is adopted through which noise is added to local model updates, which ultimately reduces the risk of information leakage during parameter sharing. An incentive based reward is needed to encourage the nodes for participation in FL. FL enabled digital twin for IoMT [71] Hierarchical FL Smart healthcare devices Centralized server DT was adopted for anomaly detection in main aggreagtor server. More robust DT based model is needed to identify unseen threats for privacy preservation. There has been a worldwide pandemic caused by the spread of COVID-19, which is considered a major health threat [75] . To reduce the rapid spread of the disease, many ML-based algorithms are proposed for the early detection of COVID-19. In most cases, DNN based algorithms called convolutional neural networks (CNNs) are used for COVID-19 detection using feature extraction from a patient chest X-ray [76] . However, the collection and sharing of abundant data for designing an effective training model is a challenging task due to privacy concerns and the fact that most user may not share their medical records for analysis purposes [77] . Given these facts, FL is considered to be the most appropriate candidate for detecting COVID-19 while preserving user information. While using FL, each hospital trains their model based on locally available X-ray images and only shares gradients with a global model for computation, hence ensuring privacy preservation [78] . Moreover, authors in [79] adopted a dynamic FL algorithm, which uses a two-step process for COVID-19 diagnosis that is client participation and selection, respectively. During each iteration, the hospital decides whether to participate in training or not based on the model performance. Furthermore, the central server decides which client's model will be selected for aggregation based on updating time. In case if a global server does not receive the local model parameters at the appropriate time, then that model is excluded from global aggregation. The communication network is a crucial factor to consider when deploying FL for applications since model updates are often transmitted through it. Indeed optimal resource scheduling is very important if one wants to design an effective training model. The case scenario is more severe in the case of a smart healthcare system where a large number of IoMT devices are present. These devices share their model parameters using the uplink channel and get the aggregator model through the downlink network. Hence, a more sophisticated resource allocation algorithm is needed while considering the highly dynamic characteristics of the wireless network. The performance and importance of FL in IoMT are studied in detail by researchers in the literature. However, to properly evaluate the FL algorithm some universal standards and protocols need to be presented. For instance, to reduce the functionality of the central server, many blockchain algorithms are presented for IoMT, but no comparative analysis has been found. This is mainly due to the fact that each algorithm is deployed under a different model specification, such as dataset and application-specific [80] . In real-world applications, the data available by each client is unique; that is, it might be in different forms like images, video, or text, and they will be showing different information like blood type and sugar level, etc. More probably, all the FL privacy preserved algorithms are designed in such a manner that the clients will have a dataset containing almost the same features [64] , [65] . Given such circumstances, a more robust heterogeneous FL mechanism is needed where clients having different specific datasets take part in sharing their local model, and the global aggregator can incorporate this dynamic model data by using ensemble learning algorithms [81] . Even though the full potential of a 5G network is yet to be recognized by the world, many professionals are working on the deployment and development of a 6G wireless network [82] . The adoption of the 6G network can be used in many industrial application sectors ranging from Industry 5.0 to body area networks. In a 6G network, the data generation and collection will be abundant. In such scenarios, the performance parameters of FL caused by 5G/6G networks and their application to the healthcare system are considered as an open research problem. Despite the many potential applications of smart healthcare systems, their deployment in the real world is limited due to the lack of privacy protection. For this specific purpose, FL is considered to be a viable option as FL operates in a collaborative fashion and provides privacy to user information. However, given the fact of the importance of FL, a limited comprehensive survey regarding FL application in IoMT is available. In this paper, we have conducted a detailed survey about FL applications for privacy preservation in IoMT networks. Firstly, we have described privacy issues in IoMT and performed an analysis of available privacy preservation techniques based on conventional ML algorithms. Then, we have provided the motivations and different robust architectures of FL algorithms for privacy preservation in IoMT networks. Taking it one step further, we have introduced how the performance of FL algorithms can be enhanced using DRL, DNN, and GANs in FL architectures. In the end, we have presented some real-time application and research directions related to FL that can be addressed to further improve the performance of FL from a privacy perspective. Trustworthy and intelligent covid-19 diagnostic iomt through xr and deep-learning-based clinic data access Artificial intelligence and internet of things enabled disease diagnosis model for smart healthcare systems Sdn-enabled energy-efficient routing optimization framework for industrial internet of things A federated learning framework for healthcare iot devices Federated learning in medicine: facilitating multi-institutional collaborations without sharing patient data Federated learning for industrial internet of things in future industries Federated learning for internet of things: Recent advances, taxonomy, and open challenges Federated learning for healthcare informatics Fusion of federated learning and industrial internet of things: A survey The future of digital health with federated learning Iot privacy and security: Challenges and solutions Towards a gatewaybased context-aware and self-adaptive security management model for iot-based ehealth systems A survey on privacy and security of internet of things Review of security and privacy for the internet of medical things (iomt) A comprehensive survey of the internet of things (iot) and ai-based smart healthcare Cardiovascular disease prevention in adolescents: ehealth, co-creation, and advocacy Securing insulin pump system using deep learning and gesture recognition Enabling identity management and privacy in a global context: Iso/iec standardization in jtc 1/sc 27/wg 5 Proposal for a privacy impact assessment manual conforming to iso/iec 29134: 2017 Preserving contextual-privacy for smart home iot devices with dynamic traffic shaping Security, privacy, and ownership issues with the use of wearable health technologies Privacy guidelines for internet of things: a cheat sheet Smart insole-based indoor localization system for internet of things applications A dual privacy preserving scheme in continuous location-based services Preliminary study about advantageous trajectory anonymization methods based on population A novel attack to spatial cloaking schemes in location-based services A novel model for preserving location privacy in internet of things A location cloaking algorithm based on combinatorial optimization for locationbased services in 5g networks A unified federated learning framework for wireless communications: Towards privacy, efficiency, and security Bubbles of trust: A decentralized blockchain-based authentication system for iot Proof of authentication: Iot-friendly blockchains Rdtids: Rules and decision tree-based intrusion detection system for internet-of-things networks Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study Vertical federated learning based privacy-preserving cooperative sensing in cognitive radio networks Communication-efficient learning of deep networks from decentralized data Blockchainbased asynchronous federated learning for internet of things Privacy threat and defense for federated learning with non-iid data in aiot Integration of blockchain and federated learning for internet of things: Recent advances and future challenges Energy efficient federated learning over wireless communication networks Low-latency federated learning and blockchain for edge association in digital twin empowered 6g networks Federated learning for mobile keyboard prediction Blockchain-federated-learning and deep learning models for covid-19 detection using ct imaging Trustfed: A framework for fair and trustworthy cross-device federated learning in iiot Federated deep learning for cyber security in the internet of things: Concepts, applications, and experimental analysis Federated learning for smart healthcare: A survey Achieving searchable and privacy-preserving data sharing for cloud-assisted e-healthcare system An openncp-based solution for secure ehealth data exchange Federated learning for edge networks: Resource optimization and incentive mechanism Deep leakage from gradients Machine learning with membership privacy using adversarial regularization Federated learning for intrusion detection system: Concepts, challenges and future directions Experience driven attack design and federated learning based intrusion detection in industry 4.0 Deep models under the gan: information leakage from collaborative deep learning Eastfly: Efficient and secure ternary federated learning Toward smart security enhancement of federated learning networks Detecting and mitigating poisoning attacks in federated learning using generative adversarial networks Ai at the edge: Blockchain-empowered secure multiparty learning with heterogeneous models Adaptive federated learning and digital twin for industrial internet of things Learning in the air: Secure federated learning for uav-assisted crowdsensing Efficient and privacy-enhanced federated learning for industrial artificial intelligence Boosting privately: Federated extreme gradient boosting for mobile crowdsensing An effective feature engineering for dnn using hybrid pca-gwo for intrusion detection in iomt architecture Incentivizing differentially private federated learning: A multidimensional contract approach Efficient client contribution evaluation for horizontal federated learning Differential privacy-enabled federated learning for sensitive health data A survey of incentive mechanism design for federated learning Motivating workers in federated learning: A stackelberg game perspective A learning-based incentive mechanism for federated learning An incentive mechanism for cross-silo federated learning: A public goods perspective Efficient client contribution evaluation for horizontal federated learning Hierarchical federated learning based anomaly detection using digital twins for smart healthcare Privacy-aware and resourcesaving collaborative learning for healthcare in cloud computing Variationaware federated learning with multi-source decentralized medical image data Privacy-preserving federated brain tumour segmentation Blockchain and ai-based solutions to combat coronavirus (covid-19)-like epidemics: A survey Artificial intelligence (ai) and big data for coronavirus (covid-19) pandemic: A survey on the state-of-the-arts Within the lack of chest covid-19 x-ray dataset: a novel detection model based on gan and deep transfer learning Blockchain-federated-learning and deep learning models for covid-19 detection using ct imaging Dynamic-fusion-based federated learning for covid-19 detection White paper-ieee federated machine learning Capc learning: Confidential and private collaborative learning Survey on 6g frontiers: Trends, applications, requirements, technologies and future research