1887
2 - Qatar Health 2021 Conference abstracts
  • ISSN: 1999-7086
  • E-ISSN: 1999-7094

ملخص

IoMT (Internet of Medical Things) devices (often referred to IoMT domain) have the potential to quickly diagnose and monitor patients outside the hospital by transmitting information through the cloud domain using wireless communication to remotely located medical professionals (user domain). Figure 1 shows the proposed IoMT framework designed to improve the privacy and security of the healthcare infrastructure. The framework consists of four modules:

1. Intrusion Detection System (IDS)1 using deep learning (DL) to identify bluetooth-based Denial-of-Service (DoS)-attacks on IoMT devices and is deployed on edge-computing to secure communication between IoMT and edge.

2. IDS1 is backed up with identity-based cryptography to encrypt the data and communication path.

3. Besides the identity-management system (to authenticate users), it is modeled with aliveness detection using face authentication techniques at the edge to guarantee the confidentiality, integrity, and availability (CIA) of the framework.

4. At the cloud level, another IDS2 using MUSE (Merged-Hierarchical-Deep-Learning-System-with-Layer-Reuse) is proposed to protect the system against Man-In-The-Middle attacks, while the data is transferred between IoMT-EDGE-CLOUD. These four modules are developed independently by precisely analyzing dependencies. The performance of IDS3 in terms of precision is 99% and for the identity-management system, the time required to encrypt and decrypt 256-bit key is 66 milliseconds and 220 milliseconds respectively. The true positive rate is 90.1%, which suggests real-time detection and authentication rate. IDS (2) using MUSE (12-layer) the accuracy is >95%, and it consumes 15.7% to 27.63% less time to train than the smaller four-layer model. Our designed models suit edge devices and cloud-based cybersecurity systems and support the fast diagnosis and care required by critically ill patients in the community.

Loading

جارٍ تحميل قياسات المقالة...

/content/journals/10.5339/jemtac.2021.qhc.41
٢٠٢١-٠٩-٢١
٢٠٢٤-٠٧-٠٤
Loading full text...

Full text loading...

/deliver/fulltext/jemtac/2021/2/jemtac.2021.qhc.41.html?itemId=/content/journals/10.5339/jemtac.2021.qhc.41&mimeType=html&fmt=ahah

References

  1. Zubair M, Unal D, Al-Ali A, Shikfa A. Exploiting Bluetooth Vulnerabilities in e-Health IoT Devices. In: Proceedings of the 3rd International Conference on Future Networks and Distributed Systems; 2019 Jul 1; pp. 1–7.
    [Google الباحث العلمي]
  2. Hady AA, Ghubaish A, Salman T, Unal D, Jain R. Intrusion Detection System for Healthcare Systems Using Medical and Network Data: A Comparison Study. IEEE Access. 2020;8:106576–84.
    [Google الباحث العلمي]
  3. Salman T, Ghubaish A, Unal D, Jain R. Safety Score as an Evaluation Metric for Machine Learning Models of Security Applications. IEEE Networking Letters. 2020; 2:(4): 207–211.
    [Google الباحث العلمي]
/content/journals/10.5339/jemtac.2021.qhc.41
Loading
/content/journals/10.5339/jemtac.2021.qhc.41
Loading

جارٍ تحميل البيانات والوسائط...

  • نوع المستند: Conference Abstract
الموضوعات الرئيسية data securitydeep learninginternet of medical thingsintrusion detection system and user authentication

الأكثر اقتباسًا لهذا الشهر Most Cited RSS feed

هذه الخانة مطلوبة
يُرجى إدخال عنوان بريد إلكتروني صالح
Approval was a Success
Invalid data
An Error Occurred
Approval was partially successful, following selected items could not be processed due to error