1887
2 - Qatar Health 2021 Conference abstracts
  • ISSN: 1999-7086
  • EISSN: 1999-7094

Abstract

IoMT (Internet of Medical Things) devices (often referred to IoMT domain) have the potential to quickly diagnose and monitor patients outside the hospital by transmitting information through the cloud domain using wireless communication to remotely located medical professionals (user domain). Figure 1 shows the proposed IoMT framework designed to improve the privacy and security of the healthcare infrastructure. The framework consists of four modules:

1. Intrusion Detection System (IDS)1 using deep learning (DL) to identify bluetooth-based Denial-of-Service (DoS)-attacks on IoMT devices and is deployed on edge-computing to secure communication between IoMT and edge.

2. IDS1 is backed up with identity-based cryptography to encrypt the data and communication path.

3. Besides the identity-management system (to authenticate users), it is modeled with aliveness detection using face authentication techniques at the edge to guarantee the confidentiality, integrity, and availability (CIA) of the framework.

4. At the cloud level, another IDS2 using MUSE (Merged-Hierarchical-Deep-Learning-System-with-Layer-Reuse) is proposed to protect the system against Man-In-The-Middle attacks, while the data is transferred between IoMT-EDGE-CLOUD. These four modules are developed independently by precisely analyzing dependencies. The performance of IDS3 in terms of precision is 99% and for the identity-management system, the time required to encrypt and decrypt 256-bit key is 66 milliseconds and 220 milliseconds respectively. The true positive rate is 90.1%, which suggests real-time detection and authentication rate. IDS (2) using MUSE (12-layer) the accuracy is >95%, and it consumes 15.7% to 27.63% less time to train than the smaller four-layer model. Our designed models suit edge devices and cloud-based cybersecurity systems and support the fast diagnosis and care required by critically ill patients in the community.

Loading

Article metrics loading...

/content/journals/10.5339/jemtac.2021.qhc.41
2021-09-21
2024-04-25
Loading full text...

Full text loading...

/deliver/fulltext/jemtac/2021/2/jemtac.2021.qhc.41.html?itemId=/content/journals/10.5339/jemtac.2021.qhc.41&mimeType=html&fmt=ahah

References

  1. Zubair M, Unal D, Al-Ali A, Shikfa A. Exploiting Bluetooth Vulnerabilities in e-Health IoT Devices. In: Proceedings of the 3rd International Conference on Future Networks and Distributed Systems; 2019 Jul 1; pp. 1–7.
    [Google Scholar]
  2. Hady AA, Ghubaish A, Salman T, Unal D, Jain R. Intrusion Detection System for Healthcare Systems Using Medical and Network Data: A Comparison Study. IEEE Access. 2020;8:106576–84.
    [Google Scholar]
  3. Salman T, Ghubaish A, Unal D, Jain R. Safety Score as an Evaluation Metric for Machine Learning Models of Security Applications. IEEE Networking Letters. 2020; 2:(4): 207–211.
    [Google Scholar]
http://instance.metastore.ingenta.com/content/journals/10.5339/jemtac.2021.qhc.41
Loading
/content/journals/10.5339/jemtac.2021.qhc.41
Loading

Data & Media loading...

This is a required field
Please enter a valid email address
Approval was a Success
Invalid data
An Error Occurred
Approval was partially successful, following selected items could not be processed due to error