Security as a solution: An intrusion detection system using a neural network for IoT enabled healthcare ecosystem

被引:9
作者
Jain A. [1 ]
Singh T. [2 ]
Sharma S.K. [3 ]
机构
[1] AIIT, Amity University, Noida
[2] ASET, Amity University, Noida
[3] Modern Institute of Technology & Research Center, Alwar
关键词
Artificial neural network (ANN); Healthcare; Intrusion detection system (IDS); IoT; IoT ecosystem; IoT security; Machine learning (ML); Network slicing; Software defined network (SDN);
D O I
10.28945/4838
中图分类号
学科分类号
摘要
Aim/Purpose The primary purpose of this study is to provide a cost-effective and artificial intelligence enabled security solution for IoT enabled healthcare ecosystem. It helps to implement, improve, and add new attributes to healthcare services. The paper aims to develop a method based on an artificial neural network technique to predict suspicious devices based on bandwidth usage. Background COVID has made it mandatory to make medical services available online to every remote place. However, services in the healthcare ecosystem require fast, uninterrupted facilities while securing the data flowing through them. The solution in this paper addresses both the security and uninterrupted services issue. This paper proposes a neural network based solution to detect and disable suspicious devices without interrupting critical and life-saving services. Methodology This paper is an advancement on our previous research, where we performed manual knowledge-based intrusion detection. In this research, all the experiments were executed in the healthcare domain. The mobility pattern of the devices was divided into six parts, and each one is assigned a dedicated slice. The security module regularly monitored all the clients connected to slices, and machine learning was used to detect and disable the problematic or suspicious devices. We have used MATLAB’s neural network to train the dataset and automatically detect and disable suspicious devices. The different network architectures and different training algorithms (Levenberg–Marquardt and Bayesian Framework) in MATLAB software have attempted to achieve more precise values with different properties. Five iterations of training were executed and compared to get the best result of R=99971. We configured the application to handle the four most applicable use cases. We also performed an experimental application simulation for the assessment and validation of predictions. Contribution This paper provides a security solution for the IoT enabled healthcare system. The architectures discussed suggest an end-to-end solution on the sliced network. Efficient use of artificial neural networks detects and block suspicious devices. Moreover, the solution can be modified, configured and deployed in many other ecosystems like home automation. Findings This simulation is a subset of the more extensive simulation previously performed on the sliced network to enhance its security. This paper trained the data using a neural network to make the application intelligent and robust. This enhancement helps detect suspicious devices and isolate them before any harm is caused on the network. The solution works both for an intrusion detection and prevention system by detecting and blocking them from using network resources. The result concludes that using multiple hidden layers and a non-linear transfer function, logsig improved the learning and results. Recommendations Everything from offices, schools, colleges, and e-consultation is currently for Practitioners happening remotely. It has caused extensive pressure on the network where the data flowing through it has increased multifold. Therefore, it becomes our joint responsibility to provide a cost-effective and sustainable security solution for IoT enabled healthcare services. Practitioners can efficiently use this affordable solution compared to the expensive security options available in the commercial market and deploy it over a sliced network. The solution can be implemented by NGOs and federal governments to provide secure and affordable healthcare monitoring services to patients in remote locations. Recommendations Research can take this solution to the next level by integrating artificial intellifor Researchers gence into all the modules. They can augment this solution by making it compatible with the federal government’s data privacy laws. Authentication and encryption modules can be integrated to enhance it further. Impact on Society COVID has given massive exposure to the healthcare sector since last year. With everything online, data security and privacy is the next most significant concern. This research can be of great support to those working for the security of health care services. This paper provides “Security as a Solution”, which can enhance the security of an otherwise less secure ecosystem. The healthcare use cases discussed in this paper address the most common security issues in the IoT enabled healthcare ecosystem. Future Research We can enhance this application by including data privacy modules like authentication and authorisation, data encryption and help to abide by the federal privacy laws. In addition, machine learning and artificial intelligence can be extended to other modules of this application. Moreover, this experiment can be easily applicable to many other domains like e-homes, e-offices and many others. For example, e-homes can have devices like kitchen equipment, rooms, dining, cars, bicycles, and smartwatches. Therefore, one can use this application to monitor these devices and detect any suspicious activity. © 2021 Informing Science Institute. All rights reserved.
引用
收藏
页码:331 / 369
页数:38
相关论文
共 57 条
  • [1] Adams C., Impersonation attack, Encyclopedia of cryptography and security, (2005)
  • [2] Alomari M. H., Younis O., Hayajneh S. M. A., A predictive model for solar photovoltaic power using the Levenberg-Marquardt and Bayesian Regularisation algorithms and real-time weather data, International Journal of Advanced Computer Science and Applications, 9, 1, pp. 347-353, (2018)
  • [3] Defining staffing: Workforce management patient classification and security system, (2017)
  • [4] Andrews J. G., Buzzi S., Choi W., Hanly S. V., Lozano A., Soong A. C. K., Zhang J. C., What will 5G be?, IEEE Journal on Selected Areas in Communications, 32, 6, pp. 1065-1082, (2014)
  • [5] Ansari A., Mohaghegh SD., Shahnam M., Dietiker J-F., Modeling average pressure and volume fraction of a fluidised bed using data-driven smart proxy, Fluids, 4, 3, (2019)
  • [6] Barakabitze A. A., Ahmad A., Mijumbi R., Hines A., 5G network slicing using SDN and NFV: A survey of taxonomy, architectures and future challenges, Computer Networks, 167, (2020)
  • [7] Barakabitze A. A., Barman N., Ahmad A., Zadtootaghaj S., Sun L., Martini M., Atzori L., QoE management of multimedia streaming services in future networks: A tutorial and survey, IEEE Communications Surveys & Tutorials, 22, 1, pp. 526-565, (2020)
  • [8] Casas P., Fiadino P., D'Alconzo A., Machine-learning based approaches for anomaly detection and classification in cellular networks, 8th Traffic Monitoring and Analysis Workshop, (2016)
  • [9] Health Insurance Portability and Accountability Act of 1996 (HIPAA), (2018)
  • [10] Chacko A., Hayajneh T., Security and privacy issues with IoT in healthcare, Pervasive Health and Technology, 18, 14, (2018)