Secure Healthcare Model Using Multi-Step Deep Q Learning Network in Internet of Things

被引:5
作者
Roy, Patibandla Pavithra [1 ]
Teju, Ventrapragada [1 ]
Kandula, Srinivasa Rao [1 ]
Sowmya, Kambhampati Venkata [2 ]
Stan, Anca Ioana [3 ]
Stan, Ovidiu Petru [4 ,5 ]
机构
[1] Dhanekula Inst Engn & Technol, Dept Elect & Commun Engn, Vijayawada 521139, India
[2] Koneru Lakshmaiah Educ Fdn, Dept Elect & Commun Engn, Vaddeswaram 522302, India
[3] Tech Univ Cluj Napoca, Fac Ind Engn Robot & Prod Management, Cluj Napoca 400114, Romania
[4] Univ Madeira Colegio Jesuitas, OSEAN Outermost Reg Sustainable Ecosyst Entreprene, P-9000082 Funchal, Portugal
[5] Tech Univ Cluj Napoca, Fac Automat & Comp Sci, Cluj Napoca 400114, Romania
关键词
deep learning network; distributed denial of service attack; healthcare system; internet of things; malware attacks; multi-step deep Q learning network; IOT; AUTHENTICATION; SYSTEM;
D O I
10.3390/electronics13030669
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) is an emerging networking technology that connects both living and non-living objects globally. In an era where IoT is increasingly integrated into various industries, including healthcare, it plays a pivotal role in simplifying the process of monitoring and identifying diseases for patients and healthcare professionals. In IoT-based systems, safeguarding healthcare data is of the utmost importance, to prevent unauthorized access and intermediary assaults. The motivation for this research lies in addressing the growing security concerns within healthcare IoT. In this proposed paper, we combine the Multi-Step Deep Q Learning Network (MSDQN) with the Deep Learning Network (DLN) to enhance the privacy and security of healthcare data. The DLN is employed in the authentication process to identify authenticated IoT devices and prevent intermediate attacks between them. The MSDQN, on the other hand, is harnessed to detect and counteract malware attacks and Distributed Denial of Service (DDoS) attacks during data transmission between various locations. Our proposed method's performance is assessed based on such parameters as energy consumption, throughput, lifetime, accuracy, and Mean Square Error (MSE). Further, we have compared the effectiveness of our approach with an existing method, specifically, Learning-based Deep Q Network (LDQN).
引用
收藏
页数:11
相关论文
共 37 条
[1]   Secure Edge of Things for Smart Healthcare Surveillance Framework [J].
Alabdulatif, Abdulatif ;
Khalil, Ibrahim ;
Yi, Xun ;
Guizani, Mohsen .
IEEE ACCESS, 2019, 7 :31010-31021
[2]   Enhancing speed of SIMON: A light-weight-cryptographic algorithm for IoT applications [J].
Alassaf, Norah ;
Gutub, Adnan ;
Parah, Shabir A. ;
Al Ghamdi, Manal .
MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (23) :32633-32657
[3]   A Novel Approach for Improving the Security of IoT-Medical Data Systems Using an Enhanced Dynamic Bayesian Network [J].
Almaiah, Mohammed Amin ;
Yelisetti, Sandeep ;
Arya, Leena ;
Babu Christopher, Nelson Kennedy ;
Kaliappan, Kumaresan ;
Vellaisamy, Pandimurugan ;
Hajjej, Fahima ;
Alkdour, Tayseer .
ELECTRONICS, 2023, 12 (20)
[4]   Secure mutual authentication and automated access control for IoT smart home using cumulative Keyed-hash chain [J].
Alshahrani, Mohammed ;
Traore, Issa .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 45 :156-175
[5]   Lightweight Privacy-Preserving Remote User Authentication and Key Agreement Protocol for Next-Generation IoT-Based Smart Healthcare [J].
Ashraf, Zeeshan ;
Mahmood, Zahid ;
Iqbal, Muddesar .
FUTURE INTERNET, 2023, 15 (12)
[6]   An Authentic-Based Privacy Preservation Protocol for Smart e-Healthcare Systems in IoT [J].
Deebak, B. D. ;
Al-Turjman, Fadi ;
Aloqaily, Moayad ;
Alfandi, Omar .
IEEE ACCESS, 2019, 7 :135632-135649
[7]   Multi-factor user authentication scheme for IoT-based healthcare services [J].
Dhillon P.K. ;
Kalra S. .
Dhillon, Parwinder Kaur (parwindhillon@gmail.com), 2018, Springer Science and Business Media Deutschland GmbH (04) :141-160
[8]   Effective IoT-based deep learning platform for online fault diagnosis of power transformers against cyberattacks and data uncertainties [J].
Elsisi, Mahmoud ;
Minh-Quang Tran ;
Mahmoud, Karar ;
Mansour, Diaa-Eldin A. ;
Lehtonen, Matti ;
Darwish, Mohamed M. F. .
MEASUREMENT, 2022, 190
[9]   Development of an IoT Architecture Based on a Deep Neural Network against Cyber Attacks for Automated Guided Vehicles [J].
Elsisi, Mahmoud ;
Tran, Minh-Quang .
SENSORS, 2021, 21 (24)
[10]   Towards Secured Online Monitoring for Digitalized GIS Against Cyber-Attacks Based on IoT and Machine Learning [J].
Elsisi, Mahmoud ;
Tran, Minh-Quang ;
Mahmoud, Karar ;
Mansour, Diaa-Eldin A. ;
Lehtonen, Matti ;
Darwish, Mohamed M. F. .
IEEE ACCESS, 2021, 9 :78415-78427