Cogni-Sec: A secure cognitive enabled distributed reinforcement learning model for medical cyber-physical system

被引:9
作者
Mishra, Sushruta [1 ]
Chakraborty, Soham [1 ]
Sahoo, Kshira Sagar [2 ]
Bilal, Muhammad [3 ]
机构
[1] Kalinga Inst Ind Technol Deemed Univ, Sch Comp Engn, Bhubaneswar, Odisha, India
[2] Umea Univ, Dept Comp Sci, S-90187 Umea, Sweden
[3] Univ Lancaster, Sch Comp & Commun, Lancaster LA1 4WA, England
关键词
Medical cyber-physical system; Blockchain; Cognitive mining; Reinforcement learning; Distributed learning; ACCESS; SEARCH;
D O I
10.1016/j.iot.2023.100978
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The advent of the Internet of Things (IoT) has resulted in significant technical development in the healthcare sector, enabling the establishment of Medical Cyber-Physical Systems (MCPS). The increased number of MCPS generates a massive amount of privacy-sensitive data, hence it is important to enhance the security of devices and data transmission in MCPS. Earlier several research studies were undertaken in order to enhance security in healthcare, but none of them could adapt to changing behaviors of data attacks. Here the role of blockchain and Reinforcement Learning (RL) comes into play since it can adjust itself to the nature of changing attacks, thus preventing any kind of attacks. This work proposes a solution, named Cogni-Sec, which employs a decentralized cognitive blockchain and Reinforcement Learning architecture and addresses the security issue. Blockchain is incorporated in the approach for data storage and transmission to increase the degree of security in the MCPS modules. Hyperledger Fabric is applied as the blockchain base which shows transaction query results with nearly 10% increased throughput, 69% less memory consumption, and 15% lower CPU usage when compared to Ethereum. Further security risk at the block mining level within a blockchain network is reduced by introducing distributed Reinforcement Learning architecture in replacement for the miner nodes, which imitates the cognitive behavior of miners in a distributed environment. Different multi-agent learning systems have been evaluated for building the mining agent. Among these, the a3c agent in distributed learning setup yields the optimum cumulative reward with a median value of 54.5 and minimizes the maximum number of data threats.
引用
收藏
页数:16
相关论文
共 48 条
[1]  
Abdmeziem M.R., 2014, INT C AD HOC NETW WI, P35
[2]  
Agarwal N., 2021, Smart Innovations in Communication and Computational Sciences, V1168, P145
[3]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[4]   Privacy Preserving String Matching for Cloud Computing [J].
Bezawada, Bruhadeshwar ;
Liu, Alex X. ;
Jayaraman, Bargav ;
Wang, Ann L. ;
Li, Rui .
2015 IEEE 35TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, 2015, :609-618
[5]   Secure Distribution of Protected Content in Information-Centric Networking [J].
Bilal, Muhammad ;
Pack, Sangheon .
IEEE SYSTEMS JOURNAL, 2020, 14 (02) :1921-1932
[6]   A secure key agreement protocol for dynamic group [J].
Bilal, Muhammad ;
Kang, Shin-Gak .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2017, 20 (03) :2779-2792
[7]   An Authentication Protocol for Future Sensor Networks [J].
Bilal, Muhammad ;
Kang, Shin-Gak .
SENSORS, 2017, 17 (05)
[8]  
Blockchain, 2022, About us
[9]  
Blockchain, 2021, Definition and use cases
[10]   Using statistical and machine learning to help institutions detect suspicious access to electronic health records [J].
Boxwala, Aziz A. ;
Kim, Jihoon ;
Grillo, Janice M. ;
Ohno-Machado, Lucila .
JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION, 2011, 18 (04) :498-505