A multi-parametric machine learning approach using authentication trees for the healthcare industry

被引:6
作者
Abunadi, Ibrahim [1 ]
Rehman, Amjad [1 ]
Haseeb, Khalid [1 ,2 ]
Alam, Teg [3 ,4 ]
Jeon, Gwanggil [1 ,5 ,6 ,7 ]
机构
[1] CCIS Prince Sultan Univ, Artificial Intelligence & Data Analyt Lab AIDA, Riyadh, Saudi Arabia
[2] Islamia Coll Peshawar, Dept Comp Sci, Peshawar, Pakistan
[3] Prince Sattam Bin Abdulaziz Univ, Coll Engn, Dept Ind Engn, Al Kharj, Saudi Arabia
[4] Azad Inst Engn & Technol, Azad puram,Chandrawal via Bangla Bazar & Bijnour,N, Lucknow, India
[5] Incheon Natl Univ, Dept Embedded Syst Engn, Incheon, South Korea
[6] CCIS Prince Sultan Univ, Incheon, South Korea
[7] Incheon Natl Univ, Incheon, South Korea
关键词
data distribution; health risks; healthcare industry; internet of things; machine learning; multi-parametric analysis; security; INTERNET; MODEL;
D O I
10.1111/exsy.13202
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Internet of Health Things (IoHT) has grown in importance for developing medical applications with the support of wireless communication systems. IoHT is integrated with many sensors to capture the patients' records and transmits them to hospital centres for analysis and reporting. Controlling and managing health records has been addressed in several ways, however, it is noted that two key research problems for vital communication systems are reliability and reducing data loss. To enhance the sustainability of health applications and effectively use the network infrastructure when transferring sensitive data, this research provides a machine learning approach. Moreover, data collected from the IoHTs are protected and can be securely received for physical process in hospitals using authentication trees. Firstly, the undirected graphs are explored based on the multi-parametric machine learning approach to minimize the computation overheads and traffic congestion. Secondly, it evaluates the nodes' level behaviour over the heterogeneous traffic load with efficient identification of redundant links. Finally, in-depth analysis and simulation results have shown that the proposed protocol is more effective than existing approaches for data accuracy and security analysis.
引用
收藏
页数:12
相关论文
共 31 条
[21]  
Nguyen DH, 2017, IEEE ICC
[22]   The Future of Healthcare Internet of Things: A Survey of Emerging Technologies [J].
Qadri, Yazdan Ahmad ;
Nauman, Ali ;
Bin Zikria, Yousaf ;
Vasilakos, Athanasios V. ;
Kim, Sung Won .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (02) :1121-1167
[23]   Sustainability Model for the Internet of Health Things (IoHT) Using Reinforcement Learning with Mobile Edge Secured Services [J].
Rehman, Amjad ;
Saba, Tanzila ;
Haseeb, Khalid ;
Alam, Teg ;
Lloret, Jaime .
SUSTAINABILITY, 2022, 14 (19)
[24]   Energy-Efficient IoT e-Health Using Artificial Intelligence Model with Homomorphic Secret Sharing [J].
Rehman, Amjad ;
Saba, Tanzila ;
Haseeb, Khalid ;
Marie-Sainte, Souad Larabi ;
Lloret, Jaime .
ENERGIES, 2021, 14 (19)
[25]  
Saba T, 2020, J INFECT PUBLIC HEAL, V13, P1567, DOI [10.1016/j.ijph.2020.06.027, 10.1016/j.jiph.2020.06.027]
[26]   Challenges and opportunities in IoT healthcare systems: a systematic review [J].
Selvaraj, Sureshkumar ;
Sundaravaradhan, Suresh .
SN APPLIED SCIENCES, 2020, 2 (01)
[27]  
Stergiou C., 2020, HDB COMPUTER NETWORK, P525
[28]   Recent advances delivered by Mobile Cloud Computing and Internet of Things for Big Data applications: a survey [J].
Stergiou, Christos ;
Psannis, Kostas E. .
INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2017, 27 (03)
[29]  
Verma P., 2020, Internet of Things use cases for the healthcare industry, P241
[30]   Medical data fusion algorithm based on Internet of things [J].
Zhang, Weiping ;
Yang, Jingzhi ;
Su, Hang ;
Kumar, Mohit ;
Mao, Yihua .
PERSONAL AND UBIQUITOUS COMPUTING, 2018, 22 (5-6) :895-902