Secure Healthcare Monitoring and Attack Detection Framework using ELUS-BILSTM and STECAES

##plugins.themes.academic_pro.article.main##

Y. Jani
P. Raajan

Abstract

The patterns of providing health-centric services have transformed extremely with the enhancement along with innovations in mobile and wireless communication technologies subsuming the Internet of Things (IoT). Due to the rapidly increasing attack, the doctors were not provided with an accurate alerting mechanism by the prevailing health monitoring system. Thus, by utilizing the Exponential Linear activation Units-centred Bidirectional Long Short Term Memory (ELUS-BiLSTM) technique, a novel healthcare monitoring along with an attack detection system is proposed in this work. Attack detection, Data security, and Patient health monitoring are the three primary phases incorporated in the proposed methodology. Initially, from the patient, the data are collected, and then the features are extracted in the attack detection phase. Next, the features being extracted are inputted to the ELUS-BiLSTM classifier where the data is classified as attacked or non-attacked data. After that, by utilizing Skew Tent Elliptic Curve Advanced Encryption Standard (STECAES), the non-attacked data is encrypted whereas the attacked data is stored in the log file. Lastly, to generate the fuzzy rules, the encrypted data is utilized; subsequently, the alert message is sent to the doctor. The experiential outcomes displayed that when analogized with the prevailing methodologies, the proposed model obtained better outcomes.

##plugins.themes.academic_pro.article.details##

How to Cite
Jani, Y., & P. Raajan. (2024). Secure Healthcare Monitoring and Attack Detection Framework using ELUS-BILSTM and STECAES. International Journal of Next-Generation Computing, 15(3). https://doi.org/10.47164/ijngc.v15i3.1545

References

  1. Ahmad Ali AlZubi, Mohammed Al-Maitah and Abdulaziz Alarifi, “Cyber attack detection in healthcare using cyber physical system and machine learning techniques”, Soft Computing, vol. 25, no. 18, pp. 12319-12332, 2021. DOI: https://doi.org/10.1007/s00500-021-05926-8
  2. Ahmed Yar Khan, Rabia Latif, Seemab Latif, Shahzaib Tahir, Gohar Batool and Tanzila Saba, “Malicious insider attack detection in IoTs using data analytics”, IEEE Access, vol. 8, pp. 11743-11753, 2019. DOI: https://doi.org/10.1109/ACCESS.2019.2959047
  3. Alrowais, Fadwa, Heba G. Mohamed, Fahd N. Al-Wesabi, Mesfer Al Duhayyim, Anwer Mustafa Hilal, and Abdelwahed Motwakel. ”Cyber attack detection in healthcare data using cyberphysical system with optimized algorithm.” Computers and Electrical Engineering 108 (2023): 108636. DOI: https://doi.org/10.1016/j.compeleceng.2023.108636
  4. Amir Aminifar, “Minimal adversarial perturbations in mobile health applications the epileptic brain activity case study”, International Conference on Acoustics, Speech and Signal Processing, IEEE, 04-08 May 2020, Barcelona, Spain, 2020. DOI: https://doi.org/10.1109/ICASSP40776.2020.9053706
  5. Anar A Hady, Ali Ghubaish, Tara Salman, Devrim Unal and Raj Jain, “Intrusion detection system for healthcare systems using medical and network data a comparison study”, IEEE Access, vol. 8, pp. 106576-106584, 2020. DOI: https://doi.org/10.1109/ACCESS.2020.3000421
  6. Andrea Agiollo, Mauro Conti, Pallavi Kaliyar, Tsung-Nan Lin and Luca Pajola, “DETONAR detection of routing attacks in RPL based IoT”, IEEE Transactions on Network and Service Management, vol. 18, no. 2, pp. 1178-1190, 2021. DOI: https://doi.org/10.1109/TNSM.2021.3075496
  7. Anuradha M, Jayasankar T, Prakash N. B, Mohamed Yacin Sikkandar , Hemalakshmi G. R, Bharatiraja C and Sagai Francis Britto A, “IoT enabled cancer prediction system to enhance the authentication and security using cloud computing”, Microprocessors and Microsystems, vol. 80, pp. 1-22, 2020. DOI: https://doi.org/10.1016/j.micpro.2020.103301
  8. Ashish Singh and Kakali Chatterjee, “Securing smart healthcare system with edge computing”, Computers and Security, vol. 108, no. 1, pp. 1-23, 2021. DOI: https://doi.org/10.1016/j.cose.2021.102353
  9. Asmae Bengag, Omar Moussaoui and Mimoun Moussaoui, “A new IDS for detecting jamming attacks in WBAN”, 3rd International Conference on Intelligent Computing in Data Sciences, IEEE, 28-30 October 2019, Marrakech, Morocco, 2019. DOI: https://doi.org/10.1109/ICDS47004.2019.8942268
  10. Bander A Alzahrani, “Secure and efficient cloud based IoT authenticated key agreement scheme for e-health wireless sensor networks”, Arabian Journal for Science and Engineering, vol. 46, no. 4, pp. 3017-3032, 2020. DOI: https://doi.org/10.1007/s13369-020-04905-9
  11. Chidambaranathan, S., and R. Geetha. ”Deep learning enabled blockchain based electronic heathcare data attack detection for smart health systems.” Measurement: Sensors (2023): 100959. DOI: https://doi.org/10.1016/j.measen.2023.100959
  12. Ege Ciklabakkal, Ataberk Donmez, Mert Erdemir, Emre Suren, Mert Kaan Yilmaz and Pelin Angin, “ARTEMIS an intrusion detection system for MQTT attacks in internet of things”, 38th Symposium on Reliable Distributed Systems, IEEE, 1-4 October 2019, Lyton, France, 2019. DOI: https://doi.org/10.1109/SRDS47363.2019.00053
  13. Fariz Andri Bakhtiar, Eko Sakti Pramukantoro and Hilman Nihri, “A lightweight IDS based on J48 algorithm for detecting DoS attacks on IoT middleware”, 1st Global Conference on Life Sciences and Technologies, IEEE, 12-14 March 2019, Osaka, Japan, 2019. DOI: https://doi.org/10.1109/LifeTech.2019.8884057
  14. Ibrahim Alrashdi, Ali Alqazzaz, Raed Alharthi, Esam Aloufi, Mohamed A Zohdy and Hua Ming, “FBAD fog-based attack detection for IoT healthcare in smart cities”, 10th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference, IEEE, 10-12 October 2019, New York, USA, 2019. DOI: https://doi.org/10.1109/UEMCON47517.2019.8992963
  15. Kilincer, Ilhan Firat, Fatih Ertam, Abdulkadir Sengur, Ru-San Tan, and U. Rajendra Acharya. ”Automated detection of cybersecurity attacks in healthcare systems with recursive feature elimination and multilayer perceptron optimization.” Biocybernetics and Biomedical Engineering 43, no. 1 (2023): 30-41. DOI: https://doi.org/10.1016/j.bbe.2022.11.005
  16. Otily Toutsop, Paige Harvey and Kevin Kornegay, “Monitoring and detection time optimization of man in the middle attacks using machine learning”, Applied Imagery Pattern Recognition Workshop, IEEE, 13-15 October 2020, Washington DC, USA, 2020. DOI: https://doi.org/10.1109/AIPR50011.2020.9425304
  17. Prajakta Kamble and Aruna Gawade, “Digitalization of healthcare with IoT and cryptographic encryption against DOS attacks”, International Conference on contemporary Computing and
  18. Informatics, IEEE, 12-14 December 2019, Singapore, 2019. DOI: https://doi.org/10.14202/vetworld.2019.12
  19. Rafik Hamza, Zheng Yan, Khan Muhammad, Paolo Bellavista and Faiza Titouna, “A privacy preserving cryptosystem for IoT e-healthcare”, Information Sciences, vol. 527, pp. 493-510, 2019. DOI: https://doi.org/10.1016/j.ins.2019.01.070
  20. Samira Akhbarifar, Hamid Haj Seyyed Javadi, Amir Masoud Rahmani and Mehdi Hosseinzadeh,
  21. “A secure remote health monitoring model for early disease diagnosis in cloud-based IoT environment”, Personal and Ubiquitous Computing, 2020.
  22. Shariq Aziz Butt, Arshad Ali, Diaz-Martinez Jorge Luis, De-La-Hoz-Franco Emiro, Tauseef Jamal and Muhammad Shoaib, “IoT smart health security threats”, 19th International Conference on Computational Science and Its Applications, IEEE, 1-4 July 2019, St. Petersburg, Russia, 2019.
  23. Shashvi Mishra and Amit Kumar Tyagi, “Intrusion detection in internet of things (IoTs) based applications using blockchain technology”, 3rd International Conference on I-SMAC, IEEE, 12-14
  24. December 2019, Palladam, India, 2019.
  25. Tehsin Kanwal, Adeel Anjum, Saif U. R Malik, Abid Khan and Muazzam A Khan, “Privacy preservation of electronic health records with adversarial attacks identification in hybrid cloud”, Computer Standards and Interfaces, vol. 78, no. 5, pp. 1-16, 2021. DOI: https://doi.org/10.1016/j.csi.2021.103522
  26. Thulasi, Thiyagu, and Krishnaveni Sivamohan. ”LSO-CSL: Light spectrum optimizer-based convolutional stacked long short term memory for attack detection in IoT-based healthcare applications.” Expert Systems with Applications 232 (2023): 120772. DOI: https://doi.org/10.1016/j.eswa.2023.120772
  27. Xiaonan Wang and Shaohao Cai, “Secure healthcare monitoring framework integrating NDNbased IoT with edge cloud”, Future Generation Computer Systems, vol. 112, no. 1, pp. 320-329, 2020. DOI: https://doi.org/10.1016/j.future.2020.05.042
  28. Yang Yang, Xianghan Zheng, Wenzhong Guo, Ximeng Liu and Victor Chang, “Privacy preserving
  29. smart IoT-based healthcare big data storage and self adaptive access control system”, Information
  30. Sciences, vol. 479, pp. 567-592, 2019. DOI: https://doi.org/10.1016/j.ins.2018.02.005