Refine your search
Collections
Co-Authors
Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Arora, Pallavi
- Home Network Security Incorporating Machine Learning Algorithms In Internet Of Medical Things
Abstract Views :120 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science and Engineering, I.K. Gujral Punjab Technical University, IN
2 Department of Electronics and Communication Engineering, Guru Nanak Dev Engineering College, IN
3 Department of Informatics, Federal Institute of Education, Science, and Technology of São Paulo, BR
1 Department of Computer Science and Engineering, I.K. Gujral Punjab Technical University, IN
2 Department of Electronics and Communication Engineering, Guru Nanak Dev Engineering College, IN
3 Department of Informatics, Federal Institute of Education, Science, and Technology of São Paulo, BR
Source
ICTACT Journal on Communication Technology, Vol 12, No 4 (2021), Pagination: 2562-2566Abstract
The proliferation of chronic disorders such as COVID-19 has recognized the importance of people all over the world having immediate access to healthcare. The recent pandemic has shown deficiencies in the traditional healthcare infrastructure, namely that hospitals and clinics alone are inadequate for grappling with such a disaster. One of the key technologies that favours new healthcare solutions is smart and interconnected wearables. Thanks to developments in the Internet of Things (IoT), these wearables will now collect data on an unprecedented scale. However, as a result of their extensive use, security in these critical systems has become a major concern. This paper presents an intrusion detection mechanism based on Machine Learning Algorithms for healthcare applications used in home network environments. Experiments are carried out on a home network to detect attacks against a health care application. Experiments using the proposed mechanism based on Machine Learning algorithms to detect attacks against a healthcare application are carried out on a home network, and the results show a good performance of the used algorithms.Keywords
IoMT, Security, Smart Watch, IDSReferences
- D. Koutras, G. Stergiopoulos, T. Dasaklis, P. Kotzanikolaou, D. Glynos and C. Douligeris, “Security in IoMT Communications: A Survey”, Sensors, Vol. 20, No. 17, pp. 4828-4848, 2020.
- F. Alsubaei, A. Abuhussein and S. Shiva, “Security and Privacy in the Internet of Medical Things: Taxonomy and Risk Assessment”, Proceedings of IEEE 42nd International Conference on Local Computer Networks, pp. 112-120, 2017.
- S. S. Hameed, “A Systematic Review of Security and Privacy Issues in the Internet of Medical Things; the Role of Machine Learning Approaches”, Computer Science, Vol. 7, No. 4, pp. 44-56, 2021.
- M. Papaioannou “A Survey on Security Threats and Countermeasures in Internet of Medical Things (IoMT)”, Emerging Telecommunications Technologies, Vol. 23, pp. 1-12, 2020.
- A. Hockey, “Uncovering the Cyber Security Challenges in Healthcare”, Network Security, Vol. 2020, No. 4, pp. 18-19, 2020.
- G. Thamilarasu, A. Odesile and A. Hoang, “An Intrusion Detection System for Internet of Medical Things”, IEEE Access, Vol. 8, pp. 181560-181576, 2020.
- G. Hatzivasilis, O. Soultatos, C. Verikoukis, G. Demetriou, C.I. Tsatsoulis and N. Systems, “Review of Security and Privacy for the Internet of Medical Things (IoMT)”, Proceedings of IEEE 42nd International Conference on Distributed Computing in Sensor Systems, pp. 1-8, 2019.
- J.J. Hathaliya and S. Tanwar, “An Exhaustive Survey on Security and Privacy Issues in Healthcare 4.0,” Computer Communications, Vol. 153, pp. 311-335, 2020.
- H.K. Bharadwaj, A. Agarwal, V. Chamola, V. Hassija, M. Guizani and B. Sikdar, “A Review on the Role of Machine Learning in Enabling IoT Based Healthcare Applications”, Proceedings of IEEE International Conference on AI and IoT for Smart Health, pp. 32-45, 2021.
- A.I. Newaz, A.K. Sikder, M.A. Rahman and A.S. Uluagac, “HealthGuard: A Machine Learning-Based Security Framework for Smart Healthcare Systems”, Proceedings of IEEE International Conference on Social Networks Analysis, Management and Security, pp. 389-396, 2019.
- L. Xiao, X. Wan, X. Lu, Y. Zhang and D. Wu, “IoT Security Techniques Based on Machine Learning: How Do IoT Devices Use AI to Enhance Security?”, IEEE Signal Processing Magazine, Vol. 35, No. 5, pp. 41-49, 2018.
- E. Adi, A. Anwar, Z. Baig and S. Zeadally, “Machine Learning and Data Analytics for the IoT”, Neural Computing and Applications, Vol. 32, No. 20, pp. 1620516233, 2020.
- S.M. Tahsien, H. Karimipour and P. Spachos, “Machine Learning based Solutions for Security of Internet of Things (IoT): A Survey”, Journal of Network and Computer Applications, Vol. 161, pp. 1-13, 2020.
- M. Hasan, M.M. Islam, M.I.I. Zarif and M.M.A. Hashem, “Attack and Anomaly Detection in IoT Sensors in IoT Sites using Machine Learning Approaches”, Internet of Things, Vol. 7, pp. 1-19, 2019.
- A.A. Hady, A. Ghubaish, T. Salman, D. Unal and R. Jain, “Intrusion Detection System for Healthcare Systems Using Medical and Network Data: A Comparison Study”, IEEE Access, Vol. 8, pp. 106576-106584, 2020.
- Openargus-Home, Available at https://openargus.org/, Accessed at 2021.
- Pearson Correlation an Overview, Available at https://www.sciencedirect.com/topics/computerscience/pearson-correlation, Accessed at 2021.
- Cybersecurity In IIOT And IOMT Networks Using Machine Learning Algorithms - A Survey
Abstract Views :123 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science and Engineering, I.K. Gujral Punjab Technical University, IN
2 Department of Electronics and Communication Engineering, Guru Nanak Dev Engineering College, IN
3 Department of Informatics, Federal Institute of Education, Science, and Technology of São Paulo, BR
1 Department of Computer Science and Engineering, I.K. Gujral Punjab Technical University, IN
2 Department of Electronics and Communication Engineering, Guru Nanak Dev Engineering College, IN
3 Department of Informatics, Federal Institute of Education, Science, and Technology of São Paulo, BR
Source
ICTACT Journal on Communication Technology, Vol 12, No 4 (2021), Pagination: 2577-2581Abstract
Rapid advancements in micro-computing, mini-hardware manufacturing, and machine-to-machine (M2M) communications have allowed for innovative Internet of Things (IoT) solutions to redefine numerous networking applications. With the emergence of IoT branches such as the Internet of Medical Things (IoMT) and the Industrial Internet of Things (IIoT), healthcare and industrial systems have been changed by IoT. This paper presents an overview of the technologies that are being used to secure IoMT as well as IIoT frameworks seen within the research articles.Keywords
Machine Learning, Healthcare, Cybersecurity, Internet of Things (IoT)References
- Modbus, “The Modbus Organization”, Available at https://modbus.org/, Accessed at 2021.
- Bacnet, “BACnet Website”, Available at http://www.bacnet.org/, Accessed at 2021.
- DNP, “Overview of DNP3 Protocol”, Available at https://www.dnp.org/About/Overview-of-DNP3-Protocol, Accessed at 2021.
- MQTT, “MQTT - The Standard for IoT Messaging”, Available at https://mqtt.org/, Accessed at 2021.
- IEEE Standards, “IEEE SA - The IEEE Standards Association - Home”, Available at https://standards.ieee.org/, Accessed at 2021.
- A. Antonini, A. Barenghi, G. Pelosi and S. Zonouz, “Security Challenges in Building Automation and SCADA”, Proceedings of International Carnahan Conference on Security Technology, pp. 1-6, 2014.
- Cypress Perform, Available at “Bluetooth Low Energy (BLE)”, Available at https://www.infineon.com/dgdl/InfineonComponent_BLE_V2.0Software%20Module%20Datasheets-v03_66EN.pdf?fileId=8ac78c8c7d0d8da4017d0eae085e299e, Accessed at 2015.
- Texas Instruments, “Bluetooth low energy Protocol Stack Introduction”, Available at http://softwaredl.ti.com/lprf/simplelink_cc2640r2_sdk/1.00.00.22/exports/ docs/blestack/html/blestack/index.html#:~:text=The%20Bluetooth%20low%20en ergy%20protocol%20stack%20(or%20protocol%20stack) %20consists,two%20sections%20are%20implemented%20 separately, Accessed at 2021.
- C.T. Lin, S.L. Wu and M.L. Lee, “Cyber Attack and Defense on Industry Control Systems”, Proceedings of IEEE International Conference on Dependable and Secure Computing, pp. 1-3, 2017.
- M. Almseidin, M. Alzubi, S. Kovacs and M. Alkasassbeh, “Evaluation of Machine Learning Algorithms for Intrusion Detection System”, Proceedings of IEEE 15th International Symposium on Intelligent Systems and Informatics, pp. 277282, 2017.
- L. Rosa, T. Cruz, P. Simoes, E. Monteiro and L. Lev, “Attacking SCADA Systems: A Practical Perspective”, Proceedings of IEEE International Conference on Integrated Network and Service Management, pp. 741-746, 2017.
- A. Keliris, H. Salehghaffari, B. Cairl, P. Krishnamurthy, M. Maniatakos and F. Khorrami, “Machine Learning-Based Defense against Process-Aware Attacks on Industrial Control Systems”, Proceedings of IEEE International Conference on Integrated Networks, pp. 1-10, 2016.
- F. Jiang, “Deep Learning based Multi-Channel Intelligent Attack Detection for Data Security”, IEEE Transactions on Sustainable Computing, pp. 1-10, 2018.
- M. Zolanvari, M.A. Teixeira, L. Gupta, K.M. Khan and R. Jain, “Machine Learning-Based Network Vulnerability Analysis of Industrial Internet of Things”, IEEE Internet of Things, Vol. 6, No. 4, pp. 6822-6834, 2019.
- M. Teixeira, T. Salman, M. Zolanvari, R. Jain, N. Meskin and M. Samaka, “SCADA System Testbed for Cybersecurity Research using Machine Learning Approach”, Future Internet, Vol. 10, No. 8, pp. 76-88, 2018.
- G. Hatzivasilis, O. Soultatos, S. Ioannidis, C. Verikoukis, G. Demetriou and C. Tsatsoulis, “Review of Security and Privacy for the Internet of Medical Things (IoMT)”, Proceedings of IEEE International Conference on Distributed Computing in Sensor Systems, pp. 457-464, 2019.
- A. Jain, T. Singh and S. Kumar Sharma, “Security as a Solution: An Intrusion Detection System using a Neural Network for IoT Enabled Healthcare Ecosystem”, Interdisciplinary Journal of Information, Knowledge, and Management, Vol. 16, pp. 331-369, 2021.
- P. Kumar, G.P. Gupta and R. Tripathi, “An Ensemble Learning and Fog-Cloud Architecture-Driven Cyber-Attack Detection Framework for IoMT Networks”, Computer Communications, Vol. 166, pp. 110-124, 2021.
- E.M. Campos, “Evaluating Federated Learning for Intrusion Detection in Internet of Things: Review and Challenges”, Proceedings of IEEE International Conference on Distributed Computing in Sensor Systems, pp. 1-13, 2021.