banner

A machine learning based approach to identifying malicious activity to improve privacy in IoT-based intelligent healthcare monitoring system

Sanjeev Kumar, Sukhvinder Singh Deora

Abstract


As the use of the Internet of Things (IoT) grows exponentially in the medical field, one of the biggest concerns is the safety of patients’ personal health information. Leveraging IoT technology in a modern healthcare environment facilitates precise handling of data and patient monitoring. Healthcare systems are susceptible to security hazards and attacks. The primary objective of malicious operations targeting these systems is to compromise privacy and obtain unauthorized access to internal processes. Consequently, advanced analytics can strengthen IoT security as a whole by facilitating the detection, mitigation, and prevention of such intrusions. The fulfilment of security requirements is crucial for improving the current healthcare system with IoT technologies, and real-world applications can benefit greatly from Machine learning (ML) applications running on authentic datasets. This paper provides framework for detecting malicious activities occurred during data transmission in IoT based health monitoring system using ML approach. In proposed framework we enhanced decision tree algorithm by utilizing oversampling and fine-tuning during training of model. The proposed framework has been analysed using real dataset that contains IoT device data transmission activities that may contain activities generated by malicious nodes. The proposed mechanism achieved an accuracy of 99.6% from the perspective of other compared ML approaches.


Keywords


IoT, healthcare; cyber-attacks; ML; security and privacy

Full Text:

PDF

References


1. Chouhan A, Tiwari A, Diwaker C, et al. Efficient Opportunities and Boundaries towards Internet of Things (IoT) Cost Adaptive Model. 2022 IEEE Delhi Section Conference (DELCON). Published online February 11, 2022. doi: 10.1109/delcon54057.2022.9753057

2. Kumar S, Deora SS. Comparative Analysis of Security Techniques in Internet of Things. 2022 Seventh International Conference on Parallel, Distributed and Grid Computing (PDGC). Published online November 25, 2022. doi: 10.1109/pdgc56933.2022.10053313

3. Otoum Y, Liu D, Nayak A. DL‐IDS: A deep learning–based intrusion detection framework for securing IoT. Transactions on Emerging Telecommunications Technologies. 2019; 33(3). doi: 10.1002/ett.3803

4. Diwaker C, Tomar P, Sharma A. Future aspects and challenges of the internet of things for the smart generation. In ICCCE 2018: Proceedings of the International Conference on Communications and Cyber Physical Engineering 2018. Springer Singapore. 2019. pp. 599-606.

5. Kumar S, Deora SS. Security Challenges and Issues in IoT. 2021 6th International Conference on Signal Processing, Computing and Control (ISPCC). Published online October 7, 2021. doi: 10.1109/ispcc53510.2021.9609486

6. Lone AN, Mustajab S, Alam M. A comprehensive study on cybersecurity challenges and opportunities in the IoT world. SECURITY AND PRIVACY. 2023; 6(6). doi: 10.1002/spy2.318

7. Elshweikh AA, Mattar AM, Hussein M, et al. Literature Survey for Cybersecurity for Internet of Things (IoT). 2022 International Telecommunications Conference (ITC-Egypt). Published online July 26, 2022. doi: 10.1109/itc-egypt55520.2022.9855671

8. Mehla A, Deora SS. Use of Machine Learning and IoT in Agriculture. In IoT Based Smart Applications. Cham: Springer International Publishing. 2022. pp. 277-293.

9. Pires IM, Hussain F, Garcia NM, et al. Improving Human Activity Monitoring by Imputation of Missing Sensory Data: Experimental Study. Future Internet. 2020; 12(9): 155. doi: 10.3390/fi12090155

10. Al-Shareeda MA, Manickam S, Laghari SA, et al. Replay-Attack Detection and Prevention Mechanism in Industry 4.0 Landscape for Secure SECS/GEM Communications. Sustainability. 2022; 14(23): 15900. doi: 10.3390/su142315900

11. Goyal P, Deora SS. A Review: Trust Management Techniques Used for Cloud Computing. Proceedings of Data Analytics and Management: ICDAM 2021. 2022; 1: 117-132.

12. Ghazanfar, S.; Hussain, F.; Rehman, A.U.; Fayyaz, U.U.; Shahzad, F.; Shah, G.A. Iot-flock: An open-source framework for iot traffic generation. In Proceedings of the 2020 International Conference on Emerging Trends in Smart Technologies (ICETST); Karachi, Pakistan; 26–27 March 2020; pp. 1-6.doi: 10.1109/icetst49965.2020.9080732

13. Alhowaide A, Alsmadi I, Tang J. Ensemble Detection Model for IoT IDS. Internet of Things. 2021; 16: 100435. doi: 10.1016/j.iot.2021.100435

14. Sarhan M, Layeghy S, Moustafa N, et al. Feature extraction for machine learning-based intrusion detection in IoT networks. Digital Communications and Networks. Published online September 2022. doi: 10.1016/j.dcan.2022.08.012

15. Carta S, PoddaAS, Recupero DR, et al. A Local Feature Engineering Strategy to Improve Network Anomaly Detection. Future Internet. 2020; 12(10): 177. doi: 10.3390/fi12100177

16. Corizzo, R.; Zdravevski, E.; Russell, M.; Vagliano, A.; Japkowicz, N. Feature extraction based on word embedding models for intrusion detection in network traffic. J. Surveillance, Secur. Saf. 2020, 1, 140–150.doi: 10.20517/jsss.2020.15

17. Bharadwaj HK, Agarwal A, Chamola V, et al. A Review on the Role of Machine Learning in Enabling IoT Based Healthcare Applications. IEEE Access. 2021; 9: 38859-38890. doi: 10.1109/access.2021.3059858

18. Hussain F, Abbas SG, Shah GA, et al. A Framework for Malicious Traffic Detection in IoT Healthcare Environment. Sensors. 2021; 21(9): 3025. doi: 10.3390/s21093025

19. Iwendi C,Anajemba JH, Biamba C, et al. Security of Things Intrusion Detection System for Smart Healthcare. Electronics. 2021; 10(12): 1375. doi: 10.3390/electronics10121375

20. Butt SA, Diaz-Martinez JL, Jamal T, et al. IoT Smart Health Security Threats. 2019 19th International Conference on Computational Science and Its Applications (ICCSA). Published online July 2019. doi: 10.1109/iccsa.2019.000-8

21. Alrashdi I, Alqazzaz A, Alharthi R, et al. FBAD: Fog-based Attack Detection for IoT Healthcare in Smart Cities. 2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON). Published online October 2019. doi: 10.1109/uemcon47517.2019.8992963

22. BahalulHaque AKM, Bhushan B, Nawar A, et al. (2022). Attacks and countermeasures in IoT based smart healthcare applications. In: Recent Advances in Internet of Things and Machine Learning: Real-World Applications. pp. 67-90.

23. Ambarkar SS, Shekokar N. Toward smart and secure IoT based healthcare system. Internet of things, smart computing and technology: A roadmap ahead. 2020; 283-303.

24. Iqbal MJ, Aurangzeb S, Aleem M, et al. RThreatDroid: A Ransomware Detection Approach to Secure IoT Based Healthcare Systems. IEEE Transactions on Network Science and Engineering. 2023; 10(5): 2574-2583. doi: 10.1109/tnse.2022.3188597

25. Kalnoor G, Gowrishankar S. IoT-based smart environment using intelligent intrusion detection system. Soft Computing. 2021; 25(17): 11573-11588. doi: 10.1007/s00500-021-06028-1

26. Choi J, Choi C, Kim S, et al. Medical Information Protection Frameworks for Smart Healthcare based on IoT. Proceedings of the 9th International Conference on Web Intelligence, Mining and Semantics.Published online June 26, 2019. doi: 10.1145/3326467.3326496




DOI: https://doi.org/10.32629/jai.v7i5.1492

Refbacks

  • There are currently no refbacks.


Copyright (c) 2024 Sanjeev Kumar, Sukhvinder Singh Deora

License URL: https://creativecommons.org/licenses/by-nc/4.0/