Hybrid deep learning-based cyberthreat detection and IoMT data authentication model in smart healthcare

IF 6.2 2区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Future Generation Computer Systems-The International Journal of Escience Pub Date : 2025-01-13 DOI:10.1016/j.future.2025.107711
Manish Kumar , Sushil Kumar Singh , Sunggon Kim
{"title":"Hybrid deep learning-based cyberthreat detection and IoMT data authentication model in smart healthcare","authors":"Manish Kumar ,&nbsp;Sushil Kumar Singh ,&nbsp;Sunggon Kim","doi":"10.1016/j.future.2025.107711","DOIUrl":null,"url":null,"abstract":"<div><div>The Internet of Medical Things (IoMT)-based medical devices and sensors play a significant role in healthcare applications, enabling on-site and remote monitoring of vital parameters in patients and alerting medical personnel in critical situations. However, these networks are vulnerable to cybersecurity threats, resulting in issues such as patient safety concerns, data breaches, ransom demands, and device tampering. Detecting cyberthreats efficiently is challenging because IoMT generates large temporal data. Furthermore, cyberattacks typically involve imbalanced classification, where classes are not equally represented. The absence of data authentication can lead to severe consequences, including threats to patient privacy and financial ramifications, ultimately eroding trust in the healthcare system.</div><div>This paper proposes an improved deep learning-based model for cyberthreat detection and IoMT data authentication in smart healthcare. First, it introduces an embedded Ensemble Learning (EL) technique to select important features of IoMT, which trims unnecessary features and reduces the possibility of overfitting by classifiers. These scaled inputs are fed into the proposed One-Dimensional Convolution Long Short-Term Memory (1D-CLSTM) Neural Network to classify cyberthreats. The random undersampling boosting technique has been applied to address issues like imbalance classification. The PoAh consensus algorithm is applied in the fog layer for data authentication. The proposed model is evaluated based on various performance metrics and compared to state-of-the-art techniques such as 1D-CNN, LSTM, and GRU. Evaluation results show that the proposed 1D-CLSTM achieves 100% accuracy with the WUSTL-EHMS-2020 and 98.55% test accuracy with the ECU-IoHT datasets. The PoAh-based authentication takes 3.47 s at average 9th iteration.</div></div>","PeriodicalId":55132,"journal":{"name":"Future Generation Computer Systems-The International Journal of Escience","volume":"166 ","pages":"Article 107711"},"PeriodicalIF":6.2000,"publicationDate":"2025-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Future Generation Computer Systems-The International Journal of Escience","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0167739X25000068","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
引用次数: 0

Abstract

The Internet of Medical Things (IoMT)-based medical devices and sensors play a significant role in healthcare applications, enabling on-site and remote monitoring of vital parameters in patients and alerting medical personnel in critical situations. However, these networks are vulnerable to cybersecurity threats, resulting in issues such as patient safety concerns, data breaches, ransom demands, and device tampering. Detecting cyberthreats efficiently is challenging because IoMT generates large temporal data. Furthermore, cyberattacks typically involve imbalanced classification, where classes are not equally represented. The absence of data authentication can lead to severe consequences, including threats to patient privacy and financial ramifications, ultimately eroding trust in the healthcare system.
This paper proposes an improved deep learning-based model for cyberthreat detection and IoMT data authentication in smart healthcare. First, it introduces an embedded Ensemble Learning (EL) technique to select important features of IoMT, which trims unnecessary features and reduces the possibility of overfitting by classifiers. These scaled inputs are fed into the proposed One-Dimensional Convolution Long Short-Term Memory (1D-CLSTM) Neural Network to classify cyberthreats. The random undersampling boosting technique has been applied to address issues like imbalance classification. The PoAh consensus algorithm is applied in the fog layer for data authentication. The proposed model is evaluated based on various performance metrics and compared to state-of-the-art techniques such as 1D-CNN, LSTM, and GRU. Evaluation results show that the proposed 1D-CLSTM achieves 100% accuracy with the WUSTL-EHMS-2020 and 98.55% test accuracy with the ECU-IoHT datasets. The PoAh-based authentication takes 3.47 s at average 9th iteration.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
智能医疗中基于深度学习的混合网络威胁检测和IoMT数据认证模型
基于医疗物联网(IoMT)的医疗设备和传感器在医疗保健应用中发挥着重要作用,可以对患者的重要参数进行现场和远程监控,并在危急情况下向医务人员发出警报。然而,这些网络容易受到网络安全威胁,导致诸如患者安全问题、数据泄露、赎金要求和设备篡改等问题。有效检测网络威胁具有挑战性,因为IoMT会产生大量的时间数据。此外,网络攻击通常涉及不平衡分类,其中类别的代表并不平等。缺乏数据身份验证可能导致严重后果,包括对患者隐私和财务后果的威胁,最终侵蚀对医疗保健系统的信任。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
CiteScore
19.90
自引率
2.70%
发文量
376
审稿时长
10.6 months
期刊介绍: Computing infrastructures and systems are constantly evolving, resulting in increasingly complex and collaborative scientific applications. To cope with these advancements, there is a growing need for collaborative tools that can effectively map, control, and execute these applications. Furthermore, with the explosion of Big Data, there is a requirement for innovative methods and infrastructures to collect, analyze, and derive meaningful insights from the vast amount of data generated. This necessitates the integration of computational and storage capabilities, databases, sensors, and human collaboration. Future Generation Computer Systems aims to pioneer advancements in distributed systems, collaborative environments, high-performance computing, and Big Data analytics. It strives to stay at the forefront of developments in grids, clouds, and the Internet of Things (IoT) to effectively address the challenges posed by these wide-area, fully distributed sensing and computing systems.
期刊最新文献
Self-sovereign identity framework with user-friendly private key generation and rule table Accelerating complex graph queries by summary-based hybrid partitioning for discovering vulnerabilities of distribution equipment DNA: Dual-radio Dual-constraint Node Activation scheduling for energy-efficient data dissemination in IoT Blending lossy and lossless data compression methods to support health data streaming in smart cities Energy–time modelling of distributed multi-population genetic algorithms with dynamic workload in HPC clusters
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1