Security as a Solution: An Intrusion Detection System Using a Neural Network for IoT Enabled Healthcare Ecosystem

Anshul Jain, Tanya Singh, Satyendra Kumar Sharma
{"title":"Security as a Solution: An Intrusion Detection System Using a Neural Network for IoT Enabled Healthcare Ecosystem","authors":"Anshul Jain, Tanya Singh, Satyendra Kumar Sharma","doi":"10.28945/4838","DOIUrl":null,"url":null,"abstract":"Aim/Purpose The primary purpose of this study is to provide a cost-effective and artificial intelligence enabled security solution for IoT enabled healthcare ecosystem. It helps to implement, improve, and add new attributes to healthcare services. The paper aims to develop a method based on an artificial neural network technique to predict suspicious devices based on bandwidth usage. Background COVID has made it mandatory to make medical services available online to every remote place. However, services in the healthcare ecosystem require fast, uninterrupted facilities while securing the data flowing through them. The solution in this paper addresses both the security and uninterrupted services issue. This paper proposes a neural network based solution to detect and disable suspicious devices without interrupting critical and life-saving services. Methodology This paper is an advancement on our previous research, where we performed manual knowledge-based intrusion detection. In this research, all the experiments were executed in the healthcare domain. The mobility pattern of the devices was divided into six parts, and each one is assigned a dedicated slice. The security module regularly monitored all the clients connected to slices, and machine learning was used to detect and disable the problematic or suspicious devices. We have used MATLAB’s neural network to train the dataset and automatically detect and disable suspicious devices. The different network architectures and different training algorithms (Levenberg–Marquardt and Bayesian Framework) in MATLAB software have attempted to achieve more precise values with different properties. Five iterations of training were executed and compared to get the best result of R=99971. We configured the application to handle the four most applicable use cases. We also performed an experimental application simulation for the assessment and validation of predictions. Contribution This paper provides a security solution for the IoT enabled healthcare system. The architectures discussed suggest an end-to-end solution on the sliced network. Efficient use of artificial neural networks detects and block suspicious devices. Moreover, the solution can be modified, configured and deployed in many other ecosystems like home automation. Findings This simulation is a subset of the more extensive simulation previously performed on the sliced network to enhance its security. This paper trained the data using a neural network to make the application intelligent and robust. This enhancement helps detect suspicious devices and isolate them before any harm is caused on the network. The solution works both for an intrusion detection and prevention system by detecting and blocking them from using network resources. The result concludes that using multiple hidden layers and a non-linear transfer function, logsig improved the learning and results. Recommendations Everything from offices, schools, colleges, and e-consultation is currently for Practitioners happening remotely. It has caused extensive pressure on the network where the data flowing through it has increased multifold. Therefore, it becomes our joint responsibility to provide a cost-effective and sustainable security solution for IoT enabled healthcare services. Practitioners can efficiently use this affordable solution compared to the expensive security options available in the commercial market and deploy it over a sliced network. The solution can be implemented by NGOs and federal governments to provide secure and affordable healthcare monitoring services to patients in remote locations. Recommendations Research can take this solution to the next level by integrating artificial intellifor Researchers gence into all the modules. They can augment this solution by making it compatible with the federal government’s data privacy laws. Authentication and encryption modules can be integrated to enhance it further. Impact on Society COVID has given massive exposure to the healthcare sector since last year. With everything online, data ecurity and privacy is the next most significant concern. This research can be of great support to those working for the security of health care services. This paper provides “Security as a Solution”, which can enhance the security of an otherwise less secure ecosystem. The healthcare use cases discussed in this paper address the most common security issues in the IoT enabled healthcare ecosystem. Future Research We can enhance this application by including data privacy modules like authentication and authorisation, data encryption and help to abide by the federal privacy laws. In addition, machine learning and artificial intelligence can be extended to other modules of this application. Moreover, this experiment can be easily applicable to many other domains like e-homes, e-offices and many others. For example, e-homes can have devices like kitchen equipment, rooms, dining, cars, bicycles, and smartwatches. Therefore, one can use this application to monitor these devices and detect any suspicious activity. © 2021 Informing Science Institute. All rights reserved.","PeriodicalId":38962,"journal":{"name":"Interdisciplinary Journal of Information, Knowledge, and Management","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Interdisciplinary Journal of Information, Knowledge, and Management","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.28945/4838","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"Computer Science","Score":null,"Total":0}
引用次数: 6

Abstract

Aim/Purpose The primary purpose of this study is to provide a cost-effective and artificial intelligence enabled security solution for IoT enabled healthcare ecosystem. It helps to implement, improve, and add new attributes to healthcare services. The paper aims to develop a method based on an artificial neural network technique to predict suspicious devices based on bandwidth usage. Background COVID has made it mandatory to make medical services available online to every remote place. However, services in the healthcare ecosystem require fast, uninterrupted facilities while securing the data flowing through them. The solution in this paper addresses both the security and uninterrupted services issue. This paper proposes a neural network based solution to detect and disable suspicious devices without interrupting critical and life-saving services. Methodology This paper is an advancement on our previous research, where we performed manual knowledge-based intrusion detection. In this research, all the experiments were executed in the healthcare domain. The mobility pattern of the devices was divided into six parts, and each one is assigned a dedicated slice. The security module regularly monitored all the clients connected to slices, and machine learning was used to detect and disable the problematic or suspicious devices. We have used MATLAB’s neural network to train the dataset and automatically detect and disable suspicious devices. The different network architectures and different training algorithms (Levenberg–Marquardt and Bayesian Framework) in MATLAB software have attempted to achieve more precise values with different properties. Five iterations of training were executed and compared to get the best result of R=99971. We configured the application to handle the four most applicable use cases. We also performed an experimental application simulation for the assessment and validation of predictions. Contribution This paper provides a security solution for the IoT enabled healthcare system. The architectures discussed suggest an end-to-end solution on the sliced network. Efficient use of artificial neural networks detects and block suspicious devices. Moreover, the solution can be modified, configured and deployed in many other ecosystems like home automation. Findings This simulation is a subset of the more extensive simulation previously performed on the sliced network to enhance its security. This paper trained the data using a neural network to make the application intelligent and robust. This enhancement helps detect suspicious devices and isolate them before any harm is caused on the network. The solution works both for an intrusion detection and prevention system by detecting and blocking them from using network resources. The result concludes that using multiple hidden layers and a non-linear transfer function, logsig improved the learning and results. Recommendations Everything from offices, schools, colleges, and e-consultation is currently for Practitioners happening remotely. It has caused extensive pressure on the network where the data flowing through it has increased multifold. Therefore, it becomes our joint responsibility to provide a cost-effective and sustainable security solution for IoT enabled healthcare services. Practitioners can efficiently use this affordable solution compared to the expensive security options available in the commercial market and deploy it over a sliced network. The solution can be implemented by NGOs and federal governments to provide secure and affordable healthcare monitoring services to patients in remote locations. Recommendations Research can take this solution to the next level by integrating artificial intellifor Researchers gence into all the modules. They can augment this solution by making it compatible with the federal government’s data privacy laws. Authentication and encryption modules can be integrated to enhance it further. Impact on Society COVID has given massive exposure to the healthcare sector since last year. With everything online, data ecurity and privacy is the next most significant concern. This research can be of great support to those working for the security of health care services. This paper provides “Security as a Solution”, which can enhance the security of an otherwise less secure ecosystem. The healthcare use cases discussed in this paper address the most common security issues in the IoT enabled healthcare ecosystem. Future Research We can enhance this application by including data privacy modules like authentication and authorisation, data encryption and help to abide by the federal privacy laws. In addition, machine learning and artificial intelligence can be extended to other modules of this application. Moreover, this experiment can be easily applicable to many other domains like e-homes, e-offices and many others. For example, e-homes can have devices like kitchen equipment, rooms, dining, cars, bicycles, and smartwatches. Therefore, one can use this application to monitor these devices and detect any suspicious activity. © 2021 Informing Science Institute. All rights reserved.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
安全即解决方案:基于神经网络的入侵检测系统,支持物联网医疗生态系统
本研究的主要目的是为物联网医疗生态系统提供具有成本效益的人工智能安全解决方案。它有助于实现、改进和向医疗保健服务添加新属性。本文旨在开发一种基于人工神经网络技术的基于带宽使用的可疑设备预测方法。新冠疫情要求每个偏远地区都必须在线提供医疗服务。然而,医疗保健生态系统中的服务需要快速、不间断的设施,同时保护流经它们的数据。本文中的解决方案同时解决了安全性和不间断服务问题。本文提出了一种基于神经网络的解决方案,在不中断关键和救生服务的情况下检测和禁用可疑设备。本文是在前人研究的基础上进行的基于知识的人工入侵检测。在本研究中,所有实验都在医疗保健领域执行。将设备的移动模式划分为六个部分,每个部分分配一个专用切片。安全模块定期监控连接到切片的所有客户端,并使用机器学习来检测和禁用有问题或可疑的设备。我们使用MATLAB的神经网络对数据集进行训练,并自动检测和禁用可疑设备。MATLAB软件中不同的网络架构和不同的训练算法(Levenberg-Marquardt和Bayesian Framework)都试图获得具有不同性质的更精确的值。执行5次迭代训练并进行比较,得到R=99971的最佳结果。我们配置应用程序来处理四个最适用的用例。我们还进行了实验应用模拟,以评估和验证预测。本文为支持物联网的医疗保健系统提供了一个安全解决方案。所讨论的体系结构建议在切片网络上提供端到端解决方案。有效利用人工神经网络检测并阻断可疑设备。此外,该解决方案可以在许多其他生态系统(如家庭自动化)中进行修改、配置和部署。该模拟是先前在切片网络上进行的更广泛的模拟的一个子集,以增强其安全性。本文采用神经网络对数据进行训练,使应用具有智能化和鲁棒性。这种增强有助于检测可疑设备,并在对网络造成任何损害之前将其隔离。该解决方案既适用于入侵检测系统,也适用于入侵防御系统,通过检测和阻止他们使用网络资源。结果表明,使用多个隐藏层和非线性传递函数,对数符号改善了学习和结果。目前,来自办公室、学校、学院和电子咨询的一切都是为远程从业者提供的。它给网络造成了巨大的压力,流经它的数据增加了数倍。因此,为物联网医疗保健服务提供具有成本效益和可持续的安全解决方案成为我们的共同责任。与商业市场上昂贵的安全选项相比,从业者可以有效地使用这种负担得起的解决方案,并将其部署在切片网络上。该解决方案可由非政府组织和联邦政府实施,为偏远地区的患者提供安全且负担得起的医疗保健监测服务。通过将人工智能集成到所有模块中,Research可以将这个解决方案提升到一个新的水平。他们可以通过使其与联邦政府的数据隐私法兼容来增强该解决方案。可以集成身份验证和加密模块来进一步增强它。自去年以来,COVID给医疗保健行业带来了巨大的影响。随着一切都在网上,数据安全和隐私是下一个最重要的问题。这项研究可以为那些从事卫生保健服务安全工作的人提供很大的支持。本文提供了“安全即解决方案”,它可以增强原本不太安全的生态系统的安全性。本文讨论的医疗保健用例解决了支持物联网的医疗保健生态系统中最常见的安全问题。未来研究我们可以通过包括数据隐私模块,如身份验证和授权,数据加密和帮助遵守联邦隐私法来增强该应用程序。此外,机器学习和人工智能可以扩展到该应用程序的其他模块。此外,这个实验可以很容易地应用于许多其他领域,如电子家庭、电子办公室和许多其他领域。 例如,电子家庭可以有厨房设备、房间、餐厅、汽车、自行车和智能手表等设备。因此,可以使用此应用程序监视这些设备并检测任何可疑活动。©2021 inform Science Institute。版权所有。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
CiteScore
2.30
自引率
0.00%
发文量
14
期刊最新文献
IJIKM Volume 18, 2023 – Table of Contents Factors Affecting Individuals’ Behavioral Intention to Use Online Capital Market Investment Platforms in Indonesia Investigating the Adoption of Social Commerce: A Case Study of SMEs in Jordan The Influence of Big Data Management on Organizational Performance in Organizations: The Role of Electronic Records Management System Potentiality Customer Churn Prediction in the Banking Sector Using Machine Learning-Based Classification Models
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1