ACGAN for Addressing the Security Challenges in IoT-Based Healthcare System
Abstract
:1. Introduction
Contributions
- Exploration of IoMT Attack Detection: The study explores the ability of biometric and network flow metric feature sets to detect attacks in the IoMT. Despite the biometric feature set being quantitatively smaller (approximately one-third of the network flow metric set), it demonstrates a higher discriminability, with an attack detection rate of 0.966.
- Three Evaluation Methods: The evaluation was conducted in three ways: using biometric features, network flow metrics, and a combination of both feature sets.
- Generation of Synthetic Samples: To minimize bias toward the majority class, two distinct approaches, ACGAN and SMOTE, were employed to generate synthetic samples. Their comparative evaluation is presented in this article.
- Comparison with Baseline Method: The results were compared with the baseline method [1], showing that the proposed method achieves a higher attack detection rate.
2. Challenges in Healthcare Monitoring Systems
Challenges Components
3. Enhanced Healthcare Monitoring Systems
4. Dataset Description
5. Experimental Results
- Accuracy estimates the ratio of recognized risk for all conditions (cases). If accuracy is higher, the machine learning model is better.
- Precision measures the accuracy of the model in predicting positive instances. High precision indicates that when the model predicts a positive class, it is likely to be correct.
- Recall is the ratio of true positive predictions to the total number of actual positive instances. This calculates the ability of the model to capture all positive instances.
- The F1-score is a metric that combines both precision and recall. It is the harmonic mean of precision and recall and provides a balanced measure of a model’s performance.
ACGAN
- Log-likelihood of the correct source (): The objective function ensures that the discriminator correctly identifies whether the sample is real or synthetic.
- Log-likelihood of the correct class (): This ensures that the discriminator correctly classifies the sample into its respective class.
Algorithm 1 Auxiliary Classifier Generative Adversarial Network (ACGAN) |
|
6. Comparison
7. Conclusions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
Abbreviations
HMS | Healthcare Monitoring System |
EHMS | Enhanced Healthcare Monitoring System |
GAN | Generative Adversarial Network |
IoT | Internet of Things |
IoMT | Internet of Medical Things |
ACGAN | Auxiliary Classifier Generative Adversarial Network |
SMOTE | Synthetic Minority Oversampling Technique |
t-SNE | t-distributed Stochastic Neighbor Embedding |
EHRs | Electronic Health Records |
SpO2 | Blood Oxygen Saturation |
ECG | Electrocardiogram |
WUSTL | Washington University in St. Louis |
MAC | Medium Access Control |
TP | True Positive |
TN | True Negative |
FN | False Negative |
FP | False Positive |
D | Discriminator |
G | Generator |
SVM | Support Vector Machine |
ANN | Artificial Neural Network |
KNN | k-Nearest Neighbor |
RF | Random Forest |
IT | Information Technology |
ML | Machine Learning |
DL | Deep Learning |
AI | Artificial Intelligence |
IDS | Intrusion Detection System |
References
- Hady, A.; Ghubaish, A.; Salman, T.; Unal, D.; Jain, R. Intrusion Detection System for Healthcare Systems Using Medical and Network Data: A Comparison Study. IEEE Access 2020, 8, 106576–106584. [Google Scholar] [CrossRef]
- Jin, Y. Low-Cost and Active Control of Radiation of Wearable Medical Health Device for Wireless Body Area Network. J. Med. Syst. 2019, 43, 137. [Google Scholar] [CrossRef] [PubMed]
- Li, R.T.; Kling, S.R.; Salata, M.J.; Cupp, S.A.; Sheehan, J.; Voos, J.E. Wearable Performance Devices in Sports Medicine. Sports Health 2016, 8, 74–78. [Google Scholar] [CrossRef]
- Bansal, A.; Kumar, S.; Bajpai, A.; Tiwari, V.N.; Nayak, M.; Venkatesan, S.; Narayanan, R. Remote health monitoring system for detecting cardiac disorders. IET Syst. Biol. 2015, 9, 309–314. [Google Scholar] [CrossRef]
- Uslu, B.Ç.; Okay, E.; Dursun, E. Analysis of factors affecting IoT-based smart hospital design. J. Cloud Comput. 2020, 9, 37. [Google Scholar] [CrossRef]
- Nguyen, T.A.; Min, D.; Choi, E.; Tran, T.D. Reliability and Availability Evaluation for Cloud Data Center Networks Using Hierarchical Models. IEEE Access 2019, 7, 9273–9313. [Google Scholar] [CrossRef]
- Bhuiyan, M.N.; Billah, M.M.; Bhuiyan, F.; Bhuiyan, M.A.R.; Hasan, N.; Rahman, M.M.; Miah, M.S.; Alibakhshikenari, M.; Arpanaei, F.; Falcone, F.; et al. Design and Implementation of a Feasible Model for the IoT Based Ubiquitous Healthcare Monitoring System for Rural and Urban Areas. IEEE Access 2022, 10, 91984–91997. [Google Scholar] [CrossRef]
- Zeshan, F.; Ahmad, A.; Babar, M.I.; Hamid, M.; Hajjej, F.; Ashraf, M. An IoT-Enabled Ontology-Based Intelligent Healthcare Framework for Remote Patient Monitoring. IEEE Access 2023, 11, 133947–133966. [Google Scholar] [CrossRef]
- Bhatia, H.; Panda, S.N.; Nagpal, D. Internet of Things and its Applications in Healthcare-A Survey. In Proceedings of the 2020 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), Noida, India, 4–5 June 2020; pp. 305–310. [Google Scholar]
- Bathalapalli, V.K.; Mohanty, S.P.; Kougianos, E.; Baniya, B.K.; Rout, B. PUFchain 2.0: Hardware-assisted robust blockchain for sustainable simultaneous device and data security in smart healthcare. SN Comput. Sci. 2022, 3, 344. [Google Scholar] [CrossRef]
- Bathalapalli, V.K.; Mohanty, S.P.; Kougianos, E.; Baniya, B.K.; Rout, B. Pufchain 3.0: Hardware-assisted distributed ledger for robust authentication in the internet of medical things. In Proceedings of the IFIP International Internet of Things Conference, Amsterdam, The Netherlands, 27–28 October 2022; Springer: Berlin/Heidelberg, Germany, 2022; pp. 23–40. [Google Scholar]
- Verma, R.A. Smart City Healthcare Cyber Physical System: Characteristics, Technologies and Challenges. Wirel. Pers. Commun. 2021, 122, 1413–1433. [Google Scholar] [CrossRef]
- Abdulmalek, S.; Nasir, A.; Jabbar, W.A.; Almuhaya, M.A.M.; Bairagi, A.K.; Khan, M.A.M.; Kee, S.H. IoT-Based Healthcare-Monitoring System towards Improving Quality of Life: A Review. Healthcare 2022, 10, 1993. [Google Scholar] [CrossRef] [PubMed]
- Philip, N.Y.; Rodrigues, J.; Wang, H.; Fong, S.J.; Chen, J. Internet of Things for In-Home Health Monitoring Systems: Current Advances, Challenges and Future Directions. IEEE J. Sel. Areas Commun. 2021, 39, 300–310. [Google Scholar] [CrossRef]
- Bhardwaj, V.; Joshi, R.; Gaur, A. IoT-Based Smart Health Monitoring System for COVID-19. SN Comput. Sci. 2022, 3, 137. [Google Scholar] [CrossRef]
- Ahmed, A.; Xi, R.; Hou, M.; Shah, S.A.; Hameed, S. Harnessing Big Data Analytics for Healthcare: A Comprehensive Review of Frameworks, Implications, Applications, and Impacts. IEEE Access 2023, 11, 112891–112928. [Google Scholar] [CrossRef]
- Tao, H.; Bhuiyan, M.Z.A.; Rahman, M.A.; Wang, G.; Wang, T.; Ahmed, M.M.; Li, J. Economic perspective analysis of protecting big data security and privacy. Future Gener. Comput. Syst. 2019, 98, 660–671. [Google Scholar] [CrossRef]
- Wang, Z.; She, Q.; Ward, T.E. Generative adversarial networks in computer vision: A survey and taxonomy. ACM Comput. Surv. (CSUR) 2021, 54, 1–38. [Google Scholar] [CrossRef]
- Gui, J.; Sun, Z.; Wen, Y.; Tao, D.; Ye, J. A review on generative adversarial networks: Algorithms, theory, and applications. IEEE Trans. Knowl. Data Eng. 2021, 35, 3313–3332. [Google Scholar] [CrossRef]
- Radford, A.; Metz, L.; Chintala, S. Unsupervised representation learning with deep convolutional generative adversarial networks. arXiv 2015, arXiv:1511.06434. [Google Scholar]
- Odena, A.; Olah, C.; Shlens, J. Conditional image synthesis with auxiliary classifier gans. In Proceedings of the International Conference on Machine Learning, PMLR, Sydney, Australia, 6–11 August 2017; pp. 2642–2651. [Google Scholar]
- Peretz, D.; Arnaert, A.; Ponzoni, N. Determining the cost of implementing and operating a remote patient monitoring programme for the elderly with chronic conditions: A systematic review of economic evaluations. J. Telemed. Telecare 2018, 24, 13–21. [Google Scholar] [CrossRef]
- Hummel, J.P.; Leipold, R.J.; Amorosi, S.L.; Bao, H.; Deger, K.A.; Jones, P.W.; Kansal, A.R.; Ott, L.S.; Stern, S.; Stein, K.M.; et al. Outcomes and costs of remote patient monitoring among patients with implanted cardiac defibrillators: An economic model based on the PREDICT RM database. J. Cardiovasc. Electrophysiol. 2019, 30, 1066–1077. [Google Scholar] [CrossRef]
- Dunbar, P.; Browne, J.P.; O’connor, L. Determinants of regulatory compliance in health and social care services: A systematic review protocol. HRB Open Res. 2021, 4, 13. [Google Scholar] [CrossRef] [PubMed]
- Graafmans, W. EU Actions on Patient Safety and Quality of Healthcare; European Commission, Healthcare Systems Unit: Madrid, Spain, 2010. [Google Scholar]
- Selznick, P. Focusing Organisational Research on Regulation. In Regulatory Policy and the Social Sciences; University of California Press: Berkeley, CA, USA, 1985. [Google Scholar]
- Bayramzadeh, S.; Aghaei, P. Technology integration in complex healthcare environments: A systematic literature review. Appl. Ergon. 2021, 92, 103351. [Google Scholar] [CrossRef] [PubMed]
- Alahmar, A.; Crupi, M.E.; Benlamri, R. Ontological framework for standardizing and digitizing clinical pathways in healthcare information systems. Comput. Methods Programs Biomed. 2020, 196, 105559. [Google Scholar] [CrossRef]
- Alfian, G.; Syafrudin, M.; Ijaz, M.F.; Syaekhoni, M.A.; Fitriyani, N.L.; Rhee, J. A personalized healthcare monitoring system for diabetic patients by utilizing BLE-based sensors and real-time data processing. Sensors 2018, 18, 2183. [Google Scholar] [CrossRef] [PubMed]
- Taimoor, N.; Rehman, S. Reliable and resilient AI and IoT-based personalised healthcare services: A survey. IEEE Access 2021, 10, 535–563. [Google Scholar] [CrossRef]
- Schiza, E.C.; Kyprianou, T.C.; Petkov, N.; Schizas, C.N. Proposal for an ehealth based ecosystem serving national healthcare. IEEE J. Biomed. Health Inform. 2018, 23, 1346–1357. [Google Scholar] [CrossRef] [PubMed]
- Lin, G.; Wen, S.; Han, Q.L.; Zhang, J.; Xiang, Y. Software vulnerability detection using deep neural networks: A survey. Proc. IEEE 2020, 108, 1825–1848. [Google Scholar] [CrossRef]
- Baniya, B.; Rush, T. Deep based anomalies detection in emerging healthcare system. In Cybersecurity in Emerging Healthcare Systems; IET Digital Library: Stevenage, UK, 2024; pp. 241–261. [Google Scholar] [CrossRef]
- Bhuiyan, M.N.; Rahman, M.M.; Billah, M.M.; Saha, D. Internet of things (IoT): A review of its enabling technologies in healthcare applications, standards protocols, security, and market opportunities. IEEE Internet Things J. 2021, 8, 10474–10498. [Google Scholar] [CrossRef]
- Mazhar, T.; Talpur, D.B.; Shloul, T.A.; Ghadi, Y.Y.; Haq, I.; Ullah, I.; Ouahada, K.; Hamam, H. Analysis of IoT Security Challenges and Its Solutions Using Artificial Intelligence. Brain Sci. 2023, 13, 683. [Google Scholar] [CrossRef]
- Joffe, E.; Bearden, C.F.; Byrne, M.J.; Bernstam, E.V. Duplicate patient records–implication for missed laboratory results. In Proceedings of the AMIA Annual Symposium, Chicago, IL, USA, 3–7 November 2012; American Medical Informatics Association: Bethesda, MD, USA, 2012; Volume 2012, p. 1269. [Google Scholar]
- Zarour, M.; Alenezi, M.; Ansari, M.T.J.; Pandey, A.K.; Ahmad, M.; Agrawal, A.; Kumar, R.; Khan, R.A. Ensuring data integrity of healthcare information in the era of digital health. Healthc. Technol. Lett. 2021, 8, 66–77. [Google Scholar] [CrossRef]
- Ahima. Fundamentals for Building a Master Patient Index/Enterprise Master Patient Index (2010 Update); American Health Information Management Association: Chicago, IL, USA, 2010. [Google Scholar]
- Zan, S.; Agboola, S.; Moore, S.A.; Parks, K.A.; Kvedar, J.C.; Jethwani, K. Patient engagement with a mobile web-based telemonitoring system for heart failure self-management: A pilot study. JMIR MHealth UHealth 2015, 3, e3789. [Google Scholar] [CrossRef] [PubMed]
- Baniya, B.K.; Rush, T. Intelligent Anomaly Detection System Based on Ensemble and Deep Learning. In Proceedings of the 2024 26th International Conference on Advanced Communications Technology (ICACT), Pyeongchang, Republic of Korea, 3–7 February 2024; pp. 137–142. [Google Scholar]
- Baniya, B.K. Intrusion Representation and Classification using Learning Algorithm. In Proceedings of the 2022 24th International Conference on Advanced Communication Technology (ICACT), Pyeongchang, Republic of Korea, 13–16 February 2022; pp. 279–284. [Google Scholar]
- Mirza, M.; Osindero, S. Conditional generative adversarial nets. arXiv 2014, arXiv:1411.1784. [Google Scholar]
- Liu, S.; Wang, Y.; Zhang, J.; Chen, C.; Xiang, Y. Addressing the class imbalance problem in twitter spam detection using ensemble learning. Comput. Secur. 2017, 69, 35–49. [Google Scholar] [CrossRef]
- Tang, J.; Alelyani, S.; Liu, H. Data Classification: Algorithms and Applications. In Data Mining and Knowledge Discovery Series; CRC Press: Boca Raton, FL, USA, 2015; pp. 498–500. [Google Scholar]
- Wolpert, D.H. Stacked generalization. Neural Netw. 1992, 5, 241–259. [Google Scholar] [CrossRef]
Feature | Description | Types |
---|---|---|
ST | ST segment is the flat section of the ECG | Biometric |
Resp_Rate | Respiration Rate | |
Heart_rate | Heart Rate | |
DIA | Diastolic Blood Pressure | |
SYS | Systolic Blood Pressure | |
Pulse_Rate | Pulse Rate | |
SpO2 | Peripheral Oxygen Saturation | |
Temp | Temperature | |
SrcBytes | Source Bytes | Network flow metric |
DstBytes | Destination Bytes | |
SrcLoad | Source Load | |
DstLoad | Destination Load | |
SrcGap | Source Missing Bytes | |
DstGap | Destination Missing Bytes | |
SIntPkt | Source Inter Packet | |
DIntPkt | Destination Inter Packet | |
SIntPktAct | Source Active Inter Packet | |
DIntPktAct | Destination Active Inter Packet | |
SrcJitter | Source Jitter | |
DstJitter | Destination Jitter | |
sMaxPktSz | Source Maximum Transmitted Packet Size | |
dMaxPktSz | Destination Maximum Transmitted Packet Size | |
sMinPktSz | Source Minimum Transmitted Packet Size | |
dMinPktSz | Destination Minimum Transmitted Packet Size | |
Dur | Duration | |
Trans | Aggregated Packets Counts | |
TotPkts | Total Packets Count | |
TotBytes | Total Packets Bytes | |
Loss | Retransmitted or Dropped Packets | |
pLoss | Percentage of Retransmitted or Dropped Packet | |
pSrcLoss | Percentage of Source Retransmitted or Dropped Packet | |
pDstLoss | Percentage of Destination Retransmitted or Dropped Packet | |
Rate | Number of Packets Per Second | |
Load | Load |
Feature Group | Accuracy | Precision | Recall | F1-Score |
---|---|---|---|---|
Biometric | 96.64 | 96.80 | 96.61 | 96.61 |
Network flow metric | 95.54 | 95.68 | 95.50 | 95.50 |
Combined (biometric+network) feature sets | 96.61 | 96.76 | 96.57 | 96.57 |
Predicted | |||
---|---|---|---|
Normal | Attack | ||
Actual | Normal | 0.998 | 0.002 |
Attack | 0.066 | 0.934 |
Predicted | |||
---|---|---|---|
Normal | Attack | ||
Actual | Normal | 0.986 | 0.014 |
Attack | 0.076 | 0.924 |
Predicted | |||
---|---|---|---|
Normal | Attack | ||
Actual | Normal | 0.997 | 0.003 |
Attack | 0.067 | 0.933 |
Predicted | |||
---|---|---|---|
Normal | Attack | ||
Actual | Normal | 0.97 | 0.03 |
Attack | 0.05 | 0.95 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Baniya, B.K. ACGAN for Addressing the Security Challenges in IoT-Based Healthcare System. Sensors 2024, 24, 6601. https://doi.org/10.3390/s24206601
Baniya BK. ACGAN for Addressing the Security Challenges in IoT-Based Healthcare System. Sensors. 2024; 24(20):6601. https://doi.org/10.3390/s24206601
Chicago/Turabian StyleBaniya, Babu Kaji. 2024. "ACGAN for Addressing the Security Challenges in IoT-Based Healthcare System" Sensors 24, no. 20: 6601. https://doi.org/10.3390/s24206601
APA StyleBaniya, B. K. (2024). ACGAN for Addressing the Security Challenges in IoT-Based Healthcare System. Sensors, 24(20), 6601. https://doi.org/10.3390/s24206601