عرض بسيط للتسجيلة

المؤلفZubair, Mohammad
المؤلفUnal, Devrim
المؤلفAl-Ali, Abdulla
المؤلفReimann, Thomas
المؤلفAlinier, Guillaume
تاريخ الإتاحة2022-03-24T05:34:01Z
تاريخ النشر2021
اسم المنشورJournal of Emergency Medicine, Trauma and Acute Care
المصدرqscience
الاقتباسZubair M, Unal D, Al-Ali A, Reimann T, Alinier G. Cybersecurity for next generation healthcare in Qatar, Journal of Emergency Medicine, Trauma & Acute Care 2021:41 http://dx.doi.org/jemtac.2021.qhc.41
الرقم المعياري الدولي للكتاب1999-7086
الرقم المعياري الدولي للكتاب1999-7094
معرّف المصادر الموحدhttps://doi.org/10.5339/jemtac.2021.qhc.41
معرّف المصادر الموحدhttp://hdl.handle.net/10576/28978
الملخصBackground: IoMT (Internet of Medical Things) devices (often referred to IoMT domain) have the potential to quickly diagnose and monitor patients outside the hospital by transmitting information through the cloud domain using wireless communication to remotely located medical professionals (user domain). Figure 1 shows the proposed IoMT framework designed to improve the privacy and security of the healthcare infrastructure. Methods: The framework consists of four modules: 1. Intrusion Detection System (IDS) 1 using deep learning (DL) to identify bluetooth-based Denial-of-Service (DoS)-attacks on IoMT devices and is deployed on edge-computing to secure communication between IoMT and edge. 2. IDS 1 is backed up with identity-based cryptography to encrypt the data and communication path. 3. Besides the identity-management system (to authenticate users), it is modeled with aliveness detection using face authentication techniques at the edge to guarantee the confidentiality, integrity, and availability (CIA) of the framework. 4. At the cloud level, another IDS 2 using MUSE (Merged-Hierarchical-Deep-Learning-System-with-Layer-Reuse) is proposed to protect the system against Man-In-The-Middle attacks, while the data is transferred between IoMT-EDGE-CLOUD. Results: These four modules are developed independently by precisely analyzing dependencies. The performance of IDS 3 in terms of precision is 99% and for the identity-management system, the time required to encrypt and decrypt 256-bit key is 66 milliseconds and 220 milliseconds respectively. The true positive rate is 90.1%, which suggests real-time detection and authentication rate. IDS (2) using MUSE (12-layer) the accuracy is >95%, and it consumes 15.7% to 27.63% less time to train than the smaller four-layer model. Conclusion: Our designed models suit edge devices and cloud-based cybersecurity systems and support the fast diagnosis and care required by critically ill patients in the community.
اللغةen
الناشرHamad bin Khalifa University Press (HBKU Press)
الموضوعdata security
deep learning
intrusion detection system
user authentication
internet of medical things
العنوانCybersecurity for next generation healthcare in Qatar
النوعArticle
رقم العدد2
رقم المجلد2021


الملفات في هذه التسجيلة

Thumbnail

هذه التسجيلة تظهر في المجموعات التالية

عرض بسيط للتسجيلة