Fusion of machine learning and blockchain-based privacy-preserving approach for healthcare data in the Internet of Things

Behnam Rezaei Bezanjani, Seyyed Hamid Ghafouri, Reza Gholamrezaei
{"title":"Fusion of machine learning and blockchain-based privacy-preserving approach for healthcare data in the Internet of Things","authors":"Behnam Rezaei Bezanjani, Seyyed Hamid Ghafouri, Reza Gholamrezaei","doi":"10.1007/s11227-024-06392-3","DOIUrl":null,"url":null,"abstract":"<p>In recent years, the rapid integration of Internet of Things (IoT) devices into the healthcare sector has brought about revolutionary advancements in patient care and data management. While these technological innovations hold immense promise, they concurrently raise critical security concerns, particularly in safeguarding medical data against potential cyber threats. The sensitive nature of health-related information requires robust measures to ensure patient data's confidentiality, integrity, and availability within IoT-enabled medical environments. Addressing the imperative need for enhanced security in IoT-based healthcare systems, we propose a comprehensive method encompassing three distinct phases. In the first phase, we implement blockchain-enabled request and transaction encryption to fortify the security of data transactions, providing an immutable and transparent framework. Subsequently, in the second phase, we introduce request pattern recognition check, leveraging diverse data sources to identify and thwart potential unauthorized access attempts. Finally, the third phase incorporates feature selection and the BiLSTM network to enhance the accuracy and efficiency of intrusion detection through advanced machine-learning techniques. We compared the simulation results of the proposed method with three recent related methods, namely AIBPSF-IoMT, OMLIDS-PBIoT, and AIMMFIDS. The evaluation criteria encompass detection rates, false alarm rates, precision, recall, and accuracy, crucial benchmarks in assessing the overall performance of intrusion detection systems. Notably, our findings reveal that the proposed method outperforms these existing methods across all evaluated criteria, underscoring its superiority in enhancing the security posture of IoT-based healthcare systems.</p>","PeriodicalId":501596,"journal":{"name":"The Journal of Supercomputing","volume":"5 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"The Journal of Supercomputing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1007/s11227-024-06392-3","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

In recent years, the rapid integration of Internet of Things (IoT) devices into the healthcare sector has brought about revolutionary advancements in patient care and data management. While these technological innovations hold immense promise, they concurrently raise critical security concerns, particularly in safeguarding medical data against potential cyber threats. The sensitive nature of health-related information requires robust measures to ensure patient data's confidentiality, integrity, and availability within IoT-enabled medical environments. Addressing the imperative need for enhanced security in IoT-based healthcare systems, we propose a comprehensive method encompassing three distinct phases. In the first phase, we implement blockchain-enabled request and transaction encryption to fortify the security of data transactions, providing an immutable and transparent framework. Subsequently, in the second phase, we introduce request pattern recognition check, leveraging diverse data sources to identify and thwart potential unauthorized access attempts. Finally, the third phase incorporates feature selection and the BiLSTM network to enhance the accuracy and efficiency of intrusion detection through advanced machine-learning techniques. We compared the simulation results of the proposed method with three recent related methods, namely AIBPSF-IoMT, OMLIDS-PBIoT, and AIMMFIDS. The evaluation criteria encompass detection rates, false alarm rates, precision, recall, and accuracy, crucial benchmarks in assessing the overall performance of intrusion detection systems. Notably, our findings reveal that the proposed method outperforms these existing methods across all evaluated criteria, underscoring its superiority in enhancing the security posture of IoT-based healthcare systems.

Abstract Image

融合机器学习和基于区块链的隐私保护方法,用于物联网中的医疗保健数据
近年来,物联网(IoT)设备迅速融入医疗保健领域,为患者护理和数据管理带来了革命性的进步。虽然这些技术创新前景广阔,但同时也引发了严重的安全问题,尤其是在保护医疗数据免受潜在网络威胁方面。健康相关信息的敏感性要求采取强有力的措施,以确保物联网医疗环境中患者数据的保密性、完整性和可用性。为了满足在基于物联网的医疗系统中增强安全性的迫切需要,我们提出了一种包含三个不同阶段的综合方法。在第一阶段,我们实施了区块链请求和交易加密,以加强数据交易的安全性,提供了一个不可变和透明的框架。随后,在第二阶段,我们引入了请求模式识别检查,利用不同的数据源来识别和挫败潜在的未经授权的访问企图。最后,第三阶段结合特征选择和 BiLSTM 网络,通过先进的机器学习技术提高入侵检测的准确性和效率。我们将所提方法的仿真结果与三种最新的相关方法(即 AIBPSF-IoMT、OMLIDS-PBIoT 和 AIMMFIDS)进行了比较。评估标准包括检测率、误报率、精确度、召回率和准确度,这些都是评估入侵检测系统整体性能的重要基准。值得注意的是,我们的研究结果表明,所提出的方法在所有评估标准上都优于这些现有方法,这凸显了它在增强基于物联网的医疗保健系统安全态势方面的优势。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信