A Novel Zero-Trust Machine Learning Green Architecture for Healthcare IoT Cybersecurity: Review, Analysis, and Implementation
- URL: http://arxiv.org/abs/2401.07368v1
- Date: Sun, 14 Jan 2024 21:01:21 GMT
- Title: A Novel Zero-Trust Machine Learning Green Architecture for Healthcare IoT Cybersecurity: Review, Analysis, and Implementation
- Authors: Zag ElSayed, Nelly Elsayed, Sajjad Bay,
- Abstract summary: The integration of Internet of Things (IoT) devices in healthcare applications has revolutionized patient care, monitoring, and data management.
However, the rapid involvement of these devices brings information security concerns that pose critical threats to patient privacy and the integrity of healthcare data.
This paper introduces a novel machine learning (ML) based architecture explicitly designed to address and mitigate security vulnerabilities in IoT devices within healthcare applications.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: The integration of Internet of Things (IoT) devices in healthcare applications has revolutionized patient care, monitoring, and data management. The Global IoT in Healthcare Market value is $252.2 Billion in 2023. However, the rapid involvement of these devices brings information security concerns that pose critical threats to patient privacy and the integrity of healthcare data. This paper introduces a novel machine learning (ML) based architecture explicitly designed to address and mitigate security vulnerabilities in IoT devices within healthcare applications. By leveraging advanced convolution ML architecture, the proposed architecture aims to proactively monitor and detect potential threats, ensuring the confidentiality and integrity of sensitive healthcare information while minimizing the cost and increasing the portability specialized for healthcare and emergency environments. The experimental results underscore the accuracy of up to 93.6% for predicting various attacks based on the results demonstrate a zero-day detection accuracy simulated using the CICIoT2023 dataset and reduces the cost by a factor of x10. The significance of our approach is in fortifying the security posture of IoT devices and maintaining a robust implementation of trustful healthcare systems.
Related papers
- CryptoDNA: A Machine Learning Paradigm for DDoS Detection in Healthcare IoT, Inspired by crypto jacking prevention Models [0.0]
The rapid integration of the Internet of Things (IoT) and Internet of Medical (IoM) devices in the healthcare industry has markedly improved patient care and hospital operations.
DDoS attacks present significant dangers, jeopardizing operational stability and patient safety.
This study introduces CryptoDNA, an innovative machine learning detection framework influenced by cryptojacking detection methods.
arXiv Detail & Related papers (2025-01-30T18:22:16Z) - A Review on the Security Vulnerabilities of the IoMT against Malware Attacks and DDoS [0.0]
The Internet of Medical Things (IoMT) has transformed the healthcare industry by connecting medical devices in monitoring treatment outcomes of patients.
This literature review examines the vulnerabilities of IoMT devices, focusing on critical threats and exploring mitigation strategies.
arXiv Detail & Related papers (2025-01-13T21:29:06Z) - A Federated Learning Platform as a Service for Advancing Stroke Management in European Clinical Centers [37.285731240749904]
This paper introduces a novel Federated Learning (FL) platform designed to support the configuration, monitoring, and management of FL processes.
Considering the production sensitivity inherent in clinical environments, we emphasize the security of the proposed FL architecture.
The platform has been successfully tested in various operational environments using a publicly available dataset.
arXiv Detail & Related papers (2024-10-02T09:24:05Z) - Lightweight CNN-BiLSTM based Intrusion Detection Systems for Resource-Constrained IoT Devices [38.16309790239142]
Intrusion Detection Systems (IDSs) have played a significant role in detecting and preventing cyber-attacks within traditional computing systems.
The limited computational resources available on Internet of Things (IoT) devices make it challenging to deploy conventional computing-based IDSs.
We propose a hybrid CNN architecture composed of a lightweight CNN and bidirectional LSTM (BiLSTM) to enhance the performance of IDS on the UNSW-NB15 dataset.
arXiv Detail & Related papers (2024-06-04T20:36:21Z) - SpikingJET: Enhancing Fault Injection for Fully and Convolutional Spiking Neural Networks [37.89720165358964]
SpikingJET is a novel fault injector designed specifically for fully connected and convolutional Spiking Neural Networks (SNNs)
Our work underscores the critical need to evaluate the resilience of SNNs to hardware faults, considering their growing prominence in real-world applications.
arXiv Detail & Related papers (2024-03-30T14:51:01Z) - Explainable Machine Learning-Based Security and Privacy Protection Framework for Internet of Medical Things Systems [1.8434042562191815]
The Internet of Medical Things (IoMT) transcends traditional medical boundaries, enabling a transition from reactive treatment to proactive prevention.
Its benefits are countered by significant security challenges that endanger the lives of its users due to the sensitivity and value of the processed data.
A new framework for Intrusion Detection Systems (IDS) is introduced, leveraging Artificial Neural Networks (ANN) for intrusion detection while utilizing Federated Learning (FL) for privacy preservation.
arXiv Detail & Related papers (2024-03-14T11:57:26Z) - Machine Learning for Healthcare-IoT Security: A Review and Risk Mitigation [4.499833362998488]
This paper reviews the fundamentals of healthcare IoT, its privacy, and data security challenges associated with machine learning and H-IoT devices.
The paper further emphasizes the importance of monitoring healthcare IoT layers such as perception, network, cloud, and application.
arXiv Detail & Related papers (2024-01-17T10:55:26Z) - A Secure Healthcare 5.0 System Based on Blockchain Technology Entangled
with Federated Learning Technique [0.44040106718326594]
Security and privacy are key concerns on the Internet of Medical Things (IoMT) industry.
By identifying concerns early, a smart healthcare system can help avoid long-term damage.
This study is to construct a secure health monitoring system in healthcare 5.0 by utilizing a blockchain technology and Intrusion Detection System (IDS)
arXiv Detail & Related papers (2022-09-16T23:25:42Z) - Edge Intelligence for Empowering IoT-based Healthcare Systems [42.909808437026136]
This article highlights the benefits of edge intelligent technology, along with AI in smart healthcare systems.
A novel smart healthcare model is proposed to boost the utilization of AI and edge technology in smart healthcare systems.
arXiv Detail & Related papers (2021-03-22T19:35:06Z) - I-Health: Leveraging Edge Computing and Blockchain for Epidemic
Management [36.55809341110476]
Epidemic situations demand intensive data collection and management from different locations/entities within a strict time constraint.
This paper proposes an Intelligent-Health (I-Health) system that aims to aggregate diverse e-health entities in a unique national healthcare system.
In particular, we design an automated patients monitoring scheme, at the edge, which enables the prompt discovery, remote monitoring, and fast emergency response.
arXiv Detail & Related papers (2020-12-18T23:41:00Z) - COVI White Paper [67.04578448931741]
Contact tracing is an essential tool to change the course of the Covid-19 pandemic.
We present an overview of the rationale, design, ethical considerations and privacy strategy of COVI,' a Covid-19 public peer-to-peer contact tracing and risk awareness mobile application developed in Canada.
arXiv Detail & Related papers (2020-05-18T07:40:49Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.