Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
110 tokens/sec
GPT-4o
56 tokens/sec
Gemini 2.5 Pro Pro
44 tokens/sec
o3 Pro
6 tokens/sec
GPT-4.1 Pro
47 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Explainable Machine Learning-Based Security and Privacy Protection Framework for Internet of Medical Things Systems (2403.09752v1)

Published 14 Mar 2024 in cs.CR and cs.AI

Abstract: The Internet of Medical Things (IoMT) transcends traditional medical boundaries, enabling a transition from reactive treatment to proactive prevention. This innovative method revolutionizes healthcare by facilitating early disease detection and tailored care, particularly in chronic disease management, where IoMT automates treatments based on real-time health data collection. Nonetheless, its benefits are countered by significant security challenges that endanger the lives of its users due to the sensitivity and value of the processed data, thereby attracting malicious interests. Moreover, the utilization of wireless communication for data transmission exposes medical data to interception and tampering by cybercriminals. Additionally, anomalies may arise due to human errors, network interference, or hardware malfunctions. In this context, anomaly detection based on Machine Learning (ML) is an interesting solution, but it comes up against obstacles in terms of explicability and protection of privacy. To address these challenges, a new framework for Intrusion Detection Systems (IDS) is introduced, leveraging Artificial Neural Networks (ANN) for intrusion detection while utilizing Federated Learning (FL) for privacy preservation. Additionally, eXplainable Artificial Intelligence (XAI) methods are incorporated to enhance model explanation and interpretation. The efficacy of the proposed framework is evaluated and compared with centralized approaches using multiple datasets containing network and medical data, simulating various attack types impacting the confidentiality, integrity, and availability of medical and physiological data. The results obtained offer compelling evidence that the FL method performs comparably to the centralized method, demonstrating high performance. Additionally, it affords the dual advantage of safeguarding privacy and providing model explanation.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (61)
  1. CompTIA. Top internet of things stats and facts, 2023. https://connect.comptia.org/blog/top-internet-of-things-stats-facts, last accessed 2023-07-23.
  2. Survey of machine learning based intrusion detection methods for internet of medical things. Applied Soft Computing, page 110227, 2023.
  3. Nist special publication on intrusion detection systems. Technical report, Booz-allen and Hamilton Inc MCLEAN VA, 2001.
  4. James Franklin. The elements of statistical learning: data mining, inference and prediction. The Mathematical Intelligencer, 27(2):83–85, 2005.
  5. Aurélien Géron. Hands-on machine learning with scikit-learn and tensorflow: Concepts. Tools, and Techniques to build intelligent systems, 2017.
  6. A survey of semi-supervised learning methods. In 2008 International conference on computational intelligence and security, volume 2, pages 30–34. IEEE, 2008.
  7. Advances and open problems in federated learning. Foundations and Trends® in Machine Learning, 14(1–2):1–210, 2021.
  8. Federated machine learning: Concept and applications. ACM Transactions on Intelligent Systems and Technology (TIST), 10(2):1–19, 2019.
  9. An explainable artificial intelligence system for small-unit tactical behavior. In Proceedings of the national conference on artificial intelligence, pages 900–907. Citeseer, 2004.
  10. Infusing domain knowledge in ai-based” black box” models for better explainability with application in bankruptcy prediction. arXiv preprint arXiv:1905.11474, 2019.
  11. Timo Speith. A review of taxonomies of explainable artificial intelligence (xai) methods. In Proceedings of the 2022 ACM Conference on Fairness, Accountability, and Transparency, pages 2239–2250, 2022.
  12. Optimized machine learning enabled intrusion detection 2 system for internet of medical things. Franklin Open, 6:100056, 2024.
  13. L Dhanabal and SP Shantharajah. A study on nsl-kdd dataset for intrusion detection system based on classification algorithms. International journal of advanced research in computer and communication engineering, 4(6):446–452, 2015.
  14. Automated detection of cybersecurity attacks in healthcare systems with recursive feature elimination and multilayer perceptron optimization. Biocybernetics and Biomedical Engineering, 43(1):30–41, 2023.
  15. WUSTL EHMS 2020 Dataset for Internet of Medical Things (IoMT) Cybersecurity Research, 2019. https://www.cse.wustl.edu/ jain/ehms/index.html, last accessed 2021-12-29.
  16. Ecu-ioht: A dataset for analyzing cyberattacks in internet of health things. Ad Hoc Networks, 122:102621, 2021.
  17. Secured data collection with hardware-based ciphers for iot-based healthcare. IEEE Internet of Things Journal, 6(1):410–420, 2018.
  18. Nour Moustafa. A new distributed architecture for evaluating ai-based security systems at the edge: Network ton_iot datasets. Sustainable Cities and Society, 72:102994, 2021.
  19. Intrusion detection method based on stacked sparse autoencoder and sliced gru for connected healthcare systems. Arabian Journal for Science and Engineering, 48(2):2061–2074, 2023.
  20. Intrusion detection in 802.11 networks: Empirical evaluation of threats and a public dataset. IEEE Communications Surveys & Tutorials, 18(1):184–208, 2015.
  21. La-gru: Building combined intrusion detection model based on imbalanced learning and gated recurrent unit neural network. security and communication networks, 2018, 2018.
  22. Vinayakumar Ravi. Deep learning-based network intrusion detection in smart healthcare enterprise systems. Multimedia Tools and Applications, pages 1–19, 2023.
  23. Irvine University of California. Kdd cup 1999 data, 1999. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html, last accessed 202-01-19.
  24. Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp, 1:108–116, 2018.
  25. Wsn-ds: A dataset for intrusion detection systems in wireless sensor networks. Journal of Sensors, 2016, 2016.
  26. The evaluation of network anomaly detection systems: Statistical analysis of the unsw-nb15 data set and the comparison with the kdd99 data set. Information Security Journal: A Global Perspective, 25(1-3):18–31, 2016.
  27. A particle swarm optimization and deep learning approach for intrusion detection system in internet of medical things. Sustainability, 14(19):12828, 2022.
  28. An improved mutual information feature selection technique for intrusion detection systems in the internet of medical things. Sensors, 23(10):4971, 2023.
  29. An effective feature engineering for dnn using hybrid pca-gwo for intrusion detection in iomt architecture. Computer Communications, 160:139–149, 2020.
  30. An ensemble learning and fog-cloud architecture-driven cyber-attack detection framework for iomt networks. Computer Communications, 166:110–124, 2021.
  31. Cybersecurity of multi-cloud healthcare systems: A hierarchical deep learning approach. Applied Soft Computing, 118:108439, 2022.
  32. Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-iot dataset. Future Generation Computer Systems, 100:779–796, 2019.
  33. Intrusion detection system for healthcare systems using medical and network data: A comparison study. IEEE Access, 8:106576–106584, 2020.
  34. A privacy-aware framework for detecting cyber attacks on internet of medical things systems using data fusion and quantum deep learning. Information Fusion, page 101889, 2023.
  35. Federated transfer learning-based ids for the internet of medical things (iomt). In 2021 IEEE Globecom Workshops (GC Wkshps), pages 1–6. IEEE, 2021.
  36. Attack detection using federated learning in medical cyber-physical systems. In Proc. 28th Int. Conf. Comput. Commun. Netw.(ICCCN), volume 29, pages 1–8, 2019.
  37. Dew-cloud-based hierarchical federated learning for intrusion detection in iomt. IEEE journal of biomedical and health informatics, 27(2):722–731, 2022.
  38. Xsru-iomt: Explainable simple recurrent units for threat detection in internet of medical things networks. Future generation computer systems, 127:181–193, 2022.
  39. Internet of medical things: Architectural model, motivational factors and impediments. In 2018 15th learning and technology conference (L&T), pages 6–13. IEEE, 2018.
  40. Future internet: the internet of things architecture, possible applications and key challenges. In 2012 10th international conference on frontiers of information technology, pages 257–260. IEEE, 2012.
  41. Security and privacy for mobile healthcare networks: from a quality of protection perspective. IEEE Wireless Communications, 22(4):104–112, 2015.
  42. Security and privacy for the internet of medical things enabled healthcare systems: A survey. IEEE Access, 7:183339–183355, 2019.
  43. Authentication techniques and methodologies used in wireless body area networks. Journal of Systems Architecture, 101:101655, 2019.
  44. KV Arya and Rajasi Gore. Data security for wban in e-health iot applications. In Intelligent Data Security Solutions for e-Health Applications, pages 205–218. Elsevier, 2020.
  45. Iomt malware detection approaches: analysis and research challenges. IEEE Access, 7:182459–182476, 2019.
  46. An exhaustive survey on security and privacy issues in healthcare 4.0. Computer Communications, 153:311–335, 2020.
  47. Deep android malware detection. In Proceedings of the seventh ACM on conference on data and application security and privacy, pages 301–308, 2017.
  48. S Agatonovic-Kustrin and Rosemary Beresford. Basic concepts of artificial neural network (ann) modeling and its application in pharmaceutical research. Journal of pharmaceutical and biomedical analysis, 22(5):717–727, 2000.
  49. Deep sparse rectifier neural networks. In Proceedings of the fourteenth international conference on artificial intelligence and statistics, pages 315–323. JMLR Workshop and Conference Proceedings, 2011.
  50. Delving deep into rectifiers: Surpassing human-level performance on imagenet classification. In Proceedings of the IEEE international conference on computer vision, pages 1026–1034, 2015.
  51. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980, 2014.
  52. A unified approach to interpreting model predictions. Advances in neural information processing systems, 30, 2017.
  53. SI-AHMED Ayoub. Source code for explainable machine learning-based security and privacy protection framework for internet of medical things systems. https://github.com/ayoub1609/bispap, 2024. Accessed: 12-03-2024.
  54. Flower: A friendly federated learning framework. 2022.
  55. Confusion matrix — Wikipedia, the free encyclopedia. https://en.wikipedia.org/wiki/Confusion_matrix. ”https://en.wikipedia.org/wiki/Confusion_matrix, last accessed 24-07-2023”.
  56. Google Developers. Classification: Accuracy — Machine Learning Crash Course — Google Developers. https://developers.google.com/machine-learning/crash-course/classification/precision-and-recall, last accessed 2023-07-23.
  57. Wikipedia. F-score - Wikipedia. https://en.wikipedia.org/wiki/F-score, last accessed 2021-12-29.
  58. Google Developers. Classification: Accuracy — Machine Learning Crash Course — Google Developers. https://developers.google.com/machine-learning/crashcourse/classification/accuracy, last accessed 2023-07-23.
  59. Loss function — Wikipedia, the free encyclopedia. https://en.wikipedia.org/wiki/Loss_function. https://en.wikipedia.org/wiki/Loss_function, last accessed 2023-07-23.
  60. Explainable ai-based malicious traffic detection and monitoring system in next-gen iot healthcare. In 2023 International Conference on Smart Applications, Communications and Networking (SmartNets), pages 1–6. IEEE, 2023.
  61. An intelligent and explainable saas-based intrusion detection system for resource-constrained iomt. IEEE Internet of Things Journal, 2023.
User Edit Pencil Streamline Icon: https://streamlinehq.com
Authors (3)
  1. Ayoub Si-ahmed (2 papers)
  2. Mohammed Ali Al-Garadi (10 papers)
  3. Narhimene Boustia (2 papers)
Citations (3)

Summary

We haven't generated a summary for this paper yet.