A Computational Framework for Cyber Threats in Medical IoT Systems
Abstract
:1. Introduction
1.1. Motivation and Objective
1.2. Contribution
- A secure and trusted communication in social networks by analyzing their behavior using the LM mechanism.
- The continuous behavior of involved devices can be easily traced by upgrading their transition nodes using the Viterbi algorithm.
- The performance of proposed scheme is analyzed with various security measures such as response time, system accuracy, number of resources used and request category.
2. Related Work
Research Statement
3. Proposed Approach
3.1. System Model
3.2. LM Algorithm
3.3. The Viterbi Method
Algorithm 1: Secure Communication Algorithm |
Input Value: (1) Number of IoT devices ‘d’, (2) 3-believing states (authentic, infected, unidentified) Input Value: (1) Number of IoT devices ‘d’, (2) 3-believing states (authentic, infected, unidentified) Output: Device is either trusted or in unidentified/infected state Step 1: Compute the artificial model according to below equation as: Step 3.1. Variable initialization of matrix and probability as: |
4. Performance Analysis
4.1. Baseline Mechanism
4.2. System Evaluation
4.3. Discussion
5. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Dunbar, R.I.M. Primate Social Systems; Springer Science & Business Media: Berlin/Heidelberg, Germany, 2013. [Google Scholar]
- Banathy, B.H. Designing Social Systems in a Changing World; Springer Science & Business Media: Berlin/Heidelberg, Germany, 2013. [Google Scholar]
- Mazman, S.G.; Usluel, Y.K. The usage of social networks in educational context. World Academy of Science. Eng. Technol. 2009, 49, 338–342. [Google Scholar]
- Parkinson, S.; Ward, P.; Wilson, K.; Miller, J. Cyber threats facing autonomous and connected vehicles: Future challenges. IEEE Trans. Intell. Transp. Syst. 2017, 18, 2898–2915. [Google Scholar] [CrossRef]
- Parn, E.A.; Edwards, D. Cyber threats confronting the digital built environment: Common data environment vulnerabilities and block chain deterrence. Eng. Constr. Archit. Manag. 2019, 26, 245–266. [Google Scholar] [CrossRef]
- Rathee, G.; Ahmad, F.; Iqbal, R.; Mukherjee, M. Cognitive Automation for Smart Decision-Making in Industrial Internet of Things. IEEE Trans. Ind. Inform. 2020, 17, 2152–2159. [Google Scholar] [CrossRef]
- Rathee, G.; Jaglan, N.; Garg, S.; Choi, B.J.; Choo, K.K.R. A Secure Spectrum Handoff Mechanism in Cognitive Radio Networks. IEEE Trans. Cogn. Commun. Netw. 2020, 6, 959–969. [Google Scholar] [CrossRef]
- Rathee, G.; Ahmad, F.; Sandhu, R.; Kerrache, C.A.; Azad, M.A. On the design and implementation of a secure blockchain-based hybrid framework for Industrial Internet-of-Things. Inf. Process. Manag. 2021, 58, 102526. [Google Scholar] [CrossRef]
- Khraisat, A.; Alazab, A. A critical review of intrusion detection systems in the internet of things: Techniques, deployment strategy, validation strategy, attacks, public datasets and challenges. Cybersecurity 2021, 4, 18. [Google Scholar] [CrossRef]
- Simoglou, G.; Violettas, G.; Petridou, S.; Mamatas, L. Intrusion Detection Systems for RPL Security: A Comparative Analysis. Comput. Secur. 2021, 104, 102219. [Google Scholar] [CrossRef]
- Saheed, Y.K.; Arowolo, M.O. Efficient Cyber Attack Detection on the Internet of Medical Things-Smart Environment Based on Deep Recurrent Neural Network and Machine Learning Algorithms. IEEE Access 2021, 9, 161546–161554. [Google Scholar] [CrossRef]
- Rahman, A.; Hossain, M.S.; Alrajeh, N.A.; Alsolami, F. Adversarial examples—Security threats to COVID-19 deep learning systems in medical IoT devices. IEEE Internet Things J. 2020, 8, 9603–9610. [Google Scholar] [CrossRef]
- Ranganayaki, R.S.; Sreeja, B.; Gandhari, S.; Ranganath, P.T.; Kumar, S. Cyber Security in Smart Hospitals: A Investigational Case Study. In Proceedings of the 2021 10th International Conference on System Modeling & Advancement in Research Trends (SMART), Moradabad, India, 10–11 December 2021; pp. 92–98. [Google Scholar]
- Mushtaq, M.; Shah, M.A.; Ghafoor, A. The Internet of Medical Things (IOMT): Security Threats and Issues Affecting Digital Economy. In Proceedings of the Competitive Advantage in the Digital Economy (CADE 2021), Online, 2–3 June 2021; pp. 137–142. [Google Scholar]
- Lourakis, M.I. A brief description of the Levenberg Marquardt algorithm implemented by levmar. Found. Res. Technol. 2005, 4, 1–6. [Google Scholar]
- Viterbi, A.J. A personal history of the Viterbi algorithm. IEEE Signal Process. Mag. 2006, 23, 120–142. [Google Scholar] [CrossRef]
- Ayub, S.; Shabir, M.; Riaz, M.; Aslam, M.; Chinram, R. Linear Diophantine fuzzy relations and their algebraic properties with decision making. Symmetry 2021, 13, 945. [Google Scholar] [CrossRef]
- Ashraf, S.; Abdullah, S.; Zeng, S.; Jin, H.; Ghani, F. Fuzzy decision support modeling for hydrogen power plant selection based on single valued neutrosophic sine trigonometric aggregation operators. Symmetry 2020, 12, 298. [Google Scholar] [CrossRef] [Green Version]
- Riaz, M.; Hashmi, M.R.; Pamucar, D.; Chu, Y.M. Spherical linear Diophantine fuzzy sets with modeling uncertainties in MCDM. Comput. Model. Eng. Sci. 2021, 126, 1125–1164. [Google Scholar] [CrossRef]
- Li, S.; Zhao, S.; Yuan, Y.; Sun, Q.; Zhang, K. Dynamic security risk evaluation via hybrid Bayesian risk graph in cyber-physical social systems. IEEE Trans. Comput. Soc. Syst. 2018, 5, 1133–1141. [Google Scholar] [CrossRef] [Green Version]
- Tagarev, T.; Sharkov, G. Computationally Intensive Functions in Designing and Operating Distributed Cyber Secure and Resilient Systems. In Proceedings of the 20th International Conference on Computer Systems and Technologies, Ruse, Bulgaria, 21–22 June 2019; pp. 8–18. [Google Scholar]
- Sánchez, H.S.; Rotondo, D.; Escobet, T.; Puig, V.; Quevedo, J. Bibliographical review on cyber-attacks from a control-oriented perspective. Annu. Rev. Control 2019, 48, 103–128. [Google Scholar] [CrossRef] [Green Version]
- Priyadharshini, N.; Gomathy, S.; Sabarimuthu, M. A review on microgrid architecture, cyber security threats and standards. Mater. Today Proc. 2020. [Google Scholar] [CrossRef]
- Bejan, A. Freedom and evolution in the dynamics of social systems. Biosystems 2020, 195, 104158. [Google Scholar] [CrossRef]
- Alturki, A.; Alshwihi, N.; Algarni, A. Factors influencing players’ susceptibility to social engineering in social gaming networks. IEEE Access 2020, 8, 97383–97391. [Google Scholar] [CrossRef]
- Yaacoub, J.P.A.; Salman, O.; Noura, H.N.; Kaaniche, N.; Chehab, A.; Malli, M. Cyber-physical systems security: Limitations, issues and future trends. Microprocess. Microsyst. 2020, 77, 103201. [Google Scholar] [CrossRef] [PubMed]
- Feng, J.; Yang, L.T.; Gati, N.J.; Xie, X.; Gavuna, B.S. Privacy-preserving computation in cyber-physical-social systems: A survey of the state-of-the-art and perspectives. Inf. Sci. 2020, 527, 341–355. [Google Scholar] [CrossRef]
- Attatfa, A.; Renaud, K.; De Paoli, S. Cyber diplomacy: A systematic literature review. Procedia Comput. Sci. 2020, 176, 60–69. [Google Scholar] [CrossRef] [PubMed]
Abbreviation | Description |
---|---|
2019 | Tagarev, T., & Sharkov, G. [21] |
TA | This paper describes high-performance, computer-assisted work related to the development and implementation of cyber security policy. |
AP | Specific details were presented in the formulation of cyber security policy and compliance with the ECHO project. |
PF | This research looks at using the power of a highly efficient computer, as well as ‘supercomputers’ for cyber security training, preliminary warning, certification, etc. |
2019 | Sánchez, H.S. et al. [22] |
TA | This review identifies attack modeling, security objectives, and targeted attack planning and threats that present mechanisms for detection and remedial actions. |
AP | Open-minded issues and future directions for further research on cyber security. |
PF | Provided the guidance for proper organization and reduction of threats. |
2020 | Priyadharshini, N. et al. [23] |
TA | Provides an overview of all the needs of small grids that explain cybersecurity issues. |
AP | Effective management and control of Microgrid |
PF | Microgrid with Distributed Generations with limited storage and ubiquitous communication networks can be future interest. |
2020 | Bejan, A. [24] |
TA | Physics of evolution causes the origin, evolution and future of the social systems is discussed. |
AP | The body movements made by individual producers of ideas and energy are similarly arranged, in stages on the surface of the earth. |
PF | In continuation the more effective research has to be carried out. |
Abbreviation | Description |
---|---|
2020 | Alturki, A. et al. [25] |
TA | Identifies factors that contribute to the abuse of social engineering concepts in social gaming systems. |
AP | The developed model is based on competitive and health belief ideas. |
PF | The presented results predicted the significant factors of risks such as tangible benefits, hard work, cooperative and competitive delays. |
2020 | Yaacoub, J.P.A. et al. [26] |
TA | This paper examines the key features of CPS and related technologies, applications and standards. In addition, CPS security threats and attacks are reviewed by highlighting the challenges and threat key issues. |
AP | CPS security solutions categorized as cryptographic and non-encryption solutions with highlighting important lessons learned appropriately throughout. |
PF | Deployment of the suggestions and recommendations in CPS as the main component of Industry 4.0. |
2020 | Feng, J. et al. [27] |
TA | A case study and a privacy-preserving tensor computation mechanism is presented for CPSs. |
AP | Privacy-preserving tensor computation framework. |
PF | The big data analysis is done by proposing the distributed and incremental tensor computations to enhance the performance of privacy-preserving in CPSSs. |
2020 | Attatfa, A. et al. [28] |
TA | A systematic literature survey is conducted to highlight the extent of recent cyber diplomacy research. |
AP | Literature gap in cyber diplomacy is covered. |
PF | Applied network sociology and Actor-Network Theory (ANT). |
Symbol | Meaning |
---|---|
Prob. of a node from state i to j with input request of length ‘l’ | |
Initial probability of state i | |
Probability output of state i. | |
Transition state from state i to j |
Artificial Training Schemes | Number of Hidden Nodes |
---|---|
LM | 9 |
Viterbi | 3 |
Artificial Model | Training | Testing | Overall Value |
---|---|---|---|
LM | 96.98 | 91.32 | 92.45 |
Viterbi | 97.42 | 95.48 | 94.37 |
Type | % of Attack Request | Level of Severity | Source Name |
---|---|---|---|
Legitimate | 0 | 0 | 30 |
Malicious | 20% | 1, 3 | 15 |
Hihly sensitive | 30% | 3, 4, 5 | 10 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Rathee, G.; Saini, H.; Kerrache, C.A.; Herrera-Tapia, J. A Computational Framework for Cyber Threats in Medical IoT Systems. Electronics 2022, 11, 1705. https://doi.org/10.3390/electronics11111705
Rathee G, Saini H, Kerrache CA, Herrera-Tapia J. A Computational Framework for Cyber Threats in Medical IoT Systems. Electronics. 2022; 11(11):1705. https://doi.org/10.3390/electronics11111705
Chicago/Turabian StyleRathee, Geetanjali, Hemraj Saini, Chaker Abdelaziz Kerrache, and Jorge Herrera-Tapia. 2022. "A Computational Framework for Cyber Threats in Medical IoT Systems" Electronics 11, no. 11: 1705. https://doi.org/10.3390/electronics11111705