Multi-layer security scheme for implantable medical devices

被引:0
|
作者
Heena Rathore
Chenglong Fu
Amr Mohamed
Abdulla Al-Ali
Xiaojiang Du
Mohsen Guizani
Zhengtao Yu
机构
[1] Hiller Measuremnts,
[2] Temple University,undefined
[3] Qatar University,undefined
[4] University of Idaho,undefined
[5] Kunming University of Science and Technology,undefined
来源
关键词
Multi-layer security; Deep learning; Medical devices; Authentication;
D O I
暂无
中图分类号
学科分类号
摘要
Internet of Medical Things (IoMTs) is fast emerging, thereby fostering rapid advances in the areas of sensing, actuation and connectivity to significantly improve the quality and accessibility of health care for everyone. Implantable medical device (IMD) is an example of such an IoMT-enabled device. IMDs treat the patient’s health and give a mechanism to provide regular remote monitoring to the healthcare providers. However, the current wireless communication channels can curb the security and privacy of these devices by allowing an attacker to interfere with both the data and communication. The privacy and security breaches in IMDs have thereby alarmed both the health providers and government agencies. Ensuring security of these small devices is a vital task to prevent severe health consequences to the bearer. The attacks can range from system to infrastructure levels where both the software and hardware of the IMD are compromised. In the recent years, biometric and cryptographic approaches to authentication, machine learning approaches to anomaly detection and external wearable devices for wireless communication protection have been proposed. However, the existing solutions for wireless medical devices are either heavy for memory constrained devices or require additional devices to be worn. To treat the present situation, there is a requirement to facilitate effective and secure data communication by introducing policies that will incentivize the development of security techniques. This paper proposes a novel electrocardiogram authentication scheme which uses Legendre approximation coupled with multi-layer perceptron model for providing three levels of security for data, network and application levels. The proposed model can reach up to 99.99% testing accuracy in identifying the authorized personnel even with 5 coefficients.
引用
收藏
页码:4347 / 4360
页数:13
相关论文
共 50 条
  • [21] A Multi-layer Security Model for Internet of Things
    Yang, Xue
    Li, Zhihua
    Geng, Zhenmin
    Zhang, Haitao
    INTERNET OF THINGS-BK, 2012, 312 : 388 - 393
  • [22] Multi-layer stackable polymer memory devices
    Kwan, Wei Lek
    Tseng, Ricky J.
    Yang, Yang
    PHILOSOPHICAL TRANSACTIONS OF THE ROYAL SOCIETY A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES, 2009, 367 (1905): : 4159 - 4167
  • [23] Security and privacy issues in implantable medical devices: A comprehensive survey
    Camara, Carmen
    Pens-Lopez, Pedro
    Tapiador, Juan E.
    JOURNAL OF BIOMEDICAL INFORMATICS, 2015, 55 : 272 - 289
  • [24] Digital Investigation of Security Attacks on Cardiac Implantable Medical Devices
    Ellouze, Nourhene
    Rekhis, Slim
    Allouche, Mohamed
    Boudriga, Noureddine
    ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2014, (165): : 15 - 30
  • [25] A Comparative Review on the Wireless Implantable Medical Devices Privacy and Security
    Ankarali, Z. Esat
    Abbasi, Qammer H.
    Demir, A. Fatih
    Serpedin, Erchin
    Qaraqe, Khalid
    Arslan, Huseyin
    2014 EAI 4TH INTERNATIONAL CONFERENCE ON WIRELESS MOBILE COMMUNICATION AND HEALTHCARE (MOBIHEALTH), 2014, : 246 - 249
  • [26] Multi-layer Representation Learning for Medical Concepts
    Choi, Edward
    Bahadori, Mohammad Taha
    Searles, Elizabeth
    Coffey, Catherine
    Thompson, Michael
    Bost, James
    Tejedor-Sojo, Javier
    Sun, Jimeng
    KDD'16: PROCEEDINGS OF THE 22ND ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2016, : 1495 - 1504
  • [27] Patients, Pacemakers, and Implantable Defibrillators: Human Values and Security for Wireless Implantable Medical Devices
    Denning, Tamara
    Borning, Alan
    Friedman, Batya
    Gill, Brian T.
    Kohno, Tadayoshi
    Maisel, William H.
    CHI2010: PROCEEDINGS OF THE 28TH ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, VOLS 1-4, 2010, : 917 - +
  • [28] Network Security Based on GCN and Multi-Layer Perception
    Yu, Wei
    Liu, Huitong
    Song, Yu
    Wang, Jiaming
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2025, 16 (01) : 471 - 480
  • [29] Multi-Layer Approach To Internet of Things (IoT) Security
    Tukur, Yusuf Muhammad
    Thakker, Dhavalkumar
    Awan, Irfan-Ullah
    2019 7TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD 2019), 2019, : 109 - 116
  • [30] An Effective Sampling Scheme for Better Multi-layer Perceptrons
    Sug, Hyontai
    PROCEEDINGS OF THE 9TH WSEAS INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE, KNOWLEDGE ENGINEERING AND DATA BASES, 2010, : 302 - +