Access the full text.
Sign up today, get DeepDyve free for 14 days.
U. Satija, Barathram Ramkumar, M. Manikandan (2017)
Real-Time Signal Quality-Aware ECG Telemetry System for IoT-Based Health Care MonitoringIEEE Internet of Things Journal, 4
Carlos Dourado, S. Silva, Raul Nóbrega, A. Barros, P. Filho, V. Albuquerque (2019)
Deep learning IoT system for online stroke detection in skull computed tomography imagesComput. Networks, 152
Gaël Beck, T. Duong, M. Lebbah, Hanene Azzag, C. Cérin (2019)
A Distributed and Approximated Nearest Neighbors Algorithm for an Efficient Large Scale Mean Shift ClusteringArXiv, abs/1902.03833
Ninu Sreedharan, Brammya Ganesan, R. Raveendran, Praveena Sarala, Binu Dennis, Rajakumar R. (2018)
Grey Wolf optimisation-based feature selection and classification for facial emotion recognitionIET Biom., 7
Farhad Ahamed, Farnaz Farid (2018)
Applying Internet of Things and Machine-Learning for Personalized Healthcare: Issues and Challenges2018 International Conference on Machine Learning and Data Engineering (iCMLDE)
Yumin Liu, Haofei Zhou, F. Tsung, Shuai Zhang (2019)
Real-time quality monitoring and diagnosis for manufacturing process profiles based on deep belief networksComput. Ind. Eng., 136
Gerd Kortuem, F. Kawsar, V. Sundramoorthy, Dan Fitton (2010)
Smart objects as building blocks for the Internet of thingsIEEE Internet Computing, 14
S. Nandyal, Aishwarya Gada (2018)
A Holistic Approach For Patient Health Care Monitoring System Through IoT2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)
Liming Fang, Yang Li, Zhe Liu, Changchun Yin, Minghui Li, Zehong Cao (2020)
A Practical Model Based on Anomaly Detection for Protecting Medical IoT Control Services Against External AttacksIEEE Transactions on Industrial Informatics, 17
Ensieh Dovom, Amin Azmoodeh, A. Dehghantanha, D. Newton, R. Parizi, H. Karimipour (2019)
Fuzzy pattern tree for edge malware detection and categorization in IoTJ. Syst. Archit., 97
S. Rathore, J. Park (2018)
Semi-supervised learning based distributed attack detection framework for IoTAppl. Soft Comput., 72
Christopher McDermott, Andrei Petrovski (2017)
Investigation of computational intelligence techniques for intrusion detection in wireless sensor networks.International Journal of Computer Networks & Communications, 9
Elike Hodo, X. Bellekens, Andrew Hamilton, Pierre-Louis Dubouilh, E. Iorkyase, C. Tachtatzis, Robert Atkinson (2016)
Threat analysis of IoT networks using artificial neural network intrusion detection system2016 International Symposium on Networks, Computers and Communications (ISNCC)
B. Rajakumar, Aloysius George (2013)
On hybridizing fuzzy min max neural network and firefly algorithm for automated heart disease diagnosis2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)
L. Tan, Neng-Ming Wang (2010)
Future internet: The Internet of Things2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE), 5
S. Mirjalili, A. Lewis (2016)
The Whale Optimization AlgorithmAdv. Eng. Softw., 95
Seyed Aghili, H. Mala, M. Shojafar, Pedro Peris-López (2019)
LACO: Lightweight Three-Factor Authentication, Access Control and Ownership Transfer Scheme for E-Health Systems in IoTFuture Gener. Comput. Syst., 96
J. Fuentes, L. González-Manzano, A. Solanas, F. Veseli (2018)
Attribute-Based Credentials for Privacy-Aware Smart Health Services in IoT-Based Smart CitiesComputer, 51
José Gómez, Juan Boubeta-Puig, José Martínez, Guadalupe Ortiz (2020)
Integrating complex event processing and machine learning: An intelligent architecture for detecting IoT security attacksExpert Syst. Appl., 149
S. Islam, Daehan Kwak, Md. Kabir, M. Hossain, K. Kwak (2015)
The Internet of Things for Health Care: A Comprehensive SurveyIEEE Access, 3
Hongchun Qu, Zeliang Qiu, Xiaoming Tang, Min Xiang, Ping Wang (2018)
Incorporating unsupervised learning into intrusion detection for wireless sensor networks with structural co-evolvabilityAppl. Soft Comput., 71
S. Durga, Rishabh Nag, E. Daniel (2019)
Survey on Machine Learning and Deep Learning Algorithms used in Internet of Things (IoT) Healthcare2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)
S. Pawar, H. Deshmukh (2018)
A Survery on e-Health Care Monitoring for Heart Care Using IOT2018 International Conference on Inventive Research in Computing Applications (ICIRCA)
Muder Almiani, A. Ghazleh, Amer Al-Rahayfeh, Saleh Atiewi, A. Razaque (2020)
Deep recurrent neural network for IoT intrusion detection systemSimul. Model. Pract. Theory, 101
Vani Agrawal, Ratika Rastogi, Dinesh Tiwari (2018)
Spider Monkey Optimization: a surveyInternational Journal of System Assurance Engineering and Management, 9
A. Diro, N. Chilamkurti (2017)
Distributed attack detection scheme using deep learning approach for Internet of ThingsFuture Gener. Comput. Syst., 82
Rafik Hamza, Zheng Yan, Khandan Muhammad, P. Bellavista, Faiza Titouna (2020)
A privacy-preserving cryptosystem for IoT E-healthcareInf. Sci., 527
A. El-latif, Bassem Abd-El-Atty, Eman Abou-Nassar, S. Venegas-Andraca (2020)
Controlled alternate quantum walks based privacy preserving healthcare images in Internet of ThingsOptics and Laser Technology, 124
G. Borkar, L. Patil, Dilip Dalgade, Ankush Hutke (2019)
A novel clustering approach and adaptive SVM classifier for intrusion detection in WSN: A data mining conceptSustain. Comput. Informatics Syst., 23
Dongshu Wang, Dapei Tan, Lei Liu (2018)
Particle swarm optimization algorithm: an overviewSoft Computing, 22
K. Römer, Benedikt Ostermaier, F. Mattern, M. Fahrmair, W. Kellerer (2010)
Real-Time Search for Real-World Entities: A SurveyProceedings of the IEEE, 98
Nagaraj Balakrishnan, Arunkumar Rajendran, D. Pelusi, V. Ponnusamy (2019)
Deep Belief Network enhanced intrusion detection system to prevent security breach in the Internet of ThingsInternet Things, 14
Tahreem Yaqoob, Haider Abbas, Mohammed Atiquzzaman (2019)
Security Vulnerabilities, Attacks, Countermeasures, and Regulations of Networked Medical Devices—A ReviewIEEE Communications Surveys & Tutorials, 21
Mingming Huang, Runsheng Lin, Shuai Huang, Tengfei Xing (2017)
A novel approach for precipitation forecast via improved K-nearest neighbor algorithmAdv. Eng. Informatics, 33
Daming Li, Lianbing Deng, Minchang Lee, Haoxiang Wang (2019)
IoT data feature extraction and intrusion detection system for smart cities based on deep migration learningInt. J. Inf. Manag., 49
M. Beno, I. Valarmathi, S. Swamy, B. Rajakumar (2014)
Threshold prediction for segmenting tumour from brain MRI scansInternational Journal of Imaging Systems and Technology, 24
L. Khan, M. Awad, B. Thuraisingham (2007)
A new intrusion detection system using support vector machines and hierarchical clusteringThe VLDB Journal, 16
Li Li, Jian Yao, Renping Xie, Menghan Xia, Wei Zhang (2016)
A Unified Framework for Street-View Panorama StitchingSensors (Basel, Switzerland), 17
Eirini Anthi, Lowri Williams, Małgorzata Słowińska, G. Theodorakopoulos, P. Burnap (2019)
A Supervised Intrusion Detection System for Smart Home IoT DevicesIEEE Internet of Things Journal, 6
Mao Yi, Xiaohui Xu, Lei Xu (2019)
An Intelligent Communication Warning Vulnerability Detection Algorithm Based on IoT TechnologyIEEE Access, 7
Y. Zhang, Peisong Li, Xinheng Wang (2019)
Intrusion Detection for IoT Based on Improved Genetic Algorithm and Deep Belief NetworkIEEE Access, 7
Shahrzad Saremi, S. Mirjalili, A. Lewis (2017)
Grasshopper Optimisation Algorithm: Theory and applicationAdv. Eng. Softw., 105
Wenke Lee, S. Stolfo (1998)
Data Mining Approaches for Intrusion Detection
Zhibo Pang (2013)
Technologies and Architectures of the Internet-of-Things (IoT) for Health and Well-being
(2009)
IT ] 7 Ju l 2 00 6 A General Computation Rule for Lossy Summaries / Messages with Examples from Equalization
Manuel Martín, B. Carro, Antonio Sánchez-Esguevillas, Jaime Lloret (2017)
Conditional Variational Autoencoder for Prediction and Feature Recovery Applied to Intrusion Detection in IoTSensors (Basel, Switzerland), 17
J. Höller, V. Tsiatsis, C. Mulligan, Stefan Avesand, D. Boyle (2014)
From Machine-to-Machine to the Internet of Things - Introduction to a New Age of Intelligence
Sanaz Moosavi, Tuan Gia, E. Nigussie, A. Rahmani, S. Virtanen, H. Tenhunen, J. Isoaho (2016)
End-to-end security scheme for mobility enabled healthcare Internet of ThingsFuture Gener. Comput. Syst., 64
This paper tactics to implement the attack detection in medical Internet of things (IoT) devices using improved deep learning architecture for accomplishing the concept bring your own device (BYOD). Here, a simulation-based hospital environment is modeled where many IoT devices or medical equipment are communicated with each other. The node or the device, which is creating the attack are recognized with the support of attribute collection. The dataset pertaining to the attack detection in medical IoT is gathered from each node that is considered as features. These features are subjected to a deep belief network (DBN), which is a part of deep learning algorithm. Despite the existing DBN, the number of hidden neurons of DBN is tuned or optimized correctly with the help of a hybrid meta-heuristic algorithm by merging grasshopper optimization algorithm (GOA) and spider monkey optimization (SMO) in order to enhance the accuracy of detection. The hybrid algorithm is termed as local leader phase-based GOA (LLP-GOA). The DBN is used to train the nodes by creating the data library with attack details, thus maintaining accurate detection during testing.Design/methodology/approachThis paper has presented novel attack detection in medical IoT devices using improved deep learning architecture as BYOD. With this, this paper aims to show the high convergence and better performance in detecting attacks in the hospital network.FindingsFrom the analysis, the overall performance analysis of the proposed LLP-GOA-based DBN in terms of accuracy was 0.25% better than particle swarm optimization (PSO)-DBN, 0.15% enhanced than grey wolf algorithm (GWO)-DBN, 0.26% enhanced than SMO-DBN and 0.43% enhanced than GOA-DBN. Similarly, the accuracy of the proposed LLP-GOA-DBN model was 13% better than support vector machine (SVM), 5.4% enhanced than k-nearest neighbor (KNN), 8.7% finer than neural network (NN) and 3.5% enhanced than DBN.Originality/valueThis paper adopts a hybrid algorithm termed as LLP-GOA for the accurate detection of attacks in medical IoT for improving the enhanced security in healthcare sector using the optimized deep learning. This is the first work which utilizes LLP-GOA algorithm for improving the performance of DBN for enhancing the security in the healthcare sector.
Data Technologies and Applications – Emerald Publishing
Published: Oct 11, 2021
Keywords: Medical Internet of things; Bring your own device; Deep belief network; Grasshopper optimization algorithm; Spider monkey optimization; Local leader phase-based grasshopper optimization algorithm
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.