Maximizing healthcare security outcomes through AI/ML multi-label classification approach on IoHT devices

Vijayakumar KP, Pradeep K, Balasundaram A, Prusty MR. Enhanced Cyber Attack Detection Process for Internet of Health Things (IoHT) Devices Using Deep Neural Network. Processes. 2023;11(4):4. https://doi.org/10.3390/pr11041072.

Article  Google Scholar 

Mamdouh M, Awad AI, Khalaf AAM, Hamed HFA. Authentication and Identity Management of IoHT Devices: Achievements, Challenges, and Future Directions. Comput Secur. 2021;111:102491. https://doi.org/10.1016/j.cose.2021.102491.

Article  MATH  Google Scholar 

Huang Z. Analysis of IoT-based smart home applications. In: 2021 IEEE International Conference on Computer Science, Artificial Intelligence and Electronic Engineering (CSAIEE). 2021, pp 218–221. https://doi.org/10.1109/CSAIEE54046.2021.9543308.

Ma L, Li Z, Zheng M. A research on IoT based smart home. In: 2019 11th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA), Qiqihar, China: IEEE. 2019, pp 120–122. https://doi.org/10.1109/ICMTMA.2019.00033.

Cook DJ, Crandall AS, Thomas BL, Krishnan NC. CASAS: a smart home in a box. Computer 2013;46(7). https://doi.org/10.1109/MC.2012.328.

Tabaa M, Monteiro F, Bensag H, Dandache A. Green Industrial Internet of Things from a smart industry perspectives. Energy Rep. 2020;6:430–46. https://doi.org/10.1016/j.egyr.2020.09.022.

Article  Google Scholar 

Brincat AA, Pacifici F, Martinaglia S, Mazzola F. The Internet of Things for intelligent transportation systems in real smart cities scenarios. In: 2019 IEEE 5th World Forum on Internet of Things (WF-IoT). 2019, pp 128–132. https://doi.org/10.1109/WF-IoT.2019.8767247.

Atiq HU, Ahmad Z, uz Zaman SK, Khan MA, Shaikh AA, Al-Rasheed A. Reliable resource allocation and management for IoT transportation using fog computing. Electronics 2023;12(6):6. https://doi.org/10.3390/electronics12061452.

Smart Healthcare - an overview | ScienceDirect Topics. [Online]. Available: https://www.sciencedirect.com/topics/engineering/smart-healthcare. Accessed 11 Jun 2024.

Saba Raoof S, Durai MAS. A Comprehensive Review on Smart Health Care: Applications, Paradigms, and Challenges with Case Studies. Contrast Media Mol Imaging. 2022;2022:4822235. https://doi.org/10.1155/2022/4822235.

Article  Google Scholar 

Centenaro M, Costa CE, Granelli F, Sacchi C, Vangelista L. A Survey on Technologies, Standards and Open Challenges in Satellite IoT. IEEE Commun SurveysTutorials. 2021;23(3):1693–720. https://doi.org/10.1109/COMST.2021.3078433.

Article  Google Scholar 

ASRPM, Selvapandian AJV, AS. Design of an EEG-based transceiver with data decomposition for IoHT applications. In: 2021 fifth International Conference on I-SMAC (IoT in social, mobile, analytics and cloud) (I-SMAC), 2021, pp 258–262. https://doi.org/10.1109/I-SMAC52330.2021.9641040.

Ianculescu M, Alexandru A, Nicolau N-D, Neagu G, Bica O. IoHT and edge computing, warrants of optimal responsiveness of monitoring applications for seniors. A case study. In: 2019 22nd International Conference on Control Systems and Computer Science (CSCS), 2019, pp 655–661. https://doi.org/10.1109/CSCS.2019.00118.

Bansal M, Priya. Application layer protocols for Internet of Healthcare Things (IoHT). In: 2020 Fourth International Conference on Inventive Systems and Control (ICISC), 2020, pp 369–376. https://doi.org/10.1109/ICISC47916.2020.9171092.

Deb S, Islam R, RobaiatMou J, Islam T. Design and implementation of low cost ECG monitoring system for the patient using smart device. In: 2017 International Conference on Electrical, Computer and Communication Engineering (ECCE), 2017, pp 774–778. https://doi.org/10.1109/ECACE.2017.7913007.

Li C, Hu X, Zhang L. The IoT-based heart disease monitoring system for pervasive healthcare service. Procedia Comput Sci. 2017;112:2328–34. https://doi.org/10.1016/j.procs.2017.08.265.

Article  MATH  Google Scholar 

Vergara PM, de la Cal E, Villar JR, González VM, Sedano J. An IoT platform for epilepsy monitoring and supervising. J Sens. 2017;2017(1):6043069. https://doi.org/10.1155/2017/6043069.

Article  Google Scholar 

Catarinucci L, et al. An IoT-aware architecture for smart healthcare systems. IEEE Internet Things J. 2015;2(6):515–26. https://doi.org/10.1109/JIOT.2015.2417684.

Article  MATH  Google Scholar 

Yin Y, Zeng Y, Chen X, Fan Y. The internet of things in healthcare: an overview. J Ind Inf Integr. 2016;1:3–13. https://doi.org/10.1016/j.jii.2016.03.004.

Article  MATH  Google Scholar 

Azizan A, Ahmed W, Razak AHA. Sensing health: a bibliometric analysis of wearable sensors in healthcare. Health Technol. 2024;14(1):15–34. https://doi.org/10.1007/s12553-023-00801-y.

Article  MATH  Google Scholar 

Kaushik K, Singh K. Security and trust in IoT communications: role and impact. In: Choudhury S, Mishra R, Mishra RG, Kumar A (Eds), Intelligent Communication, Control and Devices, Singapore: Springer, 2020, pp 791–798. https://doi.org/10.1007/978-981-13-8618-3_81.

Thamilarasu G, Odesile A, Hoang A. An Intrusion Detection System for Internet of Medical Things. IEEE Access. 2020;8:181560–76. https://doi.org/10.1109/ACCESS.2020.3026260.

Article  Google Scholar 

What You Need To Know About Medical IoT Security. Capterra. [Online]. Available: https://www.capterra.com/resources/medical-internet-of-things-iot-security/. Accessed 12 Jun 2024.

Nations U. Population. United Nations. [Online]. Available: https://www.un.org/en/global-issues/population. Accessed 12 Jun 2024.

Chataut R, Phoummalayvane A, Akl R. Unleashing the power of IoT: a comprehensive review of IoT applications and future prospects in healthcare, agriculture, smart homes, smart cities, and industry 4.0. Sensors (Basel). 2023;23(16):7194. https://doi.org/10.3390/s23167194.

A Full Guide to Networks for IoT Healthcare Devices. [Online]. Available: https://intellisoft.io/iot-in-healthcare-key-trends-usages/. Accessed 12 Jun 2024.

Alam T. “A Reliable Communication framework and its use in internet of things (Iot),” May 01, 2018. Rochester: Social Science Research Network. [Online]. Available: https://papers.ssrn.com/abstract=3619450. Accessed 07 Apr 2025.

Healthcare IoT - Worldwide | Statista Market Forecast. Statista. [Online]. Available: https://www.statista.com/outlook/tmo/internet-of-things/healthcare-iot/worldwide. Accessed 12 Jun 2024.

Raghupathi W, Raghupathi V, Saharia A. Analyzing health data breaches: a visual analytics approach. AppliedMath. 2023;3(1):1. https://doi.org/10.3390/appliedmath3010011.

Cartwright AJ. The elephant in the room: cybersecurity in healthcare. J Clin Monit Comput. 2023;37(5):1123–32. https://doi.org/10.1007/s10877-023-01013-5.

Article  MATH  Google Scholar 

Reddy J, Elsayed N, ElSayed Z, Ozer M. A Review on Data Breaches in Healthcare Security Systems. IJCA. 2023;184(45):1–7. https://doi.org/10.5120/ijca2023922333.

Article  MATH  Google Scholar 

Cost of a data breach: Healthcare industry impacts. Security Intelligence. [Online]. Available: https://securityintelligence.com/articles/cost-of-a-data-breach-2023-healthcare-industry-impacts/securityintelligence.com/articles/cost-of-a-data-breach-2023-healthcare-industry-impacts. Accessed 12 Jun 2024.

Expression P. The Cost of Cyberattacks in Healthcare in 2023. Intraprise Health. [Online]. Available: https://intraprisehealth.com/the-cost-of-cyberattacks-in-healthcare/. Accessed 12 Jun 2024.

Wolf A. Biggest healthcare industry cyber attacks. Arctic Wolf. [Online]. Available: https://arcticwolf.com/resources/blog/top-healthcare-industry-cyberattacks/. Accessed 12 Jun 2024.

Chua JA. Cybersecurity in the healthcare industry. [Online]. Available: https://podiatrym.com/pdf/2021/7/Chua821web.pdf. Accessed 7 Apr 2025.

Djenna A, Eddine Saïdouni D. Cyber attacks classification in IoT-Based-Healthcare infrastructure.In: 2018 2nd Cyber Security in Networking Conference (CSNet), 2018, pp 1–4. https://doi.org/10.1109/CSNET.2018.8602974.

Magnusson J, Sloof J. A Literature survey on cyber attacks in healthcare. [Online]. Available: https://hex.cse.kau.se/~jonamagn102/DVAD03_Sloof_Magnusson.pdf. Accessed 7 Apr 2025.

Thyagarajan C, Suresh S, Sathish N, Suthir DS. A typical analysis and survey on healthcare cyber security. 2020;9(03). [Online]. Available: https://www.researchgate.net/publication/348369769_A_Typical_Analysis_And_Survey_On_Healthcare_Cyber_Security#fullTextFileContent. Accessed 07 Apr 2025.

Alanazi AT. Clinicians’ perspectives on healthcare cybersecurity and cyber threats. Cureus 15(10):e47026. https://doi.org/10.7759/cureus.47026.

Alipour J, Mehdipour Y, Karimi A, Khorashadizadeh M, Akbarpour M. Security, confidentiality, privacy and patient safety in the hospital information systems from the users’ perspective: A cross-sectional study. Int J Med Informatics. 2023;175:105066. https://doi.org/10.1016/j.ijmedinf.2023.105066.

Article  Google Scholar 

Raiyn J. A survey of cyber attack detection strategies. Int J Secur Appl. 2014;8:247–56. https://doi.org/10.14257/ijsia.2014.8.1.23.

Article  MATH  Google Scholar 

Patel M, Amritha PP, Sudheer VB, Sethumadhavan M. DDoS attack detection model using machine learning algorithm in next generation firewall. Procedia Comput Sci. 2024;233:175–83. https://doi.org/10.1016/j.procs.2024.03.207.

Article  Google Scholar 

Nguyen LAT, To BL, Nguyen HK, Nguyen MH. Detecting phishing web sites: a heuristic URL-based approach. 2013 International Conference on Advanced Technologies for Communications (ATC 2013), 2013, pp 597–602. https://doi.org/10.1109/ATC.2013.6698185.

Abdelhamid N, Ayesh A, Thabtah F. Phishing detection based Associative Classification data mining. Expert Syst Appl. 2014;41(13):5948–59. https://doi.org/10.1016/j.eswa.2014.03.019.

Article  MATH  Google Scholar 

Mvah F, Kengne Tchendji V, Tayou Djamegni C, Anwar AH, Tosh DK, Kamhoua C. Countering ARP spoofing attacks in software-defined networks using a game-theoretic approach. Comput Secur. 2024;139:103696. https://doi.org/10.1016/j.cose.2023.103696.

Kumar V, Sinha D. A robust intelligent zero-day cyber-attack detection technique. Complex Intell Syst. 2021;7(5):2211–34. https://doi.org/10.1007/s40747-021-00396-9.

Article  MATH  Google Scholar 

Holm H. Signature based intrusion detection for zero-day attacks: (not) a closed chapter? In: Proceedings of the 2014 47th Hawaii International Conference on System Sciences, In: HICSS ’14. USA: IEEE Computer Society, 2014, pp. 4895–4904. https://doi.org/10.1109/HICSS.2014.600.

Soe YN, Feng Y, Santosa PI, Hartanto R, Sakurai K. Rule Generation for Signature Based Detection Systems of Cyber Attacks in IoT Environments. Bull Netw Comput Syst Softw. 2019;8(2):2.

Google Scholar 

Visoottiviseth V, Sakarin P, Thongwilai J, Choobanjong T. Signature-based and behavior-based attack detection with machine learning for Home IoT devices. In: 2020 IEEE REGION 10 CONFERENCE (TENCON), 2020, pp 829–834. https://doi.org/10.1109/TENCON50793.2020.9293811.

Kwon H-Y, Kim T, Lee M-K. Advanced Intrusion Detection Combining Signature-Based and Behavior-Based Detection Methods. Electronics. 2022;11(6):6. https://doi.org/10.3390/electronics11060867.

Article  MATH  Google Scholar 

Alsamiri J, Alsubhi K. Internet of Things cyber attacks detection using machine learning. IJACSA. 2019;10(12). https://doi.org/10.14569/IJACSA.2019.0101280.

Mtukushe N, Onaolapo AK, Aluko A, Dorrell DG. Review of Cyberattack Implementation, Detection, and Mitigation Methods in Cyber-Physical Systems. Energies. 2023;16(13):13. https://doi.org/10.3390/en16135206.

Article  Google Scholar 

Apruzzese G et al. The role of machine learning in cybersecurity. Digit Threats.2023;4(1):8:1–8:38. https://doi.org/10.1145/3545574.

Shombot ES, Dusserre G, Bestak R, Ahmed NB. An application for predicting phishing attacks: A case of implementing a support vector machine learning model. Cyber Secur Appl. 2024;2:100036. https://doi.org/10.1016/j.csa.2024.100036.

Article  Google Scholar 

Bahassi H, Edddermoug N, Mansour A, Mohamed A. Toward an exhaustive review on Machine Learning for Cybersecurity. Procedia Comput Sci. 2022;203:583–7. https://doi.org/10.1016/j.procs.2022.07.083.

Article  MATH  Google Scholar 

Liu L, Wang B, Yu B, Zhong Q. Automatic malware classification and new malware detection using machine learning. Front Inf Technol Electronic Eng. 2017;18(9):1336–47. https://doi.org/10.1631/FITEE.1601325.

Article  MATH  Google Scholar 

Jullian O, Otero B, Rodriguez E, Gutierrez N, Antona H, Canal R. Deep-learning based detection for cyber-attacks in IoT networks: a distributed attack detection framework. J Netw Syst Manage. 2023;31(2):33. https://doi.org/10.1007/s10922-023-09722-7.

Article  Google Scholar 

Comments (0)

No login
gif