Secure Data Transmission in Healthcare Internet of Things Using Bayesian Deep Q Neural Network with Privacy Preservation Authentication Scheme

Authors

  • M. Lorate Shiny, Kalpana Murugan, Nagaraj Ramrao

Keywords:

Healthcare security, Internet of Things, Deep learning, Privacy-preserving, cipher text, attribute encryption, deep Q network

Abstract

The integration of the Internet of Things (IoT) in the healthcare industry has led to the development of efficient IoT-based healthcare systems for real-time patient monitoring, with the ability to store and process large amounts of data. However, the sharing of sensitive patient information, such as health status and device usage, over the cloud raises security concerns. To address these issues, cryptographic methods and deep learning models have been used to provide secure data transmission and anomaly detection. In this paper, a privacy-preserving deep learning model called the Bayesian Deep Q neural network (BDQNN) with Ciphertext-attribute based policy encryption (CP-ABPE) has been proposed to protect transmitted data from external threats and reduce communication overhead in an IoT-based healthcare system. The proposed model was evaluated through simulation experiments and demonstrated superior performance compared to traditional methods, with an accuracy of 98.3%, sensitivity of 94.2%, specificity of 96.9%, precision of 95.9%, communication overhead of 68.1%, encryption time of 59.4ms, and decryption time of 60.2ms.

Downloads

Download data is not yet available.

References

Empowering the Health Workforce: Strategies to Make the Most of the Digital Revolution; Technical Report; Organization for Economic Co-Operation and Development (OECD): Paris, France, 2020. Available online: https://www.oecd.org/publications/ empowering-the-health-workforce-to-make-the-most-of-the-digital-revolution-37ff0eaa-en.htm (accessed on 6 July 2022).

Hallberg, D., & Salimi, N. (2020). Qualitative and Quantitative Analysis of Definitions of e-Health and m-Health. Healthcare informatics research, 26(2), 119-128.

Wan, H., Zhuang, L., Pan, Y., Gao, F., Tu, J., Zhang, B., & Wang, P. (2020). Biomedical sensors. In Biomedical Information Technology (pp. 51-79). Academic Press.

Angelov, G. V., Nikolakov, D. P., Ruskova, I. N., Gieva, E. E., & Spasova, M. L. (2019). Healthcare sensing and monitoring. In Enhanced Living Environments: Algorithms, Architectures, Platforms, and Systems (pp. 226-262). Cham: Springer International Publishing.

Kathamuthu, N. D., Chinnamuthu, A., Iruthayanathan, N., Ramachandran, M., & Gandomi, A. H. (2022). Deep Q-learning-based neural network with privacy preservation method for secure data transmission in internet of things (IoT) healthcare application. Electronics, 11(1), 157.

Ramos, J. L. H., Bernabé, J. B., & Skarmeta, A. F. (2014, July). Towards privacy-preserving data sharing in smart environments. In 2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (pp. 334-339). IEEE.

Guo, X., Duan, X., Gao, H., Huang, A., & Jiao, B. (2013). An ecg monitoring and alarming system based on android smart phone. Communications and Network, 5(03), 584-589.

Awotunde, J. B., Jimoh, R. G., Folorunso, S. O., Adeniyi, E. A., Abiodun, K. M., & Banjo, O. O. (2021). Privacy and security concerns in IoT-based healthcare systems. In The Fusion of Internet of Things, Artificial Intelligence, and Cloud Computing in Health Care (pp. 105-134). Cham: Springer International Publishing.

Mousavi, S. K., Ghaffari, A., Besharat, S., & Afshari, H. (2021). Security of internet of things based on cryptographic algorithms: a survey. Wireless Networks, 27, 1515-1555.

Rahim, R., Murugan, S., Mostafa, R. R., Dubey, A. K., Regin, R., Kulkarni, V., & Dhanalakshmi, K. S. (2020). Detecting the Phishing Attack Using Collaborative Approach and Secure Login through Dynamic Virtual Passwords. Webology, 17(2).

Tang, J., Liu, A., Zhao, M., & Wang, T. (2018). An aggregate signature based trust routing for data gathering in sensor networks. Security and Communication Networks, 2018.

Al-Qatf, M., Lasheng, Y., Al-Habib, M., & Al-Sabahi, K. (2018). Deep learning approach combining sparse autoencoder with SVM for network intrusion detection. Ieee Access, 6, 52843-52856.

Otoum, S., Kantarci, B., & Mouftah, H. T. (2019). On the feasibility of deep learning in sensor network intrusion detection. IEEE Networking Letters, 1(2), 68-71.

El-Meniawy, N., Rizk, M. R., Ahmed, M. A., & Saleh, M. (2022). An Authentication Protocol for the Medical Internet of Things. Symmetry, 14(7), 1483.

Deebak, B. D., Al-Turjman, F., Aloqaily, M., & Alfandi, O. (2019). An authentic-based privacy preservation protocol for smart e-healthcare systems in IoT. IEEE Access, 7, 135632-135649.

Zhang, C., Zhu, L., Xu, C., & Lu, R. (2018). PPDP: An efficient and privacy-preserving disease prediction scheme in cloud-based e-Healthcare system. Future Generation Computer Systems, 79, 16-25.

Wang, K., Chen, C. M., Tie, Z., Shojafar, M., Kumar, S., & Kumari, S. (2021). Forward privacy preservation in IoT-enabled healthcare systems. IEEE transactions on industrial informatics, 18(3), 1991-1999.

Kathamuthu, N. D., Chinnamuthu, A., Iruthayanathan, N., Ramachandran, M., & Gandomi, A. H. (2022). Deep Q-learning-based neural network with privacy preservation method for secure data transmission in internet of things (IoT) healthcare application. Electronics, 11(1), 157.

Ahamad, D., Hameed, S. A., & Akhtar, M. (2022). A multi-objective privacy preservation model for cloud security using hybrid Jaya-based shark smell optimization. Journal of King Saud University-Computer and Information Sciences, 34(6), 2343-2358.

Veeramakali, T., Siva, R., Sivakumar, B., Senthil Mahesh, P. C., & Krishnaraj, N. (2021). An intelligent internet of things-based secure healthcare framework using blockchain technology with an optimal deep learning model. The Journal of Supercomputing, 1-21.

Hui, H., Zhou, C., Xu, S., & Lin, F. (2020). A novel secure data transmission scheme in industrial internet of things. China Communications, 17(1), 73-88.

Abirami, P., & Bhanu, S. V. (2020). Enhancing cloud security using crypto-deep neural network for privacy preservation in trusted environment. Soft Computing, 24, 18927-18936.

Zhang, L., Shi, Y., Chang, Y. C., & Lin, C. T. (2020). Hierarchical fuzzy neural networks with privacy preservation for heterogeneous big data. IEEE Transactions on Fuzzy Systems, 29(1), 46-58.

Bi, H., Liu, J., & Kato, N. (2021). Deep learning-based privacy preservation and data analytics for IoT enabled healthcare. IEEE Transactions on Industrial Informatics, 18(7), 4798-4807.

Bordoloi, D., Singh, V., Sanober, S., Buhari, S. M., Ujjan, J. A., & Boddu, R. (2022). Deep learning in healthcare system for quality of service. Journal of Healthcare Engineering, 2022.

Zhang, Y., Zheng, D., & Deng, R. H. (2018). Security and privacy in smart health: Efficient policy-hiding attribute-based access control. IEEE Internet of Things Journal, 5(3), 2130-2145.

Park, K., Noh, S., Lee, H., Das, A. K., Kim, M., Park, Y., & Wazid, M. (2020). LAKS-NVT: Provably secure and lightweight authentication and key agreement scheme without verification table in medical internet of things. IEEE Access, 8, 119387-119404.

Shreya, S., Chatterjee, K., & Singh, A. (2022). A smart secure healthcare monitoring system with Internet of Medical Things. Computers and Electrical Engineering, 101, 107969.

Bahache, A. N., Chikouche, N., & Mezrag, F. (2022). Authentication schemes for healthcare applications using wireless medical sensor networks: A survey. SN Computer Science, 3(5), 382.

Jan, S. U., Ali, S., Abbasi, I. A., Mosleh, M. A., Alsanad, A., & Khattak, H. (2021). Secure patient authentication framework in the healthcare system using wireless medical sensor networks. Journal of Healthcare Engineering, 2021.

Mnih, V., Kavukcuoglu, K., Silver, D., Rusu, A. A., Veness, J., Bellemare, M. G., ... & Hassabis, D. (2015). Human-level control through deep reinforcement learning. nature, 518(7540), 529-533.

Lillicrap, T. P., Hunt, J. J., Pritzel, A., Heess, N. M. O., Erez, T., Tassa, Y., ... & Wierstra, D. P. (2020). U.S. Patent No. 10,776,692. Washington, DC: U.S. Patent and Trademark Office.

Guesmi, R., Farah, M. A. B., Kachouri, A., & Samet, M. (2014, November). A novel design of Chaos based S-Boxes using genetic algorithm techniques. In 2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA) (pp. 678-684). IEEE.

Downloads

Published

02.06.2024

How to Cite

M. Lorate Shiny. (2024). Secure Data Transmission in Healthcare Internet of Things Using Bayesian Deep Q Neural Network with Privacy Preservation Authentication Scheme. International Journal of Intelligent Systems and Applications in Engineering, 12(3), 4057–4066. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/6109

Issue

Section

Research Article