Abstract
Artificial intelligence (AI) technology is the greatest option for medical applications since it improves data security and reliability. As a result, several AI-driven security procedures are implemented by standard IoT cloud framework initiatives. Medical Internet of Things (MIoT) devices have a role to play in meeting the urgent need for timely medical services, disease treatment, and monitoring of medical resources. Previous studies have demonstrated that health issues cannot be detected with sensitive features and cannot avoid data leakage, providing low security for sensitive data from medical IoT devices. So, to overcome the problems, an AI-based Generative Deep Belief Neural Network (AI -GDBN2) is to avoid the leakage of sensitive data and improve accuracy. We collect the dataset based on Medical-IoT features from the standard repository in the cloud; the initial step is preprocessing the data using normalization and cleaning, identifying missing values, eliminating inappropriate values, and reducing unscaled feature range weights that can provide the original dataset. The next step involves feature selection using the Fuzzy Recurrent Neural Network (FRNN) algorithm. This process utilizes the behavioral support factors of the features to determine their weights. Finally, the proposed AI-GDBN2 model selects the attributes based on their maximum feature weight. AI provides security for sensitive data and avoids data leakages. And the AI-GDBN2 is providing security based on the encryption method Advanced Honey Encryption Standard (AHES) to encrypt data using the maximum threshold values features and transmit paths. Next, using the randomly generated hash key, the AHES method encrypts the data. AI-GDBN2 classifies the results based on sensitive and non-sensitive feature values and avoids abnormal data leakages to improve security. So, the simulation result proposed method AI-GDBN2 shows an accuracy of 0.98%; the outcomes of both the suggested and previous approaches are validated and compared using various performance metrics.









Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Data Availability
All the databases are freely available and cited in the manuscript.
References
Manickam P, Mariappan SA, Murugesan SM, Hansda S, Kaushik A, Shinde R, Thipperudraswamy SP. Artificial intelligence (AI) and Internet of Medical Things (IoMT) assisted biomedical systems for intelligent healthcare. Biosensors (Basel). 2022;12(8):562. https://doi.org/10.3390/bios12080562.
Gera S, Mridul M, Sharma S. IoT based automated health care monitoring system for Smart City. In: 2021 5th International Conference on Computing Methodologies and Communication (ICCMC), Erode, India, pp 364–368, 2021. https://doi.org/10.1109/ICCMC51019.2021.9418487.
Umer M, Aljrees T, Karamti H, et al. Heart failure patients monitoring using IoT-based remote monitoring system. Sci Rep. 2023;13:19213. https://doi.org/10.1038/s41598-023-46322-6.
Besher KM, Subah Z, Ali MZ. IoT sensor initiated healthcare data security. IEEE Sens J. 2021;21(10):11977–82. https://doi.org/10.1109/JSEN.2020.3013634.
Alraja MN, Farooque MMJ, Khashab B. The effect of security, privacy, familiarity, and trust on users’ attitudes toward the use of the IoT-based healthcare: the mediation role of risk perception. IEEE Access. 2019;7:111341–54. https://doi.org/10.1109/ACCESS.2019.2904006.
Bhuiyan MN, Rahman MM, Billah MM, Saha D. Internet of Things (IoT): a review of its enabling technologies in healthcare applications, standards protocols, security, and market opportunities. IEEE Internet Things J. 2021;8(13):10474–98. https://doi.org/10.1109/JIOT.2021.3062630.
Wang S, Zhou X, Wen K, Weng B, Zeng P. Security analysis of a user authentication scheme for IoT-based healthcare. IEEE Internet Things J. 2023;10(7):6527–30. https://doi.org/10.1109/JIOT.2022.3228921.
Liu J, Yang J, Wu W, Huang X, Xiang Y. Lightweight authentication scheme for data dissemination in cloud-assisted healthcare IoT. IEEE Trans Comput. 2023;72(5):1384–95. https://doi.org/10.1109/TC.2022.3207138.
Xu L, Zhou X, Tao Y, Liu L, Yu X, Kumar N. Intelligent security performance prediction for IoT-enabled healthcare networks using an improved CNN. IEEE Trans Ind Inf. 2022;18(3):2063–74. https://doi.org/10.1109/TII.2021.3082907.
Lin H, Kaur K, Wang X, Kaddoum G, Hu J, Hassan MM. Privacy-aware access control in IoT-enabled healthcare: a federated deep learning approach. IEEE Internet Things J. 2023;10(4):2893–902. https://doi.org/10.1109/JIOT.2021.3112686.
Zulkifl Z, et al. FBASHI: fuzzy and blockchain-based adaptive security for healthcare IoTs. IEEE Access. 2022;10:15644–56. https://doi.org/10.1109/ACCESS.2022.3149046.
Taimoor N, Rehman S. Reliable and resilient AI and IoT-based personalised healthcare services: a survey. IEEE Access. 2022;10:535–63. https://doi.org/10.1109/ACCESS.2021.3137364.
Affia AA, Finch H, Jung W, Samori IA, Potter L, Palmer X-L. IoT health devices: exploring security risks in the connected landscape. IoT. 2023;4(2):150–82. https://doi.org/10.3390/iot4020009.
Tao H, Bhuiyan MZA, Abdalla AN, Hassan MM, Zain JM, Hayajneh T. Secured data collection with hardware-based ciphers for IoT-based healthcare. IEEE Internet Things J. 2019;6(1):410–20. https://doi.org/10.1109/JIOT.2018.2854714.
Demirbaga U, Aujla GS. MapChain: a blockchain-based verifiable healthcare service management in IoT-based big data ecosystem. IEEE Trans Netw Serv Manag. 2022;19(4):3896–907. https://doi.org/10.1109/TNSM.2022.3204851.
Zaman S, Khandaker MRA, Khan RT, Tariq F, Wong K-K. Thinking out of the blocks: holochain for distributed security in IoT healthcare. IEEE Access. 2022;10:37064–81. https://doi.org/10.1109/ACCESS.2022.3163580.
Islam MM, Bhuiyan ZA. An integrated scalable framework for cloud and IoT based green healthcare system. IEEE Access. 2023;11:22266–82. https://doi.org/10.1109/ACCESS.2023.3250849.
Elayan H, Aloqaily M, Guizani M. Sustainability of healthcare data analysis IoT-based systems using deep federated learning. IEEE Internet Things J. 2022;9(10):7338–46. https://doi.org/10.1109/JIOT.2021.3103635.
Rashid FKM, Osman OS, Mcgee ET, Raad H. Discovering hazards in IoT architectures: a safety analysis approach for medical use cases. IEEE Access. 2023;11:53671–86. https://doi.org/10.1109/ACCESS.2023.3280414.
Xu G, et al. An IoT-based framework of Webvr visualization for medical big data in connected health. IEEE Access. 2019;7:173866–74. https://doi.org/10.1109/ACCESS.2019.2957149.
Rahman, Hossain MS, Alrajeh NA, Alsolami F. Adversarial examples—security threats to COVID-19 deep learning systems in medical IoT devices. IEEE Internet Things J. 2021;8(12):9603–10. https://doi.org/10.1109/JIOT.2020.3013710.
Shim K-A. Cryptanalysis of two signature schemes for IoT-based mobile payments and healthcare wireless medical sensor networks. IEEE Access. 2020;8:167203–8. https://doi.org/10.1109/ACCESS.2020.3023093.
Keshta I. AI-driven IoT for smart health care: security and privacy issues. Inform Med Unlocked. 2022;30: 100903. https://doi.org/10.1016/j.imu.2022.100903. (ISSN 2352-9148).
Alshamrani M. IoT and artificial intelligence implementations for remote healthcare monitoring systems: a survey. J King Saud Univ Comput Inf Sci. 2022;34(8, Part A):4687–701. https://doi.org/10.1016/j.jksuci.2021.06.005. (ISSN 1319-1578).
Xu J, Xi X, Chen J, Sheng VS, Ma J, Cui Z. A survey of deep learning for electronic health records. Appl Sci. 2022;12(22):11709. https://doi.org/10.3390/app122211709.
Vivek Raj K, Ankitha H, Ankitha NG, KanthiHegde LS. Honey encryption based hybrid cryptographic algorithm: a fusion ensuring enhanced security. In: 2020 5th International Conference on Communication and Electronics Systems (ICCES), Coimbatore, India, pp 490–494, 2020. https://doi.org/10.1109/ICCES48766.2020.9137849.
Ahmad S, Rass S, Schartner P. False-bottom encryption: deniable encryption from secret sharing. IEEE Access. 2023;11:62549–64. https://doi.org/10.1109/ACCESS.2023.3288285.
Alotaibi M. Improved blowfish algorithm-based secure routing technique in IoT-based WSN. IEEE Access. 2021;9:159187–97. https://doi.org/10.1109/ACCESS.2021.3130005.
Singandhupe A, La HM, Feil-Seifer D. Reliable security algorithm for drones using individual characteristics from an EEG signal. IEEE Access. 2018;6:22976–86. https://doi.org/10.1109/ACCESS.2018.2827362.
El Houda ZA, Brik B, Ksentini A, Khoukhi L. A MEC-based architecture to secure IoT applications using federated deep learning. IEEE Internet Things Mag. 2023;6(1):60–3. https://doi.org/10.1109/IOTM.001.2100238.
Rezaee K, Khosravi MR, Anari MS. Deep-transfer-learning-based abnormal behavior recognition using internet of drones for crowded scenes. IEEE Internet Things Mag. 2022;5(2):41–4. https://doi.org/10.1109/IOTM.001.2100138.
Ravi V, Chaganti R, Alazab M. Deep learning feature fusion approach for an intrusion detection system in SDN-based IoT networks. IEEE Internet Things Mag. 2022;5(2):24–9. https://doi.org/10.1109/IOTM.003.2200001.
Said EH, Otoum Y, Nayak A. A scalable meta learning-based model to secure IoT networks. IEEE Internet Things Mag. 2023;6(2):116–20. https://doi.org/10.1109/IOTM.001.2200226.
Liu J, Yang D, Lian M, Li M. Research on intrusion detection based on particle swarm optimization in IoT. IEEE Access. 2021;9:38254–68. https://doi.org/10.1109/ACCESS.2021.3063671.
Reising D, Cancelleri J, Loveless TD, Kandah F, Skjellum A. Radio identity verification-based IoT security using RF-DNA fingerprints and SVM. IEEE Internet Things J. 2021;8(10):8356–71. https://doi.org/10.1109/JIOT.2020.3045305.
Acknowledgements
The authors acknowledged the SRM Institute of Science and Technology, Ramapuram, Chennai, Tamil Nadu, India for supporting the research work by providing the facilities.
Funding
No funding received for this research.
Author information
Authors and Affiliations
Contributions
All authors participated equally in this research.
Corresponding author
Ethics declarations
Conflict of interest
No conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Anupriya, J., Devi, R.R. Artificial Intelligence Based Security Improvement in Medical-IoT Health Care System Using Generative Deep Belief Neural Network. SN COMPUT. SCI. 5, 1027 (2024). https://doi.org/10.1007/s42979-024-03307-0
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s42979-024-03307-0