Secure blockchain enabled Cyber–physical systems in healthcare using deep belief network with ResNet model

https://doi.org/10.1016/j.jpdc.2021.03.011Get rights and content

Highlights

  • Secure intrusion detection with blockchain in the healthcare sector is proposed.

  • It involves a series of cyber–physical system and deep learning processes.

  • The presented model takes place on NSL-KDD 2015, CIDDS-001, and ISIC dataset.

  • Presented DBN model has achieved a detection rate of 98.95% and 98.94% on the applied datasets.

  • Effective classification performance with ResNet 101 model achieving maximum sensitivity.

Abstract

Cyber–physical system (CPS) is the incorporation of physical processes with processing and data transmission. Cybersecurity is a primary and challenging issue in healthcare due to the legal and ethical perspective of the patient’s medical data. Therefore, the design of CPS model for healthcare applications requires special attention for ensuring data security. To resolve this issue, this paper proposes a secure intrusion, detection with blockchain based data transmission with classification model for CPS in healthcare sector. The presented model performs data acquisition process using sensor devices and intrusion detection takes place using deep belief network (DBN) model. In addition, the presented model uses a multiple share creation (MSC) model for the generation of multiple shares of the captured image, and thereby achieves privacy and security. Besides, the blockchain technology is applied for secure data transmission to the cloud server, which executes the residual network (ResNet) based classification model to identify the presence of the disease. The experimental validation of the presented model takes place using NSL-KDD 2015, CIDDS-001 and ISIC dataset. The simulation outcome pointed out the effective outcome of the presented model.

Introduction

Recently, Cyber–physical system (CPS) has gained maximum attention which has been assumed as an advanced model. It is the integration of processing and communication abilities globally. CPS is meant to be basic research that has been carried out by the US National Science Foundation (NSF) and preferred by US President’s Council of Advisors on Science and Technology. CPS depends upon sensing, computation, and networking. The current innovations of Wireless Sensor Networks (WSN), medical sensors, and Cloud Computing (CC) tend to make CPS an effective module for clinical applications such as healthcare and home patient care [15]. Such advances are applicable for observing the patient health status in remote site and provide better treatments. A manageable study has been processed on clinical sensors. The sensors are used for collecting the patient details which is highly confidential. The accumulated data is passed to access through the wireless communication medium. Also, wired sensors are applied; hence, WSN offers elasticity and makes it comfortable for physicians and patients. The data gathered by sensors are saved in a server and it can be accessed by physicians [1].

Security is the most significant one where the patient’s details are highly confidential from both legal and ethical sides [6]. Thus, at the time of developing CPS structure medical domains, maxi-mum attentions have to be provided for data security [13], [14], [19]. Database management models have to be effective and scalable. The clinical data is applicable to offer appropriate insight into treatments which is highly essential to save the user’s life, in which the data is available and accessible to legal medical officer whenever required. Additionally, medical applications need maximum computing resources for making smart decisions on the basis of huge patient’s data. Hence, the data which is collected by WSN is highly experienced with limited energy, computing, and memory storage.

The CC model is applicable to offer effective solutions for the problems involved in this study. The recent studies are endeavoring to apply state-of-the-art CC models for CPS that enhances the reliability of the network and activate actual data analysis. Furthermore, CC is said to be a Computing Infrastructure which is applied by a consumer organization whenever required. It offers the service like processing, saved, networking, and software “as a service”. [6] presented CC in the following: “cloud is a parallel and distributed computing (DC) is composed of interlinked as well as virtualized systems are supervised dynamically and projected as diverse computing resources based on the service-level agreements (SLA) that are implemented with a negotiation among service giver and consumers”. Hence, as per the name, it is considered that the cloud is composed of given as follows: (1) self-service, (2) per-usage metering as well as billing, (3) flexibility, and (4) customization.

The 2 factors of CC are highly applicable to end users. Initially, individuals are applying personal information with the help of system with Internet connection. Secondly, software applications are not essential for user’s PC and accessible on the cloud. Additionally, CC offers different software services, APIs, and development devices to researchers. This service activates the users to transform the processing structure to the cloud. The CC is a result of recent models like DC, Internet models such as service based structural design, web services, scheme organization which is autonomic computing, and hardware such as virtualization, multicore chips. The integrated sensor–cloud structure is an interior portion of CPS, in which the cloud maintains the cyber actions and the sensors maintain the external events. A progressive study on sensor–cloud is defined in [2]. Since the CPS method is novel, the problems are resolved effectively. Concurrent computation, data query, memory, and security are some of the problems.

In CPS, the concatenation of active user input like smart feedback scheme, electronic details of patient information, and passive user input like biosensors and smart tools in clinical platforms supports the data acquisition for making effective decisions. The integration of data acquisition and decision making scheme has been explored crucially for medical applications and these integration gains maximum attention. The options of applying CPS in medical sector encloses the establishment of coordinated interoperation of independent and applicable tools, also the novel approaches to manage and operate healthcare physical systems under the application of calculation and manage, reduced implantable smart tools, body area networks, systematic tools, and novel fabrication concepts.

Though massive CPS structures are existed, only less CPS architectures are available for medical domains. Hu et al. [11] have presented a service-oriented architecture (SOA) relied medical CPS method; hence, it suffers from incomplete structure. Wang et al. [26] implied a trusted CPS structural design for medical sector that applies WSN-CC combined approach. Banerjee et al. [5] applied a modeling and investigation of medical CPS. Thus, it experiences the issues of security and privacy. Rajkumar [18] stated that the challenges of CPS can be resolved in future where the outcome in a science of CPS as well as technological solutions can be provided. Similarly, real-time, affordable, and consistent CPS can be placed in massive applications. In Rajhans et al. [17] deployed an abstraction and verification of this strategy, and a structural approach for CPS which has been projected by applying structural as well as semantic mappings for assuring reliability and activate scheme-level validation. In Vamvoudakis et al. [23] introduced a game-based method for evaluating binary arbitrary parameter according to the sensor values without any corruption. The CPS management can be processed, using wireless manage and event-based control, Demirel et al. [8] carried out a study in wireless control loops along with sensor readings that are unwanted and energy-based multihop wireless network. Finally, a modular design model has been deployed and optimized the data transmission strategies as well as managing rules.

In [21], the event-oriented state evaluation issues are known in which sensors are stimulated by a fusion model when it is a better prediction value and should not exceed the applied threshold. Also, the cases of CPS are identified. Then, CC is extensively employed recently. Thus, it can accomplish with best outcomes. Baliga et al. [4] offered a comprehensive power application diagnosis for CC. It assumes the public and private clouds with power utilization by switching, transmission, data computation as well as data storage. Warneke and Kao [27] applied dynamic resource assignment to effective parallel information procedure in CC. Khazaei et al. [12] examined the pool management method to CC centers. In [12], network virtualization as well as software-based networking for CC has been consolidated.

Xiao et al. [28] used an attribute-based approach for the study of security and privacy issues in CC. Also, the well-known CC environments like Amazon, Google, and IBM, has been applied in diverse applications like smart transportation systems, developing organization. In [25], a context-aware vehicular CPS with cloud support has been projected and 2 important service elements like vehicular social networks as well as context-aware vehicular security have been deployed. In Wan et al. [24] provided a novel structure named as VCMIA by combining vehicular CPS with mobile CC, and offers portable services for effective users like drivers and passengers to use the mobile traffic clouds. A new RGB based share creation model using elliptic curve cryptography (ECC) method has been presented in [20] to attain privacy and safety. The presented model generates a set of shares for an individual image which further undergoes encryption and decryption using ECC [3].

To resolve cybersecurity issue in CPS, this paper introduces secure intrusion detection with blockchain based data transmission with classification model for CPS in healthcare sector [9]. The presented model comprises different stages namely data acquisition, intrusion detection, data transmission and classification. In the beginning, the medical data is acquired by the use of sensor devices. Next, deep belief network (DBN) model based intrusion detection process takes place to identify the anomaly data in the gathered data. Simultaneously, multiple share creation (MSC) model is applied, which creates a set of shares of the captured image. Then, the blockchain technology is employed for secure data transmission to the cloud server, which executes the residual network (ResNet) based classification model for the identification of the existence of the disease. The experimental validation of the presented model takes place using skin lesion dataset and the simulation outcome pointed out the effective outcome of the presented model. In short, the paper contributions are summarized as follows.

  • Propose a new secure intrusion detection with blockchain based data transmission with classification model for CPS in healthcare sector

  • Involves several processes namely data acquisition, intrusion detection, encryption, data transmission and classification.

  • Employ DBN based intrusion detection process for the identification of anomalies

  • Introduce MSE with blockchain technology for secured data transmission

  • Finally, ResNet based classification model is applied for disease diagnosis

Section snippets

The proposed model

The working principle of the presented method is depicted in Fig. 1. As shown, the medical data is gathered from the physical space namely hospital, patient, and drug suppliers. Next, the user sensors are utilized to gather the patient data in different dimensions. Then, cyber security intrusion detection model is executed using DBN model to identify the presence of intrusion in the medical data. Next to that, MSC model creates multiple shares of the image and is encrypted by SC. Followed by,

Performance validation

The simulation results of the presented model have been examined under several aspects. The intrusion detection performance of the DBN model in the CPS has been assessed using two benchmark dataset namely NSL-KDD 2015 and CIDDS-001 dataset [7]. The former NSL-KDD dataset comprises a set of 125973 instances, 41 attributes and 2 classes. Next, the latter CIDDS-001 dataset includes 1018950 instances with 14 attributes and 2 classes as shown in Table 1. For experimental validation, 10 fold

Conclusion

This paper has developed secure intrusion detection with blockchain based data transmission with the classification model for CPS in the healthcare sector. The proposed model involves a series of processes namely data acquisition, DBN based intrusion detection, MSC based encryption, blockchain based data transmission, and ResNet 101 based classification. The performance validation of the presented model takes place on NSL-KDD 2015, CIDDS-001, and ISIC dataset. The simulation outcome indicated

Declaration of Competing Interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Acknowledgment

The work of K. Shankar was supported by RUSA Phase 2.0 Grant Sanctioned Vide Letter No. F. 24-51/2014-U, Policy (TNMulti-Gen), Department of Education, Government of India, in October 2018.

Gia Nhu Nguyen (Member, IEEE) received the Ph.D. degree in computer science from the Ha Noi University of Science, Vietnam National University, Vietnam. He is currently the Dean of the Graduate School, Duy Tan University, Vietnam. He has a total academic teaching experience of 20 years with more than 50 publications in reputed international conferences, journals, and online book chapter contributions (Indexed By: SCI, SCIE, SSCI, and Scopus). His areas of research include network communication,

References (28)

  • DemirelB. et al.

    Modular design of jointly optimal controllers and forwarding policies for wireless control

    IEEE Trans. Automat. Control

    (2014)
  • GuptaB.B. et al.

    An overview of internet of things (iot): architectural aspects, challenges, and protocols

    Concurr. Comput.Practice Exper.

    (2020)
  • HuL. et al.

    Review of cyber-physical system architecture

  • KhazaeiH. et al.

    Analysis of a pool management scheme for cloud computing centers

    IEEE Trans. Parallel Distrib. Syst.

    (2012)
  • Cited by (182)

    • Cyber-physical systems security: A systematic review

      2024, Computers and Industrial Engineering
    View all citing articles on Scopus

    Gia Nhu Nguyen (Member, IEEE) received the Ph.D. degree in computer science from the Ha Noi University of Science, Vietnam National University, Vietnam. He is currently the Dean of the Graduate School, Duy Tan University, Vietnam. He has a total academic teaching experience of 20 years with more than 50 publications in reputed international conferences, journals, and online book chapter contributions (Indexed By: SCI, SCIE, SSCI, and Scopus). His areas of research include network communication, security and vulnerability, network performance analysis and simulation, cloud computing, and image processing in biomedical. He is also an Associate Editor of the International Journal of Synthetic Emotions (IJSE).

    Mr. Ho Le Viet Nin completed the Master degree of Computer Science and also currently doing Ph.D. Candidate in Duy Tan University in Danang, Vietnam. Currently, he is doing as the IT lecture in Duy Tan University. His research includes several areas, which are ‘BigData’, ‘Analyzing and Simulation Network Efficiency’.

    Dr. Mohamed Elhoseny is currently an Assistant Professor at the Faculty of Computers and Information, Mansoura University where he is also the Director of Distributed Sensing and Intelligent Systems Lab. Besides, he has been appointed as an ACM Distinguished Speaker from 2019 to 2022. Collectively, Dr. Elhoseny authored/co-authored over 85 ISI Journal articles in high-ranked and prestigious journals such as IEEE Transactions on Industrial Informatics (IEEE), IEEE Transactions on Reliability (IEEE), Future Generation Computer Systems (Elsevier), and Neural Computing and Applications (Springer). Besides, Dr. Elhoseny authored/edited Conference Proceedings, Book Chapters, and 10 books published by Springer and Taylor & Francis. His research interests include Smart Cities, Network Security, Artificial Intelligence, Internet of Things, and Intelligent Systems. Dr. Elhoseny serves as the Editor-in-Chief of International Journal of Smart Sensor Technologies and Applications, IGI Global. Moreover, he is an Associate Editor of many journals such as IEEE Access (Impact Factor 3.5), IEEE Future Directions, PLOS One journal (Impact Factor 2.7), Remote Sensing (Impact Factor 3.5), and International Journal of E-services and Mobile Applications, IGI Global (Scopus Indexed). Also, he is an Editorial Board member in reputed journals such as Applied Intelligence, Springer (Impact Factor 1.9). Moreover, he served as the co-chair, the publication chair, the program chair, and a track chair for several international conferences published by IEEE and Springer.

    K. Shankar (Member, IEEE) is currently a Postdoctoral Fellow with Department of Computer Applications, Alagappa University, Karaikudi, India. He has authored/coauthored over 55 ISI Journal articles (with total Impact Factor 150+) and more than 100 Scopus Indexed Articles. He has guest-edited several special issues at many journals published by SAGE, TechScience, Inderscience and MDPI. He has served as Guest Editor and Associate Editor in SCI, Scopus indexed journals like Elsevier, Springer, IGI, Wiley & MDPI. He has served as chair (program, publications, Technical committee and track) on several International conferences. He has delivered several invited and keynote talks, and reviewed the technology leading articles for journals like Scientific Reports – Nature, the IEEE Transactions on Neural Networks and Learning Systems, IEEE Journal of Biomedical and Health Informatics, IEEE Transactions on Reliability, the IEEE Access and the IEEE Internet of Things. He has authored/edited Conference Proceedings, Book Chapters, and 2 books published by Springer. He has been a part of various seminars, paper presentations, research paper reviews, and convener and a session chair of the several conferences. He displayed vast success in continuously acquiring new knowledge and applying innovative pedagogies and has always aimed to be an effective educator and have a global outlook.  His current research interests include Healthcare applications, Secret Image Sharing Scheme, Digital Image Security, Cryptography, Internet of Things, and Optimization algorithms.

    B. B. Gupta (SM’17) received the Ph.D. degree in information and cyber security from the Indian Institute of Technology Roorkee, India. He was a Visiting Researcher with Yamaguchi University, Japan, in 2015. He is currently guiding 10 students for their master’s and Ph.D. research work in the area of information and cyber security. He has published over 90 research papers (including three books and 14 chapters) in international journals and conferences of high repute, including the IEEE, Elsevier, ACM, Springer, Wiley Inderscience, and so on. He has visited several countries, i.e., Canada, Japan, China, Malaysia, and Hong-Kong, to present his research work. His biography was selected and publishes in the 30th Edition of Marquis Who is Who in the World, 2012. He is also working principal investigator of various R&D projects. His research interest includes information security, cyber security, mobile security, cloud computing, Web security, intrusion detection, computer networks, and phishing. He has also served as a technical program committee member for over 20 International conferences worldwide. He is member of ACM, SIGCOMM, The Society of Digital Information and Wireless Communications, Internet Society, and the Institute of Nanotechnology, and a Life Member of the International Association of Engineers and the International Association of Computer Science and Information Technology. He is serving as an Associate Editor of the IEEE Access, an Associate Editor of IJICS, Inderscience and Executive Editor of IJITCA, Inderscience, respectively. He is also serving as a reviewer for the Journals of IEEE, Springer, Wiley, Taylor, and Francis. He is also serving as a guest editor for various reputed journals. He is also an editor of various international journals and magazines.

    Ahmed A. Abd El-Latif received the B.Sc. degree with honor rank in Mathematics and Computer Science in 2005 and M.Sc. degree in Computer Science in 2010, all from Menoufia University, Egypt. He received his Ph. D. degree in Computer Science & Technology at Harbin Institute of Technology (H.I.T), Harbin, P. R. China in 2013. He is an associate professor of Computer Science at Menoufia University, Egypt and School of Information Technology and Computer Science, Nile University, Egypt. He is author and co-author of more than 100 papers, including refereed IEEE/ACM/Springer/Elsevier journals, conference papers, and book chapters. He received many awards, State Encouragement Award in Engineering Sciences 2016, Arab Republic of Egypt; the best Ph. D student award from Harbin Institute of Technology, China 2013; Young scientific award, Menoufia University, Egypt 2014. He is a fellow at Academy of Scientific Research and Technology, Egypt. His areas of interests are multimedia content encryption, secure wireless communication, IoT, applied cryptanalysis, perceptual cryptography, secret media sharing, information hiding, biometrics, forensic analysis in digital images, and quantum information processing. Dr. Abd El-Latif has many collaborative scientific activities with international teams in different research projects. Furthermore, he has been reviewing papers for 80+ International Journals including IEEE Communications Magazine, IEEE Internet of Things journal, Information Sciences, IEEE Transactions on Network and Service Management, IEEE Transactions on Services Computing, Scientific reports Nature, Journal of Network and Computer Applications, Signal processing, Cryptologia, Journal of Network and Systems Management, Visual Communication and Image Representation, Neurocomputing, Future Generation Computer Systems, etc. Dr. Abd El-Latif is an associate editor of Journal of Cyber Security and Mobility.

    View full text