Category Ranking

98%

Total Visits

921

Avg Visit Duration

2 minutes

Citations

20

Article Abstract

The benefits of the Internet of Medical Things (IoMT) in providing seamless healthcare to the world are at the forefront of technological advancement. However, security concerns of any IoMT systems are high since they threaten to compromise personal information of patients and can even cause health hazards. Researchers are exploring the use of various techniques to ensure a high level of security of IoMT systems. One key concern is that the computing power of any Internet of Things (IoT) device is relatively low, hence mechanisms that require low computational power are appropriate for designing Intrusion Detection Systems (IDS). In this research work, a blockchain IDS coalition is proposed for securing IoMT networks and devices. The blockchain ledger is compact and uses less processing resources. Additionally, the ledger requires less communication overhead. The cryptographic hashes in the suggested architecture ensure complete data secrecy and integrity between parties who are trusted and those who are untrustworthy. Peer-to-peer networks in both central and cluster networks are also included in this work for complete decentralization. The proposed model can counter various attacks, including Denial of Service (DoS), anonymity attacks, impersonation attacks, Man-In-The-Middle (MITM), and Cross-Site Scripting (XSS). The proposed method achieved an F1- score as high as 100% and reported an AUC value of over 99%.

Download full-text PDF

Source
http://dx.doi.org/10.1109/JBHI.2023.3325964DOI Listing

Publication Analysis

Top Keywords

intrusion detection
8
internet medical
8
medical things
8
iomt systems
8
bids blockchain
4
blockchain intrusion
4
detection system
4
system coalition
4
coalition securing
4
securing internet
4

Similar Publications

This paper presents a novel multiscale signal processing framework for power quality disturbance (PQD) and cyber intrusion detection in smart grids, combining Non-Subsampled Contourlet Transform (NSCT), Split Augmented Lagrangian Shrinkage Algorithm (SALSA), and Morphological Component Analysis (MCA). A key innovation lies in an adaptive weighting mechanism within NSCT's directional sub bands, enabling dynamic energy redistribution and enhanced representation of both low-frequency anomalies (e.g.

View Article and Find Full Text PDF

Computer networks are highly vulnerable to cybersecurity intrusions. Likewise, software-defined networks (SDN), which enable 5G users to broadcast sensitive data, have become a primary target for vulnerability. To protect the network security against attacks, various security protocols, including authorization, the authentication process, and intrusion detection techniques, are essential.

View Article and Find Full Text PDF

Voice as Objective Biomarker of Stress: Association of Speech Features and Cortisol.

Acta Neuropsychiatr

September 2025

Goethe-University Frankfurt am Main; Department of Psychiatry, Psychosomatic Medicine and Psychotherapy, University Hospital, Frankfurt, Germany.

Objective: Cortisol is a well-established biomarker of stress, assessed through salivary or blood samples, which are intrusive and time-consuming. Speech, influenced by physiological stress responses, offers a promising non-invasive, real-time alternative for stress detection. This study examined relationships between speech features, state anger, and salivary cortisol using a validated stress-induction paradigm.

View Article and Find Full Text PDF

This paper presents a hybrid adaptive approach based on machine learning (ML) for classifying incoming traffic, feature selection and thresholding, aimed at enhancing downgrade attack detection in Wi-Fi Protected Access 3 (WPA3) networks. The fast proliferation of WPA3 is regarded critical for securing modern Wi-Fi systems, which have become integral to 5G and Beyond (5G&B) Radio Access Networks (RAN) architecture. However, the wireless communication channel remains inherently susceptible to downgrade attacks, where adversaries intentionally cause networks to revert from WPA3 to WPA2, with the malicious intent of exploiting known security flaws.

View Article and Find Full Text PDF

Leveraging data analytics to revolutionize cybersecurity with machine learning and deep learning.

Sci Rep

August 2025

Department of clinical Laboratory Sciences, College of Applied Medical Sciences, King Khalid University, 61421, Abha, Saudi Arabia.

The exponential growth of digital technologies has brought about a surge in the complexity and frequency of cyber-attacks, necessitating robust cyber security measures. This study introduces an innovative approach to cyber security data analysis by leveraging Convolutional Neural Network (CNN) technology. The primary objective is to explore the potential of CNNs in accurately and efficiently detecting and classifying cyber security threats.

View Article and Find Full Text PDF