Investigating the security issues of multi-layer IoMT attacks using machine learning techniques

Conference poster


Al Sukhni, B., Manna, S., Dave, J. and Zhang, L. 2022. Investigating the security issues of multi-layer IoMT attacks using machine learning techniques.
AuthorsAl Sukhni, B., Manna, S., Dave, J. and Zhang, L.
TypeConference poster
Description

The Internet of Medical Things (IoMT) plays a significant role in the healthcare system as it improves effectiveness and efficiency of treatment by continuously monitoring patients using smart home sensor and wearables (Fig. 1), early disease diagnosis using data collected from the Internet of Medical Things (IoMT) devices and assisting doctors in deciding the best treatment and acting immediately if necessary. Additionally, it helps to reduce the number of hospital visits, limiting carbon footprint.IoMT devices are vulnerable to Multi-layer attacks because most of these devices are resource-constrained and portable, which is why there is not that much implementation of security features in these devices and making them a prime target for intruders looking to steal patients’ sensitive information and healthcare records. Multi-layer attacks are a group of attacks exploiting multiple layers of IoMT architecture. Denial-of-service (DoS) and Man-In-The-Middle (MITM) attacks, for instance, can target the three layers of the IoMT system and lead to serious consequences, such as theft of patients’ sensitive data and reputational damages. The main aim of the project is to create a robust IDS for IoT devices.

KeywordsIoMT security; Multi-layer attacks ; Machine learning
Year2022
ConferenceExploring Research and Development in the MedTech, Life Science and Healthcare Sectors
Related URLhttps://www.eventbrite.co.uk/e/maidstones-first-research-development-event-tickets-408607454897
File
License
File Access Level
Open
References

[1] Rasool, R.U., Ahmad, H.F., Rafique, W., Qayyum, A. and Qadir, J., 2022. Security and privacy of internet of medical things: A contemporary review in the age of surveillance, botnets, and adversarial ML. Journal of Network and Computer Applications, p.103332.
[2] Khanam, S., Ahmedy, I.B., Idris, M.Y.I., Jaward, M.H. and Sabri, A.Q.B.M., 2020. A survey of security challenges, attacks taxonomy and advanced countermeasures in the internet of things. IEEE access, 8, pp.219709-219743.
[3] Doshi, R., Apthorpe, N. and Feamster, N. (2018) “Machine learning DDoS detection for consumer internet of things devices,” in Proceedings - 2018 IEEE Symposium on Security and Privacy Workshops, SPW 2018. doi:10.1109/SPW.2018.00013.
[4] Moustafa, N., Turnbull, B. and Choo, K.K.R., 2018. An ensemble intrusion detection technique based on proposed statistical flow features for protecting network traffic of internet of things. IEEE Internet of Things Journal, 6(3), pp.4815-4830.
[5] Shafiq, M. et al. (2020) “Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things in smart city,” Future Generation Computer Systems, 107. doi:10.1016/j.future.2020.02.017.
[6] Liang, C. et al. (2019) “Intrusion Detection System for Internet of Things based on a Machine Learning approach,” in Proceedings - International Conference on Vision Towards Emerging Trends in Communication and Networking, ViTECoN 2019. doi:10.1109/ViTECoN.2019.8899448.
[7] Hady, A.A. et al. (2020) “Intrusion Detection System for Healthcare Systems Using Medical and Network Data: A Comparison Study,” IEEE Access, 8. doi:10.1109/ACCESS.2020.3000421.

Publication process dates
Deposited14 Nov 2022
Permalink -

https://repository.canterbury.ac.uk/item/9315y/investigating-the-security-issues-of-multi-layer-iomt-attacks-using-machine-learning-techniques

Download files


File
Poster Badeea Al Sukhni and Soumya Manna Medtech event.pdf
License: CC BY-NC-ND 4.0
File access level: Open

  • 82
    total views
  • 18
    total downloads
  • 0
    views this month
  • 0
    downloads this month

Export as

Related outputs

Investigating security issues (multilayer attacks) on IoT devices using machine learning
Al Sukhni, B., Manna, S., Dave, J. and Zhang, L. 2024. Investigating security issues (multilayer attacks) on IoT devices using machine learning.
Safeguarding IoMT: Semi-automated Intrusion Detection System (SAIDS) for detecting multilayer attacks
Al Sukhni, B., Manna, S., Dave, J. and Zhang, L. 2024. Safeguarding IoMT: Semi-automated Intrusion Detection System (SAIDS) for detecting multilayer attacks.
Integration of graduate employability skills through industry outsourced CDIO project
Manna, S., Joyce, N. and Nortcliffe, A. 2023. Integration of graduate employability skills through industry outsourced CDIO project. in: Lyng, R., Bennedsen, J., Bettaied, L., Bodsberg, N. R., Edstrom, K., Guojonsdottir, M. S., Roslof, J., Solbjord, O. K. and Oien, G. (ed.) The 19th CDIO International Conference: Proceedings - Full Papers NTNU SEED. pp. 425-435
A review of privacy-preserving federated learning, deep learning, and machine learning IIoT and IoTs solutions
Obarafor, Victor, Qi, Man and Zhang, L. 2023. A review of privacy-preserving federated learning, deep learning, and machine learning IIoT and IoTs solutions. in: 2023 8th IEEE International Conference on Signal and Image Processing (ICSIP) Wuxi, China IEEE. pp. 1074-1078
The impact of system transparency on analytical reasoning
Hepenstal, S., Zhang, L. and Wong, B. 2023. The impact of system transparency on analytical reasoning. in: CHI '23: CHI Conference on Human Factors in Computing Systems, Hamburg Germany, April 23 - 28, 2023 New York ACM.
The impact of system transparency on analytical reasoning
Hepenstal, S., Zhang, L. and Wong, B.L.W. 2023. The impact of system transparency on analytical reasoning.
Optimal locations and computational frameworks of FSR and IMU sensors for measuring gait abnormalities
Manna, S., Azhar, H. and Greace, A. 2023. Optimal locations and computational frameworks of FSR and IMU sensors for measuring gait abnormalities. Heliyon. 9 (4), p. e15210. https://doi.org/10.1016/j.heliyon.2023.e15210
Machine learning-based solutions for securing IoT systems against multilayer attacks
Al Sukhni, B., Manna, S., Dave, J. and Zhang, L. 2022. Machine learning-based solutions for securing IoT systems against multilayer attacks. in: Singh Tomar, R., Verma, S., Kumar Chaurasia, B., Singh, V., Abawajy, J. H., Akashe, S., Hsiung, Pao-Ann and Prasad, R. (ed.) Communication, Networks and Computing Third International Conference, CNC 2022, Gwalior, India, December 8–10, 2022, Proceedings, Part I Cham Springer. pp. 140-153
Investigating the security issues of multi-layer IoT attacks using machine learning techniques
Al Sukhni, Badeea, Dave, Jugal M., Manna, Soumya K. and Zhang, Leishi 2022. Investigating the security issues of multi-layer IoT attacks using machine learning techniques. in: 2022 Human-Centered Cognitive Systems (HCCS) IEEE.
Cyber physical system: Security challenges in Internet of Things system
Mohanta, Bhabendu Kumar, Dehury, Mohan Kumar, Sukhni, Badeea Al and Mohapatra, Niva 2022. Cyber physical system: Security challenges in Internet of Things system. in: 2022 Sixth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC) IEEE.
Designing a system to mimic expert cognition: An initial prototype
Hepenstal, Sam, Zhang, Leishi and William Wong, B. L. 2022. Designing a system to mimic expert cognition: An initial prototype. Proceedings of the Human Factors and Ergonomics Society Annual Meeting. 66 (1), pp. 2057-2061. https://doi.org/10.1177/1071181322661092
Accuracy and repeatability study of an elbow exoskeleton for multistage exercises
Manna, Soumya K 2022. Accuracy and repeatability study of an elbow exoskeleton for multistage exercises. in: 2022 20th International Conference on Mechatronics - Mechatronika (ME) IEEE.
A smart and home-based telerehabilitation tool for patients with neuromuscular disorder
Manna, Soumya K., Hannan, M. A., Azhar, B., Smith, D. and Islam, T. 2022. A smart and home-based telerehabilitation tool for patients with neuromuscular disorder. IEEE. https://doi.org/10.1109/iecbes54088.2022.10079410
Evaluation of students’ performance in CDIO projects through blended learning
Manna, S., Battikh, N., Nortcliffe, A. and Camm, J. 2022. Evaluation of students’ performance in CDIO projects through blended learning.
A smart and secure IoMT tele-neurorehabilitation framework for post-stroke patients
Manna, S., Azhar, H. and Sakel, M. 2022. A smart and secure IoMT tele-neurorehabilitation framework for post-stroke patients. in: Bhaumik, S., Chattopadhyay, S., Chattopadhyay, T. and Bhattacharya, S. (ed.) Proceedings of International Conference on Industrial Instrumentation and Control ICI2C 2021 Singapore Springer. pp. 11-20
Enhancing hands-on skills under capstone CDIO project using blended learning approach
Manna, S., Battikh, N. and Camm, J. 2021. Enhancing hands-on skills under capstone CDIO project using blended learning approach . Sheffield
An analysis of expertise in intelligence analysis to support the design of human-centered artificial intelligence
Hepenstal, S., Zhang, L. and Wong, BL William 2021. An analysis of expertise in intelligence analysis to support the design of human-centered artificial intelligence. https://doi.org/10.1109/SMC52423.2021.9659095
Automated identification of insight seeking behaviours, strategies and rules: a preliminary study
Hepenstal, S., Zhang, L. and Wong, BL William 2021. Automated identification of insight seeking behaviours, strategies and rules: a preliminary study. Sage Journals: Proceedings of the Human Factors and Ergonomics Society Annual Meeting . (65), pp. 1269-1273. https://doi.org/https://doi.org/10.1177/1071181321651348
An inclusive student-led online class test during the pandemic
Manna, S. and Azhar, H. 2021. An inclusive student-led online class test during the pandemic . Assessment and Feedback Symposium 2021.
A granular computing approach to provide transparency of intelligent systems for criminal investigations
Zhang, L. 2021. A granular computing approach to provide transparency of intelligent systems for criminal investigations. in: Pedrycz, W. and Chen, S.-M. (ed.) Interpretable Artificial Intelligence: A Perspective of Granular Computing Cham Springer.
Developing conversational agents for use in criminal investigations
Hepenstal, S., Zhang, L., Kodagoda N. and Wong B.L.W 2021. Developing conversational agents for use in criminal investigations. ACM Transactions on Interactive Intelligent Systems. 11 (3-4), pp. 1-35. https://doi.org/10.1145/3444369
Adaptive and flexible online learning during Covid19 lockdown
Manna, S., Nortcliffe, A., Sheikholeslami, G. and Richmond-Fuller, A. 2021. Adaptive and flexible online learning during Covid19 lockdown.
Developing engineering growth mindset through CDIO outreach activities
Manna, S., Nortcliffe, A. and Sheikholeslami, G. 2020. Developing engineering growth mindset through CDIO outreach activities. in: Proceedings of the 16th International CDIO Conference Gothenburg, Sweden CDIO.
Design of a game-based rehabilitation system using Kinect sensor
Manna, S. and Dubuy, V. N. 2019. Design of a game-based rehabilitation system using Kinect sensor. Minneapolis, MN, USA ASME.
Assessment of joint parameters in a Kinect sensor based rehabilitation game
Manna, S. and Dubey, V. N. 2019. Assessment of joint parameters in a Kinect sensor based rehabilitation game. Anaheim, California, USA ASME.
Rehabilitation strategy for post-stroke recovery using an innovative elbow exoskeleton
Manna, S. and Dubey, V. N. 2019. Rehabilitation strategy for post-stroke recovery using an innovative elbow exoskeleton. Proceedings of the Institution of Mechanical Engineers, Part H: Journal of Engineering in Medicine. 233 (6), pp. 668-680. https://doi.org/10.1177/0954411919847058
A portable elbow exoskeleton for three stages of rehabilitation
Manna, S. and Dubey, V. N. 2019. A portable elbow exoskeleton for three stages of rehabilitation. Journal of Mechanisms and Robotics. 11 (6), p. 065002. https://doi.org/10.1115/1.4044535