Submitted:
16 February 2023
Posted:
17 February 2023
You are already at the latest version
Abstract
Keywords:
1. Introduction
1.1. IoMT and Smart E-Healthcare
1.1.1. IoMT and Enabling Wireless Technologies
1.1.2. Smart E-Healthcare
1.2. Security and Privacy Requirements for IoMT Devices
2. Related Research
- PUF is used to mask health data. The classified data will be used to construct a response which is the masked data.
- Created a lightweight framework such that simple and minimal processing is required.
- Generally, after the data collection, the data is processed using mathematical operations and encryption. There is a probability of attacks exploiting the data before even the data is processed. But using the proposed methodology, the data is masked using PUF before any kind of data processing is initialized. This avoids attacks in the data collection stage.
- A simplified ML model is used to retrieve the original healthcare data with substantially less computational time, which makes this technique more suitable.
- Generally, a large dataset is used when the PUF is involved. But in the proposed experiment, the ML model is replacing the requirement of a large CRP dataset.
- The healthcare data is not sent in plaintext to the server, which makes it more secure and lightweight.
- In this proposed research, timestamps are used as a part of the challenges of the PUF. Even if the health data is identical for a particular person at different timestamps, the masked data will be different for different timestamps.
- The proposed framework gives high accuracy, which shows that it can be used to retrieve the original health data.
3. Physically Unclonable Function (PUF)
3.1. Definition
3.2. Figures of Merit of a PUF
3.2.1. Reproducibility
3.2.2. Uniqueness
3.2.3. Identifiability
3.2.4. Randomness
4. The Proposed Model for IoMT Device
4.0.1. IoMT Device
4.0.2. Gateway
4.0.3. Cloud Server
4.1. Assumptions
- The WMD is incorporated with PUF chips.
- The PUFs of medical devices are strong and unaffected by outside variables like temperature, voltage, current, humidity, noise, etc.
- The ML model is only stored in the secure database (SDB) of the CS. Only the server can access the ML model to retrieve the health data.
- No CRPs will be stored anywhere.
- Before data masking, WMD is already verified in the network.
4.2. Machine Learning Algorithm
4.3. Enrollment Phase
- PUF response generation: As shown in Algorithm 1, initially, and will be selected, and the combination of these will act as a challenge C of the PUF of the medical device. PUF will generate a response R using the process variation of the chip. The response, timestamp, and health data will be shared with the CS through a secure communication medium.
- Training and database storage: In this step, a ML model will be trained using the received R, , and . The server will use R and as the input features and as the output feature. The generated model will be stored in a SDB for data retrieval. This completes the enrollment phase.
| Algorithm 1:Secure Enrollment Process |
| Step-1: PUF response generation WMD: = C C → R WMD ⟶ CS {R, , } Step-2: Training and database storage CS: R, , ⊧ CS ⟶ SDB {} SDB: ∈ |
4.4. Data Masking and Retrieving Phase
- Data Masking: Data will be masked using the incorporated PUF in the WMD. At first, WMD will collect from the human body. Moreover, will be identified from the clock of the WMD. Before doing any kind of further operation, both and will act as challenge C of the PUF, which will generate response R. This response R will be sent to the CS using a public channel.
- Retrieving Data: Upon receiving R, CS will select and will use both R and as the input features of the stored for that WMD. The will predict the actual data . By following this way, CS will retrieve the masked data from the WMD.
| Algorithm 2:Data Masking and Retrieving Process |
| Step-1: Data Masking WMD: ‡ , = C C→R WMD ⟶ CS {R } Step-2: Retrieving Data CS ⟶ SDB {} SDB: ∋ SDB ⟶ CS {} CS: ‡ R, ↦ CS ⟶ SDB {} SDB: ∈ |
5. Experimental Results
5.1. Experimental Setup
5.2. Dataset Preparation
5.3. Machine Learning Model Training
5.4. Temperature Prediction
6. Conclusions and Future Work
References
- Ikram Ud Din, Ahmad Almogren, Mohsen Guizani, and Mansour Zuair. A decade of internet of things: Analysis in the light of healthcare applications. IEEE Access 2019, 7, 89967–89979. [CrossRef]
- Jerrin T John and SR Jino Ramson. Energy-aware duty cycle scheduling for efficient data collection in wireless sensor networks. IJARCET 2013, 2.
- Sahshanu Razdan and Sachin Sharma. Internet of Medical Things (IoMT): Overview, Emerging Technologies, and Case Studies. IETE Technical Review 2022, 39, 775–788. [CrossRef]
- Fayez Qureshi and Sridhar Krishnan. Wearable hardware design for the internet of medical things (IoMT). Sensors 2018, 18, 3812. [CrossRef] [PubMed]
- SD Burton, LM Tanczer, Srinidhi Vasudevan, Stephen Hailes, and Madeline Carr. The UK Code of Practice for Consumer IoT Security-Where We Are and What Next. PETRAS, Mar 2021.
- Lavanya Sharma, Pradeep K Garg, and Sunil K Khatri. Smart E-Healthcare with Internet of Things: Current Trends, Challenges, Solutions, and Technologies. In From visual surveillance to internet of things, pages 215–234. Chapman and Hall/CRC, 2019.
- Yingnan Sun, Frank P.-W. Lo, and Benny Lo. Security and privacy for the internet of medical things enabled healthcare systems: A survey. IEEE Access 2019, 7, 183339–183355. [CrossRef]
- Yasir Mehmood, Farhan Ahmad, Ibrar Yaqoob, Asma Adnane, Muhammad Imran, and Sghaier Guizani. Internet-of-things-based smart cities: Recent advances and challenges. IEEE Communications Magazine 2017, 55, 16–24. [CrossRef]
- Pintu Sadhu, Venkata Prasanth Yanambaka, Ahmed Abdelgawad, and Kumar Yelamarthi. NAHAP: PUF-Based Three Factor Authentication System for Internet of Medical Things. IEEE Consumer Electronics Magazine 2022, 12, 107–115.
- Pintu Kumar Sadhu, Venkata P. Yanambaka, Ahmed Abdelgawad, and Kumar Yelamarthi. Prospect of Internet of Medical Things: A Review on Security Requirements and Solutions. Sensors 2022, 22.
- Pintu Kumar Sadhu, Venkata P Yanambaka, and Ahmed Abdelgawad. Internet of Things: Security and Solutions Survey. Sensors 2022, 22, 7433. [CrossRef]
- Amir-Mohammad Rahmani, Nanda Kumar Thanigaivelan, Tuan Nguyen Gia, Jose Granados, Behailu Negash, Pasi Liljeberg, and Hannu Tenhunen. Smart e-health gateway: Bringing intelligence to internet-of-things based ubiquitous healthcare systems. In 2015 12th annual IEEE consumer communications and networking conference (CCNC), pages 826–834. IEEE, 2015.
- George Hatzivasilis, Othonas Soultatos, Sotiris Ioannidis, Christos Verikoukis, Giorgos Demetriou, and Christos Tsatsoulis. Review of Security and Privacy for the Internet of Medical Things (IoMT). In 2019 15th International Conference on Distributed Computing in Sensor Systems (DCOSS), pages 457–464, 2019.
- Fatima Alshehri and Ghulam Muhammad. A comprehensive survey of the internet of things (iot) and ai-based smart healthcare. IEEE Access 2021, 9, 3660–3678. [CrossRef]
- Rachida Hireche, Houssem Mansouri, and Al-Sakib Khan Pathan. Security and Privacy Management in Internet of Medical Things (IoMT): A Synthesis. Journal of Cybersecurity and Privacy 2022, 2, 640–661. [CrossRef]
- Bakkiam David Deebak, Fadi Al-Turjman, Moayad Aloqaily, and Omar Alfandi. An authentic-based privacy preservation protocol for smart e-healthcare systems in IoT. IEEE Access 2019, 7, 135632–135649. [CrossRef]
- Tobias Nilges. The cryptographic strength of tamper-proof hardware. 2015.
- Basel Halak, Mark Zwolinski, and M Syafiq Mispan. Overview of PUF-based hardware security solutions for the Internet of Things. In 2016 IEEE 59th International Midwest Symposium on Circuits and Systems (MWSCAS), pages 1–4. IEEE, 2016.
- Salma Lbrini, Abdelhamid Fadil, Zakaria Aamir, Mohamed Khomali, Hassane Jarar Oulidi, and Hassan Rhinane. "big health data: Cardiovascular disease prevention using big data and machine learning". In "Machine Intelligence and Data Analytics for Sustainable Future Smart Cities", pages 311–327. Springer, 2021.
- Hongyu Zhao, Haiyang Xu, Zhelong Wang, Litong Wang, Sen Qiu, Daoyong Peng, Jiaxi Li, and Jiahao Jiang. "analysis and evaluation of hemiplegic gait based on wearable sensor network". Information Fusion 2023, 90, 382–391.
- Jyoti Deogirikar and Amarsinh Vidhate. Security attacks in iot: A survey. In 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), pages 32–37, 2017.
- Chunxiao Li, Anand Raghunathan, and Niraj K. Jha. Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system. In 2011 IEEE 13th International Conference on e-Health Networking, Applications and Services, pages 150–156, 2011.
- Taewan Kim, Hakjoon Lee, and Yunmo Chung. Advanced universal remote controller for home automation and security. IEEE Transactions on Consumer Electronics 2010, 56, 2537–2542. [CrossRef]
- Karim Abouelmehdi, Abderrahim Beni-Hessane, and Hayat Khaloufi. Big healthcare data: preserving security and privacy. Journal of big data 2018, 5, 1–18. [CrossRef]
- Constantinos Kolias, Georgios Kambourakis, Angelos Stavrou, and Jeffrey Voas. Ddos in the iot: Mirai and other botnets. Computer 2017, 50, 80–84.
- Lars Tebelmann, Jean-Luc Danger, and Michael Pehl. Self-secured PUF: Protecting the loop PUF by masking. In International Workshop on Constructive Side-Channel Analysis and Secure Design, pages 293–314. Springer, 2020.
- Randy Torrance and Dick James. The state-of-the-art in ic reverse engineering. In Christophe Clavier and Kris Gaj, editors, Cryptographic Hardware and Embedded Systems - CHES 2009, pages 363–381, Berlin, Heidelberg, 2009. Springer Berlin Heidelberg.
- Pintu Kumar Sadhu, Venkata P. Yanambaka, Saraju P. Mohanty, and Elias Kougianos. Easy-sec: Puf-based rapid and robust authentication framework for the internet of vehicles, 2022.
- Daniel, J. Bernstein, Yun-An Chang, Chen-Mou Cheng, Li-Ping Chou, Nadia Heninger, Tanja Lange, and Nicko van Someren. Factoring rsa keys from certified smart cards: Coppersmith in the wild. In Kazue Sako and Palash Sarkar, editors, Advances in Cryptology - ASIACRYPT 2013, pages 341–360, Berlin, Heidelberg, 2013. Springer Berlin Heidelberg.
- Venkata, P. Yanambaka, Saraju P. Mohanty, Elias Kougianos, and Deepak Puthal. Pmsec: Physical unclonable function-based robust and lightweight authentication in the internet of medical things. IEEE Transactions on Consumer Electronics 2019, 65, 388–397. [CrossRef]
- Muhammad Shahzad and Munindar, P. Singh. Continuous authentication and authorization for the internet of things. IEEE Internet Computing 2017, 21, 86–90. [CrossRef]
- Yansong Gao, Hua Ma, Said F Al-Sarawi, Derek Abbott, and Damith C Ranasinghe. PUF-FSM: a controlled strong PUF. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 2017, 37, 1104–1108.
- Pintu, K. Sadhu and Venkata P. Yanambaka. MC- PUF: A Robust Lightweight Controlled Physical Unclonable Function for Resource Constrained Environments. In 2022 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), pages 452–453, 2022.
- Charles Herder, Meng-Day Yu, Farinaz Koushanfar, and Srinivas Devadas. Physical unclonable functions and applications: A tutorial. Proceedings of the IEEE 2014, 102, 1126–1141. [CrossRef]
- Pintu Kumar Sadhu, Venkata P. Yanambaka, Ahmed Abdelgawad, and Kumar Yelamarthi. Performance analysis of ring oscillator puf for robust security in smart transportation. In 2021 IEEE 7th World Forum on Internet of Things (WF-IoT), pages 301–302, 2021.
- M. Garcia-Bosque, G. Díez-Señorans, C. Sánchez-Azqueta, and S. Celma. Introduction to physically unclonable fuctions: Properties and applications. In 2020 European Conference on Circuit Theory and Design (ECCTD), pages 1–4, 2020.
- Venkata KVV Bathalapalli, Saraju P Mohanty, Elias Kougianos, Babu K Baniya, and Bibhudutta Rout. PUFchain 2.0: Hardware-Assisted Robust Blockchain for Sustainable Simultaneous Device and Data Security in Smart Healthcare. SN Computer Science 2022, 3, 1–19. [CrossRef]
















| Notation | Description |
|---|---|
| C, , , , | Challenge |
| R, , , , | Response |
| , , , , | Timestamp |
| → | CRP Generation |
| ‡ | Data Collection |
| ⟶ | Data transfer |
| ↦ | ML model prediction |
| ⊧ | Model Training |
| ∋ | Database Query |
| ∈ | Store Operation |
| Units | Dropout (30%) |
Batch Normalization |
Optimizer | Activation Function |
Epochs | Batch Size |
Validation Accuracy |
|---|---|---|---|---|---|---|---|
| 4096-3072 | ✗ | ✓ | Adam | Swish | 10 | 5000 | 86.08 |
| 4096-3072 | ✗ | ✗ | Adam | Swish | 10 | 5000 | 72.06 |
| 4096-4096-4096 | ✗ | ✓ | Adadelta | Swish | 25 | 10000 | 94.23 |
| 4096-4096-4096 | ✗ | ✗ | Adadelta | Swish | 25 | 10000 | 84.73 |
| 4096-4096-4096-3072- 3072-3072-2048- 2048-2048 |
✓ | ✓ | Nadam | Swish | 50 | 10000 | 95.01 |
| 4096-4096-4096-3072- 3072-3072-2048- 2048-2048 |
✗ | ✗ | Nadam | Relu | 50 | 10000 | 88.52 |
| 4096-4096-3072- 3072-2048-2048 |
✗ | ✓ | RMSProp | Relu | 50 | 5000 | 89.85 |
| 4096-4096-3072- 3072-2048-2048 |
✗ | ✗ | RMSProp | Relu | 50 | 5000 | 82.08 |
| 4096-3072-3072- 2048-2048-2048 |
✓ | ✗ | RMSProp | Relu | 50 | 5000 | 91.05 |
| 4096-3072-3072- 2048-2048-2048 |
✓ | ✗ | Nadam | Relu | 50 | 5000 | 85.72 |
| 4096-4096-3072 | ✗ | ✓ | Nadam | Relu | 50 | 10000 | 89.32 |
| 4096-4096-3072 | ✓ | ✓ | RMSProp | Swish | 50 | 10000 | 92.05 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).