Advancing IoT Security in Medical Imaging with Enhanced CNN Architectures
International Journal of Electrical and Electronics Engineering |
© 2024 by SSRG - IJEEE Journal |
Volume 11 Issue 11 |
Year of Publication : 2024 |
Authors : Naga Venkata Rama Krishna Guduri, Beera John Jaidhan |
How to Cite?
Naga Venkata Rama Krishna Guduri, Beera John Jaidhan, "Advancing IoT Security in Medical Imaging with Enhanced CNN Architectures," SSRG International Journal of Electrical and Electronics Engineering, vol. 11, no. 11, pp. 44-52, 2024. Crossref, https://doi.org/10.14445/23488379/IJEEE-V11I11P105
Abstract:
This paper delves into implementing a cutting-edge Convolution Neural Network (CNN) architecture to identify abnormalities in medical images seamlessly integrated within an IoT-enabled healthcare system. The primary objective is to enhance data security and improve diagnostic accuracy by leveraging deep learning techniques. The model presented in this study incorporates advanced CNN enhancements, such as attention mechanisms and transfer learning, to maximize performance and guarantee strong security in transmitting and processing medical data. This comprehensive study delves into the methodology, implementation, and evaluation of a groundbreaking approach. Our aim is to provide a detailed framework for harnessing the power of IoT in the field of medical imaging, all while tackling the critical security challenges that arise.
Keywords:
Artificial Intelligence, Deep Learning, IoT, IoMT, CNN.
References:
[1] Qing Li et al., “Medical Image Classification with Convolutional Neural Network,” 13th International Conference on Control Automation Robotics & Vision (ICARCV), Singapore, pp. 844-848, 2014.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Sanaz Rahimi Moosavi et al., “SEA: A Secure and Efficient Authentication and Authorization Architecture for IoT-Based Healthcare Using Smart Gateways,” Procedia Computer Science, vol. 52, pp. 452-459, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Jie Lin et al., “A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications,” IEEE Internet of Things Journal, vol. 4, no. 5, pp. 1125-1142, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Julia Rauscher, and Bernhard Bauer, “Safety and Security Architecture Analyses Framework for the Internet of Things of Medical Devices,” IEEE 20th International Conference on e-Health Networking, Applications and Services (Healthcom), Ostrava, Czech Republic, pp. 1-3, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Anastasiia Strielkina et al., “Cybersecurity of Healthcare IoT-Based Systems: Regulation and Case-Oriented Assessment,” IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT), Kyiv, Ukraine, pp. 67-73, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Anastasiia Strielkina, Vyacheslav Kharchenko, and Dmytro Uzun, “Availability Models of The Healthcare Internet of Things System Taking Into Account Countermeasures Selection,” Information and Communication Technologies in Education, Research, and Industrial Applications Conference, pp. 220-242, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Jianbing Ni, Xiaodong Lin, and Xuemin Shen, “Toward Edge-Assisted Internet of Things: From Security and Efficiency Perspectives,” IEEE Network, vol. 33, no. 2, pp. 50-57, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Truong Thu Huong et al., “LocKedge: Low-Complexity Cyberattack Detection in IoT Edge Computing,” IEEE Access, vol. 9, pp. 29696-29710, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Truong Thu Huong et al., “An Efficient Low Complexity Edge-Cloud Framework for Security in IoT Networks,” IEEE Eighth International Conference on Communications and Electronics (ICCE), Phu Quoc Island, Vietnam, pp. 533-539, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Julia Rauscher, and Bernhard Bauer, “Adaptation of Architecture Analyses: An IoT Safety and Security Flaw Assessment Approach,” Proceedings of the 14th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2021), pp. 320-327, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Omar Cheikhrouhou et al., “A Lightweight Blockchain and Fog-enabled Secure Remote Patient Monitoring System,” Internet of Things, vol. 22, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Celestino Obua, MUST Data Science Research Hub (MUDSReH), NIH RePORTER, 2022. [Online]. Available: https://reporter.nih.gov/project-details/10312539#details
[13] Ken Hoyme, Security Safety Co-Analysis Tool Environment (SSCATE), Adventium Enterprises, SBIR STTR America’s Seed Fund, 2016. [Online]. Available: https://legacy.www.sbir.gov/sbirsearch/detail/1252209
[14] Ken Hoyme, Security Safety Co-Analysis Tool Environment (SSCATE), Adventium Enterprises, SBIR STTR America’s Seed Fund, 2015. [Online]. Available: https://legacy.www.sbir.gov/sbirsearch/detail/869241
[15] Lenore McMackin, SBIR Phase II: Low Cost Shortwave Infrared (SWIR) Spectral Imaging Microscope Camera Based on Compressive Sensing, Inview Technology Corporation, SBIR STTR America’s Seed Fund, 2014. [Online]. Available: https://legacy.www.sbir.gov/sbirsearch/detail/704773
[16] Lenore McMackin, SBIR Phase I: Low Cost Shortwave Infrared (SWIR) Spectral Imaging Microscope Camera Based on Compressive Sensing, Inview Technology Corporation, US National Science Foundation, 2013. [Online]. Available: https://www.nsf.gov/awardsearch/showAward?AWD_ID=1315515
[17] Milos Dobrojevic et al., “Addressing Internet of Things Security By Enhanced Sine Cosine Metaheuristics Tuned Hybrid Machine Learning Model and Results Interpretation Based on SHAP Approach,” PeerJ Computer Science, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Georg L. Baumgärtner et al., “Metadata-Independent Classification of MRI Sequences Using Convolutional Neural Networks: Successful Application to Prostate MRI,” European Journal of Radiology, vol. 166, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Kusum Lata, and Linga Reddy Cenkeramaddi, “Deep Learning for Medical Image Cryptography: A Comprehensive Review,” Applied Sciences, vol. 13, no. 14, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Sarina Aminizadeh et al., “The Applications of Machine Learning Techniques in Medical Data Processing Based on Distributed Computing and The Internet of Things,” Computer Methods and Programs in Biomedicine, vol. 241, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Abdullah Lakhan et al., “Autism Spectrum Disorder Detection Framework for Children Based on Federated Learning Integrated CNN-LSTM,” Computers in Biology and Medicine, vol. 166, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Lihao Liu, Angelica I. Aviles-Rivero, and Carola-Bibiane Schonlieb, “Contrastive Registration for Unsupervised Medical Image Segmentation,” IEEE Transactions on Neural Networks and Learning Systems, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Siraj Khan et al., “Efficient Leukocytes Detection and Classification in Microscopic Blood Images Using Convolutional Neural Network Coupled with A Dual Attention Network,” Computers in Biology and Medicine, vol. 174, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[24] Huixin Jia et al., “Application of Convolutional Neural Networks in Medical Images: A Bibliometric Analysis,” Quantitative Imaging in Medicine and Surgery, vol. 14, no. 5, pp. 3501-3518, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[25] Giuseppe Rovere et al., “Adoption of Blockchain as A Step Forward in Orthopedic Practice,” European Journal of Translational Myology, vol. 34, no. 2, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[26] Mousa Alalhareth, and Sung-Chul Hong, “Enhancing the Internet of Medical Things (IoMT) Security with Meta-Learning: A Performance-Driven Approach for Ensemble Intrusion Detection Systems,” Sensors, vol. 24, no. 11, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[27] Hicham Amellal et al., “Quantum Man-in-the-Middle Attacks on QKD Protocols: Proposal of a Novel Attack Strategy,” 6th International Conference on Contemporary Computing and Informatics, Gautam Buddha Nagar, India, pp. 513-519, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[28] Shatha Alhazmi et al., “Mitigating Man-in-the-Middle Attack Using Quantum Key Distribution,” IEEE Long Island Systems, Applications and Technology Conference, Old Westbury, NY, USA, pp. 1-6, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[29] Abdullah Al Hayajneh, Md Zakirul Alam Bhuiyan, and Ian McAndrew, “Improving Internet of Things (IoT) Security with Software-Defined Networking (SDN),” Computers, vol. 9, no. 1, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[30] S. Aruna et al., “Detect and Prevent Attacks of Intrusion in IoT Devices Using Game Theory with Ant Colony Optimization (ACO),” Journal of Cybersecurity and Information Management, vol. 14, no. 2, pp. 275-286, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[31] Mst Shapna Akter et al., “Quantum Cryptography for Enhanced Network Security: A Comprehensive Survey of Research, Developments, and Future Directions,” IEEE International Conference on Big Data, Sorrento, Italy, pp. 5408-5417, 2023.[CrossRef] [Google Scholar] [Publisher Link]