Ensuring Communication Network Security for Medical Implantable Devices to Enhance Cyber Security
Keywords:
DBNF, ECD, IMDAbstract
In this current world usage of medical implantable devices has been widely increased to the peak. The implantable medical devices are fixed inside the human body to help them recover from their Illness. On the other aspect even though it is a life changer and life saver for the humans, on the other side all these devices are prone to be attacked by the attackers causing humans to lack in illness. Nowadays cybercrime has been boomed up in all domains and industries which has continued in the medical/health sector too. But anyway, as of now, nothing has gone serious with hacking medical implantable devices. But on the other hand, since these medical devices are vulnerable to the threats these devices must be secured thoroughly. The increasing integration of medical implantable devices into healthcare systems has revolutionized patient care and introduced new cybersecurity challenges. This paper addresses the imperative of securing communication networks associated with medical implants to fortify overall cyber security in healthcare settings. The focus is on strategies to safeguard the integrity, confidentiality, and availability of data exchanged between medical implants and external devices. This paper's main focus is the communication network security which takes connection to the implantable medical devices. The process of working with firmware is a bit critical so we concentrate on dealing with the unauthorized access prevention to IMD via a secure communication channel or the communication network using the Robust protocols. Furthermore, the paper emphasizes the importance of about the new networks Deep belief neuro-fuzzy network(DBNF) and EfficientNet-B3-Attn-2 fused Cascade Neuro-Fuzzy Network (ECD) to safeguard the implantable medical devices.
Downloads
References
"Security Framework for Implantable Medical Devices in the Internet of Things" by Y. Zhang et al. (2016).
"Anomaly Detection for Medical Devices using Machine Learning Techniques," by B. L. Ramakrishna, G. Rajaram, and N. Niranjan, in 2017 IEEE International Conference on Healthcare Informatics (ICHI), 2017.
"Securing Implantable Medical Devices in Healthcare Internet of Things" by S. Kim et al. (2017).
"Anomaly Detection in Medical Devices using Deep Learning Techniques," by S. Ashok Kumar, R. Anitha, and S. Chitra, in 2018 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), 2018.
"Securing Implantable Medical Devices Using Lightweight Cryptography" by R. Ashok Kumar et al. (2018).
"Security Monitoring and Intrusion Detection for Medical IoT Devices using Machine Learning," by J. Pfoh, T. Messervey, and S. K. Venkatesh, in 2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS), 2018.
"Machine Learning-Based Detection of Security Threats in Medical Cyber-Physical Systems," by A. Alrawais, A. Alhothaily, and X. Cheng, in 2018 IEEE International Conference on Smart Computing (SMARTCOMP), 2018.
"A Machine Learning-Based Security Framework for Implantable Medical Devices in the Internet of Things" by W. Zhang et al. (2018).
"Security Issues and Solutions in Implantable Medical Devices: A Review" by S. Kim et al. (2018).
"Communication Security in Implantable Medical Devices" by D. D. Ucar et al. (2018).
"Machine Learning-Based Security Framework for IoT-Enabled Medical Devices," by A. Alrawais, A. Alhothaily, and X. Cheng, in IEEE Access, vol. 7, pp. 37391-37400, 2019.
"A Survey on Security and Privacy Issues in Implantable Medical Devices" by J. Li et al. (2019).
"Machine Learning-Based Secure and Efficient Communication for Implantable Medical Devices in Healthcare Cyber-Physical Systems" by M. M. Islam et al. (2019).
"Machine Learning-Based Intrusion Detection System for Implantable Medical Devices" by C. Shrestha et al. (2019).
"A Security Framework for Implantable Medical Devices using Blockchain Technology" by S. S. Saini et al. (2019).
"Secure Implantable Medical Devices using Machine Learning for Improved Performance and Attack Detection" by M. A. Karim et al. (2020).
"Security and Privacy Issues in Implantable Medical Devices: A Comprehensive Survey" by N. A. Alqahtani et al. (2020).
"Securing Implantable Medical Devices with Deep Learning" by S. Hasan et al. (2020).
"A Machine Learning Approach to Detect Malicious Attacks in Implantable Medical Devices" by A. E. Arafat et al. (2021).
"Analysis of Cybersecurity Risks for Implantable Medical Devices" by G. Krempl et al. (2021).
"A Review of Security Mechanisms for Implantable Medical Devices" by K. R. Kollipara et al. (2021).
"A Review on Security Threats and Countermeasures for Implantable Medical Devices" by K. Khalid et al. (2022).
"A Machine Learning-Based Approach for Detecting Cyber Attacks on Implantable Medical Devices" by S. S. Roy et al. (2022).
"Securing Wireless Communication of Implantable Medical Devices against Cyber-Physical Attacks using Game Theory" by M. U. Ghazanfar et al. (2022).
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.