Secured mutual wireless communication using real and imaginary-valued artificial neuronal synchronization and attack detection
This research presents a cutting-edge security framework that integrates optimal Intrusion Detection System (IDS) and Artificial Neural Networks (ANNs)-based key exchange methods to enhance the reliability of mutual wireless communication in Internet of Medical Things (IoMT) networks. The advent of...
Gespeichert in:
Veröffentlicht in: | Engineering applications of artificial intelligence 2024-11, Vol.137, p.109203, Article 109203 |
---|---|
Hauptverfasser: | , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | This research presents a cutting-edge security framework that integrates optimal Intrusion Detection System (IDS) and Artificial Neural Networks (ANNs)-based key exchange methods to enhance the reliability of mutual wireless communication in Internet of Medical Things (IoMT) networks. The advent of IoMT technology has brought about a significant transformation in patient care and healthcare operations. It allows for real-time monitoring and diagnosis to be conducted remotely. However, the protection of sensitive medical data has become a crucial issue that has to be addressed to maintain privacy and security. IoMT devices, which have limited processing capabilities, are especially susceptible to cyberattacks, therefore requiring the implementation of new security measures. The proposed methodology offers numerous advantages. By utilizing patient sensor data and analyzing network traffic, the suggested solution surpasses current methods in identifying and preventing network threats with increased precision. This research showcases the better effectiveness of Deep Learning (DL) models in identifying intrusions in IoMT settings, by examining 17 Machine Learning (ML) and 6 DL models. The suggested methodology relies on using a neural sequence of ANNs that consist of both real and imaginary-valued components. This approach enables reciprocal learning and synchronization, which in turn facilitates safe key distribution among IoMT devices. This novel method not only guarantees strong key exchange mechanisms but also enhances the overall security of IoMT networks. This paper presents a complete solution to solve the difficulties of protecting wireless communication in IoMT contexts. This approach performs better than comparable methods in the literature. |
---|---|
ISSN: | 0952-1976 |
DOI: | 10.1016/j.engappai.2024.109203 |