An Intrusion Detection System for Internet of Medical Things

Internet of Things (IoT) is making strong advances in healthcare with the promise of transformation in technological, social and economic prospects, paving the way for a healthy future. Medical devices equipped with wireless communication enable remote monitoring features and are increasingly becoming connected to each other and to the Internet. Such smart and connected medical devices referred to as the Internet of Medical Things have enabled continuous real-time patient monitoring, increase in diagnostic accuracy, and effective treatment. In spite of their numerous benefits, these devices open up newer attack surfaces thereby introducing multitude of security and privacy concerns. Attacks on Internet connected medical devices can potentially cause significant physical harm and life-threatening damage to the patients. In this research, we design and develop a novel mobile agent based intrusion detection system to secure the network of connected medical devices. In particular, the proposed system is hierarchical, autonomous, and employs machine learning and regression algorithms to detect network level intrusions as well as anomalies in sensor data. We simulate a hospital network topology and perform detailed experiments for various subsets of Internet of Medical things including wireless body area networks and other connected medical devices. Our simulation results demonstrate that we are able to achieve high detection accuracy with minimal resource overhead.

[1]  John E. Gaffney,et al.  Evaluation of Intrusion Detection Systems , 2003, Journal of research of the National Institute of Standards and Technology.

[2]  Shancang Li Security and Vulnerability in the Internet of Things , 2017 .

[3]  Mohammad Zulkernine,et al.  DIDMA: a distributed intrusion detection system using mobile agents , 2005, Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing and First ACIS International Workshop on Self-Assembling Wireless Network.

[4]  M Sushma,et al.  INTRUSION DETECTION AND PREVENTION OF NODE REPLICATION ATTACKS IN WIRELESS BODY AREA SENSOR NETWORK , 2012 .

[5]  Hong Wen,et al.  Cooperative Jamming for Physical Layer Security Enhancement in Internet of Things , 2018, IEEE Internet of Things Journal.

[6]  O. Kachirski,et al.  Intrusion detection using mobile agents in wireless ad hoc networks , 2002, Proceedings. IEEE Workshop on Knowledge Media Networking.

[7]  Nidal Nasser,et al.  SEEM: Secure and energy-efficient multipath routing protocol for wireless sensor networks , 2007, Comput. Commun..

[8]  K. V. Arya,et al.  Feedback Reliability Ratio of an Intrusion Detection System , 2012, J. Information Security.

[9]  Haider Abbas,et al.  Security Vulnerabilities, Attacks, Countermeasures, and Regulations of Networked Medical Devices—A Review , 2019, IEEE Communications Surveys & Tutorials.

[10]  Luca Simone Ronga,et al.  A New Modulation for Intrinsically Secure Radio Channel in Wireless Systems , 2009, Wirel. Pers. Commun..

[11]  Georgios Kambourakis,et al.  Securing Medical Sensor Environments: The CodeBlue Framework Case , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).

[12]  Geethapriya Thamilarasu,et al.  iDetect: an intelligent intrusion detection system for wireless body area networks , 2016, Int. J. Secur. Networks.

[13]  Min Chen,et al.  An Integrated Biometric-Based Security Framework Using Wavelet-Domain HMM in Wireless Body Area Networks (WBAN) , 2011, 2011 IEEE International Conference on Communications (ICC).

[14]  Wade Trappe,et al.  The challenges facing physical layer security , 2015, IEEE Communications Magazine.

[15]  Colleen Swanson,et al.  SoK: Security and Privacy in Implantable Medical Devices and Body Area Networks , 2014, 2014 IEEE Symposium on Security and Privacy.

[16]  J. Martin Leo Manickam,et al.  Public key cryptosystem based security in wireless body area network , 2014, 2014 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2014].

[17]  Srinivas Sampalli,et al.  A security suite for wireless body area networks , 2012, ArXiv.

[18]  D. Dimitrov Medical Internet of Things and Big Data in Healthcare , 2016, Healthcare informatics research.

[19]  Muhammad Usman,et al.  Mobile Agent Based Hierarchical Intrusion Detection System in Wireless Sensor Networks , 2012 .

[20]  Eugene H. Spafford,et al.  An architecture for intrusion detection using autonomous agents , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).

[21]  Matthias Hollick,et al.  Lightweight energy consumption-based intrusion detection system for wireless sensor networks , 2015, SAC '13.

[22]  Zhiyuan Ma,et al.  Autonomous mobile agent based intrusion detection framework in wireless body area networks , 2015, 2015 IEEE 16th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM).

[23]  Fang Liu,et al.  Security and Privacy in the Medical Internet of Things: A Review , 2018, Secur. Commun. Networks.

[24]  Geethapriya Thamilarasu,et al.  Distributed intrusion detection using mobile agents in wireless body area networks , 2017, 2017 Seventh International Conference on Emerging Security Technologies (EST).

[25]  Pardeep Kumar,et al.  Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey , 2011, Sensors.

[26]  Lorenzo Mucchi,et al.  Physical layer security based on spread‐spectrum watermarking and jamming receiver , 2017, Trans. Emerg. Telecommun. Technol..

[27]  Qinghe Du,et al.  A Review of Physical Layer Security Techniques for Internet of Things: Challenges and Solutions , 2018, Entropy.

[28]  Fengyuan Xu,et al.  IMDGuard: Securing implantable medical devices with the external wearable guardian , 2011, 2011 Proceedings IEEE INFOCOM.

[29]  T. Dimitriou,et al.  Security issues in biomedical wireless sensor networks , 2008, 2008 First International Symposium on Applied Sciences on Biomedical and Communication Technologies.

[30]  Mohsen Toorani On Vulnerabilities of the Security Association in the IEEE 802.15.6 Standard , 2015, Financial Cryptography Workshops.

[31]  Wenjia Li,et al.  Recommendation-Based Trust Management in Body Area Networks for Mobile Healthcare , 2014, 2014 IEEE 11th International Conference on Mobile Ad Hoc and Sensor Systems.

[32]  Feng Zhao,et al.  Accurate CPU Power Modeling for Multicore Smartphones , 2015 .

[33]  Kyung-Sup Kwak,et al.  The Internet of Things for Health Care: A Comprehensive Survey , 2015, IEEE Access.

[34]  Yan Zhang,et al.  A safe mobile agent system for distributed intrusion detection , 2003, Proceedings of the 2003 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.03EX693).