Octopus: A Novel Approach for Health Data Masking and Retrieving Using Physical Unclonable Functions and Machine Learning

Health equipment are used to keep track of significant health indicators, automate health interventions, and analyze health indicators. People have begun using mobile applications to track health characteristics and medical demands because devices are now linked to high-speed internet and mobile phones. Such a combination of smart devices, the internet, and mobile applications expands the usage of remote health monitoring through the Internet of Medical Things (IoMT). The accessibility and unpredictable aspects of IoMT create massive security and confidentiality threats in IoMT systems. In this paper, Octopus and Physically Unclonable Functions (PUFs) are used to provide privacy to the healthcare device by masking the data, and machine learning (ML) techniques are used to retrieve the health data back and reduce security breaches on networks. This technique has exhibited 99.45% accuracy, which proves that this technique could be used to secure health data with masking.

[1]  Pintu Kumar Sadhu,et al.  NAHAP: PUF-Based Three Factor Authentication System for Internet of Medical Things , 2023, IEEE Consumer Electronics Magazine.

[2]  Pintu Kumar Sadhu,et al.  Physical Unclonable Function and Machine Learning Based Group Authentication and Data Masking for In-Hospital Segments , 2022, Electronics.

[3]  Zhelong Wang,et al.  Analysis and evaluation of hemiplegic gait based on wearable sensor network , 2022, Inf. Fusion.

[4]  Pintu Kumar Sadhu,et al.  Internet of Things: Security and Solutions Survey , 2022, Sensors.

[5]  A. Pathan,et al.  Security and Privacy Management in Internet of Medical Things (IoMT): A Synthesis , 2022, J. Cybersecur. Priv..

[6]  Pintu Kumar Sadhu,et al.  Prospect of Internet of Medical Things: A Review on Security Requirements and Solutions , 2022, Sensors.

[7]  Pintu Kumar Sadhu,et al.  MC- PUF: A Robust Lightweight Controlled Physical Unclonable Function for Resource Constrained Environments , 2022, 2022 IEEE Computer Society Annual Symposium on VLSI (ISVLSI).

[8]  Venkata K. V. V. Bathalapalli,et al.  PUFchain 2.0: Hardware-Assisted Robust Blockchain for Sustainable Simultaneous Device and Data Security in Smart Healthcare , 2022, SN Computer Science.

[9]  Pintu Kumar Sadhu,et al.  Easy-Sec: PUF-Based Rapid and Robust Authentication Framework for the Internet of Vehicles , 2022, ArXiv.

[10]  Kumar Yelamarthi,et al.  Performance Analysis of Ring Oscillator PUF for Robust Security in Smart Transportation , 2021, 2021 IEEE 7th World Forum on Internet of Things (WF-IoT).

[11]  Sahshanu Razdan,et al.  Internet of Medical Things (IoMT): Overview, Emerging Technologies, and Case Studies , 2021, IETE Technical Review.

[12]  G. Díez-Señorans,et al.  Introduction to Physically Unclonable Fuctions: Properties and Applications , 2020, 2020 European Conference on Circuit Theory and Design (ECCTD).

[13]  Linesh Raja,et al.  Light-weighted cryptographic algorithms for energy efficient applications , 2020 .

[14]  Yingnan Sun,et al.  Security and Privacy for the Internet of Medical Things Enabled Healthcare Systems: A Survey , 2019, IEEE Access.

[15]  Sunil K. Khatri,et al.  Smart E-Healthcare with Internet of Things: Current Trends, Challenges, Solutions, and Technologies , 2019, From Visual Surveillance to Internet of Things.

[16]  Moayad Aloqaily,et al.  An Authentic-Based Privacy Preservation Protocol for Smart e-Healthcare Systems in IoT , 2019, IEEE Access.

[17]  Mohsen Guizani,et al.  A Decade of Internet of Things: Analysis in the Light of Healthcare Applications , 2019, IEEE Access.

[18]  Deepak Puthal,et al.  PMsec: Physical Unclonable Function-Based Robust and Lightweight Authentication in the Internet of Medical Things , 2019, IEEE Transactions on Consumer Electronics.

[19]  Sotiris Ioannidis,et al.  Review of Security and Privacy for the Internet of Medical Things (IoMT) , 2019, 2019 15th International Conference on Distributed Computing in Sensor Systems (DCOSS).

[20]  Panagiotis G. Sarigiannidis,et al.  Securing the Internet of Things: Challenges, threats and solutions , 2019, Internet Things.

[21]  A. B. Hssane,et al.  Big healthcare data: preserving security and privacy , 2018, Journal of Big Data.

[22]  Sridhar Krishnan,et al.  Wearable Hardware Design for the Internet of Medical Things (IoMT) , 2018, Sensors.

[23]  Yasir Mehmood,et al.  Internet-of-Things-Based Smart Cities: Recent Advances and Challenges , 2017, IEEE Communications Magazine.

[24]  Georgios Kambourakis,et al.  DDoS in the IoT: Mirai and Other Botnets , 2017, Computer.

[25]  Longfei Wu,et al.  A Survey on Security and Privacy Issues in Internet-of-Things , 2017, IEEE Internet of Things Journal.

[26]  Munindar P. Singh,et al.  Continuous Authentication and Authorization for the Internet of Things , 2017, IEEE Internet Computing.

[27]  Amarsinh Vidhate,et al.  Security attacks in IoT: A survey , 2017, 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC).

[28]  Derek Abbott,et al.  PUF-FSM: A Controlled Strong PUF , 2017, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[29]  Mark Zwolinski,et al.  Overview of PUF-based hardware security solutions for the internet of things , 2016, 2016 IEEE 59th International Midwest Symposium on Circuits and Systems (MWSCAS).

[30]  Maryline Laurent-Maknavicius,et al.  Survey on secure communication protocols for the Internet of Things , 2015, Ad Hoc Networks.

[31]  Hannu Tenhunen,et al.  Smart e-Health Gateway: Bringing intelligence to Internet-of-Things based ubiquitous healthcare systems , 2015, 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC).

[32]  Kyung-Sup Kwak,et al.  The Internet of Things for Health Care: A Comprehensive Survey , 2015, IEEE Access.

[33]  Srinivas Devadas,et al.  Physical Unclonable Functions and Applications: A Tutorial , 2014, Proceedings of the IEEE.

[34]  Tanja Lange,et al.  Factoring RSA keys from certified smart cards: Coppersmith in the wild , 2013, IACR Cryptol. ePrint Arch..

[35]  D. Kuritzkes,et al.  Hematopoietic cell transplantation and HIV cure: where we are and what next? , 2013, Blood.

[36]  J. S. Shah,et al.  Performace Analysis of Encryption and Decryption Using Genetic Based Cancelable Non-invertible Fingerprint Based Key in MANET , 2012, 2012 International Conference on Communication Systems and Network Technologies.

[37]  Pardeep Kumar,et al.  Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey , 2011, Sensors.

[38]  Yan Gu,et al.  A Performance Analysis of Identity-Based Encryption Schemes , 2011, INTRUST.

[39]  Niraj K. Jha,et al.  Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system , 2011, 2011 IEEE 13th International Conference on e-Health Networking, Applications and Services.

[40]  Yunmo Chung,et al.  Advanced universal remote controller for home automation and security , 2010, IEEE Transactions on Consumer Electronics.

[41]  Sergei Skorobogatov,et al.  Optical Fault Masking Attacks , 2010, 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography.

[42]  Christophe Clavier,et al.  Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings , 2009, CHES.

[43]  Michael Hutter,et al.  Optical Fault Attacks on AES: A Threat in Violet , 2009, 2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC).

[44]  Dick James,et al.  The State-of-the-Art in IC Reverse Engineering , 2009, CHES.

[45]  Srivaths Ravi,et al.  A study of the energy consumption characteristics of cryptographic algorithms and security protocols , 2006, IEEE Transactions on Mobile Computing.

[46]  Ghulam Muhammad,et al.  A Comprehensive Survey of the Internet of Things (IoT) and AI-Based Smart Healthcare , 2021, IEEE Access.

[47]  Salma Lbrini,et al.  Big Health Data: Cardiovascular Disease Prevention Using Big Data and Machine Learning , 2021 .

[48]  B. Bhushan,et al.  IoT Enabled Technology in Secured Healthcare: Applications, Challenges and Future Directions , 2020 .

[49]  Jean-Luc Danger,et al.  Self-Secured PUF: Protecting the Loop PUF by Masking , 2020, IACR Cryptol. ePrint Arch..

[50]  Tobias Nilges,et al.  The Cryptographic Strength of Tamper-Proof Hardware , 2015 .

[51]  S. R. Jino Ramson,et al.  Energy-Aware Duty Cycle Scheduling for Efficient Data Collection in Wireless Sensor Networks , 2013 .