Machine-to-Machine Communication for Device Identification and Classification in Secure Telerobotics Surgery

The capacity of machine objects to communicate autonomously is seen as the future of the Internet of Things (IoT), but machine-to-machine communication (M2M) is also gaining traction. In everyday life, security, transportation, industry, and healthcare all employ this paradigm. Smart devices have the ability to detect, handle, store, and analyze data, resulting in major network issues such as security and reliability. There are numerous vulnerabilities linked with IoT devices, according to security experts. Prior to performing any activities, it is necessary to identify and classify the device. Device identification and classification in M2M for secure telerobotic surgery are presented in this study. Telerobotics is an important aspect of the telemedicine industry. The major purpose is to provide remote medical care, which eliminates the requirement for both doctors and patients to be in the same location. This paper aims to propose a security and energy-efficient protocol for telerobotic surgeries, which is the primary concern at present. For secure telerobotic surgery, the author presents an Efficient Device type Detection and Classification (EDDC) protocol for device identification and classification in M2M communication. The periodic trust score is calculated using three factors from each sensor node. It demonstrates that the EDDC protocol is more effective and secure in detecting and categorizing rogue devices.

[1]  Zhiwei Li,et al.  Secure software attestation for military telesurgical robot systems , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.

[2]  Zhipeng Wu,et al.  A Data-Oriented M2M Messaging Mechanism for Industrial IoT Applications , 2017, IEEE Internet of Things Journal.

[3]  Bhavani M. Thuraisingham,et al.  Cyberphysical systems security applied to telesurgical robotics , 2012, Comput. Stand. Interfaces.

[4]  Zheng Zhou,et al.  A security authentication scheme in machine-to-machine home network service , 2015, Secur. Commun. Networks.

[5]  Dan Stoianovici,et al.  Technology Insight: telementoring and telesurgery in urology , 2006, Nature Clinical Practice Urology.

[6]  J. Bhola,et al.  Information Theory-Based Defense Mechanism Against DDOS Attacks for WSAN , 2020, Lecture Notes in Electrical Engineering.

[7]  Surender Kumar Soni,et al.  Genetic algorithm based optimized leach protocol for energy efficient wireless sensor networks , 2020, J. Ambient Intell. Humaniz. Comput..

[8]  Anas Abou El Kalam,et al.  Bilateral Teleoperation System Using QoS and Secure Communication Networks for Telemedicine Applications , 2016, IEEE Systems Journal.

[9]  Venkatasamy Sureshkumar,et al.  End to end light weight mutual authentication scheme in IoT-based healthcare environment , 2019, Journal of Reliable Intelligent Environments.

[10]  Dipti D. Patil,et al.  Network Performance Measurement through Machine to Machine Communication in TeleRobotics System , 2021, Tehnički glasnik.

[11]  Mandeep Kaur,et al.  Elitist multi-objective bacterial foraging evolutionary algorithm for multi-criteria based grid scheduling problem , 2016, 2016 International Conference on Internet of Things and Applications (IOTA).

[12]  Alexander Rakhlin,et al.  Automatic Instrument Segmentation in Robot-Assisted Surgery Using Deep Learning , 2018, bioRxiv.

[13]  Ehab Al-Shaer,et al.  On secure and resilient telesurgery communications over unreliable networks , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[14]  Chinmay Chakraborty,et al.  Chronic Wound Image Analysis by Particle Swarm Optimization Technique for Tele-Wound Network , 2017, Wirel. Pers. Commun..

[15]  Ruhul Amin,et al.  Robust secure communication protocol for smart healthcare system with FPGA implementation , 2019, Future Gener. Comput. Syst..

[16]  Ahmad-Reza Sadeghi,et al.  IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT , 2016, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).

[17]  Edmundo Monteiro,et al.  Security Issues and Approaches on Wireless M2M Systems , 2013, Wireless Networks and Security.

[18]  Mandeep Kaur,et al.  Discovery of resources using MADM approaches for parallel and distributed computing , 2017 .

[19]  S. K. Mohapatra,et al.  Energy-efficient modified LEACH protocol for IoT application , 2018, IET Wirel. Sens. Syst..

[20]  Vijay Sivaraman,et al.  Characterizing and classifying IoT traffic in smart cities and campuses , 2017, 2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[21]  Mohammad Shabaz,et al.  Compact Ultrawide Band Metamaterial-Inspired Split Ring Resonator Structure Loaded Band Notched Antenna , 2021 .

[22]  Chinmay Chakraborty,et al.  Artificial Intelligence and Internet of Things Based Healthcare 4.0 Monitoring System , 2021, Wireless Personal Communications.

[23]  Ashok Kumar,et al.  SA Sorting: A Novel Sorting Technique for Large-Scale Data , 2019, J. Comput. Networks Commun..

[24]  Liangli Ma,et al.  RISE: A RelIable and SEcure scheme for wireless Machine to Machine communications , 2013 .

[25]  Gaurav Dhiman,et al.  Application of Blockchain and Internet of Things in Healthcare and Medical Sector: Applications, Challenges, and Future Perspectives , 2021, Journal of Food Quality.

[26]  Chinmay Chakraborty,et al.  Reinforcement learning for medical information processing over heterogeneous networks , 2021, Multimedia Tools and Applications.

[27]  Jin Cao,et al.  Security Issues on Machine to Machine Communications , 2012, KSII Trans. Internet Inf. Syst..

[28]  Nikhil Chopra,et al.  On content modification attacks in bilateral teleoperation systems , 2016, 2016 American Control Conference (ACC).

[29]  Yuval Elovici,et al.  Detection of Unauthorized IoT Devices Using Machine Learning Techniques , 2017, ArXiv.

[30]  N. Dowler,et al.  Safety issues in telesurgery-summary , 1995 .

[31]  Wan-Young Chung,et al.  Wireless Machine-to-Machine Healthcare Solution Using Android Mobile Devices in Global Networks , 2013, IEEE Sensors Journal.

[32]  Dilip Kumar,et al.  Computational intelligence-based energy efficient routing protocols with QoS assurance for wireless sensor networks: a survey , 2019, Int. J. Wirel. Mob. Comput..

[33]  Jonathan Rodriguez,et al.  MoSHCA - my mobile and smart health care assistant , 2013, Healthcom.

[34]  Vijay M. Wadhai,et al.  ADAPTIVE REAL TIME DATA MINING METHODOLOGY FOR WIRELESS BODY AREA NETWORK BASED HEALTHCARE APPLICATIONS , 2012 .

[35]  Dipti Patil,et al.  5G Enabled Tactile Internet for Tele-Robotic Surgery , 2020 .

[36]  Vinay Bhatia,et al.  Design and Simulation of Capacitive MEMS Switch for Ka Band Application , 2021, Wirel. Commun. Mob. Comput..

[37]  Mohsen Guizani,et al.  Home M2M networks: Architectures, standards, and QoS improvement , 2011, IEEE Communications Magazine.

[38]  Βασιλική Κ. Λιάσκου Machine to Machine communications , 2013 .

[39]  Blake Hannaford,et al.  Preliminary protocol for interoperable telesurgery , 2009, 2009 International Conference on Advanced Robotics.

[40]  Lina Yao,et al.  Intent Recognition in Smart Living Through Deep Recurrent Neural Networks , 2017, ICONIP.

[41]  Kim-Kwang Raymond Choo,et al.  Anonymity Preserving and Lightweight Multimedical Server Authentication Protocol for Telecare Medical Information System , 2019, IEEE Journal of Biomedical and Health Informatics.

[42]  Min Chen,et al.  Machine-to-Machine Communications: Architectures, Standards and Applications , 2012, KSII Trans. Internet Inf. Syst..

[43]  Hongliang Ren,et al.  Real-Time Instrument Segmentation in Robotic Surgery Using Auxiliary Supervised Deep Adversarial Learning , 2019, IEEE Robotics and Automation Letters.

[44]  B. Dickens,et al.  Legal and ethical issues in telemedicine and robotics , 2006, International journal of gynaecology and obstetrics: the official organ of the International Federation of Gynaecology and Obstetrics.

[45]  Sanjay Kadam,et al.  A novel multi-objective bacteria foraging optimization algorithm (MOBFOA) for multi-objective scheduling , 2018, Appl. Soft Comput..