On the design of an AI-driven secure communication scheme for internet of medical things environment

The Internet of Medical Things (IoMT) is a collection of smart healthcare devices, hardware infrastructure, and related software applications, that facilitate the connection of healthcare information technology system via the Internet. It is also called IoT in healthcare, facilitating secure communi...

Full description

Bibliographic Details
Main Authors: Neha Garg, Rajat Petwal, Mohammad Wazid, D.P. Singh, Ashok Kumar Das, Joel J.P.C. Rodrigues
Format: Article
Language:English
Published: KeAi Communications Co., Ltd. 2023-10-01
Series:Digital Communications and Networks
Subjects:
Online Access:http://www.sciencedirect.com/science/article/pii/S235286482200058X
Description
Summary:The Internet of Medical Things (IoMT) is a collection of smart healthcare devices, hardware infrastructure, and related software applications, that facilitate the connection of healthcare information technology system via the Internet. It is also called IoT in healthcare, facilitating secure communication of remote healthcare devices over the Internet for quick and flexible analysis of healthcare data. In other words, IoMT is an amalgam of medical devices and applications, which improves overall healthcare outcomes. However, this system is prone to security- and privacy-related attacks on healthcare data. Therefore, providing a robust security mechanism to prevent the attacks and vulnerability of IoMT is essential. To mitigate this, we proposed a new Artificial-Intelligence envisioned secure communication scheme for IoMT. The discussed network and threat models provide details of the associated network arrangement of the IoMT devices and attacks relevant to IoMT. Furthermore, we provide the security analysis of the proposed scheme to show its security against different possible attacks. Moreover, a comparative study of the proposed scheme with other similar schemes is presented. Our results show that the proposed scheme outperforms other similar schemes in terms of communication and computation costs, and security and functionality attributes. Finally, we provide a pragmatic study of the proposed scheme to observe its impact on various network performance parameters.
ISSN:2352-8648