Skip to main content

Trusted Mechanism Using Artificial Neural Networks in Healthcare Software-Defined Networks

  • Chapter
  • First Online:
Software Defined Internet of Everything

Part of the book series: Internet of Things ((ITTCC))

  • 596 Accesses

Abstract

For pervasive applications of the artificial neural networks (ANN), the autonomous control usually affects the overall processing and analysis of data in the healthcare systems. Though, involvement of several malicious activities by the intruders may drastically affect the overall communication system. Recently, more and more engineers have applied a trusted and secure Artificial Internet of Things (AIoT) healthcare system is used to analyze and process the accurate control for overall benefits. However, the lack of security and trust in IoT devices results in accidental control of risks. The aim of this chapter is to propose an ANN-based secure network to analyze the legitimacy of IoT devices by categorizing through back propagation and Bayesian rule schemes. The proposed system can efficiently recognize the illegal activity of malicious IoT devices used to record, manage, and store the sensitive information of healthcare centers. The proposed phenomenon is proposed over various security metrics against conventional scheme. Further, we have discussed the Software-Defined Networks (SDNs) architectures that provide better solutions by removing the decision making capabilities from intermediate nodes in the network.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 129.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Alduailij, M. A., & Lilien, L. T. (2015). A collaborative healthcare application based on opportunistic resource utilization networks with OVM primitives, in IEEE 2015 International Conference on Collaboration Technologies and Systems (CTS) (pp. 426–433).

    Google Scholar 

  2. Aujla, G. S., Chaudhary, R., Kumar, N., Kumar, R., & Rodrigues, J. J. (2018). An ensembled scheme for QoS-aware traffic flow management in software defined networks, in 2018 IEEE International Conference on Communications (ICC) (pp. 1–7). Piscataway: IEEE.

    Google Scholar 

  3. Aujla, G. S., & Jindal, A. (2020). A decoupled blockchain approach for edge-envisioned IoT-based healthcare monitoring. IEEE Journal on Selected Areas in Communications, 39(2), 491–499.

    Article  Google Scholar 

  4. Aujla, G. S., Jindal, A., Kumar, N., & Singh, M. (2016). SDN-based data center energy management system using RES and electric vehicles, in 2016 IEEE Global Communications Conference (GLOBECOM) (pp. 1–6). Piscataway: IEEE.

    Google Scholar 

  5. Aujla, G. S., Kumar, N., Garg, S., Kaur, K., & Ranjan, R. (2019). EDCSuS: Sustainable edge data centers as a service in SDN-enabled vehicular environment. IEEE Transactions on Sustainable Computing.

    Google Scholar 

  6. Aujla, G. S., Singh, M., Bose, A., Kumar, N., Han, G., & Buyya, R. (2020). BlockSDN: Blockchain-as-a-service for software defined networking in smart city applications. IEEE Network, 34(2), 83–91.

    Article  Google Scholar 

  7. Aujla, G. S., Singh, A., & Kumar, N. (2019). Adaptflow: Adaptive flow forwarding scheme for software-defined industrial networks. IEEE Internet of Things Journal, 7(7), 5843–5851.

    Article  Google Scholar 

  8. Geng, R., Wang, R., & Liu, R. (2018). A software defined networking-oriented security scheme for vehicle networks. IEEE Access, 6, 58195–58203.

    Article  Google Scholar 

  9. Graupe, D. (2013). Principles of artificial neural networks (vol. 7). Singapore: World Scientific.

    Book  Google Scholar 

  10. Hirtan, L., Krawiec, P., Dobre, P., & Batalla, J. M. (2019). Blockchain-based approach for e-health data access management with privacy protection, in 2019 IEEE 24th International Work-shop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD) (pp. 1–7).

    Google Scholar 

  11. Holzinger, A., Langs, G., Denk, H., Zatloukal, K., & Müller, H. (2019). Causability and explainability of artificial intelligence in medicine. Data Mining and Knowledge Discovery, 9(4), 1312–1321.

    Google Scholar 

  12. Iqbal, W., Abbas, H., Daneshmand, M., Rauf, B., & Bangash, Y. A. (2020). An in-depth analysis of IoT security requirements, challenges, and their countermeasures via software-defined security. IEEE Internet of Things Journal, 7(10), 10250–10276.

    Article  Google Scholar 

  13. Jiang, S., Duan, M., & Wang, L. (2018). Toward privacy-preserving symptoms matching in SDN-based mobile healthcare social networks. IEEE Internet of Things Journal, 5(3), 1379–1388.

    Article  Google Scholar 

  14. Jindal, A., Aujla, G. S., Kumar, N., & Villari, M. (2019). GUARDIAN: Blockchain-based secure demand response management in smart grid system. IEEE Transactions on Services Computing, 13(4), 613–24.

    Article  Google Scholar 

  15. Lelcuk, A., Groskop, M., Yehuda, D., Yotam, B. E. N. (2017). U.S. Patent No. 9,825,928. Washington: U.S. Patent and Trademark Office.

    Google Scholar 

  16. Meng, W., Choo, K. R. R., Furnell, S., Vasilakos, A. V., & Probst, C. W. (2018). Towards Bayesian-based trust management for insider attacks in healthcare software-defined networks. IEEE Transactions on Network and Service Management, 15(2), 761–773.

    Article  Google Scholar 

  17. Meneghello, F., Calore, M., Zucchetto, D., Polese, M., & Zanella, A. (2019). IoT: Internet of threats? A survey of practical security vulnerabilities in real IoT devices. IEEE Internet of Things Journal, 6(5), pp. 8182–8201.

    Article  Google Scholar 

  18. Mitchell, R., Michalski, J., & Carbonell, T. (2013). An artificial intelligence approach. Berlin: Springer.

    Google Scholar 

  19. Rathee, G., Sharma, A., Kumar, R., Ahmad, F., & Iqbal, R. (2020). A trust management scheme to secure mobile information centric networks. Computer Communications, 151, 66–75.

    Article  Google Scholar 

  20. Wu, Z., & Weaver, A. C. (2006). Application of fuzzy logic in federated trust management for perva-sive computing, in IEEE 30th Annual International Computer Software and Applications Conference (COMPSAC’06) (vol. 2, pp. 215–222).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Rathee, G. (2022). Trusted Mechanism Using Artificial Neural Networks in Healthcare Software-Defined Networks. In: Aujla, G.S., Garg, S., Kaur, K., Sikdar, B. (eds) Software Defined Internet of Everything. Internet of Things. Springer, Cham. https://doi.org/10.1007/978-3-030-89328-6_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-89328-6_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-89327-9

  • Online ISBN: 978-3-030-89328-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics