Abstract
For pervasive applications of the artificial neural networks (ANN), the autonomous control usually affects the overall processing and analysis of data in the healthcare systems. Though, involvement of several malicious activities by the intruders may drastically affect the overall communication system. Recently, more and more engineers have applied a trusted and secure Artificial Internet of Things (AIoT) healthcare system is used to analyze and process the accurate control for overall benefits. However, the lack of security and trust in IoT devices results in accidental control of risks. The aim of this chapter is to propose an ANN-based secure network to analyze the legitimacy of IoT devices by categorizing through back propagation and Bayesian rule schemes. The proposed system can efficiently recognize the illegal activity of malicious IoT devices used to record, manage, and store the sensitive information of healthcare centers. The proposed phenomenon is proposed over various security metrics against conventional scheme. Further, we have discussed the Software-Defined Networks (SDNs) architectures that provide better solutions by removing the decision making capabilities from intermediate nodes in the network.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Alduailij, M. A., & Lilien, L. T. (2015). A collaborative healthcare application based on opportunistic resource utilization networks with OVM primitives, in IEEE 2015 International Conference on Collaboration Technologies and Systems (CTS) (pp. 426–433).
Aujla, G. S., Chaudhary, R., Kumar, N., Kumar, R., & Rodrigues, J. J. (2018). An ensembled scheme for QoS-aware traffic flow management in software defined networks, in 2018 IEEE International Conference on Communications (ICC) (pp. 1–7). Piscataway: IEEE.
Aujla, G. S., & Jindal, A. (2020). A decoupled blockchain approach for edge-envisioned IoT-based healthcare monitoring. IEEE Journal on Selected Areas in Communications, 39(2), 491–499.
Aujla, G. S., Jindal, A., Kumar, N., & Singh, M. (2016). SDN-based data center energy management system using RES and electric vehicles, in 2016 IEEE Global Communications Conference (GLOBECOM) (pp. 1–6). Piscataway: IEEE.
Aujla, G. S., Kumar, N., Garg, S., Kaur, K., & Ranjan, R. (2019). EDCSuS: Sustainable edge data centers as a service in SDN-enabled vehicular environment. IEEE Transactions on Sustainable Computing.
Aujla, G. S., Singh, M., Bose, A., Kumar, N., Han, G., & Buyya, R. (2020). BlockSDN: Blockchain-as-a-service for software defined networking in smart city applications. IEEE Network, 34(2), 83–91.
Aujla, G. S., Singh, A., & Kumar, N. (2019). Adaptflow: Adaptive flow forwarding scheme for software-defined industrial networks. IEEE Internet of Things Journal, 7(7), 5843–5851.
Geng, R., Wang, R., & Liu, R. (2018). A software defined networking-oriented security scheme for vehicle networks. IEEE Access, 6, 58195–58203.
Graupe, D. (2013). Principles of artificial neural networks (vol. 7). Singapore: World Scientific.
Hirtan, L., Krawiec, P., Dobre, P., & Batalla, J. M. (2019). Blockchain-based approach for e-health data access management with privacy protection, in 2019 IEEE 24th International Work-shop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD) (pp. 1–7).
Holzinger, A., Langs, G., Denk, H., Zatloukal, K., & Müller, H. (2019). Causability and explainability of artificial intelligence in medicine. Data Mining and Knowledge Discovery, 9(4), 1312–1321.
Iqbal, W., Abbas, H., Daneshmand, M., Rauf, B., & Bangash, Y. A. (2020). An in-depth analysis of IoT security requirements, challenges, and their countermeasures via software-defined security. IEEE Internet of Things Journal, 7(10), 10250–10276.
Jiang, S., Duan, M., & Wang, L. (2018). Toward privacy-preserving symptoms matching in SDN-based mobile healthcare social networks. IEEE Internet of Things Journal, 5(3), 1379–1388.
Jindal, A., Aujla, G. S., Kumar, N., & Villari, M. (2019). GUARDIAN: Blockchain-based secure demand response management in smart grid system. IEEE Transactions on Services Computing, 13(4), 613–24.
Lelcuk, A., Groskop, M., Yehuda, D., Yotam, B. E. N. (2017). U.S. Patent No. 9,825,928. Washington: U.S. Patent and Trademark Office.
Meng, W., Choo, K. R. R., Furnell, S., Vasilakos, A. V., & Probst, C. W. (2018). Towards Bayesian-based trust management for insider attacks in healthcare software-defined networks. IEEE Transactions on Network and Service Management, 15(2), 761–773.
Meneghello, F., Calore, M., Zucchetto, D., Polese, M., & Zanella, A. (2019). IoT: Internet of threats? A survey of practical security vulnerabilities in real IoT devices. IEEE Internet of Things Journal, 6(5), pp. 8182–8201.
Mitchell, R., Michalski, J., & Carbonell, T. (2013). An artificial intelligence approach. Berlin: Springer.
Rathee, G., Sharma, A., Kumar, R., Ahmad, F., & Iqbal, R. (2020). A trust management scheme to secure mobile information centric networks. Computer Communications, 151, 66–75.
Wu, Z., & Weaver, A. C. (2006). Application of fuzzy logic in federated trust management for perva-sive computing, in IEEE 30th Annual International Computer Software and Applications Conference (COMPSAC’06) (vol. 2, pp. 215–222).
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Rathee, G. (2022). Trusted Mechanism Using Artificial Neural Networks in Healthcare Software-Defined Networks. In: Aujla, G.S., Garg, S., Kaur, K., Sikdar, B. (eds) Software Defined Internet of Everything. Internet of Things. Springer, Cham. https://doi.org/10.1007/978-3-030-89328-6_12
Download citation
DOI: https://doi.org/10.1007/978-3-030-89328-6_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-89327-9
Online ISBN: 978-3-030-89328-6
eBook Packages: Computer ScienceComputer Science (R0)