Journal of Medical Systems

, 42:186 | Cite as

Maintaining Security and Privacy in Health Care System Using Learning Based Deep-Q-Networks

  • P. Mohamed ShakeelEmail author
  • S. Baskar
  • V. R. Sarma Dhulipala
  • Sukumar Mishra
  • Mustafa Musa Jaber
Mobile & Wireless Health
Part of the following topical collections:
  1. Advancements in Internet of Medical Things for Healthcare System


In the recent past, Internet of Things (IoT) plays a significant role in different applications such as health care, industrial sector, defense and research etc.… It provides effective framework in maintaining the security, privacy and reliability of the information in internet environment. Among various applications as mentioned health care place a major role, because security, privacy and reliability of the medical information is maintained in an effective way. Even though, IoT provides the effective protocols for maintaining the information, several intermediate attacks and intruders trying to access the health information which in turn reduce the privacy, security and reliability of the entire health care system in internet environment. As a result and to solve the issues, in this research Learning based Deep-Q-Networks has been introduced for reducing the malware attacks while managing the health information. This method examines the medical information in different layers according to the Q-learning concept which helps to minimize the intermediate attacks with less complexity. The efficiency of the system has been evaluated with the help of experimental results and discussions.


Internet of things (IoT) Privacy Security and reliability Learning based deep-Q-networks 


Compliance with Ethical Standards

Conflicts of Interest

The author(s) declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.

Ethical Approval

All procedures performed in this study were in accordance with the ethical standards of the institutional research committee and with the 1964 Helsinki declaration and its later amendments.

Informed Consent

Informed consent was obtained from all individual participants included in the study.


  1. 1.
    Nordrum, A., Popular Internet of Things Forecast of 50 Billion Devices by 2020 Is Outdated. IEEE. 2016.Google Scholar
  2. 2.
    Hsu, C.-L., and Lin, J. C.-C., An empirical examination of consumer adoption of internet of things services: Network externalities and concern for information privacy perspectives. Comput. Hum. Behav. 62:516–527, 2016. Scholar
  3. 3.
    Vongsingthong, S., Smanchat, S., Internet of Things: A review of applications & technologies" (PDF). Suranaree J. Sci. Technol. 2014.Google Scholar
  4. 4.
    Kang, W. M. , Moon, S. Y, Park, J. H., An enhanced security framework for home appliances in smart home. Human-centric Comput. Inform. Sci. 7 (6). 2017. doi: Retrieved 3 November 2017.
  5. 5.
    Istepanian, R., Hu, S., Philip, N., and Sungoor, A., The potential of internet of m-health things "m-IoT" for non-invasive glucose level sensing. Ann Int. Conf IEEE Eng. Med. Biol. Soc. (EMBC)., 2011.
  6. 6.
    Feamster, N., Mitigating the Increasing Risks of an Insecure Internet of Things. Freedom to Tinker. 2017.Google Scholar
  7. 7.
    Alshehri, S., Radziszowski, S. P., and Raj, R. K., Secure access foe healthcare data in the cloud using Ciphertext-policy attribute-based encryption. Arlington: IEEE 28th Int. Conf. on Data Engineering Workshops, 2012, 143–146.Google Scholar
  8. 8.
    Mxoli, A., Gerber, M., and Phipps, N. M., Information security risk measures for cloud based personal Heath Records. London: IEEE Int. Conf. on Information Society, 2014, 187–193.Google Scholar
  9. 9.
    Abu Alsheikh, M., Lin, S., Niyato, D., and Tan, H. P., Machine learning in wireless sensor networks: Algorithms, strategies, and applications. IEEE Commun. Surv. Tutorial. 16(4):1996–2018, 2014.CrossRefGoogle Scholar
  10. 10.
    Granjal, J., Monteiro, E., and Silva, J. S., Security for the internet of things: A survey of existing protocols and open research issues. IEEE Comm. Surv. Tutorial. 17(3):thirdquarter, 2015.CrossRefGoogle Scholar
  11. 11.
    Kaikang, Z.-B., and Congwang, Security and privacy mechanism for health internet of things. J. Chin. Univ. Posts. Telecomm. 20(2):64–68, 2013.CrossRefGoogle Scholar
  12. 12.
    Sultan Alasmari; Mohd Anwar, Security & Privacy Challenges in IoT-Based Health Cloud, International Conference on Computational Science and Computational Intelligence (CSCI) in IEEE, 2016.Google Scholar
  13. 13.
    Steele, R., and Clarke, A., The internet of things and next-generation public health information systems. Commun. Netw. 5:4–9, 2013.CrossRefGoogle Scholar
  14. 14.
    Perera, C., Zaslavsky, A., Christen, P., and Georgakopoulos, D., Context aware computing for the internet of things: A survey. IEEE Comm. Surv. Tutorial. 16(1):First Quarter, 2014.CrossRefGoogle Scholar
  15. 15.
    Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., and Ayyash, M., Internet of things: A survey on enabling technologies, protocols, and applications. IEEE Comm. Surv. Tutorial. 17(4):Fourthquarter, 2015.CrossRefGoogle Scholar
  16. 16.
    Zanella, A., Bui, N., Castellani, A., Vangelista, L., Zorzi, M., Internet of Things for Smart Cities. IEEE Internet Things J. 1(1), 2014.Google Scholar
  17. 17.
    Li, F., Xiong, P., Practical Secure Communication for Integrating Wireless Sensor Networks Into the Internet of Things. IEEE Sensors J. 13(10), 2013.Google Scholar
  18. 18.
    Chze, P. L. R., Leong, K. S., A secure multi-hop routing for IoT communication. IEEE World Forum on Internet of Things (WF-IoT), 2014.Google Scholar
  19. 19.
    Tan, Z., Jamdagni, A., He, X., Nanda, P., and Liu, R. P., A system for denial-of-service attack detection based on multivariate correlation analysis. IEEE Trans. Paral. Distrib. Syst. 25(2):447–456, 2013.Google Scholar
  20. 20.
    Yan, Z., Zhang, P., and Vasilakos, A. V., A survey on trust management for internet of things. J. Netw. Comput. Appl. 42(3):120–134, 2014.CrossRefGoogle Scholar
  21. 21.
    Szegedy, Christian; Toshev, Alexander; Erhan, Dumitru, Deep neural networks for object detection. Adv. Neu. Inform. Proc. Syst., 2013.Google Scholar
  22. 22.
    Polikar, R., Ensemble based Systems in Decision Making (PDF). IEEE Circ. Syst. Mag. 6(3):21–45, 2006 [permanent dead link] a tutorial article on ensemble systems including pseudocode, block diagrams and implementation issues for AdaBoost and other ensemble learning algorithms.CrossRefGoogle Scholar
  23. 23.
    Pujol, J., The solution of nonlinear inverse problems and the Levenberg-Marquardt method. Geophysics. SEG. 72(4):W1–W16, 2007. Scholar
  24. 24.
    Riedmiller, M., Gabel, T., Hafner, R., and Lange, S., Reinforcement learning for robot soccer. Auton. Robot. 27:55–73, 2009.CrossRefGoogle Scholar
  25. 25.
    Krizhevsky, A., Sutskever, I., and Hinton, G. E., Imagenet classification with deep convolutional neural networks (PDF). Adv. Neural Inf. Proces. Syst. 1:1097–1105, 2012.Google Scholar
  26. 26.
    Collobert, R., Bengio, S.. Links between Perceptrons, MLPs and SVMs. Proc. Int'l Conf. on Machine Learning (ICML), 2004.Google Scholar
  27. 27.
    Schneider, P., Hammer, B., and Biehl, M., Adaptive relevance matrices in learning vector quantization. Neural Comput. 21:3532–3561, 2009. Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  • P. Mohamed Shakeel
    • 1
    Email author
  • S. Baskar
    • 2
  • V. R. Sarma Dhulipala
    • 3
  • Sukumar Mishra
    • 4
  • Mustafa Musa Jaber
    • 5
  1. 1.Faculty of Information and Communication TechnologyUniversiti Teknikal Malaysia MelakaDurian TunggalMalaysia
  2. 2.Department of Electronics and Communication EngineeringKarpagam Academy of Higher EducationCoimbatoreIndia
  3. 3.Department of PhysicsAnna UniversityTiruchirappalliIndia
  4. 4.Department of Electrical Engineering Indian Institute of TechnologyNew DelhiIndia
  5. 5.Universiti Tun Hussein Onn MalasiaParit RajaMalaysia

Personalised recommendations