A Novel Agent-Based Intrusion Detection System for Wireless Body Area Network
Keywords:
eHealthcare, Wireless Body Area Network, Security, Intrusion Detection System, Agent TechnologySynopsis
This is a Chapter in:
Book:
Intelligent Computing and Consumer Support Applications
Series:
Chronicle of Computing
Chapter Abstract:
The objective of e-health is to assist patients in improving health care through integrating a wireless body network, communication infrastructure, and hospital network. The patient monitoring system assists patients in better understanding their health daily. The mobility and dynamism offered by e-health services expose the health system to the risk of attacks and intrusions. However, securing patient information and confidentiality is essential to ensure quality care. Current research on security in e-health focuses on implementing authentication, encryption, and trust-based solutions for implanted and wearable medical devices. These solutions are often computationally expensive and challenging to implement on medical devices with limited resources. This paper proposes a novel intrusion detection system based on agent technology to protect patients' medical data. The proposed method detects network-level intrusions as well as anomalies in sensor data. Our model was experimented with by simulating a hospital network topology. Our simulation results demonstrate that we can achieve high detection accuracy.
Keywords:
eHealthcare, Wireless Body Area Network, Security, Intrusion Detection System, Agent Technology
Cite this paper as:
Sellami L., Sellami K., Tiako P. F. (2023) A Novel Agent-Based Intrusion Detection System for Wireless Body Area Network. In: Tiako P.F. (ed) Intelligent Computing and Consumer Support Applications. Chronicle of Computing. OkIP. https://doi.org/10.55432/978-1-6692-0003-1_8
Presented at:
The 2022 OkIP International Conference on Advances in Health Information Technology (AHIT) in Oklahoma City, Oklahoma, USA, and Online, on October 3-6, 2022
Contacts:
Lynda Sellami
slynda1@yahoo.fr
References
Habib, K., & Leister, W. (2013). Adaptive Security for the Internet of Things Reference Model. 6th Norwegian Information Security Conference, NISK, 13-24.
SUNDMAEKER, H., GUILLEMIN, P., FRIESS, P., & Woelfflé S. (2010). Vision and challenges for realising the Internet of Things. Cluster of European research projects on the internet of things, European Commision, 3(3), 34-36.
X-ETP Group. (2010). Future Internet Strategic Research Agenda, Version 1.1, European Future Internet X-ETP Group, 1-73, 2010.
Abie. H.. & Balasingham, I. (2012). Risk-Based Adaptive Security for Smart IoT in eHealth, BodyNets, 269-275.
Sellami, L., Sellami, K., & Tiako, PF. (2016). Detection of New Attacks on Ubiquitous Services in Cloud Computing and Against Measure. Advanced Science Letters 22 (10), 3168-3172.
Sellami, L., Idoughi, D., Sellami, K., & Tiako, PF. (2021). Detection and Preventing Approach for Electronic Medical Records in E-Health. In 2021 OKIP International Conference on Advances in Health Information Technology (AHIT). Oklahoma International Publication, USA.
Saleem, S., Ullah, S., & Kwak, K. S. (2011). A Study of IEEE 802.15.4 Security Framework for Wireless Body Area Networks. Sensors; 11(2), 1383-1395.
Ziaie, N. (2013). e-Health Security Issues and Solutions, Master of Science Thesis, University of Gothenburg. Göteborg. Sweden.
Li, M., Lou, W., & Ren, K. (2010). Data Security and Privacy in Wireless Body Area Networks, Wireless Communications, IEEE, 17(1), 51-58, February.
Ghamari, M., Janko, B., Sherratt, RS. Harwin, W., Piechockic, R., & Soltanpur. C. (2016). A Survey on Wireless Body Area Networks for eHealthcare Systems in Residential Environment, Sensors 16, 6( 831). https://doi.org/10.3390/s16060831
Al-Rimawi, R., Dwairej, D., Masadeh, A., Ahmad, M. & Al-Ananbeh. E. (2016). E-health Concept Development and Maturity in Literature. Journal of Health, Medicine and Nursing. ISSN 2422-8419. An International Peer-reviewed Journal. 29.
Hodgkiss, J., Djahel, S., & Zhang, Z (2021). A New Attack Method Against ECG-Based Key Generation and Agreement Schemes in Body Area Networks, in IEEE Sensors Journal, 21(15), 17300-17307, doi: 10.1109/JSEN.2021.3079177.
Habib, K., Torjusen, A. & Leister, W. (2014). A Novel Authentication Framework Based on Biometric and Radio Fingerprinting for the IoT in eHealth, SMART 2014, July 20 - 24, 32-37.
Bengag, A., Bengag, A., & Moussaoui. O. (2020). Effective and Robust Detection of Jamming Attacks for WBAN-Based Healthcare Monitoring Systems. In International Conference on Electronic Engineering and Renewable Energy, 169–174. Springer, Singapore.
Jaitly, S., Malhotra, H., & Bhushan, B. (2017). Security vulnerabilities and countermeasures against jamming attacks in Wireless Sensor Networks: A survey. In International Conference on Computer, Communications and Electronics (Comptelix). IEEE, 559-564.
Chowdhury, S.K., & Sen, M. (2018). Survey on Attacks on Wireless Body Area Network. Conference on Computational Intelligence & IoT (ICCIIoT) 2018. At: National Institute of Technology Agartala, Tripura, Indi.
a, pp 636-644.
Malik, M.S.A., Ahmed, M., Abdullah, T., Kousar, N., Shumaila, M. N. & Awais. P. M. (2018). Wireless Body Area Network Security and Privacy Issue in E-Healthcare. (IJACSA) International Journal of Advanced Computer Science and Applications, 9(4)
Anwar, M., Abdullah, A.H., Butt, R.A., & Ashraf, M.W. Securing. (2018). Data Communication in Wireless Body Area Networks Using Digital Signatures. Technical Journal, University of Engineering and Technology (UET) Taxila, Pakistan, 23(2).
Liu, Q., Mkongwa, K.F., & Zhang, C. (2021). Performance issues in wireless body area networks for the healthcare application: a survey and future prospects. SN Applied Sciences 3.
Raymond, D.R., Midkiff. S.F. (2008). Denial-of-service in wireless sensor networks: Attacks and defences. IEEE Pervasive Computing.7(Pt 1), 74-81
Ramkumar, M. (2010)Proxy aided key pre-distribution schemes for sensor networks. In: Paper Presented at the IEEE International Conference on Performance, Computing, and Communications; 461-68
Premkumar, M., & Sundararajan, T. V. P. (2020). DLDM: Deep learning-based defense mechanism for denial of service attacks in wireless sensor networks. Microprocessors and Microsystems, v 79, 103278.
Castalia home. [Online]. Available:https://castalia.forge.nicta.com.au/index.php/en/
Omnet++ WBAN Projects | Wireless Body Area Network Projects, OpenSim Ltd., 2011.
