Abstract
Introduction: Wireless Body Area Networks (WBANs) are similar to custom Wireless
Sensor Networks, so these networks are prone to adversaries through their activities, but in
healthcare applications, security is necessary for the patient data. Moreover, providing reliable
healthcare to patients is essential, and for the right treatment, correct patient data is required. For
this purpose, we need to eliminate anomalies and irrelevant data created by malicious persons, attackers,
and unauthorized users. However, existing technologies are not able to detect adversaries
and are unable to maintain the data for a long duration while transferring it.
Aims: This patent research aims to identify adversarial attacks and solutions for these attacks to
maintain reliable smart healthcare services.
Methodology: We proposed a Convolutional-Bi-directional Long Short-Term Memory (ConvBi-
LSTM) model that provides a solution for the detection of adversaries and robustness against adversaries.
Bi-LSTM (Bidirectional-Long Short Term Memory), where the hyperparameters of
BiLSTM are tuned using the PHMS (Prognosis Health Monitoring System) to detect malicious or
irrelevant anomalies data.
Result: Thus, the empirical outcomes of the proposed model showed that it accurately categorizes
a patient's health status founded on abnormal vital signs and is useful for providing the proper
medical care to the patients. Furthermore, the Convolution Neural Networks (CNN) performance
is also evaluated spatially to examine the relationship between the sensor and CMS (Central Monitoring
System) or doctor’s device. The accuracy, recall, precision, loss, time, and F1 score metrics
are used for the performance evaluation of the proposed model.
Conclusion: Besides, the proposed model performance is compared with the existing approaches
using the MIMIC (Medical Information Mart for Intensive Care) data set.
Keywords:
WBANs, ConvBi- LSTM, adversarial attacks, CNN, CMS, MIMIC.
[1]
R.N.L.S. Kalpana, and D. Nageshwar Rao, A survey on deep learning techniques for anomaly detection in human activity recognition Rural and Tribal Development using Iot and Cloud Computing, advances in Sustainability Science and Technology, 2022..
[8]
B. Saneja, and R. Rani, "An integrated framework for anomaly detection in big data of medical wireless sensors", Modern Physics., vol. 32, .1850283 2018
[14]
S.G.S. Nair, and R. Balakrishnan, Mitigating false alarms using accumulator rule and dynamic sliding window in wireless body area networks. CSI Transaction. 6, 203–208., ICT, 2018.
[21]
M.S. Kumar, V.S. Dhulipala, and S. Baskar, "Fuzzy unordered rule induction algorithm based classification for reliable communication using wearable computing devices in healthcare", Journal of Ambient. Intell. Humaniz. Comput. Sci., vol. 12, pp. 3515-3526, 2021.
[23]
J Ian, J Shlens, and C Szegedy, Explaining and harnessing adversarial examples. arXiv, 2014.
[25]
W Xu, D Evans, and Y Qi, Feature squeezing: Detecting adversarial examples in deep neural networks. arXiv , 2017.
[26]
B. Biggio, B. Nelson, and P. Laskov, "Support vector machines under adversarial label noise", In Asian conference on machine learning, 2011, pp. 97-112
[28]
J. Gao, B. Wang, Z. Lin, W. Xu, and Y Qi, Deepcloak: Masking deep neural network models for robustness against adversarial samples. arXiv, 2017.
[29]
V. Balasubramanian, S-S. Ho, and V. Vovk, Conformal prediction for reliable machine learning: theory, adaptations and applications., Newnes, 2014.
[30]
D. Volkhonskiy, I. Nouretdinov, A. Gammerman, V. Vovk, and E Burnaev, Inductive conformal martingales for change-point detection. arXiv, 2017.
[31]
A. Kurakin, I. Goodfellow, and S Bengio, Adversarial examples in the physical world. arXiv, 2016.
[34]
G.R. Mode, and K.A. Hoque, Adversarial examples in deep learning for multivariate time series regression. arXiv, 2020.
[35]
G.R. Mode, Adversarial robustness of deep learning enabled industry 4.0 prognostics., University of Missouri: Columbia, 2020.