Improved security for IoT-based remote healthcare systems using deep learning with jellyfish search optimization algorithm.

Journal: Scientific reports
PMID:

Abstract

With an increased chronic disease and an ageing population, remote health monitoring is a substantial method to enhance the care of patients and decrease healthcare expenses. The Internet of Things (IoT) presents a promising solution for remote health monitoring by collecting and analyzing vital data like body temperature, ECG, and heart rate, giving real-time insights to medical professionals. However, maintaining effectual monitoring in environments with bandwidth or energy constraints presents crucial threats. While machine analysis and human insight performance must be content, conveying extra data to gratify both would be evaded for efficient resource application. Therefore, this article proposes an Enhanced Security Mechanism for Human-Centered Systems using Deep Learning with Jellyfish Search Optimizer (ESHCS-DLJSO) approach for IoT healthcare applications. The projected ESHCS-DLJSO approach allows IoT devices in the healthcare field to securely convey medical data and early recognition of health problems in the human-machine interface. To achieve this, the ESHCS-DLJSO approach utilizes a min-max normalization technique to transform the input data into a more suitable format. The bacterial foraging optimization algorithm (BFOA) method is used for feature extraction. Moreover, a convolutional neural network with long short-term memory (CNN-LSTM-Attention) technique is used for disease detection and classification. Finally, the ESHCS-DLJSO technique employs the jellyfish search optimizer (JSO) technique for hyperparameter tuning. The simulation of the ESHCS-DLJSO technique is examined on an IoT healthcare security dataset. The performance validation of the ESHCS-DLJSO technique portrayed a superior accuracy value of 99.43% over existing approaches.

Authors

  • Faris Kateb
    Department of Information Technology, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi Arabia.
  • Mahmoud Ragab
    Information Technology Department, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, 21589, Saudi Arabia. mragab@kau.edu.sa.
  • Felwa Abukhodair
    Information Technology Department, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, 21589, Saudi Arabia.
  • Omar Ahmed Abdulkader
    Faculty of Computer Studies, Arab Open University, Riyadh, Saudi Arabia.
  • Louai A Maghrabi
    Department of Software Engineering, College of Engineering, University of Business and Technology, Jeddah, Saudi Arabia.
  • Sami Saeed Binyamin
    Computer and Information Technology Department, The Applied College, King Abdulaziz University, Jeddah 21589, Saudi Arabia.
  • Mohammed Khaled Al-Hanawi
    Health Services and Hospitals Administration Department, Faculty of Economics and Administration, King Abdulaziz University, Jeddah, Saudi Arabia.