2022
DOI: 10.1016/j.ins.2022.10.060
|View full text |Cite
|
Sign up to set email alerts
|

Anomaly detection in Internet of medical Things with Blockchain from the perspective of deep neural network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(5 citation statements)
references
References 43 publications
0
2
0
Order By: Relevance
“…With 5G networks facilitating rapid, high-volume data exchanges, the IoMT has gained momentum in the healthcare sector. In [260], the emphasis is on detecting anomalies using deep learning for enhanced security within 5G contexts in IoM. By utilizing multi-model autoencoders for feature extraction, the complexity of traffic feature information has been significantly reduced.…”
Section: A Anomaly Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…With 5G networks facilitating rapid, high-volume data exchanges, the IoMT has gained momentum in the healthcare sector. In [260], the emphasis is on detecting anomalies using deep learning for enhanced security within 5G contexts in IoM. By utilizing multi-model autoencoders for feature extraction, the complexity of traffic feature information has been significantly reduced.…”
Section: A Anomaly Detectionmentioning
confidence: 99%
“…With 5G networks facilitating rapid, voluminous data exchanges, the Internet of Medical Things (IoMT) has gained momentum in the healthcare sector. In [257], the emphasis is on detecting anomalies using deep learning for enhanced security within 5G contexts in IoM. By utilizing multi-model autoencoders for feature extraction, the complexity of traffic an up-to-date antivirus tool to detect and protect the end-point for new vulnerabilities, (vi) the human element is the weakest link and its essential to build cyber awareness within the workplace environment and train them so that they are cyber prepared, (vii) enabling application security using vulnera-bility scanners and making sure that only inventoried tools are used, (viii) last but not the least, to ensure data security mechanisms are in place (i.e.…”
Section: A Anomaly Detectionmentioning
confidence: 99%
“…Similarly, research in [361] proposes using Permissioned Blockchain-based Federated Learning for Anomaly Detection (PBFLAD), where changes to the AI framework are linked utilizing a shared ledger, allowing auditing of the machine learning models. Furthermore, in [362], IoMT Blockchain network Anomaly Detection (IoMTBC-AD) is employed to prevent insider attacks in blockchain networks utilized in IoMT by combining the network with deep learning to detect network anomalies. Moreover, Hybrid Deep Learning (HDL) making use of LSTM and convolutional neural networks for evaluating traffic flow anomalies by assisting blockchain in resolving gaps in the datasets has been studied in [363].…”
Section: Anomaly or Intrusion Diagnosis And Suppressionmentioning
confidence: 99%
“…BFT-IoMT [358] Anomaly detection DAG blockchain [359], Brain-chain [360], PBFLAD [361], IoMTBC-AD [362], HDL [363] Virtual network ----BTNV [365], DQL-KDVN [366], DLT [367], CBDST [368], SliceBlock [369], BNSB [370], Skunk [371], SRT-DDQ [372], TTRAS [373] Big data analysis ----BlockIoTIntelligence [374], DFL-B [375] Cloud/edge compu.…”
Section: Packet Forwardingmentioning
confidence: 99%
“…A method to detect attack traffic using a deep neural network in the IoMT-Blockchain environment is proposed in [6]. The study used a multi-model autoencoder (MMAE) to effectively learn the fusion of low-dimensional feature representations between different features from the original data.…”
Section: Related Workmentioning
confidence: 99%