4.7 Review

A review of Machine Learning (ML)-based IoT security in healthcare: A dataset perspective

期刊

COMPUTER COMMUNICATIONS
卷 213, 期 -, 页码 61-77

出版社

ELSEVIER
DOI: 10.1016/j.comcom.2023.11.002

关键词

Internet of Things (IoT); Intrusion Detection System (IDS); IoT security; IoT datasets; Internet of Medical Things (IoMT)

向作者/读者索取更多资源

The Internet of Things (IoT) has the potential to revolutionize medical treatment in healthcare, but it also faces security threats. Advanced analytics can enhance IoT security, but generating realistic datasets is complex. This research conducts a review of Machine Learning (ML) solutions for IoT security in healthcare, focusing on existing datasets, resources, applications, and challenges, to highlight the current landscape and future requirements.
The Internet of Things (IoT) is transforming society by connecting businesses and optimizing systems across industries. Its impact has been felt in healthcare, where it has the potential to revolutionize medical treatment. Conversely, healthcare systems are targeted by attackers and security threats. Malicious activities against such systems intend to compromise privacy and acquire control over internal procedures. In this regard, advanced analytics can enhance these attacks' detection, mitigation, and prevention and improve overall IoT security. However, the process of producing realistic datasets is complex. There are critical aspects to consider when developing models that can be directly deployed in real environments (e.g., multiple devices, features, and realistic testbed). Thereupon, the main goal of this research is to conduct a review of Machine Learning (ML) solutions for IoT security in healthcare. Furthermore, this review is conducted from a dataset standpoint, focusing on existing datasets, resources, applications, and open challenges. Our primary objective is to highlight the current landscape of datasets for IoT security in healthcare and the immediate requirements for future datasets to support the development of novel approaches.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据