1
|
Rezazadeh J, Ameri Sianaki O, Farahbakhsh R. Machine Learning for IoT Applications and Digital Twins. SENSORS (BASEL, SWITZERLAND) 2024; 24:5062. [PMID: 39124109 PMCID: PMC11314713 DOI: 10.3390/s24155062] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 06/24/2024] [Accepted: 06/29/2024] [Indexed: 08/12/2024]
Abstract
The Internet of Things (IoT) stands as one of the most transformative technologies of our era, significantly enhancing the living conditions and operational efficiencies across various domains [...].
Collapse
Affiliation(s)
- Javad Rezazadeh
- Crown Institute of Higher Education (CIHE), Sydney, NSW 2060, Australia
| | - Omid Ameri Sianaki
- Victoria University Business School, Victoria University, Melbourne, VIC 8001, Australia;
| | - Reza Farahbakhsh
- Institute Polytechnique de Paris, Telecom SudParis, 91000 Evry, France;
| |
Collapse
|
2
|
Ganiga R, S. N. M, Choi W, Pan S. ResNet1D-Based Personal Identification with Multi-Session Surface Electromyography for Electronic Health Record Integration. SENSORS (BASEL, SWITZERLAND) 2024; 24:3140. [PMID: 38793994 PMCID: PMC11124878 DOI: 10.3390/s24103140] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 02/27/2024] [Revised: 05/07/2024] [Accepted: 05/11/2024] [Indexed: 05/26/2024]
Abstract
Personal identification is an important aspect of managing electronic health records (EHRs), ensuring secure access to patient information, and maintaining patient privacy. Traditionally, biometric, signature, username/password, photo identity, etc., are employed for user authentication. However, these methods can be prone to security breaches, identity theft, and user inconvenience. The security of personal information is of paramount importance, particularly in the context of EHR. To address this, our study leverages ResNet1D, a deep learning architecture, to analyze surface electromyography (sEMG) signals for robust identification purposes. The proposed ResNet1D-based personal identification approach using the sEMG signal can offer an alternative and potentially more secure method for personal identification in EHR systems. We collected a multi-session sEMG signal database from individuals, focusing on hand gestures. The ResNet1D model was trained using this database to learn discriminative features for both gesture and personal identification tasks. For personal identification, the model validated an individual's identity by comparing captured features with their own stored templates in the healthcare EHR system, allowing secure access to sensitive medical information. Data were obtained in two channels when each of the 200 subjects performed 12 motions. There were three sessions, and each motion was repeated 10 times with time intervals of a day or longer between each session. Experiments were conducted on a dataset of 20 randomly sampled subjects out of 200 subjects in the database, achieving exceptional identification accuracy. The experiment was conducted separately for 5, 10, 15, and 20 subjects using the ResNet1D model of a deep neural network, achieving accuracy rates of 97%, 96%, 87%, and 82%, respectively. The proposed model can be integrated with healthcare EHR systems to enable secure and reliable personal identification and the safeguarding of patient information.
Collapse
Affiliation(s)
- Raghavendra Ganiga
- Department of Information and Communication Technology, Manipal Institute of Technology, Manipal Academy of Higher Education (MAHE), Manipal 576104, India;
| | - Muralikrishna S. N.
- Department of Computer Science and Engineering, Manipal Institute of Technology, Manipal Academy of Higher Education (MAHE), Manipal 576104, India
| | - Wooyeol Choi
- Department of Computer Engineering, Chosun University, Gwangju 61452, Republic of Korea;
| | - Sungbum Pan
- IT Research Institute, Chosun University, 309 Pilmun-daero, Gwangju 61452, Republic of Korea
| |
Collapse
|
3
|
Elkhodr M, Gide E, Darwish O, Al-Eidi S. BioChainReward: A Secure and Incentivised Blockchain Framework for Biomedical Data Sharing. INTERNATIONAL JOURNAL OF ENVIRONMENTAL RESEARCH AND PUBLIC HEALTH 2023; 20:6825. [PMID: 37835095 PMCID: PMC10572599 DOI: 10.3390/ijerph20196825] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 06/29/2023] [Revised: 07/19/2023] [Accepted: 09/20/2023] [Indexed: 10/15/2023]
Abstract
In the era of digital healthcare, biomedical data sharing is of paramount importance for the advancement of research and personalised healthcare. However, sharing such data while preserving user privacy and ensuring data security poses significant challenges. This paper introduces BioChainReward (BCR), a blockchain-based framework designed to address these concerns. BCR offers enhanced security, privacy, and incentivisation for data sharing in biomedical applications. Its architecture consists of four distinct layers: data, blockchain, smart contract, and application. The data layer handles the encryption and decryption of data, while the blockchain layer manages data hashing and retrieval. The smart contract layer includes an AI-enabled privacy-preservation sublayer that dynamically selects an appropriate privacy technique, tailored to the nature and purpose of each data request. This layer also features a feedback and incentive mechanism that incentivises patients to share their data by offering rewards. Lastly, the application layer serves as an interface for diverse applications, such as AI-enabled apps and data analysis tools, to access and utilise the shared data. Hence, BCR presents a robust, comprehensive approach to secure, privacy-aware, and incentivised data sharing in the biomedical domain.
Collapse
Affiliation(s)
- Mahmoud Elkhodr
- School of Engineering and Technology, Central Queensland University, Sydney, NSW 2000, Australia;
| | - Ergun Gide
- School of Engineering and Technology, Central Queensland University, Sydney, NSW 2000, Australia;
| | - Omar Darwish
- Information Security and Applied Computing Department, Eastern Michigan University, Ypsilanti, MI 48197, USA;
| | - Shorouq Al-Eidi
- Computer Science Department, Tafila Technical University, Tafila 66110, Jordan;
| |
Collapse
|
4
|
Mitchell ARJ, Ahlert D, Brown C, Birge M, Gibbs A. Electrocardiogram-based biometrics for user identification - Using your heartbeat as a digital key. J Electrocardiol 2023; 80:1-6. [PMID: 37058746 DOI: 10.1016/j.jelectrocard.2023.04.001] [Citation(s) in RCA: 1] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 08/21/2022] [Revised: 02/22/2023] [Accepted: 04/04/2023] [Indexed: 04/16/2023]
Abstract
External biometrics such as thumbprint and facial recognition have become standard tools for securing our digital devices and protecting our data. These systems, however, are potentially prone to copying and cybercrime access. Researchers have therefore explored internal biometrics, such as the electrical patterns within an electrocardiogram (ECG). The heart's electrical signals carry sufficient distinctiveness to allow the ECG to be used as an internal biometric for user authentication and identification. Using the ECG in this way has many potential advantages and limitations. This article reviews the history of ECG biometrics and explores some of the technical and security considerations. It also explores current and future uses of the ECG as an internal biometric.
Collapse
Affiliation(s)
| | | | - Chris Brown
- The Allan Lab, Jersey General Hospital, Jersey
| | - Max Birge
- The Allan Lab, Jersey General Hospital, Jersey
| | | |
Collapse
|
5
|
Escaping Local Minima via Appraisal Driven Responses. ROBOTICS 2022. [DOI: 10.3390/robotics11060153] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/23/2022] Open
Abstract
Inspired by the reflective and deliberative control mechanisms used in cognitive architectures such as SOAR and Sigma, we propose an alternative decision mechanism driven by architectural appraisals allowing robots to overcome impasses. The presented work builds on and improves on our previous work on a generally applicable decision mechanism with roots in the Standard Model of the Mind and the Generalized Cognitive Hour-glass Model. The proposed decision mechanism provides automatic context-dependent switching between exploration-oriented, goal-oriented, and backtracking behavior, allowing a robot to overcome impasses. A simulation study of two applications utilizing the proposed decision mechanism is presented demonstrating the applicability of the proposed decision mechanism.
Collapse
|
6
|
An Intelligent Multimodal Biometric Authentication Model for Personalised Healthcare Services. FUTURE INTERNET 2022. [DOI: 10.3390/fi14080222] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022] Open
Abstract
With the advent of modern technologies, the healthcare industry is moving towards a more personalised smart care model. The enablers of such care models are the Internet of Things (IoT) and Artificial Intelligence (AI). These technologies collect and analyse data from persons in care to alert relevant parties if any anomaly is detected in a patient’s regular pattern. However, such reliance on IoT devices to capture continuous data extends the attack surfaces and demands high-security measures. Both patients and devices need to be authenticated to mitigate a large number of attack vectors. The biometric authentication method has been seen as a promising technique in these scenarios. To this end, this paper proposes an AI-based multimodal biometric authentication model for single and group-based users’ device-level authentication that increases protection against the traditional single modal approach. To test the efficacy of the proposed model, a series of AI models are trained and tested using physiological biometric features such as ECG (Electrocardiogram) and PPG (Photoplethysmography) signals from five public datasets available in Physionet and Mendeley data repositories. The multimodal fusion authentication model shows promising results with 99.8% accuracy and an Equal Error Rate (EER) of 0.16.
Collapse
|
7
|
Kashou AH, Adedinsewo DA, Siontis KC, Noseworthy PA. Artificial Intelligence-Enabled ECG: Physiologic and Pathophysiologic Insights and Implications. Compr Physiol 2022; 12:3417-3424. [PMID: 35766831 PMCID: PMC9795459 DOI: 10.1002/cphy.c210001] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Grants] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/30/2022]
Abstract
Advancements in machine learning and computing methods have given new life and great excitement to one of the most essential diagnostic tools to date-the electrocardiogram (ECG). The application of artificial intelligence-enabled ECG (AI-ECG) has resulted in the ability to identify electrocardiographic signatures of conventional and unique variables and pathologies, giving way to tremendous clinical potential. However, what these AI-ECG models are detecting that the human eye is missing remains unclear. In this article, we highlight some of the recent developments in the field and their potential clinical implications, while also attempting to shed light on the physiologic and pathophysiologic features that enable these models to have such high diagnostic yield. © 2022 American Physiological Society. Compr Physiol 12:3417-3424, 2022.
Collapse
Affiliation(s)
- Anthony H Kashou
- Department of Cardiovascular Medicine, Mayo Clinic, Rochester, Minnesota, USA
| | | | | | - Peter A Noseworthy
- Department of Cardiovascular Medicine, Mayo Clinic, Rochester, Minnesota, USA
| |
Collapse
|
8
|
Abstract
Biometric technology has received a lot of attention in recent years. One of the most prevalent biometric traits is the finger-knuckle print (FKP). Because the dorsal region of the finger is not exposed to surfaces, FKP would be a dependable and trustworthy biometric. We provide an FKP framework that uses the VGG-19 deep learning model to extract deep features from FKP images in this paper. The deep features are collected from the VGG-19 model’s fully connected layer 6 (F6) and fully connected layer 7 (F7). After applying multiple preprocessing steps, such as combining features from different layers and performing dimensionality reduction using principal component analysis (PCA), the extracted deep features are put to the test. The proposed system’s performance is assessed using experiments on the Delhi Finger Knuckle Dataset employing a variety of common classifiers. The best identification result was obtained when the Artificial neural network (ANN) classifier was applied to the principal components of the averaged feature vector of F6 and F7 deep features, with 95% of the data variance preserved. The findings also demonstrate the feasibility of employing these deep features in an FKP recognition system.
Collapse
|
9
|
Super-Resolution Generative Adversarial Network Based on the Dual Dimension Attention Mechanism for Biometric Image Super-Resolution. SENSORS 2021; 21:s21237817. [PMID: 34883819 PMCID: PMC8659601 DOI: 10.3390/s21237817] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 09/24/2021] [Revised: 11/19/2021] [Accepted: 11/22/2021] [Indexed: 11/17/2022]
Abstract
There exist many types of intelligent security sensors in the environment of the Internet of Things (IoT) and cloud computing. Among them, the sensor for biometrics is one of the most important types. Biometric sensors capture the physiological or behavioral features of a person, which can be further processed with cloud computing to verify or identify the user. However, a low-resolution (LR) biometrics image causes the loss of feature details and reduces the recognition rate hugely. Moreover, the lack of resolution negatively affects the performance of image-based biometric technology. From a practical perspective, most of the IoT devices suffer from hardware constraints and the low-cost equipment may not be able to meet various requirements, particularly for image resolution, because it asks for additional storage to store high-resolution (HR) images, and a high bandwidth to transmit the HR image. Therefore, how to achieve high accuracy for the biometric system without using expensive and high-cost image sensors is an interesting and valuable issue in the field of intelligent security sensors. In this paper, we proposed DDA-SRGAN, which is a generative adversarial network (GAN)-based super-resolution (SR) framework using the dual-dimension attention mechanism. The proposed model can be trained to discover the regions of interest (ROI) automatically in the LR images without any given prior knowledge. The experiments were performed on the CASIA-Thousand-v4 and the CelebA datasets. The experimental results show that the proposed method is able to learn the details of features in crucial regions and achieve better performance in most cases.
Collapse
|
10
|
Abstract
In this study, an effective local minima detection and definition algorithm is introduced for a mobile robot navigating through unknown static environments. Furthermore, five approaches are presented and compared with the popular approach wall-following to pull the robot out of the local minima enclosure namely; Random Virtual Target, Reflected Virtual Target, Global Path Backtracking, Half Path Backtracking, and Local Path Backtracking. The proposed approaches mainly depend on changing the target location temporarily to avoid the original target’s attraction force effect on the robot. Moreover, to avoid getting trapped in the same location, a virtual obstacle is placed to cover the local minima enclosure. To include the most common shapes of deadlock situations, the proposed approaches were evaluated in four different environments; V-shaped, double U-shaped, C-shaped, and cluttered environments. The results reveal that the robot, using any of the proposed approaches, requires fewer steps to reach the destination, ranging from 59 to 73 m on average, as opposed to the wall-following strategy, which requires an average of 732 m. On average, the robot with a constant speed and reflected virtual target approach takes 103 s, whereas the identical robot with a wall-following approach takes 907 s to complete the tasks. Using a fuzzy-speed robot, the duration for the wall-following approach is greatly reduced to 507 s, while the reflected virtual target may only need up to 20% of that time. More results and detailed comparisons are embedded in the subsequent sections.
Collapse
|
11
|
Yang W, Wang S, Sahri NM, Karie NM, Ahmed M, Valli C. Biometrics for Internet-of-Things Security: A Review. SENSORS (BASEL, SWITZERLAND) 2021; 21:6163. [PMID: 34577370 PMCID: PMC8472874 DOI: 10.3390/s21186163] [Citation(s) in RCA: 17] [Impact Index Per Article: 5.7] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Grants] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 08/13/2021] [Revised: 09/10/2021] [Accepted: 09/11/2021] [Indexed: 11/16/2022]
Abstract
The large number of Internet-of-Things (IoT) devices that need interaction between smart devices and consumers makes security critical to an IoT environment. Biometrics offers an interesting window of opportunity to improve the usability and security of IoT and can play a significant role in securing a wide range of emerging IoT devices to address security challenges. The purpose of this review is to provide a comprehensive survey on the current biometrics research in IoT security, especially focusing on two important aspects, authentication and encryption. Regarding authentication, contemporary biometric-based authentication systems for IoT are discussed and classified based on different biometric traits and the number of biometric traits employed in the system. As for encryption, biometric-cryptographic systems, which integrate biometrics with cryptography and take advantage of both to provide enhanced security for IoT, are thoroughly reviewed and discussed. Moreover, challenges arising from applying biometrics to IoT and potential solutions are identified and analyzed. With an insight into the state-of-the-art research in biometrics for IoT security, this review paper helps advance the study in the field and assists researchers in gaining a good understanding of forward-looking issues and future research directions.
Collapse
Affiliation(s)
- Wencheng Yang
- Security Research Institute, School of Science, Edith Cowan University, Cyber Security Cooperative Research Centre, Joondalup, WA 6027, Australia; (N.M.S.); (N.M.K.); (M.A.); (C.V.)
| | - Song Wang
- School of Engineering and Mathematical Sciences, La Trobe University, Melbourne, VIC 3086, Australia;
| | - Nor Masri Sahri
- Security Research Institute, School of Science, Edith Cowan University, Cyber Security Cooperative Research Centre, Joondalup, WA 6027, Australia; (N.M.S.); (N.M.K.); (M.A.); (C.V.)
| | - Nickson M. Karie
- Security Research Institute, School of Science, Edith Cowan University, Cyber Security Cooperative Research Centre, Joondalup, WA 6027, Australia; (N.M.S.); (N.M.K.); (M.A.); (C.V.)
| | - Mohiuddin Ahmed
- Security Research Institute, School of Science, Edith Cowan University, Cyber Security Cooperative Research Centre, Joondalup, WA 6027, Australia; (N.M.S.); (N.M.K.); (M.A.); (C.V.)
| | - Craig Valli
- Security Research Institute, School of Science, Edith Cowan University, Cyber Security Cooperative Research Centre, Joondalup, WA 6027, Australia; (N.M.S.); (N.M.K.); (M.A.); (C.V.)
| |
Collapse
|