Abstract
There have been significant advances in the field of Internet of Things (IoT) recently, which have not always considered security or data security concerns: A high degree of security is required when considering the sharing of medical data over networks. In most IoT-based systems, especially those within smart-homes and smart-cities, there is a bridging point (fog computing) between a sensor network and the Internet which often just performs basic functions such as translating between the protocols used in the Internet and sensor networks, as well as small amounts of data processing. The fog nodes can have useful knowledge and potential for constructive security and control over both the sensor network and the data transmitted over the Internet. Smart healthcare services utilise such networks of IoT systems. It is therefore vital that medical data emanating from IoT systems is highly secure, to prevent fraudulent use, whilst maintaining quality of service providing assured, verified and complete data. In this article, we examine the development of a Cognitive Fog (CF) model, for secure, smart healthcare services, that is able to make decisions such as opting-in and opting-out from running processes and invoking new processes when required, and providing security for the operational processes within the fog system. Overall, the proposed ensemble security model performed better in terms of Accuracy Rate, Detection Rate, and a lower False Positive Rate (standard intrusion detection measurements) than three base classifiers (K-NN, DBSCAN, and DT) using a standard security dataset (NSL-KDD).
- 2018. Decision Trees for Classification: A Machine Learning Algorithm. https://www.xoriant.com/blog/product-engineering/.Google Scholar
- Karim Abouelmehdi, Abderrahim Beni Hssane, and Hayat Khaloufi. 2018. Big healthcare data: Preserving security and privacy. J. Big Data 5 (2018), 1. DOI:https://doi.org/10.1186/s40537-017-0110-7Google Scholar
Cross Ref
- Abdulla Amin Aburomman and Mamun Bin Ibne Reaz. 2016. A novel SVM-kNN-PSO ensemble method for intrusion detection system. Applied Soft Computing 38 (2016), 360-372. DOI:https://doi.org/10.1016/j.asoc.2015.10.011 Google Scholar
Digital Library
- Swati Agarwal, Shashank Yadav, and Arun kumar Yadav. 2016. An efficient architecture and algorithm for resource provisioning in fog computing. In Proceedings of the IEEE Region 10 Conference (TENCON’17). 3129–3134. DOI:10.1109/TENCON.2017.8228399Google Scholar
Cross Ref
- John Patrick C. Agustin, Joshua H. Jacinto, Wilbert Jethro R. Limjoco, and Jhoanna Rhodette I. Pedrasa. 2017. IPv6 routing protocol for low-power andLossy networks implementation in network simulator-3. In IEEE Region 10 Conference (TENCON 2017). IEEE, 3129–3134.Google Scholar
- Mohammed Al-khafajiy, Thar Baker, Carl Chalmers, Muhammad Asim, Hoshang Kolivand, Muhammad Fahim, and Atif Waraich. 2019. Remote health monitoring of elderly through wearable sensors. Multimedia Tools and Applications (24 Jan 2019). DOI:https://doi.org/10.1007/s11042-018-7134-7Google Scholar
- M. Al-khafajiy, T. Baker, A. Waraich, D. Al-Jumeily, and A. Hussain. 2018. IoT-Fog optimal workload via fog offloading. In 2018 IEEE/ACM International Conference on Utility and Cloud Computing Companion (UCC Companion). 359–364. DOI:https://doi.org/10.1109/UCC-Companion.2018.00081Google Scholar
- Mohammed Al-khafajiy, Lee Webster, Thar Baker, and Atif Waraich. 2018. Towards fog driven IoT healthcare: challenges and framework of fog computing in healthcare. In 2nd International Conference on Future Networks and Distributed Systems. ACM, 9. Google Scholar
Digital Library
- Ismaeel Al Ridhawi, Moayad Aloqaily, and Azzedine Boukerche. 2019. Comparing fog solutions for energy efficiency in wireless networks: Challenges and opportunities. IEEE Wireless Communications 26, 6 (2019), 80–86.Google Scholar
Digital Library
- Fadi Al-Turjman. 2017. Cognitive caching for the future sensors in fog networking. Pervasive and Mobile Computing 42 (2017), 317–334. Google Scholar
Digital Library
- Bahast Ali and Xiaochun Cheng. 2019. Security solution based on raspberry PI and IoT. In Cyberspace Safety and Security, Jaideep Vaidya, Xiao Zhang, and Jin Li (Eds.). Springer International Publishing, Cham, 162–171. Google Scholar
- M. Z. Alom and T. M. Taha. 2017. Network intrusion detection for cyber security using unsupervised deep learning approaches. In 2017 IEEE National Aerospace and Electronics Conference (NAECON). 63–69. DOI:https://doi.org/10.1109/NAECON.2017.8268746Google Scholar
Cross Ref
- A. Alrawais, A. Alhothaily, C. Hu, and X. Cheng. 2017. Fog computing for the Internet of Things: Security and privacy issues. IEEE Internet Computing (Mar. 1), 21 (2017), 2. Google Scholar
Digital Library
- Venkatraman Balasubramanian, Safa Otoum, Moayad Aloqaily, Ismaeel Al Ridhawi, and Yaser Jararweh. 2020. Low-latency vehicular edge: A vehicular infrastructure model for 5G. Simulation Modelling Practice and Theory 98 (2020), 101968.Google Scholar
Cross Ref
- Venkatraman Balasubramanian, Faisal Zaman, Moayad Aloqaily, Ismaeel Al Ridhawi, Yaser Jararweh, and Haythem Bany Salameh. 2019. A mobility management architecture for seamless delivery of 5G-IoT services. In I IEEE International Conference on Communications (ICC 2019). IEEE, 1–7.Google Scholar
Cross Ref
- Venkatraman Balasubramanian, Faisal Zaman, Moayad Aloqaily, Saed Alrabaee, Maria Gorlatova, and Martin Reisslein. 2019. Reinforcing the edge: Autonomous energy management for mobile device clouds. In IEEE Conference on Computer Communications Workshops (INFOCOM 2019 WKSHPS). IEEE, 44–49.Google Scholar
Cross Ref
- M. H. Bhuyan, D. K. Bhattacharyya, and J. K. Kalita. 2014. Network anomaly detection: methods, systems and tools. IEEE Communications Surveys Tutorials 16, 1 (2014), 303–336. DOI:https://doi.org/10.1109/SURV.2013.052213.00046Google Scholar
Cross Ref
- Hafida Bouziane, Belhadri Messabih, and Abdallah Chouarfia. 2011. Profiles and majority voting-based ensemble method for protein secondary structure prediction. Evolutionary Bioinformatics Online 7 (10 2011), 171-189. DOI:https://doi.org/10.4137/EBO.S7931Google Scholar
- Ahmed M. Elmisery, Seungmin Rho, and Dmitri Botvich. 2016. A fog based middleware for automated compliance with OECD privacy principles in Internet of Healthcare Things. IEEE Access 4 (2016), 8418–8441.Google Scholar
Cross Ref
- Q. Fan and N. Ansari. 2018. Towards workload balancing in fog computing empowered IoT. IEEE Transactions on Network Science and Engineering (2018), 1–1. DOI:https://doi.org/10.1109/TNSE.2018.2852762Google Scholar
- Dewan Md. Farid, Nouria Harbi, and Mohammad Zahidur Rahman. 2010. Combining naive Bayes and decision tree for adaptive intrusion detection. CoRR abs/1005.4496 (2010). arxiv:1005.4496http://arxiv.org/abs/1005.4496.Google Scholar
- Canadian Institute for Cybersecurity. 2018. NSL-KDD dataset. http://www.unb.ca/cic/datasets/nsl.html.Google Scholar
- L. Galluccio, S. Milardo, G. Morabito, and S. Palazzo. 2015. Sdn wise: Design. 2015 Prototyping and experimentation of a stateful SDN solution for wireless sensor networks. In 2015 IEEE Conference on Computer Communications (INFOCOM). IEEE, 513–521.Google Scholar
- T. Govindarajan. 2016. Evaluation of ensemble classifiers for intrusion detection. International Journal of Computer and Information Engineering 10, 6 (2016), 1045–1053.Google Scholar
- Harriet Green. 2015. The Internet of Things in the cognitive era: Realizing the future and full potential of connected devices. ed: IBM Watson IoT (2015).Google Scholar
- Andreas Heil, Mirko Knoll, and Torben Weis. 2007. The Internet of Things - Context-based device federations. In 2007 40th Annual Hawaii International Conference on System Sciences (HICSS’07). IEEE, 58–58. Google Scholar
Digital Library
- Martin Henze, René Hummen, Roman Matzutt, and Klaus Wehrle. 2014. A trust point-based security architecture for sensor data in the cloud. In Trusted Cloud Computing (2014), 77–106.Google Scholar
Cross Ref
- Kirak Hong, David Lillethun, Umakishore Ramachandran, Beate Ottenwälder, and Boris Koldehofe. 2013. Mobile fog: A programming model for large-scale applications on the Internet of Things. In 2nd ACM SIGCOMM Workshop on Mobile Cloud Computing (MCC’13). ACM, New York,, 15–20. DOI:https://doi.org/10.1145/2491266.2491270 Google Scholar
Digital Library
- Kai Hwang, Sameer Kulkareni, and Yue Hu.2009. Cloud security with virtualized defense and reputation-based trust mangement. In 2009 8th IEEE International Conference on DependableAutonomic and Secure Computing, IEEE, 717–722. Google Scholar
Digital Library
- Fatemeh Jalali, Olivia J. Smith, Timothy Lynar, and Frank Suits. 2017. Cognitive IoT gateways: Automatic task sharing and switching between cloud and edge/fog computing. In SIGCOMM Posters and Demos. ACM, 121–123. Google Scholar
Digital Library
- M. F. Jiang, S. S. Tseng, and C. M. Su. 2001. Two-phase clustering process for outliers detection. Pattern Recognition Letters 22/6-7 (2001), 691–700. DOI:https://doi.org/10.1016/s0167-8655(00)00131-8 Google Scholar
Digital Library
- A. Kapsalis, P. Kasnesis, I. S. Venieris, D. I. Kaklamani, and C. Z. Patrikakis. 2017. A cooperative fog approach for effective workload balancing. IEEE Cloud Computing 4, 2 (March 2017), 36–45. DOI:https://doi.org/10.1109/MCC.2017.25Google Scholar
Cross Ref
- Daoying Ma and Aidong Zhang. 2004. An adaptive density-based clustering algorithm for spatial database with noise. In IEEE International Conference on Data Mining (ICDM’04) (2004). DOI:https://doi.org/10.1109/icdm.2004.10036 Google Scholar
Digital Library
- Zakaria Maamar, Thar Baker, Noura Faci, Emir Ugljanin, Yacine Atif, Mohammed Al-Khafajiy, and Mohamed Sellami. 2018. Cognitive computing meets the Internet of Things. In 13th International Conference on Software Technologies. SciTePress.Google Scholar
- Wided Mathlouthi and Narjes Bellamine Ben Saoud. 2017. Flexible composition of System of Systems on cloud federation. In 2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud). IEEE, 358–365.Google Scholar
Cross Ref
- N. Moustafa, B. Turnbull, and K. R. Choo. 2019. An ensemble intrusion detection technique based on proposed statistical flow features for protecting network traffic of Internet of Things. IEEE Internet of Things Journal (2019), 1–1. DOI:https://doi.org/10.1109/JIOT.2018.2871719Google Scholar
- S. Otoum, B. Kantarci, and H. T. Mouftah. 2017. Mitigating false negative intruder decisions in WSN-based smart grid monitoring. In 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC). 153–158. DOI:https://doi.org/10.1109/IWCMC.2017.7986278Google Scholar
- S. Otoum, B. Kantarci, and H. T. Mouftah. 2019. On the feasibility of deep learning in sensor network intrusion detection. IEEE Networking Letters 1, 2 (June 2019), 68–71. DOI:https://doi.org/10.1109/LNET.2019.2901792Google Scholar
Cross Ref
- Safa Otoum, Burak Kantraci, and Hussein T. Mouftah. 2017. Hierarchical trust-based black-hole detection in WSN-based smart grid monitoring. IEEE International Conference on Communications (ICC’17) (2017). DOI:https://doi.org/icc.2017Google Scholar
Cross Ref
- Beate Ottenwälder, Boris Koldehofe, Kurt Rothermel, and Umakishore Ramachandran. 2013. MigCEP: Operator migration for mobility driven distributed complex event processing. In 7th ACM International Conference on Distributed Event-based Systems (DEBS’13). ACM, New York,, 183–194. DOI:https://doi.org/10.1145/2488222.2488265 Google Scholar
Digital Library
- A.K. Pujari. 2001. Data Mining Techniques. Universities Press. https://books.google.ca/books?id=dH2KQhJboSYC.Google Scholar
- Amir-Mohammad Rahmani, Nanda Kumar Thanigaivelan, Tuan Nguyen Gia, Jose Granados, Behailu Negash, Pasi Liljeberg, and Hannu Tenhunen. 2015. Smart e-health gateway: Bringing intelligence to Internet-of-Things based ubiquitous healthcare systems. In 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC). IEEE, 826–834.Google Scholar
Cross Ref
- Anam Sajid and Haider Abbas. 2016. Data privacy in cloud-assisted healthcare systems: State of the art and future challenges. J. Medical Systems 40, 6 (2016), 155:1–155:16. DOI:https://doi.org/10.1007/s10916-016-0509-2 Google Scholar
Digital Library
- Amit Sheth. 2016. Internet of Things to Smart IoT through semantic, cognitive, and perceptual computing. IEEE Intelligent Systems 31, 2 (2016), 108–112. Google Scholar
Digital Library
- Fan Shi, Zhenlei Chen, and Xiaochun Cheng. 2019. Behavior modeling and individual recognition of sonar transmitter for secure communication in UASNs. IEEE Access (2019).Google Scholar
- S. Soheily-Khah, P. Marteau, and N. Béchet. 2018. Intrusion detection in network systems through hybrid supervised and unsupervised machine learning process: a case study on the ISCX dataset. In 2018 1st International Conference on Data Intelligence and Security (ICDIS). 219–226. DOI:https://doi.org/10.1109/ICDIS.2018.00043Google Scholar
Cross Ref
- Seyed Ahmad Soleymani, Abdul Hanan Abdullah, Mahdi Zareei, Mohammad Hossein Anisi, Cesar Vargas-Rosales, Muhammad Khurram Khan, and Shidrokh Goudarzi. 2017. A secure trust model based on fuzzy logic in vehicular ad hoc networks with fog computing. IEEE Access 5 (2017), 15619–15629.Google Scholar
Cross Ref
- Bunheang Tay, Jung Keun Hyun, and Sejong Oh. 2014. A machine learning approach for specification of spinal cord injuries using fractional anisotropy values obtained from diffusion tensor images. Computational and Mathematical Methods in Medicine 2014 (01 2014), 276589. DOI:https://doi.org/10.1155/2014/276589Google Scholar
- Tian Wang, Guangxue Zhang, M. D. Zakirul Alam Bhuiyan, Anfeng Liu, Weijia Jia, and Mande Xie. 2018. A Novel Trust Mechanism Based on Fog Computing in Sensor-Cloud System. Future Generation Computer Systems.Google Scholar
- T. Wang, G. Zhang, A. Liu, M. Z. A. Bhuiyan, and Q. Jin. 2018. A secure IoT service architecture with an efficient balance dynamics based on cloud and edge computing.IEEE Internet of Things Journal.Google Scholar
- Qihui Wu, Guoru Ding, Yuhua Xu, Shuo Feng, Zhiyong Du, Jinlong Wang, and Keping Long. 2014. Cognitive Internet of Things: A new paradigm beyond connection. IEEE Internet of Things Journal 1, 2 (2014), 129–143.Google Scholar
Cross Ref
- A. Yousefpour, G. Ishigaki, R. Gour, and J. P. Jue. 2018. On reducing IoT service delay via fog offloading. IEEE Internet of Things Journal 5, 2 (April 2018), 998–1010. DOI:https://doi.org/10.1109/JIOT.2017.2788802Google Scholar
Cross Ref
Index Terms
Intelligent Control and Security of Fog Resources in Healthcare Systems via a Cognitive Fog Model
Recommendations
Towards fog driven IoT healthcare: challenges and framework of fog computing in healthcare
ICFNDS '18: Proceedings of the 2nd International Conference on Future Networks and Distributed SystemsAs we are within the era of the internet of things (IoT) its increasing integration to our everyday lives means that the devices involved produce massive amounts of data every second from billions of devices. The current approach used to handle this ...
Fog Computing: Issues and Challenges in Security and Forensics
COMPSAC '15: Proceedings of the 2015 IEEE 39th Annual Computer Software and Applications Conference - Volume 03Although Fog Computing is defined as the extension of the Cloud Computing paradigm, its distinctive characteristics in the location sensitivity, wireless connectivity, and geographical accessibility create new security and forensics issues and ...
Fog computing security: a review of current applications and security solutions
Fog computing is a new paradigm that extends the Cloud platform model by providing computing resources on the edges of a network. It can be described as a cloud-like platform having similar data, computation, storage and application services, but is ...






Comments