Abstract

Families, physicians, and hospital environments use remote patient monitoring (RPM) technologies to remotely monitor a patient’s vital signs, reduce visit time, reduce hospital costs, and improve the quality of care. The Internet of Medical Things (IoMT) is provided by applications that provide remote access to patient’s physiological data. The Internet of Medical Things (IoMT) tools basically have a user interface, biosensor, and Internet connectivity. Accordingly, it is possible to record, transfer, store, and process medical data in a short time by integrating IoMT with the data communication infrastructure in edge computing. (Edge computing is a distributed computing paradigm that brings computation and data storage closer to the sources of data. This is expected to improve response times and save bandwidth. A common misconception is that edge and IoT are synonymous.) But, this approach faces problems with security and intrusion into users’ medical data that are confidential. Accordingly, this study presents a secure solution in order to be used in the IoT infrastructure in edge computing. In the proposed method, first the clustering process is performed effectively using information about the characteristics and interests of users. Then, the people in each cluster evaluated by using edge computing and people with higher scores are considered as influential people in their cluster, and since users with high user interaction can publish information on a large scale, it can be concluded that, by increasing user interaction, information can be disseminated on a larger scale without any intrusion and thus in a safe way in the network. In the proposed method, the average of user interactions and user scores are used as a criterion for identifying influential people in each cluster. If there is a desired number of people who are considered to start disseminating information, it is possible to select people in each cluster with a higher degree of influence to start disseminating information. According to the research results, the accuracy has increased by 0.2 and more information is published in the proposed method than the previous methods.

1. Introduction

The Internet of Things is a new concept in the world of information and communication technology; in fact, it is a modern technology that provides the ability to send and receive data through communication networks, whether the Internet or intranet for any entity [1]. Smart devices are all part of an emerging category called the Internet of Things, or IoT for short. At a basic level, the Internet of Things deals with connecting different objects through the Internet and communicating with each other to achieve its goal of providing a more efficient and intelligent experience.

In the meantime, improving health is considered to be the ultimate goal of economic, social, and technical progress, and rapid population growth and aging will change the world significantly. These factors have put a lot of pressure on food suppliers and health systems around the world, and the advancement of new IoT technology is expected to provide appropriate and potential solutions to these challenges. Therefore, the use of IoT for health can certainly be effective in strategic research roadmap in medicine and the use of IoT. Nowadays, the advent of various wearable devices has enabled people to monitor their health anywhere and anytime through the Internet of Medical Things (IoMT) [2]. Accordingly, IoT-based wearable devices will become a key part of human health in the not-too-distant future. IoMT  not only is able to monitor physiological information about the human body through wearable devices but also can send the results of this information to a remote monitoring center or family doctor, or even generate emergency alerts. It should be noted that IoMT can help physicians to suggest treatment programs through recommender systems.

This method can significantly reduce the time of medical examination, improve diagnostic efficiency, and save human resources [3]. But now, it is impractical to transfer information from wearable devices (where they were created) to the cloud infrastructure (where they are processed) because the cloud-centric processing method results in high communication delays and reduces data transfer rates between IoT devices and IoT devices with potential users.

In order to accomplish the previously stated goal, the concept of edge computing has recently been proposed, which makes it possible to process IoT services to process data near data sources and data sinks instead of engaging in the cloud [4]. This solution reduces communication delays and makes better use of the computing, storage, and network resources that are currently available. It can also reduce runtime and power consumption, which can be very useful for using the Internet of Things in health and medicine.

Given that edge computing is a new research topic, robust integrated solutions to its various challenges, including security, and secure routing, have not yet been proposed. However, one of the problems with using such systems is that unauthorized people infiltrate the system and use its information or perform unauthorized manipulations. This feature allows unauthorized access to existing data and performing manipulations in these networks [5]. Therefore, this study examines the process of detecting intrusion into the Internet of Medical Things using clustering methods in the edge computing infrastructure and the results will be compared with some other methods in this field.

The most important contributions of this study include the following:Providing a clustering-based routing method for use in the Internet of Medical Things (IoMT).Using edge computing to reduce delays in sending important medical information to emergency centers safelyAn interactive and structural approach is used to increase the accuracy within the clusters in order to increase efficiency and increase security. In this way, the influential nodes can be identified with higher accuracy.

2. Research Background

The study in [6] reviewed security and confidentiality in the IoMT. Accordingly, firstly security and privacy problems in various parts of the IoMT have been investigated. The existing solutions in the field of security and privacy problems, which provide the suitable context for solving these challenges for the IoT infrastructure, were reviewed. According to the results of this study, there is a need for new methods in the process of providing security and intrusion detection in IoMT.

The challenges and methods of detecting malware intrusion in the Internet of Things were reviewed in [7]. This study aimed to conduct a comprehensive review of existing problems and solutions. The presence of various botnets in IoMT infrastructures has led to attacks on the security of an infrastructure, including comprehensiveness, confidentiality, and availability. These can reduce the spread of new infrastructure such as IoMT. Accordingly, firstly, the types of malware attacks and how they work have been examined.

Then, an IoT-based architecture with various security protocols is examined for use in deploying and securing the IoMT infrastructure. The study in [8] proposed a secure framework using the Internet of Medical Things that also improves energy consumption. This method is designed to reduce communication overhead and energy consumption between medical sensors that process and transmit health information.

On the other hand, the proposed method is able to secure the medical data of patients against unwanted access. According to the evaluation results, energy consumption is reduced by 29%, and productivity is increased by 18%. A fog computing-based (Fog computing or fog networking, also known as fogging, is an architecture that uses edge devices to carry out a substantial amount of computation, storage, and communication locally and routed over the Internet backbone.) attack detection system using MOA-WMA algorithm is presented in [9].

The proposed model consists of several parts. In preprocessing, the input data is first processed and converted into a format that can be used in machine learning, and the required features are extracted from them and then sent to the feature selection section, where the required features are selected for accurate detection of intrusion and enter the next section after passing a filter to remove additional information, for modeling in this phase using a multilayer neural network. Finally, the next steps are done based on this modeling and learning that is done with the help of training data. The evaluation results indicate an increase in accuracy and efficiency with the help of this method. An in-depth learning-based solution is presented in [10] to extract IoT data features and intrusion detection in IoMT. The deep learning model is combined with intrusion detection technology to help with this approach. This method solves the problem of distributive incompatibility of source and target data. The proposed solution can be used in various neural networks. Accordingly, the problem of data learning can be solved with its help, and abnormal data can be detected more accurately. Thus, evaluations have shown that intrusion into the IoMT can be detected with high accuracy. A Markov model-based approach is presented in [11] to detect anomalies and secure health monitoring systems.

According to the results of this study, due to the continuity of the applied traffic in the network and their interdependence, as a result, abnormal movements in the network can be detected by using the Markov model. This solution is based on data dependence on the network, so it can operate without supervision based on the learning model and be used on wearable sensors with low energy.

Also, unlike other methods that only operate linearly, this method can be performed in nonlinear dimensions as well, which in turn will be able to detect intrusion and anomalies in the network with more power. Finally, the solution is evaluated and it is concluded that, on average, it significantly increases the accuracy of network anomaly detection. A combination of different machine learning methods to detect intrusion into the IoT infrastructure is presented in [12]. Accordingly, six types of machine learning methods (Random Forest, K-Nearest Neighbor Support Vector Machine, Neural Networks, J48, and Decision Table) were used.

This method uses unlabeled data along with monitored methods to increase the accuracy of the IoMT intrusion detection system. This solution teaches a single-layer neural network to categorize samples on unlabeled data. Next, each of the created categories is combined with the initial data set, and retraining is applied to the classification method. According to the results of the research, the accuracy of the solution is high, and also the execution time of the intrusion detection process is reduced. Table 1 provides a summary of previous methods and the advantages and disadvantages of each method.

3. Clustering of the Proposed Method

An interactive approach is used to identify influential nodes in IoT networks, that is, paying attention to interactions between users. User interaction is reflecting a node that receives more tweets but responds less (has fewer retweets) and is a better option to be happy, and in fact, such a node is selected as the influential node. That is, the influential nodes in each association are identified using an analytical relationship based on a combination of structural and interactive approaches. It should be noted that the number of tweets received and responding to each user is used within the database.

3.1. Utilizing an Interactive and Structural Approach to Increase Accuracy within Clusters

After identifying the effective users in the previous step, the impact point of each of them is calculated by the following formula:where is the number of times ui retweets uj tweets, the number of times uj retweets ui tweets, is the number of times ui retweets other users’ tweets, is the number of times uj retweets the tweets of other users, is the total number of messages received by i, and is the total number of messages sent from i to j, each of which is normalized individually.

3.2. Research Plan

Given that some of the nodes of a large database are studied (case study) in this study, the research method in this dissertation is a case study.

First, information and theoretical foundations of the research are extracted from valid internal and external sources in the present study. Then the IoT general database Mirai and Bashlite which is available at http://www.archive.ics.uci.edu/mI/datasets/detection_of_iot_botnet_attacks_n_balot is selected for implementation and execution. Data are first categorized by the k-means clustering algorithm; then, intrusion detection and routing are optimized by edge calculations in MATLAB and the results are presented in the form of tables and graphs. Finally, the obtained results are compared with the results of other previous methods.

3.3. Problem Solving Method

In the present study, K-means clustering is used to classify the database after selecting the appropriate database. Different forums are identified in the IoT network. In the next step, special attention is paid to the demographic characteristics of users, including their age, gender, and occupation, to identify the forums in the IoT networks. A code between 0 and 1 is assigned to each of these attributes. A kind of clustering algorithm should be used to continue the process of identifying associations based on the mentioned demographic characteristics; the k-means algorithm is selected in the present study.

Then, influential nodes are identified in the IoT networks. Edge computing is used to identify the influential nodes in the IoT networks. The interactive approach in edge computing, that is, interactions between users, has been considered. Interaction between users means a node that receives more information but responds less (has less response) is a better option to be head-cluster, and in fact, such a node is selected as the influential node.

That is, the influential nodes in each association are identified using an analytical relationship, based on a combination of structural and interactive approaches. It should be noted that the amount of information received and answered for each user is used in the data. By identifying the influential users in the previous step, the impact score of each of them is now calculated and at the end, the obtained values are placed in the objective function which is presented in the next section. Figure 1 shows the alpha, beta, and gamma wolves movements.

Figure 2 provides the optimal solutions by alpha, beta, and gamma wolves in the proposed method.

The pseudocode of the gray wolf algorithm is given in Figure 3.

Table 2 tabulates a part of the study data set.

3.4. Objective Function in Edge Computation Algorithm

This study was carried out to increase the accuracy and secure routing of the IoT network using edge computing. Therefore, the objective function is as follows:where F is the accuracy in the IoT network and is calculated by edge computing.

In this study, the community includes all users of the database. The sample group includes 1000 users of the database. By definition, the random sampling method is simple [25]. MATLAB (version 2017) was used for data analysis, and results are presented. In this section, simulation results on IoT network data were presented. The simulation consists of two stages.

In the first stage, network forums or clustering of 1000 users is found based on the three characteristics of gender, age, and occupation, and in the next step, the degree of interaction and ranking of clustered users are obtained. The data in this section includes information about these 1000 users and their neighbors, in addition to information about user interactions, shared posts, and user comments about posts. In this method, users are selected with a higher degree of interaction and rank to start the process of disseminating information in each cluster, and information is disseminated through these users to other users.

MATLAB software was used for simulations related to user clustering, and the degree of interaction and user rank were used to perform the relevant simulations.

3.5. Platform Used

The platform used Windows 7, 64-bit CPU, 4 GHZ, Core 7 Duo.

3.6. Clustering, Number of Clusters, Clustering Effect, Clustering Criteria, and Reason for Using Cummins Algorithm for Clustering

Data clustering is done in this section. Clustering leads to the categorization and ordering of large volumes of information. As a result, it is much easier to study and analyze data in a particular order than to examine large volumes of information without categorization. There are several methods for clustering. The K-means method is one of the data clustering methods in data mining.

This method is a basic method for many other clustering methods (such as fuzzy clustering) although it is a simple method. This method is considered an exclusive method. As a result, this algorithm is used for clustering in this study due to its ease of use. The parameters to be set in the K-means clustering algorithm are given in Table 3.

Figure 1 shows the set parameters, user features, and ignored properties as follows: Number of repetitions: 250Number of samples: 1000Number of clusters: 25Distance function: Euclidean distanceNumber of features: 4

Information about the number of users in each forum, the percentage of users in each forum, and a comparison between accuracy and number of clusters as well as a comparison between the number of clusters and the time of their next analysis to find effective users are provided in this section. In Figure 4, the columns represent the number of each cluster and the rows the percentage of network users in each cluster. Then, the accuracy of the K-means algorithm was calculated for different numbers. The accuracy of this algorithm increases with the number of different clusters, as the number of clusters increases. The number of 25 clusters is relatively accurate among the number of clusters tested.

Despite the help of user profile information-based clustering in IoT networks, it has the disadvantage of identifying groups with common characteristics because individuals are not interested in disclosing personal information publicly for security reasons.

In this section, the cosine similarity measure was used to perform clustering. (A cosine similarity measure for fuzzy sets [26] is defined as the inner product of two vectors divided by the product of their lengths. This is nothing but the cosine of the angle between the vector representations of the two fuzzy sets.) The cosine similarity measure used by Collins et al. is the similarity measure between two vectors of an interior multiplication space based on the cosine of the angle between them. The cosine of angle of zero degrees is equal to one and is less than one for the other angles. Therefore, it is thus a judgment of orientation and not magnitude. Two vectors with the same direction have a cosine similarity criterion equal to one, two vectors with a 90° angle have a similarity of zero, and two vectors with the opposite direction have a similarity of −1.

The cosine similarity measure is used especially in a positive space with a range of [0, 1]. It should be noted that this range is used for any number of dimensions, typically used in positive dimensions with high dimensions.

First, the cosine distance is defined aswhere A and B are two arbitrary vectors and S is the square of the distance between them.

However, this criterion is not an appropriate distance because it does not guarantee the principle of triangular inequality and goes beyond the principle of superposition. To compensate for the principle of triangular inequality, while maintaining the same order as before, it is necessary to convert it to an angular distance.

The cosine distance of two vectors can be converted into equation (4) with the Euclidean inner product formula:where A and B are two arbitrary vectors and θ is the angle between them.

And finally, by applying a series of changes and inner product, the criterion of cosine similarity used in this study can be expressed aswhere A and B are two arbitrary vectors, θ are the angles between them, and Ai and Bi are components of the two vectors. The results of the above formula are between −1 and 1, in which −1 represents completely different, 1 represents completely similar, 0 indicates noncorrelation or orthogonality, and the values between them indicate the degree of similarity or dissimilarity.

After clustering, there is now a regular data set that is divided into 25 categories (clusters). Using the edge calculation algorithm, three larger values are calculated in each cluster, that is, 25 values of A, 25 values of B, and 25 values of C. The largest value of A in every 25 clusters is called the total A. Also, the largest value of B in a total of 25 clusters is called the value of total B, and the largest value of C in a total of 25 clusters is called the value of total C (Table 4).

As can be seen, total A (13.87) is created in cluster number 11, total B in cluster number 9, and total C in cluster number 10.

3.7. Degree of User Interaction in Each Cluster

Here, the values of the UIi formula for nodes with different ID are shown. It can be said that whichever has the highest UIi value is selected as the most important node. The amount of user interactions in the first cluster is shown in Figure 5.

3.8. Score of Users in Each Cluster

The score of users was obtained according to the community algorithm using the corresponding formula, for nodes with different IDs. In each cluster, each user with the highest score (Si) is considered the most important and effective nodes. Figure 6 shows the score of users in the first cluster.

3.9. Impact of Users on the Network

The final results of the proposed method for identifying users who are effective in each community are presented in this section, which is a hybrid measure of two criteria of user interaction and the score of the user. Figure 7 shows the users in the first cluster based on the amount of impact (Mi). Given how many users are considered to start diffusion, we can select the users who have the most impact (and are at the top of the chart) from each community and start diffusion through them.

3.10. Calculating the Accuracy of the Proposed Method and Comparing It with Existing Methods

The proposed method has an accuracy of 86.081, which is about 0.2% better than the basic research method with an accuracy of 66.081%. It should be noted that, in the proposed method, the community structure of the IoT is considered, the community is first selected, and then the proposed method was applied; this issue was not considered in the basic research.

The accuracy of the proposed method and the basic research for different numbers of users were compared, and as shown in Figure 8 and Table 5, the accuracy of the proposed method for different numbers has improved compared to the basic research.

It is observed that the accuracy of existing methods to find effective publishers decreases with the increasing number of users in IoT networks.

In order to start diffusion and diffusion information in basic methods, for example, 20 users are selected as initial acceptors to start diffusion information. All selected users may be in specific forums, and other forums may not share from publication; eventually the published messages may never reach them. However, in the proposed method, all forums are considered to start and at least one user is selected in each forum, and since this user is more influential and due to the similarity of his characteristics and desires with the users of the forum, this user can publish information and prevent the infiltration of information.

4. Conclusion

The IoMT is a connected infrastructure of medical devices, applications, and health systems and services. The rise of IoMT is driven by an increase in the number of connected medical devices that are able to generate, collect, analyze, or transmit health data or images and connect to healthcare provider networks, transmitting data to either a cloud repository or internal servers. This connectivity between medical devices means that security can no longer be examined within the neat, physical walls as it was considered before. Attacks on IoMT devices can potentially cause significant physical harm and life-threatening damage to the patients.

For addressing this problem, many researches have been done to provide a way for preventing IoMT intrusion and secure routing, in many of which IC and LT diffusion models start the diffusion process from nodes and have no assumptions about starting them. The publication process is not considered, and there is also a need to consider the possibility of accepting and receiving the publication which was done randomly. In other methods, it was based on publication or on popular topics, as they are limited in publication time. In later periods, they may lose their effectiveness and may not be popular in the future. So the methods used by popular users have become more popular for using in IoMT.

In degree-based methods, K-core and other ranking algorithms, including association algorithms, have no presuppositions about networks with association structure and cannot be deduced in networks with association structure. In the proposed method, users were placed in their respective forums, taking into account network forums that are based on individual characteristics in the user profile. Forums based on the characteristics of users' profiles, despite their advantages, are weak because users are reluctant to share their information with the public for security reasons.

Data Availability

Datasets of Mirai and Bashlite can be obtained from the following site: https://archive.ics.uci.edu/ml/datasets/detection_of_IoT_botnet_attacks_N_BaIoT.

Conflicts of Interest

The authors declare that they have no conflicts of interest.