Crypto Hash Based Malware Detection in IoMT Framework

R. Punithavathi, K. Venkatachalam, Mehedi Masud, Mohammed A. Alzain, Mohamed Abouhawwash*

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

16 Scopus citations

Abstract

The challenges in providing e-health services with the help of Internet of Medical Things (IoMT) is done by connecting to the smart medical devices. Through IoMT sensor devices/smart devices, physicians share the sensitive information of the patient. However, protecting the patient health care details from malware attack is necessary in this advanced digital scenario. Therefore, it is needed to implement cryptographic algorithm to enhance security, safety, reliabil-ity, preventing details from malware attacks and privacy of medical data. Nowa-days blockchain has become a prominent technology for storing medical data securely and transmit through IoMT concept. The issues in the existing research works are in terms of insecurity, non-reliability, remote hijacking, hacking of password and Denial of Service (DoS) attacks. In order to overcome these issues, this work is focused on the double layer encryption model using PoW consensus with Crypto Hash algorithm (PoW-CHA). This proposed work concentrates on secured storage of medical data via IoMT transmission. It ensures transparency, decentralization, security, immutability and preserving privacy, and precisely detecting the malware attack. The accuracy of PoW-CHA is 98% compared to PoW and Crypto Hash algorithm. Moreover, it takes minimum computation time for PoW-CHA.

Original languageEnglish
Pages (from-to)559-574
Number of pages16
JournalIntelligent Automation and Soft Computing
Volume34
Issue number1
DOIs
StatePublished - 2022
Externally publishedYes

Bibliographical note

Publisher Copyright:
© 2022, Tech Science Press. All rights reserved.

Keywords

  • crypto hash algorithm
  • health care data
  • IOMT
  • malware detection
  • PoW

ASJC Scopus subject areas

  • Software
  • Theoretical Computer Science
  • Computational Theory and Mathematics
  • Artificial Intelligence

Fingerprint

Dive into the research topics of 'Crypto Hash Based Malware Detection in IoMT Framework'. Together they form a unique fingerprint.

Cite this