Detecting Anomalous User Behavior in Remote Patient Monitoring

AI-generated keywords: Remote Patient Monitoring Internet of Medical Things Anomaly Detection Smart Healthcare Infrastructure Data Security

AI-generated Key Points

  • Growth in Remote Patient Monitoring (RPM) services using IoMT devices enhances diagnosis quality and enables timely treatment across various medical conditions
  • Increased proliferation of IoMT devices poses risks such as theft of personal information, data breaches, and compromised medical devices
  • IoMT devices generate vast amounts of data reflecting user behavior patterns, which may lead to anomalies due to unexpected user behavior or compromised devices
  • Establishing a robust framework for securing smart healthcare infrastructure is crucial to detect and mitigate anomalies effectively
  • An innovative Hidden Markov Model (HMM)-based anomaly detection model tailored for RPM leveraging IoMT and smart home devices has been developed
  • The model achieved over 98% accuracy in identifying anomalies within the context of RPM through comprehensive testing with multiple IoMT devices and home sensors
  • Network data captured through tools like Wireshark is used to monitor user presence based on device connectivity patterns
  • Behavioral data collection techniques are explored to enhance anomaly detection capabilities within remote patient monitoring scenarios
Also access our AI generated: Comprehensive summary, Lay summary, Blog-like article; or ask questions about this paper to our AI assistant.

Authors: Deepti Gupta, Maanak Gupta, Smriti Bhatt, Ali Saman Tosun

License: CC BY 4.0

Abstract: The growth in Remote Patient Monitoring (RPM) services using wearable and non-wearable Internet of Medical Things (IoMT) promises to improve the quality of diagnosis and facilitate timely treatment for a gamut of medical conditions. At the same time, the proliferation of IoMT devices increases the potential for malicious activities that can lead to catastrophic results including theft of personal information, data breach, and compromised medical devices, putting human lives at risk. IoMT devices generate tremendous amount of data that reflect user behavior patterns including both personal and day-to-day social activities along with daily routine health monitoring. In this context, there are possibilities of anomalies generated due to various reasons including unexpected user behavior, faulty sensor, or abnormal values from malicious/compromised devices. To address this problem, there is an imminent need to develop a framework for securing the smart health care infrastructure to identify and mitigate anomalies. In this paper, we present an anomaly detection model for RPM utilizing IoMT and smart home devices. We propose Hidden Markov Model (HMM) based anomaly detection that analyzes normal user behavior in the context of RPM comprising both smart home and smart health devices, and identifies anomalous user behavior. We design a testbed with multiple IoMT devices and home sensors to collect data and use the HMM model to train using network and user behavioral data. Proposed HMM based anomaly detection model achieved over 98% accuracy in identifying the anomalies in the context of RPM.

Submitted to arXiv on 22 Jun. 2021

Ask questions about this paper to our AI assistant

You can also chat with multiple papers at once here.

AI assistant instructions?

Results of the summarizing process for the arXiv paper: 2106.11844v1

The growth in Remote Patient Monitoring (RPM) services utilizing wearable and non-wearable Internet of Medical Things (IoMT) devices holds great promise for enhancing the quality of diagnosis and enabling timely treatment across a wide range of medical conditions. However, with the increasing proliferation of IoMT devices, there is a heightened risk of malicious activities that could result in severe consequences such as theft of personal information, data breaches, and compromised medical devices, ultimately endangering human lives. IoMT devices generate vast amounts of data reflecting user behavior patterns encompassing personal activities, social interactions, and routine health monitoring. Within this context, anomalies may arise due to various factors including unexpected user behavior, sensor malfunctions, or abnormal values stemming from compromised devices. To effectively address this issue, it is imperative to establish a robust framework for securing smart healthcare infrastructure to detect and mitigate anomalies. In response to this critical need, our research presents an innovative anomaly detection model tailored for RPM leveraging IoMT and smart home devices. We introduce a Hidden Markov Model (HMM)-based anomaly detection approach that scrutinizes normal user behavior within the RPM environment comprising both smart home and smart health devices while pinpointing anomalous user actions. To validate our proposed model, we have designed a comprehensive testbed incorporating multiple IoMT devices and home sensors to gather relevant data. By training the HMM model using network traffic and behavioral data collected from these devices, we have achieved remarkable accuracy exceeding 98% in identifying anomalies within the context of RPM. Furthermore, our study delves into the intricacies of network data captured through tools like Wireshark to monitor user presence based on device connectivity patterns. Additionally, behavioral data collection techniques are explored to enhance anomaly detection capabilities within remote patient monitoring scenarios. Overall, our research underscores the significance of developing advanced anomaly detection mechanisms within IoMT-driven healthcare ecosystems to safeguard against potential threats and ensure the seamless delivery of secure and efficient remote patient monitoring services.
Created on 16 Aug. 2024

Assess the quality of the AI-generated content by voting

Score: 0

Why do we need votes?

Votes are used to determine whether we need to re-run our summarizing tools. If the count reaches -10, our tools can be restarted.

The previous summary was created more than a year ago and can be re-run (if necessary) by clicking on the Run button below.

Similar papers summarized with our AI tools

Navigate through even more similar papers through a

tree representation

Look for similar papers (in beta version)

By clicking on the button above, our algorithm will scan all papers in our database to find the closest based on the contents of the full papers and not just on metadata. Please note that it only works for papers that we have generated summaries for and you can rerun it from time to time to get a more accurate result while our database grows.

Disclaimer: The AI-based summarization tool and virtual assistant provided on this website may not always provide accurate and complete summaries or responses. We encourage you to carefully review and evaluate the generated content to ensure its quality and relevance to your needs.