Open Access iconOpen Access

ARTICLE

crossmark

Crypto Hash Based Malware Detection in IoMT Framework

R Punithavathi1, K Venkatachalam2, Mehedi Masud3, Mohammed A. AlZain4, Mohamed Abouhawwash5,6,*

1Department of Information Technology, M. Kumarasamy College of Engineering, Karur, 639113, India
2 Department of Applied Cybernetics, Faculty of Science, University of Hradec Králové, Hradec Králové, 50003, Czech Republic
3 Department of Computer Science, College of Computers and Information Technology, Taif University, Taif, 21944, Saudi Arabia
4 Department of Information Technology, College of Computers and Information Technology, Taif University, Taif, 21944, Saudi Arabia
5 Department of Mathematics, Faculty of Science, Mansoura University, Mansoura, 35516, Egypt
6 Department of Computational Mathematics, Science, and Engineering (CMSE), Michigan State University, East Lansing, MI, 48824, USA

* Corresponding Author: Mohamed Abouhawwash. Email: email

Intelligent Automation & Soft Computing 2022, 34(1), 559-574. https://doi.org/10.32604/iasc.2022.024715

Abstract

The challenges in providing e-health services with the help of Internet of Medical Things (IoMT) is done by connecting to the smart medical devices. Through IoMT sensor devices/smart devices, physicians share the sensitive information of the patient. However, protecting the patient health care details from malware attack is necessary in this advanced digital scenario. Therefore, it is needed to implement cryptographic algorithm to enhance security, safety, reliability, preventing details from malware attacks and privacy of medical data. Nowadays blockchain has become a prominent technology for storing medical data securely and transmit through IoMT concept. The issues in the existing research works are in terms of insecurity, non-reliability, remote hijacking, hacking of password and Denial of Service (DoS) attacks. In order to overcome these issues, this work is focused on the double layer encryption model using PoW consensus with Crypto Hash algorithm (PoW-CHA). This proposed work concentrates on secured storage of medical data via IoMT transmission. It ensures transparency, decentralization, security, immutability and preserving privacy, and precisely detecting the malware attack. The accuracy of PoW-CHA is 98% compared to PoW and Crypto Hash algorithm. Moreover, it takes minimum computation time for PoW-CHA.

Keywords


Cite This Article

APA Style
Punithavathi, R., Venkatachalam, K., Masud, M., AlZain, M.A., Abouhawwash, M. (2022). Crypto hash based malware detection in iomt framework. Intelligent Automation & Soft Computing, 34(1), 559-574. https://doi.org/10.32604/iasc.2022.024715
Vancouver Style
Punithavathi R, Venkatachalam K, Masud M, AlZain MA, Abouhawwash M. Crypto hash based malware detection in iomt framework. Intell Automat Soft Comput . 2022;34(1):559-574 https://doi.org/10.32604/iasc.2022.024715
IEEE Style
R. Punithavathi, K. Venkatachalam, M. Masud, M.A. AlZain, and M. Abouhawwash, “Crypto Hash Based Malware Detection in IoMT Framework,” Intell. Automat. Soft Comput. , vol. 34, no. 1, pp. 559-574, 2022. https://doi.org/10.32604/iasc.2022.024715



cc Copyright © 2022 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1304

    View

  • 940

    Download

  • 0

    Like

Share Link