Federated Learning-Based Lightweight Two-Factor Authentication Framework with Privacy Preservation for Mobile Sink in the Social IoMT

被引:5
作者
Deebak, B. D. [1 ]
Hwang, Seong Oun [1 ]
机构
[1] Gachon Univ, Dept Comp Engn, Seongnam 13120, South Korea
基金
新加坡国家研究基金会;
关键词
Internet of Medical Things; eHealth; two-factor authentication; federated learning; learning analysis; device protection; transmission efficiency; PROVABLY SECURE; INTERNET; SCHEME; PROTOCOL; THINGS; EDGE; IOT;
D O I
10.3390/electronics12051250
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The social Internet of Medical Things (S-IoMT) highly demands dependable and non-invasive device identification and authentication and makes data services more prevalent in a reliable learning system. In real time, healthcare systems consistently acquire, analyze, and transform a few operational intelligence into actionable forms through digitization to capture the sensitive information of the patient. Since the S-IoMT tries to distribute health-related services using IoT devices and wireless technologies, protecting the privacy of data and security of the device is so crucial in any eHealth system. To fulfill the design objectives of eHealth, smart sensing technologies use built-in features of social networking services. Despite being more convenient in its potential use, a significant concern is a security preventing potential threats and infringement. Thus, this paper presents a lightweight two-factor authentication framework (L2FAK) with privacy-preserving functionality, which uses a mobile sink for smart eHealth. Formal and informal analyses prove that the proposed L2FAK can resist cyberattacks such as session stealing, message modification, and denial of service, guaranteeing device protection and data integrity. The learning analysis verifies the features of the physical layer using federated learning layered authentication (FLLA) to learn the data characteristics by exploring the learning framework of neural networks. In the evaluation, the core scenario is implemented on the TensorFlow Federated framework to examine FLLA and other relevant mechanisms on two correlated datasets, namely, MNIST and FashionMNIST. The analytical results show that the proposed FLLA can analyze the protection of privacy features effectively in order to guarantee an accuracy asymptotic to 89.83% to 93.41% better than other mechanisms. Lastly, a real-time testbed demonstrates the significance of the proposed L2FAK in achieving better quality metrics, such as transmission efficiency and overhead ratio than other state-of-the-art approaches.
引用
收藏
页数:36
相关论文
共 87 条
[1]  
Abdullah A., 2019, 2019 2 INT C COMP, P1, DOI [10.1109/CAIS.2019.8769560, DOI 10.1109/cais.2019.8769560]
[2]   Provably secured lightweight authenticated key agreement protocol for modern health industry [J].
Abdussami, Mohammad ;
Amin, Ruhul ;
Vollala, Satyanarayana .
AD HOC NETWORKS, 2023, 141
[3]  
Ahmed J., 2022, IEEE J. Biomed. Health Inform., V27
[4]  
Al-Sarawi S, 2020, PROCEEDINGS OF THE 2020 FOURTH WORLD CONFERENCE ON SMART TRENDS IN SYSTEMS, SECURITY AND SUSTAINABILITY (WORLDS4 2020), P449, DOI 10.1109/WorldS450073.2020.9210375
[5]   Seamless Authentication: For IoT-Big Data Technologies in Smart Industrial Application Systems [J].
AL-Turjman, Fadi ;
Deebak, B. D. .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (04) :2919-2927
[6]   A Secure and Practical Authentication Scheme Using Personal Devices [J].
Alhothaily, Abdulrahman ;
Hu, Chunqiang ;
Alrawais, Arwa ;
Song, Tianyi ;
Cheng, Xiuzhen ;
Chen, Dechang .
IEEE ACCESS, 2017, 5 :11677-11687
[7]   A Lightweight Authentication Scheme for a Network of Unmanned Aerial Vehicles (UAVs) by Using Physical Unclonable Functions [J].
Alkatheiri, Mohammed Saeed ;
Saleem, Sajid ;
Alqarni, Mohammed Ali ;
Aseeri, Ahmad O. ;
Chauhdary, Sajjad Hussain ;
Zhuang, Yu .
ELECTRONICS, 2022, 11 (18)
[8]   A Provably Secure and Lightweight Patient-Healthcare Authentication Protocol in Wireless Body Area Networks [J].
Alzahrani, Bander A. ;
Irshad, Azeem ;
Albeshri, Aiiad ;
Alsubhi, Khalid .
WIRELESS PERSONAL COMMUNICATIONS, 2021, 117 (01) :47-69
[9]   A robust and anonymous patient monitoring system using wireless medical sensor networks [J].
Amin, Ruhul ;
Islam, S. K. Hafizul ;
Biswas, G. P. ;
Khan, Muhammad Khurram ;
Kumar, Neeraj .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 80 :483-495
[10]   Blockchain Based Authentication and Cluster Head Selection Using DDR-LEACH in Internet of Sensor Things [J].
Amjad, Sana ;
Abbas, Shahid ;
Abubaker, Zain ;
Alsharif, Mohammed H. ;
Jahid, Abu ;
Javaid, Nadeem .
SENSORS, 2022, 22 (05)