An Efficient and Secure Authentication Protocol with Deep Learning Based Key Generation toward Securing Healthcare Data in IoT

被引:1
|
作者
Sharma, Sudhir [1 ]
Tripathi, Sandesh [2 ]
Bhatt, Kaushal Kishor [2 ]
Chhimwal, Nitin [2 ]
机构
[1] Manipal Univ Jaipur, Dept Informat Technol SIT, Jaipur, Rajasthan, India
[2] Birla Inst Appl Sci, Dept Comp Sci & Engn, Naini Tal, Uttarakhand, India
关键词
Authentication; deep neuro fuzzy network; extreme learning machine; Internet of Things; smart healthcare; RISK-MANAGEMENT MODEL; INTERNET; SCHEME;
D O I
10.1080/01969722.2022.2137644
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the emergence of technologies in the growing world, the IoT is termed as a novel concept. The combination of internet with smart devices provides convenient user-related services. The attack toward confidential data may leak data and can cause serious security issues. Meanwhile, the classical security techniques cannot be utilized in a direct manner. Thus, novel techniques are needed for safeguarding the IoT from security issues. This paper designs secure authentication model for IoT in the healthcare. Several entities, such as gateway node, sensor node and medical professional are included for performing the secure authentication. The proposed protocol is devised by providing a mathematical model that makes usage of hashing function, encryption algorithm, XOR, Chebyshev polynomial, passwords, secret keys, and other security operations. Here, Secret key is generated with the deep neuro fuzzy network (DNFN) using Extreme Learning Machine (ELM) based sub-key generation. The proposed technique outperformed with less computation time of 33,484,154,235 ns, smallest memory of 51.750 MB, and highest detection rate of 94.9%.
引用
收藏
页码:848 / 871
页数:24
相关论文
共 50 条
  • [1] A secure authentication protocol for healthcare service in IoT with Q-net based secret key generation
    Mahajan, Rupali
    Chavan, Smita
    Ajalkar, Deepika Amol
    Balshetwar, S., V
    Khadkikar, Prajakta Ajay
    WEB INTELLIGENCE, 2023, 21 (04) : 407 - 433
  • [2] Toward Designing a Secure Authentication Protocol for IoT Environments
    Hosseinzadeh, Mehdi
    Malik, Mazhar Hussain
    Safkhani, Masoumeh
    Bagheri, Nasour
    Le, Quynh Hoang
    Tightiz, Lilia
    Mosavi, Amir H.
    SUSTAINABILITY, 2023, 15 (07)
  • [3] Secure transmission and authentication protocol in IoT with deep-Q-net-key updation
    Kandasamy, Ramesh
    Dhandapani, Sheema
    Subbiyan, Balasubramani
    Gurumani, Vijaya
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2025, 48 (03) : 130 - 148
  • [4] PLAKE: PUF-Based Secure Lightweight Authentication and Key Exchange Protocol for IoT
    Roy, Sourav
    Das, Dipnarayan
    Mondal, Anindan
    Mahalat, Mahabub Hasan
    Sen, Bibhash
    Sikdar, Biplab
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (10) : 8547 - 8559
  • [5] An efficient key agreement and authentication protocol for secure communication in industrial IoT applications
    Vinoth, R.
    Deborah, Lazarus Jegatha
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 14 (3) : 1431 - 1443
  • [6] A secure and efficient authentication and multimedia data sharing approach in IoT-healthcare
    Yempally, Sangeetha
    Singh, Sanjay Kumar
    Sarveshwaran, Velliangiri
    IMAGING SCIENCE JOURNAL, 2023, 71 (03) : 277 - 298
  • [7] An Efficient Key Management and Authentication Protocol for IoT Networks
    Reddy, Alumuru Mahesh
    Rao, M. Kameswara
    PRZEGLAD ELEKTROTECHNICZNY, 2023, 99 (10): : 153 - 159
  • [8] A secure blockchain-based group key agreement protocol for IoT
    Chen, Chien-Ming
    Deng, Xiaoting
    Gan, Wensheng
    Chen, Jiahui
    Islam, S. K. Hafizul
    JOURNAL OF SUPERCOMPUTING, 2021, 77 (08) : 9046 - 9068
  • [9] Lightweight Multi-party Authentication and Key Agreement Protocol in IoT-based E-Healthcare Service
    Sahu, Amiya Kumar
    Sharma, Suraj
    Puthal, Deepak
    ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2021, 17 (02)
  • [10] Efficient and secure three-party mutual authentication key agreement protocol for WSNs in IoT environments
    Chen, Chi-Tung
    Lee, Cheng-Chi
    Lin, Iuon-Chang
    PLOS ONE, 2020, 15 (04):