An Efficient and Secure Authentication Protocol with Deep Learning Based Key Generation toward Securing Healthcare Data in IoT

被引:1
|
作者
Sharma, Sudhir [1 ]
Tripathi, Sandesh [2 ]
Bhatt, Kaushal Kishor [2 ]
Chhimwal, Nitin [2 ]
机构
[1] Manipal Univ Jaipur, Dept Informat Technol SIT, Jaipur, Rajasthan, India
[2] Birla Inst Appl Sci, Dept Comp Sci & Engn, Naini Tal, Uttarakhand, India
关键词
Authentication; deep neuro fuzzy network; extreme learning machine; Internet of Things; smart healthcare; RISK-MANAGEMENT MODEL; INTERNET; SCHEME;
D O I
10.1080/01969722.2022.2137644
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the emergence of technologies in the growing world, the IoT is termed as a novel concept. The combination of internet with smart devices provides convenient user-related services. The attack toward confidential data may leak data and can cause serious security issues. Meanwhile, the classical security techniques cannot be utilized in a direct manner. Thus, novel techniques are needed for safeguarding the IoT from security issues. This paper designs secure authentication model for IoT in the healthcare. Several entities, such as gateway node, sensor node and medical professional are included for performing the secure authentication. The proposed protocol is devised by providing a mathematical model that makes usage of hashing function, encryption algorithm, XOR, Chebyshev polynomial, passwords, secret keys, and other security operations. Here, Secret key is generated with the deep neuro fuzzy network (DNFN) using Extreme Learning Machine (ELM) based sub-key generation. The proposed technique outperformed with less computation time of 33,484,154,235 ns, smallest memory of 51.750 MB, and highest detection rate of 94.9%.
引用
收藏
页码:848 / 871
页数:24
相关论文
共 50 条
  • [21] Deep Learning-based Continuous Authentication for an IoT-enabled healthcare service
    Sahu, Amiya Kumar
    Sharma, Suraj
    Raja, Rohit
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 99
  • [22] New ECC-Based IoT Authentication Protocol for Securing RFID Systems
    Timouhin H.
    Amounas F.
    Azrour M.
    SN Computer Science, 4 (6)
  • [23] SEA: A Secure and Efficient Authentication and Authorization Architecture for IoT-Based Healthcare Using Smart Gateways
    Moosavi, Sanaz Rahimi
    Tuan Nguyen Gia
    Rahmani, Amir-Mohammad
    Nigussie, Ethiopia
    Virtanen, Seppo
    Isoaho, Jouni
    Tenhunen, Hannu
    6TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT-2015), THE 5TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2015), 2015, 52 : 452 - 459
  • [24] A Flexible and Efficient Authentication and Secure Data Transmission Scheme for IoT Applications
    Fang, Dongfeng
    Qian, Yi
    Hu, Rose Qingyang
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (04): : 3474 - 3484
  • [25] SELWAK: A Secure and Efficient Lightweight and Anonymous Authentication and Key Establishment Scheme for IoT Based Vehicular Ad hoc Networks
    Jan, Sagheer Ahmed
    Ul Amin, Noor
    Shuja, Junaid
    Abbas, Assad
    Maray, Mohammed
    Ali, Mazhar
    SENSORS, 2022, 22 (11)
  • [26] Efficient Key Generation Techniques for Securing IoT Communication Protocols
    Boke, Amol K.
    Nakhate, Sangeeta
    Rajawat, Arvind
    IETE TECHNICAL REVIEW, 2021, 38 (03) : 282 - 293
  • [27] Securing IoT-based Groups: Efficient, Scalable and Fault-tolerant Key Management Protocol
    Abdmeziem, Mohammed Riyadh
    Charoy, Francois
    AD HOC & SENSOR WIRELESS NETWORKS, 2019, 45 (3-4) : 215 - 251
  • [28] Proxy-based public-key cryptosystem for secure and efficient IoT-based cloud data sharing in the smart city
    Hundera, Negalign Wake
    Jin, Chuanjie
    Geressu, Dagmawit Mesfin
    Aftab, Muhammad Umar
    Olanrewaju, Oluwasanmi Ariyo
    Xiong, Hu
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (21) : 29673 - 29697
  • [29] An efficient provably secure authentication and key agreement protocol for satellite communication networks
    Thakur, Garima
    Obaidat, Mohammad S.
    Sharma, Piyush
    Prajapat, Sunil
    Kumar, Pankaj
    SECURITY AND PRIVACY, 2024, 7 (05)
  • [30] A secure and efficient certificateless authenticated key agreement protocol for smart healthcare
    Ma, Yuqian
    Ma, Yongliu
    Liu, Yidan
    Cheng, Qingfeng
    COMPUTER STANDARDS & INTERFACES, 2023, 86