An Efficient and Secure Authentication Protocol with Deep Learning Based Key Generation toward Securing Healthcare Data in IoT

被引:1
|
作者
Sharma, Sudhir [1 ]
Tripathi, Sandesh [2 ]
Bhatt, Kaushal Kishor [2 ]
Chhimwal, Nitin [2 ]
机构
[1] Manipal Univ Jaipur, Dept Informat Technol SIT, Jaipur, Rajasthan, India
[2] Birla Inst Appl Sci, Dept Comp Sci & Engn, Naini Tal, Uttarakhand, India
关键词
Authentication; deep neuro fuzzy network; extreme learning machine; Internet of Things; smart healthcare; RISK-MANAGEMENT MODEL; INTERNET; SCHEME;
D O I
10.1080/01969722.2022.2137644
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the emergence of technologies in the growing world, the IoT is termed as a novel concept. The combination of internet with smart devices provides convenient user-related services. The attack toward confidential data may leak data and can cause serious security issues. Meanwhile, the classical security techniques cannot be utilized in a direct manner. Thus, novel techniques are needed for safeguarding the IoT from security issues. This paper designs secure authentication model for IoT in the healthcare. Several entities, such as gateway node, sensor node and medical professional are included for performing the secure authentication. The proposed protocol is devised by providing a mathematical model that makes usage of hashing function, encryption algorithm, XOR, Chebyshev polynomial, passwords, secret keys, and other security operations. Here, Secret key is generated with the deep neuro fuzzy network (DNFN) using Extreme Learning Machine (ELM) based sub-key generation. The proposed technique outperformed with less computation time of 33,484,154,235 ns, smallest memory of 51.750 MB, and highest detection rate of 94.9%.
引用
收藏
页码:848 / 871
页数:24
相关论文
共 50 条
  • [41] Provably secure biometric based authentication and key agreement protocol for wireless sensor networks
    Srinivas, Jangirala
    Mishra, Dheerendra
    Mukhopadhyay, Sourav
    Kumari, Saru
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2018, 9 (04) : 875 - 895
  • [42] Secure Timestamp-Based Mutual Authentication Protocol for IoT Devices Using RFID Tags
    Tewari, Aakanksha
    Gupta, Brij B.
    INTERNATIONAL JOURNAL ON SEMANTIC WEB AND INFORMATION SYSTEMS, 2020, 16 (03) : 20 - 34
  • [43] An efficient authentication and key agreement protocol for IoT-enabled devices in distributed cloud computing architecture
    Huang, Huihui
    Lu, Siqi
    Wu, Zehui
    Wei, Qiang
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2021, 2021 (01)
  • [44] A Provably Secure and Practical PUF-Based End-to-End Mutual Authentication and Key Exchange Protocol for IoT
    Li, Sensen
    Zhang, Tikui
    Yu, Bin
    He, Kuan
    IEEE SENSORS JOURNAL, 2021, 21 (04) : 5487 - 5501
  • [45] New Efficient and Secured Authentication Protocol for Remote Healthcare Systems in Cloud-IoT
    Azrour, Mourade
    Mabrouki, Jamal
    Chaganti, Rajasekhar
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [46] Adaptive Key Management-Based Privacy Preservation Protocol for Healthcare Data
    Khatiwada, Pankaj
    Gupta, Nishu
    Yang, Bian
    Derawi, Mohammad
    ADVANCED RESEARCH IN TECHNOLOGIES, INFORMATION, INNOVATION AND SUSTAINABILITY, PT 2, ARTIIS 2023, 2024, 1936 : 234 - 247
  • [47] Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks
    Mishra, Dheerendra
    Vijayakumar, P.
    Sureshkumar, Venkatasamy
    Amin, Ruhul
    Islam, S. K. Hafizul
    Gope, Prosanta
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (14) : 18295 - 18325
  • [48] FSMFA: Efficient firmware-secure multi-factor authentication protocol for IoT devices
    Chen, Zigang
    Cheng, Zhiquan
    Luo, Wenjun
    Ao, Jin
    Liu, Yuhong
    Sheng, Kai
    Chen, Long
    INTERNET OF THINGS, 2023, 21
  • [49] Provably Secure Lightweight Mutual Authentication and Key Agreement Scheme for Cloud-Based IoT Environments
    Ju, Sieun
    Park, Yohan
    SENSORS, 2023, 23 (24)
  • [50] ScPUAK: Smart card-based secure Protocol for remote User Authentication and Key agreement
    Cherbal, Sarra
    Benchetioui, Rania
    COMPUTERS & ELECTRICAL ENGINEERING, 2023, 109