Affiliation:
1. Department of Computer Engineering, Gachon University, Seongnam 13120, Republic of Korea
Abstract
The social Internet of Medical Things (S-IoMT) highly demands dependable and non-invasive device identification and authentication and makes data services more prevalent in a reliable learning system. In real time, healthcare systems consistently acquire, analyze, and transform a few operational intelligence into actionable forms through digitization to capture the sensitive information of the patient. Since the S-IoMT tries to distribute health-related services using IoT devices and wireless technologies, protecting the privacy of data and security of the device is so crucial in any eHealth system. To fulfill the design objectives of eHealth, smart sensing technologies use built-in features of social networking services. Despite being more convenient in its potential use, a significant concern is a security preventing potential threats and infringement. Thus, this paper presents a lightweight two-factor authentication framework (L2FAK) with privacy-preserving functionality, which uses a mobile sink for smart eHealth. Formal and informal analyses prove that the proposed L2FAK can resist cyberattacks such as session stealing, message modification, and denial of service, guaranteeing device protection and data integrity. The learning analysis verifies the features of the physical layer using federated learning layered authentication (FLLA) to learn the data characteristics by exploring the learning framework of neural networks. In the evaluation, the core scenario is implemented on the TensorFlow Federated framework to examine FLLA and other relevant mechanisms on two correlated datasets, namely, MNIST and FashionMNIST. The analytical results show that the proposed FLLA can analyze the protection of privacy features effectively in order to guarantee an accuracy ≈89.83% to 93.41% better than other mechanisms. Lastly, a real-time testbed demonstrates the significance of the proposed L2FAK in achieving better quality metrics, such as transmission efficiency and overhead ratio than other state-of-the-art approaches.
Funder
Ministry of Science and Information Communication Technology
Gachon University research fund
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Hardware and Architecture,Signal Processing,Control and Systems Engineering
Reference87 articles.
1. Designing secure lightweight blockchain-enabled RFID-based authentication protocol for supply chains in 5G mobile edge computing environment;Jangirala;IEEE Trans. Ind. Inform.,2019
2. On the physical layer security of federated learning based IoMT networks;Ahmed;IEEE J. Biomed. Health Inform.,2022
3. Luo, S., Zhu, D., Li, Z., and Wu, C. (2021). Ensemble federated adversarial training with non-iid data. arXiv.
4. Edemekong, P.F., Annamaraju, P., and Haydel, M.J. (2018). Health Insurance Portability and Accountability Act, StatPearls Publishing LLC.
5. Abdullah, A., Hamad, R., Abdulrahman, M., Moala, H., and Elkhediri, S. (2019, January 1–3). CyberSecurity: A review of internet of things (IoT) security issues, challenges and techniques. Proceedings of the 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS), Riyadh, Saudi Arabia.
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献