4.5 Article

Deep Learning-based Continuous Authentication for an IoT-enabled healthcare service

Journal

COMPUTERS & ELECTRICAL ENGINEERING
Volume 99, Issue -, Pages -

Publisher

PERGAMON-ELSEVIER SCIENCE LTD
DOI: 10.1016/j.compeleceng.2022.107817

Keywords

Internet of Things; Continuous Authentication; Security; LSTM; Deep Learning; Healthcare

Ask authors/readers for more resources

The security of IoT continues to be a significant concern, with current research focusing on external attacks. However, internal devices or users within the network may pose a greater threat, highlighting the need for a security system that can continuously authenticate legitimate users.
The Internet of Things (IoT) has introduced a new dimension to the Internet in the last decade; nonetheless, security, particularly attacks on authentication, continue to be a significant concern in IoT. The majority of research endeavours consider external attacks that originate from outside of an IoT network. Their authentication mechanisms authenticate users at the outset of a session. However, a device or user within the network may be a more significant threat than the external attacker due to their accessibility. An intruder during the session can physically grasp any IoT device and impersonate it. Therefore, the suggested security system continuously authenticates legitimate users inside a session. The system takes data from users and authenticates them using a Deep Learning-based Long Short-Term Memory classification algorithm. There are 3.5 percent false acceptances and 2.4% false rejections for the security system. The research also compared the suggested approach to other current security techniques.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available