Physical Unclonable Function and Machine Learning Based Group Authentication and Data Masking for In-Hospital Segments
Abstract
:1. Introduction
- On-body segment: consumer health wearables (used for fitness or health data monitoring such as fitness bands, smartwatches, smart shoes, smart clothes, etc.) and clinical-grade wearables (for example, elders can wear smart belts for identifying any risks and providing safety support, Halo Sport headset to activate specific brain regions, etc.) [7].
- In-home segment: For making a healthy home, wearable devices for monitoring patients at home use health data collection using sensors [8]. For example, a personal emergency response system can be used by older people to get live service; telemedicine and digital tests are part of the in-home IoMT segment.
- Community segment: The MDs and health stations of a particular area develop this segment [9]. This segment considers mobility, emergency response intelligence, kiosks, point-of-care devices, and logistics as components.
- In-clinic segment: the MDs that help to gather necessary data and device suggestions regarding administrative and clinical operations build this segment [10].
- In-hospital segment: This segment manages the system of a hospital using MDs’ data. This can provide solutions in the area of patient management, personnel management, environment, etc., in the hospital [11].
1.1. Security and Privacy Concerns in the IoMT
1.2. Contributions
- It is the general norm for PUF-based methods to transmit challenges to the device and/or the cloud. The proposed framework incorporates machine learning to control the PUF. It eliminates the requirement of transmitting challenges from the cloud server.
- Usually, CRPs are stored on the cloud server to verify the devices. The proposed method removes the requirement of CRP storage in the cloud server, which reduces the storage cost in the secure database.
- A group of devices are authenticated at a time instead of a single device.
- A single message transfer is adequate to complete the authentication of the group of medical devices.
- A single machine learning model identifies a group of medical devices. The proposed method eliminates the requirement of storing multiple models for multiple devices.
- No need to transfer data separately after authentication. Health data are sent at the same time with the authentication request.
- The secret encryption key in the edge router is updated periodically, which removes prevents key guessing attacks.
- The method involves each device’s authentication separately, it follows a linear relation for communication overhead. Communication overhead is decreased with the increment of devices in the proposed method.
- Less computation cost is involved. The cost is also decreased with the number of devices.
2. Related Work
3. Proposed Group Medical Devices Authentication and Data Masking Framework
- Medical Devices: The MDs are wearable devices used by patients on hospital premises. These MDs collect data from patients’ bodies for further analysis by doctors or other experts. Each MD is equipped with a PUF and also stores a unique challenge. The MDs are connected to the hospital network.
- Edge Router: The ER is the gateway of the hospital, which has enough processing power to handle multiple requests and perform many tasks at the same time. It is not a limited-resources device like an MD. It is responsible for network handling, maintaining MDs’ authentication processes, data masking, etc. Like MDs, it is also equipped with a PUF. Moreover, an ML model is stored in the ER to control the PUF.
- Cloud Server: The CS is the central element for making the decision and storing any kind of data. The CS stores the authentication parameters of the MDs. It is the only trusted element in the network. It is the most powerful device in the IoMT network. It is responsible for authenticating MDs and retrieving data. After the extraction of data, it stores the data in a secure database (SDB) through a secure channel. Moreover, the SDB stores the pseudoidentity () of each MD and ERs. Furthermore, two ML models are stored in the SDB for authentication purposes.
- PUF controlling model: The PUF used in the method is a controlled PUF or MC-PUF [45]. and timestamp () are used as the input features, and the partial challenge is the output feature of the model. This ML model is stored in both the EG and the SDB. The model is called .
- Device prediction model: This model is responsible for identifying the MDs. The CRPs of the group of MDs are collected and trained. The CRPs are the input features of the model and the MDs identity are the output feature. This model is stored in the SDB for identifying the s of the MDs. The model is named .
3.1. Assumptions
- Each MD and the ER of the group need to be incorporated in the PUF module.
- The model which is stored in the ER for partially controlling the group of MDs is not modified.
- The ER is already authenticated prior to the MD group validation process.
- The stored challenge in the ER is updated periodically.
- The PUFs used are strong and reliable PUFs. The PUFs are not affected by noise and external parameters.
- The secure connection between the CS and the SDB is uninterrupted.
- No impact on CS and SDB is considered in the method.
- s, s, CRPs, and models are stored in the trusted SDB only.
- The group of MDs are enrolled at the same time. If any modification in the group is required, the model of the CS is updated. Moreover, the ER is updated with the required data of the new MD. After successful updating, the MD is included in the group.
3.2. Edge Router Enrollment
- training: The CS trains the stored in the SDB. Moreover, it shares the model with the ER. After that, the ER receives the and a secret response for each MD.
- Encryption of credentials: The ER first selects a secret challenge and stores it. The incorporated PUF of the ER generates using the challenge . The is used as the encryption key to encrypt the s and the secret responses of the MDs. After encryption, the ER transfers the to the CS for storing purposes in the SDB.
Algorithm 1 Edge router secure registration process. |
|
3.3. Group of Medical Devices Enrollment
- Prediction and challenge collection: The stored uses different timestamps and s to generate challenges for each MD. The different sets of challenges are sent to the different MDs.
- PUF response generation and training: Each MD generates responses using the received set of challenges using the incorporated PUF in each MD. Each MD shares the set of CRPs with the CS. After receiving all the CRPs from each MD, the CS trains and stores it in the SDB.
Algorithm 2 Secure registration process of a group of medical devices. |
|
3.4. Proposed Group Devices Authentication and Data Masking
- Request for response generation: Authentication starts in the ER with the secret response generation by sending the stored challenge to the incorporated PUF in the ER. The ER uses the response to decrypt the stored secret message to find out the s of the group of MDs and the secret response of each MD. After this, the ER uses to generate a partial challenge. and act as input features of the model. A random nonce is concatenated with the partial challenge, then an XOR operation is performed with each secret response of each MD. The output of each XOR operation is shared with the corresponding MD.
- Response sharing by MDs: Each MD generates its secret response using the stored challenge. By performing an XOR operation, MDs get the partial challenge and random nonce. Each MD finds out the complete challenge by combining the received partial challenge from the ER and its own PID. The MDs generate the response using the PUF to validate the identity of the MD. The collected data and the random nonce are concatenated and an XOR operation is performed.
- Authentication request and data masking: The ER separates the responses and data using concatenation and an XOR operation using the nonce. The ER calculates using s, completed challenges, and data. Here, XOR operations are performed to mask all the information. is calculated by performing hash operations of partial challenges, the response of the ER, and data. Moreover, responses are concatenated to define and the PIDs of all the MDs and the ER are calculated and a hash is made to find out . , , , and are sent to the CS.
- Device authentication and retrieving data: After receiving a request from the ER, the CS runs the to predict partial challenges like the ER and also calculates the complete challenges. Both challenges and responses act as input features of the to predict the s to verify the identity. is verified to complete the initial verification of the MDs and the ER. Using the challenges, s, and , the data of the MDs are extracted. The retrieved data are verified if the calculated matches the received . This completes the group of MDs’ authentication and data retrieving process.
Algorithm 3 Group of devices’ authentication and secure data transfer. |
|
3.5. Encryption Key Update Process of the Edge Router
- New secret key generation: The ER selects a new challenge and generates response using the PUF. It decrypts the stored message using the previous secret response and encrypts it again using the new generated response.
- Updating secret key: The ER uses the XOR operation between and and transfers the result to the CS using a public channel. After receiving the message, the CS uses the XOR operation to get the new secret key of the ER and stores it in the SDB.
Algorithm 4 Edge router encryption key update process. |
|
4. Results
4.1. Machine Learning Performance
4.2. Computation Cost
4.3. Communication Overhead
4.4. Performance Comparison
5. Security Proof
5.1. Formal Security Proof
5.1.1. Notations
- P believes X (P |≡ X): P either believes or has the ability to think that the formula X is true.
- P sees X (P ◃ X): P either already believes or has a substantial basis for believing that the phrase X is true.
- P once sent X (P |∼ X): Although object P has already sent a message containing statement X, it is unclear if the information was sent there at the time of the process or in the past. However, in this instance, it is clear that P believes X.
- Fresh X (#(X)): communication X is regarded as new because it has not been addressed before the current transmission period.
- P has complete control over X (P X): this happens when P has entire authority over function X and it is used in accordance with the authority’s instructions.
- Secret key between P and Q (P Q): this implies that only P and Q are aware of the secret code or methods X.
5.1.2. Inference Rules
- ∘
- : <Nonce-Verification Rule>
- ∘
- : <Jurisdiction Rule>
- ∘
- : <Key Freshness Rule>
- ∘
- : <Shared Key Rule>
- ∘
- : <Secret Key Sharing Rule>
5.1.3. Initial Assumptions
- ∘
- : CS |≡ CS ER
- ∘
- : MD1 |≡ CS ER
- ∘
- : CS |≡ CS MD1
- ∘
- : MD1 |≡ CS MD1
- ∘
- : ER |≡ ER MD1
- ∘
- : MD1 |≡ ER MD1
- ∘
- : CS |≡ CS ER
- ∘
- : ER |≡ CS ER
5.1.4. Idealized Form
- ∘
- : ER → MD1: {, , #(, )}
- ∘
- : MD1 → ER: {, , #(, )}
- ∘
- : ER → CS: {, , , , , , , #(, , , )}
5.1.5. Goals of Proposed Framework
- ∘
- : ER |≡ MD1 |≡<ER MD1>
- ∘
- : CS |≡ MD1 |≡<CS MD1>
5.1.6. Formal Verification Proof
5.2. Informal Security Proof
5.2.1. Impersonation Attacks
5.2.2. Side-Channel Attacks
5.2.3. Modeling Attacks
5.2.4. Physical Attacks
5.2.5. Dos Attacks
5.2.6. Replay Attack
5.2.7. Eavesdropping Attack
5.2.8. Man-in-the-Middle Attack
5.2.9. Anonymous Identity
5.2.10. Forward Secrecy
6. Conclusions and Future Directions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Bajic, B.; Rikalovic, A.; Suzic, N.; Piuri, V. Industry 4.0 implementation challenges and opportunities: A managerial perspective. IEEE Syst. J. 2021, 15, 546–559. [Google Scholar] [CrossRef]
- Rikalovic, A.; Suzic, N.; Bajic, B.; Piuri, V. Industry 4.0 implementation challenges and opportunities: A technological perspective. IEEE Syst. J. 2022, 16, 2797–2810. [Google Scholar] [CrossRef]
- Sadhu, P.K.; Yanambaka, V.P.; Mohanty, S.P.; Kougianos, E. Easy-Sec: PUF-based rapid and robust authentication framework for the internet of vehicles. arXiv 2022, arXiv:2204.07709. [Google Scholar]
- Khan, M.A.; Siddiqui, M.S.; Rahmani, M.K.I.; Husain, S. Investigation of big data analytics for sustainable smart city development: An emerging country. IEEE Access 2022, 10, 16028–16036. [Google Scholar] [CrossRef]
- Khalil, U.; Mueen-Uddin; Malik, O.A.; Hussain, S. A blockchain footprint for authentication of IoT-enabled smart devices in smart cities: State-of-the-art advancements, challenges and future research directions. IEEE Access 2022, 10, 76805–76823. [Google Scholar] [CrossRef]
- Sadhu, P.; Yanambaka, V.P.; Abdelgawad, A.; Yelamarthi, K. NAHAP: PUF-based three factor authentication system for internet of medical things. IEEE Consum. Electron. Mag. 2022. [Google Scholar] [CrossRef]
- Hernandez, S.; Raison, M.; Torres, A.; Gaudet, G.; Achiche, S. From on-body sensors to in-body data for health monitoring and medical robotics: A survey. In Proceedings of the Global Information Infrastructure and Networking Symposium (GIIS), Montreal, QC, Canada, 15–19 September 2014; pp. 1–5. [Google Scholar]
- Noguchi, H.; Mori, T.; Sato, T. Framework for search application based on time segment of sensor data in home environment. In Proceedings of the Seventh International Conference on Networked Sensing Systems (INSS), Kassel, Germany, 15–18 June 2010; pp. 261–264. [Google Scholar]
- Internet of Medical Things (IoMT) Market by Component, Platform, Connectivity Devices, Application and Is Expected to Reach USD 1,84,592.31 Million by 2028. Available online: https://www.marketwatch.com/press-release/internet-of-medical-things-iomt-market-by-component-platform-connectivity-devices-application-and-is-expected-to-reach-usd-18459231-million-by-2028-2022-04-26 (accessed on 22 June 2022).
- Internet of Medical Things Revolutionizing Healthcare. Available online: https://aabme.asme.org/posts/internet-of-medical-things-revolutionizing-healthcare/ (accessed on 1 April 2021).
- What Is the Internet of Medical Things (IoMT)? Available online: https://mobius.md/2019/03/06/what-is-the-iomt/ (accessed on 22 June 2022).
- Sadhu, P.K.; Yanambaka, V.P.; Abdelgawad, A.; Yelamarthi, K. Prospect of internet of medical things: A review on security requirements and solutions. Sensors 2022, 22, 5517. [Google Scholar] [CrossRef]
- Meng, W.; Cai, Y.; Yang, L.T.; Chiu, W.Y. Hybrid emotion-aware monitoring system based on brainwaves for internet of medical things. IEEE Internet Things J. 2021, 8, 16014–16022. [Google Scholar] [CrossRef]
- Masud, M.; Gaba, G.S.; Alqahtani, S.; Muhammad, G.; Gupta, B.B.; Kumar, P.; Ghoneim, A. A lightweight and robust secure key establishment protocol for internet of medical things in COVID-19 patients care. IEEE Internet Things J. 2021, 8, 15694–15703. [Google Scholar] [CrossRef]
- Healthcare IT sEcurity Budgets Aren’T Keeping Pace with IoMT Threats. Available online: https://www.ivanti.com/blog/healthcare-it-security-budgets-aren-t-keeping-pace-with-iomt-threats (accessed on 10 October 2022).
- Chen, C.M.; Chen, Z.; Kumari, S.; Lin, M.C. LAP-IoHT: A lightweight authentication protocol for the internet of health things. Sensors 2022, 22, 5401. [Google Scholar] [CrossRef]
- Elmitwalli, E.; Ni, K.; Köse, S. Machine learning attack resistant area-efficient reconfigurable Ising-PUF. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 2022, 30, 526–538. [Google Scholar] [CrossRef]
- Wang, A.; Tan, W.; Wen, Y.; Lao, Y. NoPUF: A novel PUF design framework toward modeling attack resistant PUFs. IEEE Trans. Circuits Syst. I Regul. Pap. 2021, 68, 2508–2521. [Google Scholar] [CrossRef]
- Kroeger, T.; Cheng, W.; Guilley, S.; Danger, J.L.; Karimi, N. Assessment and mitigation of power side-channel-based cross-PUF attacks on arbiter-PUFs and their derivatives. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 2022, 30, 187–200. [Google Scholar] [CrossRef]
- Wisiol, N.; Thapaliya, B.; Mursi, K.T.; Seifert, J.P.; Zhuang, Y. Neural network modeling attacks on arbiter-PUF-based designs. IEEE Trans. Inf. Forensics Secur. 2022, 17, 2719–2731. [Google Scholar] [CrossRef]
- Olowononi, F.O.; Rawat, D.B.; Liu, C. Resilient machine learning for networked cyber physical systems: A survey for machine learning security to securing machine learning for CPS. IEEE Commun. Surv. Tutor. 2021, 23, 524–552. [Google Scholar] [CrossRef]
- Al-Dhief, F.T.; Latiff, N.M.A.; Malik, N.N.N.A.; Salim, N.S.; Baki, M.M.; Albadr, M.A.A.; Mohammed, M.A. A survey of voice pathology surveillance systems based on internet of things and machine learning algorithms. IEEE Access 2020, 8, 64514–64533. [Google Scholar] [CrossRef]
- Habib, M.; Wang, Z.; Qiu, S.; Zhao, H.; Murthy, A.S. Machine learning based healthcare system for investigating the association between depression and quality of life. IEEE J. Biomed. Health Inform. 2022, 26, 2008–2019. [Google Scholar] [CrossRef]
- Guezzaz, A.; Asimi, Y.; Azrour, M.; Asimi, A. Mathematical validation of proposed machine learning classifier for heterogeneous traffic and anomaly detection. Big Data Min. Anal. 2021, 4, 18–24. [Google Scholar] [CrossRef]
- Li, J.; Su, Z.; Guo, D.; Choo, K.K.R.; Ji, Y. PSL-MAAKA: Provably secure and lightweight mutual authentication and key agreement protocol for fully public channels in internet of medical things. IEEE Internet Things J. 2021, 8, 13183–13195. [Google Scholar] [CrossRef]
- Amintoosi, H.; Nikooghadam, M.; Shojafar, M.; Kumari, S.; Alazab, M. Slight: A lightweight authentication scheme for smart healthcare services. Comput. Electr. Eng. 2022, 99, 107803. [Google Scholar] [CrossRef]
- Siddiqi, M.A.; Doerr, C.; Strydis, C. IMDfence: Architecting a secure protocol for implantable medical devices. IEEE Access 2020, 8, 147948–147964. [Google Scholar] [CrossRef]
- Hwang, Y.W.; Lee, I.Y. A study on CP-ABE-based medical data sharing system with key abuse prevention and verifiable outsourcing in the IoMT environment. Sensors 2020, 20, 4934. [Google Scholar] [CrossRef] [PubMed]
- Liu, X.; Yang, X.; Luo, Y.; Zhang, Q. Verifiable multi-keyword Search encryption scheme with anonymous key generation for medical internet of things. IEEE Internet Things J. 2021, 9, 22315–22326. [Google Scholar] [CrossRef]
- Li, H.; Yu, K.; Liu, B.; Feng, C.; Qin, Z.; Srivastava, G. An efficient ciphertext-policy weighted attribute-based encryption for the internet of health things. IEEE J. Biomed. Health Inform. 2022, 26, 1949–1960. [Google Scholar] [CrossRef] [PubMed]
- Huang, P.; Guo, L.; Li, M.; Fang, Y. Practical privacy-preserving ECG-based authentication for IoT-based healthcare. IEEE Internet Things J. 2019, 6, 9200–9210. [Google Scholar] [CrossRef]
- Ying, B.; Mohsen, N.R.; Nayak, A.A. Efficient authentication protocol for continuous monitoring in medical sensor networks. IEEE Open J. Comput. Soc. 2021, 2, 130–138. [Google Scholar] [CrossRef]
- Ryu, J.; Oh, J.; Kwon, D.; Son, S.; Lee, J.; Park, Y.; Park, Y. Secure ECC-based three-factor mutual authentication protocol for telecare medical information system. IEEE Access 2022, 10, 11511–11526. [Google Scholar] [CrossRef]
- Al-Zubaidie, M.; Zhang, Z.; Zhang, J. RAMHU: A new robust lightweight scheme for mutual users authentication in healthcare applications. Secur. Commun. Netw. 2019, 2019, 3263902. [Google Scholar] [CrossRef]
- Padinjappurathu Gopalan, S.; Chowdhary, C.L.; Iwendi, C.; Farid, M.A.; Ramasamy, L.K. An efficient and privacy-preserving scheme for disease prediction in modern healthcare systems. Sensors 2022, 22, 5574. [Google Scholar] [CrossRef]
- de Marcos, L.; Martínez-Herráiz, J.J.; Junquera-Sánchez, J.; Cilleruelo, C.; Pages-Arévalo, C. Comparing machine learning classifiers for continuous authentication on mobile devices by keystroke dynamics. Electronics 2021, 10, 1622. [Google Scholar] [CrossRef]
- Wazid, M.; Singh, J.; Das, A.K.; Shetty, S.; Khan, M.K.; Rodrigues, J.J. ASCP-IoMT: AI-enabled lightweight secure communication protocol for internet of medical things. IEEE Access 2022, 10, 57990–58004. [Google Scholar] [CrossRef]
- Alladi, T.; Chamola, V.; Naren. HARCI: A two-way authentication protocol for three entity healthcare IoT networks. IEEE J. Sel. Areas Commun. 2021, 39, 361–369. [Google Scholar] [CrossRef]
- Gope, P.; Gheraibia, Y.; Kabir, S.; Sikdar, B. A secure IoT-based modern healthcare system with fault-tolerant decision making process. IEEE J. Biomed. Health Inform. 2021, 25, 862–873. [Google Scholar] [CrossRef] [PubMed]
- Lee, T.F.; Ye, X.; Lin, S.H. Anonymous dynamic group authenticated key agreements using physical unclonable functions for internet of medical things. IEEE Internet Things J. 2022, 9, 15336–15348. [Google Scholar] [CrossRef]
- Awad Abdellatif, A.; Samara, L.; Mohamed, A.; Erbad, A.; Chiasserini, C.F.; Guizani, M.; O’Connor, M.D.; Laughton, J. MEdge-Chain: Leveraging edge computing and blockchain for efficient medical data exchange. IEEE Internet Things J. 2021, 8, 15762–15775. [Google Scholar] [CrossRef]
- Lin, P.; Song, Q.; Yu, F.R.; Wang, D.; Guo, L. Task offloading for wireless VR-enabled medical treatment with blockchain security using collective reinforcement learning. IEEE Internet Things J. 2021, 8, 15749–15761. [Google Scholar] [CrossRef]
- Egala, B.S.; Pradhan, A.K.; Badarla, V.R.; Mohanty, S.P. Fortified-chain: A blockchain-based framework for security and privacy-assured internet of medical things with effective access control. IEEE Internet Things J. 2021, 8, 11717–11731. [Google Scholar] [CrossRef]
- Wang, W.; Chen, Q.; Yin, Z.; Srivastava, G.; Gadekallu, T.R.; Alsolami, F.; Su, C. Blockchain and PUF-based lightweight authentication protocol for wireless medical sensor networks. IEEE Internet Things J. 2022, 9, 8883–8891. [Google Scholar] [CrossRef]
- Sadhu, P.K.; Yanambaka, V.P. MC-PUF: A robust lightweight controlled physical unclonable function for resource constrained environments. In Proceedings of the IEEE Computer Society Annual Symposium on VLSI (ISVLSI), Nicosia, Cyprus, 4–6 July 2022; pp. 452–453. [Google Scholar] [CrossRef]
- Alladi, T.; Chakravarty, S.; Chamola, V.; Guizani, M. A lightweight authentication and attestation scheme for in-transit vehicles in IoV scenario. IEEE Trans. Veh. Technol. 2020, 69, 14188–14197. [Google Scholar] [CrossRef]
- Pravinchandra, M.M.; Diwanji, H.M.; Shah, J.S.; Kotak, H. Performace analysis of encryption and decryption using genetic based cancelable non-invertible fingerprint based key in MANET. In Proceedings of the International Conference on Communication Systems and Network Technologies, Rajkot, India, 11–13 May 2012; pp. 357–361. [Google Scholar] [CrossRef]
- Sadhu, P.K.; Yanambaka, V.P.; Abdelgawad, A. MC-Multi PUF based lightweight authentication framework for internet of medical things. In Proceedings of the IEEE 8th World Forum on Internet of Things (WF-IoT), Yokohama, Japan, 26 October–11 November 2022; pp. XX–YY. [Google Scholar]
- Burrows, M.; Abadi, M.; Needham, R. A logic of authentication. ACM Trans. Comput. Syst. 1990, 8, 18–36. [Google Scholar] [CrossRef]
- Yao, J.; Pang, L.; Su, Y.; Zhang, Z.; Yang, W.; Fu, A.; Gao, Y. Design and evaluate recomposited OR-AND-XOR-PUF. IEEE Trans. Emerg. Top. Comput. 2022, 10, 662–677. [Google Scholar] [CrossRef]
- Li, X.; Peng, J.; Obaidat, M.S.; Wu, F.; Khan, M.K.; Chen, C. A secure three-factor user authentication protocol with forward secrecy for wireless medical sensor network systems. IEEE Syst. J. 2020, 14, 39–50. [Google Scholar] [CrossRef]
- Yıldız, H.; Cenk, M.; Onur, E. PLGAKD: A PUF-based lightweight group authentication and key distribution protocol. IEEE Internet Things J. 2021, 8, 5682–5696. [Google Scholar] [CrossRef]
Author | Objective | Technique Used | Pros | Cons |
---|---|---|---|---|
Li et al. [25] | Reduce complexity and secure communication | PKI | Lightweight scheme | Much time and storage required |
Siddiqi et al. [27] | Security protocol for IMD ecosystem | MAC | 7% energy consumption | No user anonymity |
Hwang et al. [28] | Improve CP-ABE-based scheme | CP-ABE | Resolves key abuse problem | PHI leakage |
Liu et al. [29] | Achieve data SNP preservation | ABE | Major decryption on server side | Complex |
Huang et al. [31] | Protection from unauthorized entity | ECG | Remove noise, light algorithm | No anonymous identity |
Ying et al. [32] | Secure communication | ECC | Low computational time | High communication overhead |
Ryu et al. [33] | Robust authentication | ECC | Used biometrics along with stored parameter | Unused parameters |
Wazid et al. [37] | Secure communication among devices, personal server, and cloud server | AI | Low end-to-end delay | Low accuracy |
Alladi et al. [38] | To achieve physical security | PUF | Low computation time | Unstable CRP can cause failure |
Gope et al. [39] | Secure and efficient authentication | PUF | Less computation at server | Two CRPs per transaction |
Lee et al. [40] | Establish group key agreement | PUF | Simple | Two new devices cannot take part at a time |
Abdellatif et al. [41] | Process large quantities of medical data | Blockchain | Remote monitoring, different actions for different data | Security is not focused |
Egala et al. [43] | Efficient secure exchange for decentralized network | Blockchain and ECC | Low energy, fast response | Ring tamper resistance instead of device |
Wang et al. [44] | To build a reliable communication channel for healthcare | Blockchain (PoW) and PUF | Low cost | Storage cost |
Acronym | Full Form | Acronym | Full Form |
---|---|---|---|
MD | IoMT device | PUF | Physical unclonable function |
ER | Edge router | CS | Cloud server |
SDB | Secure database | Pseudoidentity | |
PUF controlling model | Device prediction model | ||
Challenge of MDs | Response of MDs | ||
Stored challenge in MDs | Stored response in MDs | ||
Stored challenge in ER | Stored response in ER | ||
Partial challenge | MD’s generated response | ||
Timestamp | Health data | ||
Y encrypted using E | Y decrypted using E | ||
→ | CRP generation | ⟶ | Data transfer |
↦ | ML model prediction | ⊧ | Model training |
H | Hash operation | ⊕ | XOR operation |
∈ | Store operation | ? | Validation checking |
Concatenation operation | × | Delete operation |
Units | Z-Score | Activation Function | Optimizer | Validation Accuracy |
---|---|---|---|---|
512-4096-4096-2048-1204 | ✗ | ReLU | Adam | 81.39 |
512-4096-4096-2048-1204 | ✓ | ReLU | RMSProp | 97.35 |
512-1024-1024-512-248 | ✗ | ReLU | RMSProp | 96.55 |
512-1024-1024-512-248 | ✓ | ReLU | RMSProp | 96.7 |
512-1024-1024-512-248 | ✓ | ReLU | Adam | 98.2 |
512-1024-1024-512-248 | ✓ | ReLU | Nadam | 96.65 |
512-4096-4096-2048-1204 | ✓ | tanh | RMSProp | 97.35 |
512-2048-1024-512 | ✓ | ReLU | RMSProp | 97.58 |
512-2048-1024-512 | ✓ | ReLU | Adam | 94.97 |
512-2048-1024-512 | ✓ | tanh | Adam | 97.9 |
512-2048-1024-512 | ✓ | tanh | RMSProp | 97.48 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Sadhu, P.K.; Yanambaka, V.P.; Abdelgawad, A. Physical Unclonable Function and Machine Learning Based Group Authentication and Data Masking for In-Hospital Segments. Electronics 2022, 11, 4155. https://doi.org/10.3390/electronics11244155
Sadhu PK, Yanambaka VP, Abdelgawad A. Physical Unclonable Function and Machine Learning Based Group Authentication and Data Masking for In-Hospital Segments. Electronics. 2022; 11(24):4155. https://doi.org/10.3390/electronics11244155
Chicago/Turabian StyleSadhu, Pintu Kumar, Venkata P. Yanambaka, and Ahmed Abdelgawad. 2022. "Physical Unclonable Function and Machine Learning Based Group Authentication and Data Masking for In-Hospital Segments" Electronics 11, no. 24: 4155. https://doi.org/10.3390/electronics11244155
APA StyleSadhu, P. K., Yanambaka, V. P., & Abdelgawad, A. (2022). Physical Unclonable Function and Machine Learning Based Group Authentication and Data Masking for In-Hospital Segments. Electronics, 11(24), 4155. https://doi.org/10.3390/electronics11244155