An AI-Enabled Hybrid Lightweight Authentication Scheme for Intelligent IoMT Based Cyber-Physical Systems
In the era of smart healthcare, Internet of Medical Things-based Cyber-Physical Systems (IoMT-based-CPS) play an important role in acquiring, evaluating, monitoring, tracking, and prescribing patients ubiquitously. For these applications, trustworthy authentication and unassailable communication are...
Saved in:
Published in | IEEE transactions on network science and engineering Vol. 10; no. 5; pp. 2719 - 2730 |
---|---|
Main Authors | , , , , , |
Format | Journal Article |
Language | English |
Published |
Piscataway
IEEE
01.09.2023
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | In the era of smart healthcare, Internet of Medical Things-based Cyber-Physical Systems (IoMT-based-CPS) play an important role in acquiring, evaluating, monitoring, tracking, and prescribing patients ubiquitously. For these applications, trustworthy authentication and unassailable communication are the most noteworthy impediments to be considered to attain the trust of patients, healthcare experts, nursing staff, pharmacologists, and other involved commodities. To address these security concerns, in this paper, we present a lightweight hybrid authentication, data privacy and preservation model that is constituted from supervised machine learning (SML) algorithm and a Cryptographic Parameter Based Encryption and Decryption (CPBE&D) algorithm to guarantee the authentication of legitimate IoMT-based-CPS accompanied by encrypted data transmission over the wireless communication channel. To accomplish promising results, we have facilitated a decentralized verification and authentication among legitimate IoMT-based-CPS in the network with an objective to reduce the authentication time, computation cost, and communication overhead with the assistance of the SML algorithm to predicate and forward the authentication parameters of these devices to the next concerned trusted authority when a patient is moving from one hospital (region) to another hospital (region). During the simulation results analysis, SML and CPBE&D authentication scheme demonstrated impressive security features in terms of cost-effective authentication throughout the legitimate patient wearable IoMT-based-CPS validation process, accompanied by profitable communication metrics in the comparison of predecessor works. |
---|---|
AbstractList | In the era of smart healthcare, Internet of Medical Things-based Cyber-Physical Systems (IoMT-based-CPS) play an important role in acquiring, evaluating, monitoring, tracking, and prescribing patients ubiquitously. For these applications, trustworthy authentication and unassailable communication are the most noteworthy impediments to be considered to attain the trust of patients, healthcare experts, nursing staff, pharmacologists, and other involved commodities. To address these security concerns, in this paper, we present a lightweight hybrid authentication, data privacy and preservation model that is constituted from supervised machine learning (SML) algorithm and a Cryptographic Parameter Based Encryption and Decryption (CPBE&D) algorithm to guarantee the authentication of legitimate IoMT-based-CPS accompanied by encrypted data transmission over the wireless communication channel. To accomplish promising results, we have facilitated a decentralized verification and authentication among legitimate IoMT-based-CPS in the network with an objective to reduce the authentication time, computation cost, and communication overhead with the assistance of the SML algorithm to predicate and forward the authentication parameters of these devices to the next concerned trusted authority when a patient is moving from one hospital (region) to another hospital (region). During the simulation results analysis, SML and CPBE&D authentication scheme demonstrated impressive security features in terms of cost-effective authentication throughout the legitimate patient wearable IoMT-based-CPS validation process, accompanied by profitable communication metrics in the comparison of predecessor works. |
Author | Attique, Muhammad Song, Houbing Farouk, Ahmed Jadoon, Muhammad Mohsin Khan, Muhammad Khurram Adil, Muhammad |
Author_xml | – sequence: 1 givenname: Muhammad orcidid: 0000-0002-2906-7802 surname: Adil fullname: Adil, Muhammad email: muhammad.adil@ieee.org organization: Global Foundation for Cyber Studies and Research, Washington, DC, USA – sequence: 2 givenname: Muhammad Khurram orcidid: 0000-0001-6636-0533 surname: Khan fullname: Khan, Muhammad Khurram email: mkhurram@ksu.edu.sa organization: Center of Excellence in Information Assurance, King Saud University, Riyadh, Saudi Arabia – sequence: 3 givenname: Muhammad Mohsin orcidid: 0000-0002-8242-4581 surname: Jadoon fullname: Jadoon, Muhammad Mohsin email: muhammedmohsin.khan@yale.edu organization: Department of Radiology and imaging, Yale University, New Haven, CT, USA – sequence: 4 givenname: Muhammad orcidid: 0000-0002-7237-180X surname: Attique fullname: Attique, Muhammad email: attique@sejong.ac.kr organization: Department of Software, Sejong University, Seoul, South Korea – sequence: 5 givenname: Houbing orcidid: 0000-0003-2631-9223 surname: Song fullname: Song, Houbing email: h.song@ieee.org organization: Department of Electrical Engineering and Computer Science, Embry-Riddle Aeronautical University, Daytona Beach, FL, USA – sequence: 6 givenname: Ahmed orcidid: 0000-0001-8702-7342 surname: Farouk fullname: Farouk, Ahmed email: ahmed.farouk@sci.svu.edu.eg organization: Department of Computer Science, Faculty of Computers and Artificial Intelligence, South Valley University, Hurghada, Egypt |
BookMark | eNp9kc9PwjAUgBujiYj8AcZLE8_Drh0dPSJBIcEfCZh4W7rulZWMDdsSs__eTogHD17ea9N-7-V97wqd100NCN3EZBjHRNyvX1azISWUDlk8EiPKz1CPMpZEjIqP8-5M0yjhIr1EA-e2hJCYjjljrIfKSY0ni2hWy7yCAs_b3JoCL82m9F_QRTw5-BJqb5T0pqnxSpWwA6wbixe1h6oym_CKF83zGj9IF2pM2xxs9Fa2LjAVXrXOw85dowstKweDU-6j98fZejqPlq9Pi-lkGSkqmI8gKUaasgJUrkRBZRFzwsaaaA6JgFRTDrnMOc9VUmg9Dvc0RMUkk2OlOWd9dHesu7fN5wGcz7bNwdahZRZm5okg3eB9FB9_Kds4Z0Fne2t20rZZTLLOadY5zTqn2clpYNI_jDL-R4q30lT_krdH0gDAbyeRspSFNXwDJq-HjA |
CODEN | ITNSD5 |
CitedBy_id | crossref_primary_10_1109_ACCESS_2024_3407376 crossref_primary_10_22399_ijcesen_625 crossref_primary_10_1007_s11227_024_06026_8 crossref_primary_10_2147_JMDH_S429071 crossref_primary_10_1109_IOTM_001_2300276 crossref_primary_10_1109_TCSS_2022_3198123 crossref_primary_10_55544_ijrah_1_1_14 crossref_primary_10_1109_JIOT_2024_3486659 crossref_primary_10_1155_2022_6595799 crossref_primary_10_1109_TIV_2023_3309548 crossref_primary_10_1007_s12083_024_01636_8 crossref_primary_10_3390_fi16110430 crossref_primary_10_1007_s12083_022_01429_x crossref_primary_10_3390_su141710666 crossref_primary_10_4108_eetsis_vi_1947 crossref_primary_10_1007_s11042_023_15592_7 |
Cites_doi | 10.1016/j.comnet.2020.107707 10.1109/ICCSPA49915.2021.9385711 10.1109/TEM.2021.3097117 10.1109/ACCESS.2020.2977968 10.1109/ICICCT.2017.7975247 10.1109/TDSC.2018.2828306 10.1109/ACCESS.2019.2941575 10.1109/TGCN.2021.3077318 10.1109/MCOM.2018.1700809 10.46586/tches.v2019.i4.154-179 10.1109/JIOT.2021.3080461 10.1109/MM.2021.3112264 10.1109/ACCESS.2019.2935782 10.1016/j.comcom.2021.02.002 10.1109/ACCESS.2018.2880898 10.1109/TNSE.2020.3040407 10.1109/ACCESS.2017.2694044 10.1109/MCI.2019.2937613 10.1109/TNSM.2019.2945254 10.1109/JIOT.2018.2847733 10.1109/JIOT.2019.2923261 10.1109/TII.2021.3100873 10.1109/ACCESS.2017.2738069 10.1109/ACCESS.2020.3011503 10.1109/TCC.2019.2936481 10.1109/TNSE.2019.2932727 10.1109/TVCG.2020.3030354 10.1007/s40860-018-0062-5 |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2023 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2023 |
DBID | 97E RIA RIE AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D |
DOI | 10.1109/TNSE.2022.3159526 |
DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | CrossRef Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace ProQuest Computer Science Collection Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Computer and Information Systems Abstracts |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 2334-329X |
EndPage | 2730 |
ExternalDocumentID | 10_1109_TNSE_2022_3159526 9737386 |
Genre | orig-research |
GrantInformation_xml | – fundername: King Saud University grantid: RSP-2021/12 funderid: 10.13039/501100002383 |
GroupedDBID | 0R~ 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABJNI ABQJQ ABVLG AGQYO AGSQL AHBIQ AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ EBS EJD IEDLZ IFIPE IPLJI JAVBF M43 OCL PQQKQ RIA RIE AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c293t-e4d5f23decbc9d2ad16038f0f6e49e7f26ebab66bc4dff8f267f8fc3a3a8cf663 |
IEDL.DBID | RIE |
ISSN | 2327-4697 |
IngestDate | Mon Jun 30 08:24:25 EDT 2025 Tue Jul 01 03:10:44 EDT 2025 Thu Apr 24 22:51:59 EDT 2025 Wed Aug 27 02:47:58 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 5 |
Language | English |
License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html https://doi.org/10.15223/policy-029 https://doi.org/10.15223/policy-037 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c293t-e4d5f23decbc9d2ad16038f0f6e49e7f26ebab66bc4dff8f267f8fc3a3a8cf663 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0003-2631-9223 0000-0002-7237-180X 0000-0002-2906-7802 0000-0001-6636-0533 0000-0002-8242-4581 0000-0001-8702-7342 |
PQID | 2866490633 |
PQPubID | 2040409 |
PageCount | 12 |
ParticipantIDs | ieee_primary_9737386 crossref_primary_10_1109_TNSE_2022_3159526 crossref_citationtrail_10_1109_TNSE_2022_3159526 proquest_journals_2866490633 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2023-09-01 |
PublicationDateYYYYMMDD | 2023-09-01 |
PublicationDate_xml | – month: 09 year: 2023 text: 2023-09-01 day: 01 |
PublicationDecade | 2020 |
PublicationPlace | Piscataway |
PublicationPlace_xml | – name: Piscataway |
PublicationTitle | IEEE transactions on network science and engineering |
PublicationTitleAbbrev | TNSE |
PublicationYear | 2023 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref13 ref12 ref15 ref14 ref31 ref30 ref11 ref10 ref2 ref1 ref17 ref16 ref18 cramer (ref28) 0 guo (ref19) 2019; 11 ref24 ref23 ref25 ref20 ref22 ref21 ref27 ref29 ref8 ref7 ref9 ref4 ref3 ref6 ref5 mubarakali (ref26) 2021 |
References_xml | – ident: ref2 doi: 10.1016/j.comnet.2020.107707 – ident: ref12 doi: 10.1109/ICCSPA49915.2021.9385711 – ident: ref16 doi: 10.1109/TEM.2021.3097117 – ident: ref22 doi: 10.1109/ACCESS.2020.2977968 – ident: ref11 doi: 10.1109/ICICCT.2017.7975247 – ident: ref14 doi: 10.1109/TDSC.2018.2828306 – ident: ref20 doi: 10.1109/ACCESS.2019.2941575 – ident: ref10 doi: 10.1109/TGCN.2021.3077318 – ident: ref8 doi: 10.1109/MCOM.2018.1700809 – ident: ref29 doi: 10.46586/tches.v2019.i4.154-179 – ident: ref21 doi: 10.1109/JIOT.2021.3080461 – ident: ref3 doi: 10.1109/MM.2021.3112264 – ident: ref17 doi: 10.1109/ACCESS.2019.2935782 – start-page: 1 year: 2021 ident: ref26 article-title: An efficient authentication scheme using blockchain technology for wireless sensor networks publication-title: Wireless Pers Commun – ident: ref27 doi: 10.1016/j.comcom.2021.02.002 – ident: ref18 doi: 10.1109/ACCESS.2018.2880898 – ident: ref4 doi: 10.1109/TNSE.2020.3040407 – ident: ref24 doi: 10.1109/ACCESS.2017.2694044 – ident: ref6 doi: 10.1109/MCI.2019.2937613 – ident: ref5 doi: 10.1109/TNSM.2019.2945254 – ident: ref7 doi: 10.1109/JIOT.2018.2847733 – ident: ref9 doi: 10.1109/JIOT.2019.2923261 – ident: ref13 doi: 10.1109/TII.2021.3100873 – ident: ref30 doi: 10.1109/ACCESS.2017.2738069 – ident: ref25 doi: 10.1109/ACCESS.2020.3011503 – ident: ref15 doi: 10.1109/TCC.2019.2936481 – ident: ref1 doi: 10.1109/TNSE.2019.2932727 – start-page: 313 year: 0 ident: ref28 article-title: BLS signature scheme. Technical Report draft-boneh-bls-signature-00, Internet Engineering Task Force., Linear secret sharing schemes from error correcting codes and universal hash functions publication-title: Proc Annu Int Conf Theory Appl Cryptographic Techn – ident: ref31 doi: 10.1109/TVCG.2020.3030354 – volume: 11 start-page: 1 year: 2019 ident: ref19 article-title: Cryptanalysis of a certificateless conditional privacy-preserving authentication scheme for wireless body area networks publication-title: Int J Electron Inf Eng – ident: ref23 doi: 10.1007/s40860-018-0062-5 |
SSID | ssj0001286333 |
Score | 2.400401 |
Snippet | In the era of smart healthcare, Internet of Medical Things-based Cyber-Physical Systems (IoMT-based-CPS) play an important role in acquiring, evaluating,... |
SourceID | proquest crossref ieee |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 2719 |
SubjectTerms | AI-enabled cryptography Algorithms Authentication Communication CPBE&D validation model Cryptography Cyber-physical systems Cybersecurity Data models data privacy and preservation Data transmission digital and smart healthcare Encryption Health care Hospitals Internet of medical things Internet of Things IoMT-based-CPS authentication Lightweight Machine learning Medical services Parameters Patients Security Supervised learning Wearable computers Wireless communications |
Title | An AI-Enabled Hybrid Lightweight Authentication Scheme for Intelligent IoMT Based Cyber-Physical Systems |
URI | https://ieeexplore.ieee.org/document/9737386 https://www.proquest.com/docview/2866490633 |
Volume | 10 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LSwMxEB5qT3rwVcVqlRw8idtud7OPHGtpacUWoS30tmxmEwS1lbpF6q83yaalqIiXsIEEAt9s5pGZbwCuJSLnHoscj8rIoTqBUN2BwkmpdDFWIhWY1gmDYdib0PtpMC3B7aYWRghhks9EXX-at_xsjksdKmuwSPPwhDuwoxy3olZrK54Sh77v24fLpssa4-GooxxAz1N-acACTZ-wpXpML5UfF7DRKt0DGKzPUySTPNeXOa_j5zeqxv8e-BD2rXlJWoU8HEFJzI5hb4t0sAJPrRlp9Z2OKZrKSG-la7bIg3bSP0yclOiwmU4iKqJ5ZKRwfRVEWbekvyHwzEl_PhiTO6UEM9JecbFwHi3kxLKgn8Ck2xm3e47tt-CgUvq5I2gWSM_PBHJkmZdmugV1LF0ZCspEJL1Q8JSHIUeaSRmreaRG9FM_jVEq0-UUyrP5TJwBoYgBF36TRoGkGDQ5cz0ZUZQxxnFTplVw11AkaMnIdU-Ml8Q4JS5LNHqJRi-x6FXhZrPlrWDi-GtxRaOxWWiBqEJtjXdi_9X3RAlOSJky1fzz33ddwK5uMl9kltWgnC-W4lKZIjm_MjL4BRI43U8 |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LSwMxEB58HNSDb7E-c_Akbt1Hsrs5Vqm02hbBCt6WzWyCoLZSt4j-epNsWoqKeAkbSCDwzWYemfkG4EQhChHyxAupSjxqEgj1HSi9nCofUy1SzLZO6Pbi1j29fmAPc3A2rYWRUtrkM1k3n_Ytvxji2ITKznlieHjieVjUep8FVbXWTEQljaMock-Xgc_P-727pnYBw1B7powzQ6Awo3xsN5UfV7DVK1dr0J2cqEoneaqPS1HHz29kjf898jqsOgOTNCqJ2IA5OdiElRnawS14bAxIo-01bdlUQVofpmqLdIyb_m4jpcQEzkwaURXPI3ca2RdJtH1L2lMKz5K0h90-udBqsCCXH0KOvFsHOnE86Ntwf9XsX7Y813HBQ632S0_SgqkwKiQK5EWYF6YJdap8FUvKZaLCWIpcxLFAWiiV6nmiR4zyKE9RaeNlBxYGw4HcBUIRmZBRQBOmKLJAcD9UCUWVYpoGKq-BP4EiQ0dHbrpiPGfWLfF5ZtDLDHqZQ68Gp9MtrxUXx1-Ltwwa04UOiBocTPDO3N_6lmnBiSnXxlq09_uuY1hq9budrNPu3ezDsmk5X-WZHcBCORrLQ22YlOLIyuMXwhngmA |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=An+AI-Enabled+Hybrid+Lightweight+Authentication+Scheme+for+Intelligent+IoMT+Based+Cyber-Physical+Systems&rft.jtitle=IEEE+transactions+on+network+science+and+engineering&rft.au=Adil%2C+Muhammad&rft.au=Khan%2C+Muhammad+Khurram&rft.au=Jadoon%2C+Muhammad+Mohsin&rft.au=Attique%2C+Muhammad&rft.date=2023-09-01&rft.pub=IEEE&rft.eissn=2334-329X&rft.volume=10&rft.issue=5&rft.spage=2719&rft.epage=2730&rft_id=info:doi/10.1109%2FTNSE.2022.3159526&rft.externalDocID=9737386 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2327-4697&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2327-4697&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2327-4697&client=summon |