{"title":"A secure authentication protocol for healthcare service in IoT with Q-net based secret key generation","authors":"Rupali Mahajan, Smita Chavan, Deepika Amol Ajalkar, Balshetwar SV, Prajakta Ajay Khadkikar","doi":"10.3233/web-220104","DOIUrl":null,"url":null,"abstract":"The major intention of this research is to propose a secure authentication protocol for healthcare services in IoT based on a developed Q-Net-based secret key. Nine phases are included in the model. The sensor node, IoT device center, gateway node, and medical professional are the four entities involved in the key generation process. The designed model derived a mathematical model, which utilized hashing function, XOR, Chebyshev polynomial, passwords, encryption algorithm, secret keys, and other security operations for performing effective authentication. Here, the secret key is generated with the Deep Q-Net-based sub-key generation approach. The proposed method achieved the minimum computation time of 169xe9 ns, minimum memory usage is 71.38, and the obtained maximum detection rate is 0.957 for 64 key lengths. The secure authentication using the proposed method is accurate and improves the effectiveness of the system’s security.","PeriodicalId":42775,"journal":{"name":"Web Intelligence","volume":"41 1","pages":"0"},"PeriodicalIF":0.2000,"publicationDate":"2023-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Web Intelligence","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.3233/web-220104","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE","Score":null,"Total":0}
引用次数: 0
Abstract
The major intention of this research is to propose a secure authentication protocol for healthcare services in IoT based on a developed Q-Net-based secret key. Nine phases are included in the model. The sensor node, IoT device center, gateway node, and medical professional are the four entities involved in the key generation process. The designed model derived a mathematical model, which utilized hashing function, XOR, Chebyshev polynomial, passwords, encryption algorithm, secret keys, and other security operations for performing effective authentication. Here, the secret key is generated with the Deep Q-Net-based sub-key generation approach. The proposed method achieved the minimum computation time of 169xe9 ns, minimum memory usage is 71.38, and the obtained maximum detection rate is 0.957 for 64 key lengths. The secure authentication using the proposed method is accurate and improves the effectiveness of the system’s security.
期刊介绍:
Web Intelligence (WI) is an official journal of the Web Intelligence Consortium (WIC), an international organization dedicated to promoting collaborative scientific research and industrial development in the era of Web intelligence. WI seeks to collaborate with major societies and international conferences in the field. WI is a peer-reviewed journal, which publishes four issues a year, in both online and print form. WI aims to achieve a multi-disciplinary balance between research advances in theories and methods usually associated with Collective Intelligence, Data Science, Human-Centric Computing, Knowledge Management, and Network Science. It is committed to publishing research that both deepen the understanding of computational, logical, cognitive, physical, and social foundations of the future Web, and enable the development and application of technologies based on Web intelligence. The journal features high-quality, original research papers (including state-of-the-art reviews), brief papers, and letters in all theoretical and technology areas that make up the field of WI. The papers should clearly focus on some of the following areas of interest: a. Collective Intelligence[...] b. Data Science[...] c. Human-Centric Computing[...] d. Knowledge Management[...] e. Network Science[...]