2022
DOI: 10.3390/s22197655
|View full text |Cite
|
Sign up to set email alerts
|

Using Machine Learning for Dynamic Authentication in Telehealth: A Tutorial

Abstract: Telehealth systems have evolved into more prevalent services that can serve people in remote locations and at their homes via smart devices and 5G systems. Protecting the privacy and security of users is crucial in such online systems. Although there are many protocols to provide security through strong authentication systems, sophisticated IoT attacks are becoming more prevalent. Using machine learning to handle biometric information or physical layer features is key to addressing authentication problems for … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 18 publications
(8 citation statements)
references
References 84 publications
0
8
0
Order By: Relevance
“…One solution to this problem is to utilize ML to process biometric information or physical layer features for human and IoT device authentication, respectively. This tutorial [24] discusses the use of ML in the creation of robust authentication protocols. These methods, which are trained on hidden concepts in biometric and physical layer data, can provide more reliable dynamic authentication models than traditional methods.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…One solution to this problem is to utilize ML to process biometric information or physical layer features for human and IoT device authentication, respectively. This tutorial [24] discusses the use of ML in the creation of robust authentication protocols. These methods, which are trained on hidden concepts in biometric and physical layer data, can provide more reliable dynamic authentication models than traditional methods.…”
Section: Related Workmentioning
confidence: 99%
“…2FA can also provide privacy protection and allow for mutual authentication and session key negotiation with minimal computational cost [23], [26]. In addition, the use of ML in the creation of robust authentication protocols can provide more reliable dynamic authentication models, as well as continuous and context-aware authentication [24]. There are also several challenges and limitations to consider when implementing these approaches.…”
Section: Related Workmentioning
confidence: 99%
“…Kashou et al compared the ability of ML and deep neural networks (DNNs) using ECG signals for authentication [ 12 ]. Developing a verification model for user identification using ML and DLLs offers many advantages, such as being human-independent, cost-effective, reliable, faster, and more precise [ 15 ]. Numerous ML models have been developed for biometric-based authentication systems, with DNNs being widely applied in this area recently [ 16 ].…”
Section: Introductionmentioning
confidence: 99%
“… Most ML models are sensitive to imbalanced datasets [ 18 ]. Enrolling a new entity in the system is complex because of the need to train the model from scratch [ 15 ]. …”
Section: Introductionmentioning
confidence: 99%
“…Machine Learning (ML) is one of the most successful tools used in various fi elds to solve problems. ML methods are adopted to develop a verifi cation model for user identifi cation [6]. Our model will do it by getting the user's ECG dataset.…”
Section: Introductionmentioning
confidence: 99%