Using Machine Learning for Dynamic Authentication in Telehealth: A Tutorial

被引:10
|
作者
Hazratifard, Mehdi [1 ]
Gebali, Fayez [1 ]
Mamun, Mohammad [2 ]
机构
[1] Univ Victoria, Dept Elect & Comp Engn, Victoria, BC V8W 2Y2, Canada
[2] Govt Canada, Natl Res Council Canada, Ottawa, ON K1A 0R6, Canada
关键词
telehealth; IoT security; dynamic authentication; continuous authentication; machine learning; deep learning; NEURAL-NETWORK; CHALLENGES; SCHEME; SYSTEM;
D O I
10.3390/s22197655
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Telehealth systems have evolved into more prevalent services that can serve people in remote locations and at their homes via smart devices and 5G systems. Protecting the privacy and security of users is crucial in such online systems. Although there are many protocols to provide security through strong authentication systems, sophisticated IoT attacks are becoming more prevalent. Using machine learning to handle biometric information or physical layer features is key to addressing authentication problems for human and IoT devices, respectively. This tutorial discusses machine learning applications to propose robust authentication protocols. Since machine learning methods are trained based on hidden concepts in biometric and physical layer data, these dynamic authentication models can be more reliable than traditional methods. The main advantage of these methods is that the behavioral traits of humans and devices are tough to counterfeit. Furthermore, machine learning facilitates continuous and context-aware authentication.
引用
收藏
页数:20
相关论文
共 50 条
  • [1] Hardware Trojan Detection Using Machine Learning: A Tutorial
    Gubbi, Kevin Immanuel
    Latibari, Banafsheh Saber
    Srikanth, Anirudh
    Sheaves, Tyler
    Beheshti-Shirazi, Sayed Arash
    Manoj, Sai P. D.
    Rafatirad, Satareh
    Sasan, Avesta
    Homayoun, Houman
    Salehi, Soheil
    [J]. ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2023, 22 (03)
  • [2] Quantum Machine Learning: A tutorial
    Martin-Guerrero, Jose D.
    Lamata, Lucas
    [J]. NEUROCOMPUTING, 2022, 470 : 457 - 461
  • [3] Machine Learning, A Tutorial With R
    Barr, Joseph R.
    [J]. 2018 FIRST IEEE INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE FOR INDUSTRIES (AI4I 2018), 2018, : 120 - 121
  • [4] Continuous Authentication of Smartphone Users using Machine Learning
    Ambol, Suhana
    Rashad, Sherif
    [J]. 2020 11TH IEEE ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2020, : 56 - 62
  • [5] A Machine Learning Framework for Biometric Authentication Using Electrocardiogram
    Kim, Song-Kyoo
    Yeun, Chan Yeob
    Damiani, Ernesto
    Lo, Nai-Wei
    [J]. IEEE ACCESS, 2019, 7 : 94858 - 94868
  • [6] Contextual authentication of users and devices using machine learning
    Mahansaria, Divyans
    Roy, Uttam Kumar
    [J]. COMPUTING, 2024,
  • [7] A tutorial on machine learning with geophysical applications
    Qadrouh, A. N.
    Carcione, J. M.
    Alajmi, M.
    Alyousif, M. M.
    [J]. BOLLETTINO DI GEOFISICA TEORICA ED APPLICATA, 2019, 60 (03) : 375 - 402
  • [8] A Tutorial on Machine Learning in Educational Science
    Kidzinski, Lukasz
    Giannakos, Michail
    Sampson, Demetrios G.
    Dillenbourg, Pierre
    [J]. STATE-OF-THE-ART AND FUTURE DIRECTIONS OF SMART LEARNING, 2016, : 453 - 459
  • [9] Machine Learning for Sensing Applications: A Tutorial
    Shirmohammadli, Vahideh
    Bahreyni, Behraad
    [J]. IEEE SENSORS JOURNAL, 2022, 22 (11) : 10183 - 10195
  • [10] A TUTORIAL ON OBJECT RECOGNITION BY MACHINE LEARNING TECHNIQUES USING PYTHON']PYTHON
    Ruiz-Sarmiento, J. R.
    Monroy, J.
    Moreno, F. A.
    Gonzalez-Jimenez, J.
    [J]. 13TH INTERNATIONAL TECHNOLOGY, EDUCATION AND DEVELOPMENT CONFERENCE (INTED2019), 2019, : 3321 - 3330