Loading…
A security-enhanced and privacy-preserving certificateless aggregate signcryption scheme based artificial neural network in wireless medical sensor network
With the recent advances in mobile sensing and beyond-5G technologies, wireless medical sensor networks (WMSN) have become an emerging hot topic in smart healthcare. Under the condition of limited resources of medical sensor nodes, ensuring the accuracy and integrity of a large number of patients...
Saved in:
Published in: | IEEE sensors journal 2023-04, Vol.23 (7), p.1-1 |
---|---|
Main Authors: | , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | With the recent advances in mobile sensing and beyond-5G technologies, wireless medical sensor networks (WMSN) have become an emerging hot topic in smart healthcare. Under the condition of limited resources of medical sensor nodes, ensuring the accuracy and integrity of a large number of patients' medical data is a crux for security and data privacy issues. In order to overcome the limitations of medical sensors in communication and computing capabilities, and to achieve privacy in WMSN, we propose a low complexity certificateless aggregate signcryption (CL-ASC) scheme based artificial neural network for safely achieving authentication and unforgeability of medical nodes. We use adaptive sigma filter for denoising, adopt Levenshtein entropy for encoding and design cryptographic protocol for signcrypting in the hidden layer of deep feedforward artificial neural network. The CL-ASC can authenticate all sensing bioinformation at once in a privacy-preserving way. Given the challenge of applying a discrete logarithm and computational Diffie-Hellman problems based on elliptic curve, the proposed scheme satisfies the IND-CCA and the UF-CMA security properties under the random oracle model. Finally, the benchmark evaluation shows that ours is ahead of similar state-of-the-art schemes, due to its low complexity and higher computational efficiency. Researchers interested in the provable security protocol design and framework of neural networks can gain useful insights from this research and identify future cross-domain of cyber security and neural networks research directions based on the proposed scheme herein. |
---|---|
ISSN: | 1530-437X 1558-1748 |
DOI: | 10.1109/JSEN.2023.3247581 |