Skip to main content

ALBA: Novel Anomaly Location-Based Authentication in IoMT Environment Using Unsupervised ML

  • Conference paper
  • First Online:
Internet of Things. Advances in Information and Communication Technology (IFIPIoT 2023)

Abstract

Smartphones have become essential components in the Internet of Medical Things (IoMT), providing convenient interfaces and advanced technology that enable interaction with various medical devices and sensors. This makes smartphones serve as gateways for sensitive data that could potentially affect patients’ health and privacy if compromised, making them primary targets for cybersecurity threats. Authentication is crucial for IoMT security, as its effectiveness relies on its resistance to any conditions of environment, device, or user. In this paper, we propose the Anomaly Location-based Authentication (ALBA) method using GPS technology and a lightweight unsupervised ML algorithm with more stable features. Our experimental results showed that the model successfully identified anomalous locations across three distinct datasets, demonstrating the adaptability of ALBA.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 119.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mohanty, S.P., Choppali, U., Kougianos, E.: Everything you wanted to know about smart cities: the internet of things is the backbone. IEEE Consum. Electron. Mag. 5(3), 60–70 (2016)

    Article  Google Scholar 

  2. Ghubaish, A., Salman, T., Zolanvari, M., Unal, D., Al-Ali, A., Jain, R.: Recent advances in the internet-of-medical-things (IoMT) systems security. IEEE Internet Things J. 8(11), 8707–8718 (2021)

    Article  Google Scholar 

  3. Mutyara, A.G., Farras, B.A., Sari, L.P., Achmad, S., Sutoyo, R.: The influence of smartphone applications on human healthcare. In: International Conference on Informatics Electrical and Electronics (ICIEE), pp. 1–6 (2022)

    Google Scholar 

  4. ur Rahman, G.M.E., Chowdhury, R.I., Dinh, A., Wahid, K.A.: A smart sensor node with smartphone based IoMT. In IEEE International Conference on Consumer Electronics - Asia (ICCE-Asia), pp. 92–95 (2019)

    Google Scholar 

  5. Iqbal, W., Abbas, H., Daneshmand, M., Rauf, B., Bangash, Y.A.: An in-depth analysis of IoT security requirements, challenges, and their countermeasures via software-defined security. IEEE Internet Things J. 7(10), 10250–10276 (2020)

    Article  Google Scholar 

  6. T. L. Lin and Y. S. Chen. A chinese continuous keystroke authentication method using cognitive factors. In IEEE International Conference on Consumer Electronics - Taiwan (ICCE-TW), pp. 1–2 (2019)

    Google Scholar 

  7. Herath, H.M.C.K.B., Dulanga, K.G.C., Tharindu, N.V.D., Ganegoda, G.U.: Continuous user authentication using keystroke dynamics for touch devices. In: 2nd International Conference on Image Processing and Robotics (ICIPRob), pp. 1–6 (2022)

    Google Scholar 

  8. Ouadjer, Y., Adnane, M., Bouadjenek, N.: Feature importance evaluation of smartphone touch gestures for biometric authentication. In: 2nd International Workshop on Human-Centric Smart Environments for Health and Well-being (IHSH), pp. 103–107 (2021)

    Google Scholar 

  9. Suharsono, A., Liang, D.: Hand stability based features for touch behavior smartphone authentication. In: 3rd IEEE International Conference on Knowledge Innovation and Invention (ICKII), pp. 167–170 (2020)

    Google Scholar 

  10. Musale, P., Baek, D., Choi, B.J.: Lightweight gait based authentication technique for IoT using subconscious level activities. In: IEEE 4th World Forum on Internet of Things (WF-IoT), pp. 564–567 (2018)

    Google Scholar 

  11. He, L., Ma, C., Tu, C., Zhang, Y.: Gait2vec: Continuous authentication of smartphone users based on gait behavior. In: IEEE 25th International Conference on Computer Supported Cooperative Work in Design (CSCWD), pp. 280–285 (2022)

    Google Scholar 

  12. Roy, S., et al.: A systematic literature review on latest keystroke dynamics based models. IEEE Access 10, 92192–92236 (2022)

    Article  Google Scholar 

  13. SimonD, J.: Mobile location history of 10/2014. Kaggle (2017). Accessed 28 Dec 2022

    Google Scholar 

  14. Zhang, L., Liu, L.: Data anomaly detection based on isolation forest algorithm. In: International Conference on Computation, Big-Data and Engineering (ICCBE), pp. 87–89, Yunlin, Taiwan (2022)

    Google Scholar 

  15. Marcelli, E., Barbariol, T., Savarino, V., Beghi, A., Susto, G.A.: A revised isolation forest procedure for anomaly detection with high number of data points. In: IEEE 23rd Latin American Test Symposium (LATS), pp. 1–5, Montevideo, Uruguay (2022)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Saraju P. Mohanty .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 IFIP International Federation for Information Processing

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Alruwaili, F.J., Mohanty, S.P., Kougianos, E. (2024). ALBA: Novel Anomaly Location-Based Authentication in IoMT Environment Using Unsupervised ML. In: Puthal, D., Mohanty, S., Choi, BY. (eds) Internet of Things. Advances in Information and Communication Technology. IFIPIoT 2023. IFIP Advances in Information and Communication Technology, vol 683. Springer, Cham. https://doi.org/10.1007/978-3-031-45878-1_30

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-45878-1_30

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-45877-4

  • Online ISBN: 978-3-031-45878-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics