Abstract
Smartphones have become essential components in the Internet of Medical Things (IoMT), providing convenient interfaces and advanced technology that enable interaction with various medical devices and sensors. This makes smartphones serve as gateways for sensitive data that could potentially affect patients’ health and privacy if compromised, making them primary targets for cybersecurity threats. Authentication is crucial for IoMT security, as its effectiveness relies on its resistance to any conditions of environment, device, or user. In this paper, we propose the Anomaly Location-based Authentication (ALBA) method using GPS technology and a lightweight unsupervised ML algorithm with more stable features. Our experimental results showed that the model successfully identified anomalous locations across three distinct datasets, demonstrating the adaptability of ALBA.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Mohanty, S.P., Choppali, U., Kougianos, E.: Everything you wanted to know about smart cities: the internet of things is the backbone. IEEE Consum. Electron. Mag. 5(3), 60–70 (2016)
Ghubaish, A., Salman, T., Zolanvari, M., Unal, D., Al-Ali, A., Jain, R.: Recent advances in the internet-of-medical-things (IoMT) systems security. IEEE Internet Things J. 8(11), 8707–8718 (2021)
Mutyara, A.G., Farras, B.A., Sari, L.P., Achmad, S., Sutoyo, R.: The influence of smartphone applications on human healthcare. In: International Conference on Informatics Electrical and Electronics (ICIEE), pp. 1–6 (2022)
ur Rahman, G.M.E., Chowdhury, R.I., Dinh, A., Wahid, K.A.: A smart sensor node with smartphone based IoMT. In IEEE International Conference on Consumer Electronics - Asia (ICCE-Asia), pp. 92–95 (2019)
Iqbal, W., Abbas, H., Daneshmand, M., Rauf, B., Bangash, Y.A.: An in-depth analysis of IoT security requirements, challenges, and their countermeasures via software-defined security. IEEE Internet Things J. 7(10), 10250–10276 (2020)
T. L. Lin and Y. S. Chen. A chinese continuous keystroke authentication method using cognitive factors. In IEEE International Conference on Consumer Electronics - Taiwan (ICCE-TW), pp. 1–2 (2019)
Herath, H.M.C.K.B., Dulanga, K.G.C., Tharindu, N.V.D., Ganegoda, G.U.: Continuous user authentication using keystroke dynamics for touch devices. In: 2nd International Conference on Image Processing and Robotics (ICIPRob), pp. 1–6 (2022)
Ouadjer, Y., Adnane, M., Bouadjenek, N.: Feature importance evaluation of smartphone touch gestures for biometric authentication. In: 2nd International Workshop on Human-Centric Smart Environments for Health and Well-being (IHSH), pp. 103–107 (2021)
Suharsono, A., Liang, D.: Hand stability based features for touch behavior smartphone authentication. In: 3rd IEEE International Conference on Knowledge Innovation and Invention (ICKII), pp. 167–170 (2020)
Musale, P., Baek, D., Choi, B.J.: Lightweight gait based authentication technique for IoT using subconscious level activities. In: IEEE 4th World Forum on Internet of Things (WF-IoT), pp. 564–567 (2018)
He, L., Ma, C., Tu, C., Zhang, Y.: Gait2vec: Continuous authentication of smartphone users based on gait behavior. In: IEEE 25th International Conference on Computer Supported Cooperative Work in Design (CSCWD), pp. 280–285 (2022)
Roy, S., et al.: A systematic literature review on latest keystroke dynamics based models. IEEE Access 10, 92192–92236 (2022)
SimonD, J.: Mobile location history of 10/2014. Kaggle (2017). Accessed 28 Dec 2022
Zhang, L., Liu, L.: Data anomaly detection based on isolation forest algorithm. In: International Conference on Computation, Big-Data and Engineering (ICCBE), pp. 87–89, Yunlin, Taiwan (2022)
Marcelli, E., Barbariol, T., Savarino, V., Beghi, A., Susto, G.A.: A revised isolation forest procedure for anomaly detection with high number of data points. In: IEEE 23rd Latin American Test Symposium (LATS), pp. 1–5, Montevideo, Uruguay (2022)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 IFIP International Federation for Information Processing
About this paper
Cite this paper
Alruwaili, F.J., Mohanty, S.P., Kougianos, E. (2024). ALBA: Novel Anomaly Location-Based Authentication in IoMT Environment Using Unsupervised ML. In: Puthal, D., Mohanty, S., Choi, BY. (eds) Internet of Things. Advances in Information and Communication Technology. IFIPIoT 2023. IFIP Advances in Information and Communication Technology, vol 683. Springer, Cham. https://doi.org/10.1007/978-3-031-45878-1_30
Download citation
DOI: https://doi.org/10.1007/978-3-031-45878-1_30
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-45877-4
Online ISBN: 978-3-031-45878-1
eBook Packages: Computer ScienceComputer Science (R0)