Mobile Computing Solutions for Healthcare Systems

Multi-Factor Authentication Protocol Based on Electrocardiography Signals for a Mobile Cloud Computing Environment

Author(s): Silas L. Albuquerque, Cristiano J. Miosso, Adson F. da Rocha and Paulo R. L. Gondim * .

Pp: 62-88 (27)

DOI: 10.2174/9789815050592123010009

* (Excluding Mailing and Handling)

Abstract

Mobile Cloud Computing (MCC) is a highly complex topic that encompasses several information security issues. The authentication area of the various entities involved has been extensively discussed in recent years and shown a wide range of possibilities. The use of inadequate authentication processes leads to several problems, which range from financial damage to users or providers of Mobile Commerce (M-Commerce) services to the death of patients who depend on Mobile Healthcare (M-Health) services.

The design of reliable authentication processes that minimize such issues involves the use of non-intrusive authentication techniques and continuous authentication of users by MCC service providers. In this sense, biometrics may satisfy such needs in various scenarios.

This research has explored some conceptual bases and presents a continuous authentication protocol for MCC environments. Such a protocol is part of a cyberphysical system (CPS) and is based on the monitoring of physiological information interpreted from users’ electrocardiograms (ECG). Machine learning techniques based on the Adaptative Boost (Adaboost) and Random Undersampling Boost (RUSBoost) were used for the classification of the cardiac cycles recognized in such ECGs.

The two ML techniques applied to electrocardiography were compared by a random subsampling technique that considers four analysis metrics, namely accuracy, precision, sensitivity, and F1-score. The experimental results showed better performance of RUSBoost regarding accuracy (97.4%), precision (98.7%), sensitivity (96.1%), and F1- score (97.4%).


Keywords: Authentication, Electrocardiography, Machine Learning, Mobile Cloud Computing.

Related Journals
Related Books
© 2024 Bentham Science Publishers | Privacy Policy