Uncrewed Aerial Vehicles Empowering Secure Authentication in Cognitive IoMT for Transformative Knowledge Discovery in Data

  • Abhishek Kumar Pandey
  • , Ashok Kumar Das
  • , Mohammad Wazid
  • , Kuljeet Kaur
  • , Youngho Park
  • , Mohammad Mehedi Hassan

Research output: Contribution to journalArticlepeer-review

1 Scopus citations

Abstract

The paradigm shift toward digital transformation is increasingly advancing toward cognitive decision discovery, particularly within the healthcare domain, where it has emerged as a critical area of research. Numerous researchers are actively contributing to this field. However, due to the sensitive nature of healthcare data, ensuring robust security within the cognitive decision-making process is paramount for Internet of Medical Things (IoMT). To address this concern, the present study proposes a comprehensive privacy-preserving authentication scheme associating aerial computing and knowledge discovery. This scheme leverages an elliptic curve-based cryptosystem to establish the authentication protocol and incorporates blockchain technology to ensure data storage security. Furthermore, the scheme facilitates secure knowledge discovery in data (KDD) within cognitive decision-making frameworks. The proposed authentication mechanism is evaluated across communication, computational efficiency, and security parameters to validate its functionality and robustness as well as to formally verify the developed scheme Scyther tool verification is done by authors. Additionally, to demonstrate the necessity and effectiveness of the proposed scheme, the authors conducted a KDD experiment using both a securely authenticated dataset and an insecure, compromised dataset. The results of these experiments are presented and thoroughly analyzed in the article.

Original languageEnglish
Pages (from-to)11329-11346
Number of pages18
JournalIEEE Internet of Things Journal
Volume12
Issue number9
DOIs
StatePublished - 2025

Keywords

  • Aerial computing
  • Internet of Medical Things (IoMT)
  • authentication
  • blockchain
  • data analytics
  • scyther tool
  • security

Fingerprint

Dive into the research topics of 'Uncrewed Aerial Vehicles Empowering Secure Authentication in Cognitive IoMT for Transformative Knowledge Discovery in Data'. Together they form a unique fingerprint.

Cite this