A review of multi-factor authentication in the Internet of Healthcare Things

被引:12
|
作者
Suleski, Tance [1 ]
Ahmed, Mohiuddin [2 ]
Yang, Wencheng [3 ]
Wang, Eugene [4 ,5 ]
机构
[1] Edith Cowan Univ, Cyber Secur Cooperat Res Ctr, Sch Sci, Joondalup, WA 6027, Australia
[2] Edith Cowan Univ, Sch Sci, Joondalup, Australia
[3] Univ Southern Queensland, Sch Math Phys & Comp, Toowoomba, Australia
[4] Walter & Eliza Hall Inst Med Res, Personalised Oncol Div, Parkville, Australia
[5] Monash Univ, Fac Med Nursing & Hlth Sci, Melbourne, Australia
来源
DIGITAL HEALTH | 2023年 / 9卷
关键词
Multi-factor authentication; MFA; healthcare; IoT; IoHT; USER AUTHENTICATION; PRIVACY; SECURE; CHALLENGES; PROTOCOL; ATTACKS;
D O I
10.1177/20552076231177144
中图分类号
R19 [保健组织与事业(卫生事业管理)];
学科分类号
摘要
ObjectiveThis review paper aims to evaluate existing solutions in healthcare authentication and provides an insight into the technologies incorporated in Internet of Healthcare Things (IoHT) and multi-factor authentication (MFA) applications for next-generation authentication practices. Our review has two objectives: (a) Review MFA based on the challenges, impact and solutions discussed in the literature; and (b) define the security requirements of the IoHT as an approach to adapting MFA solutions in a healthcare context. MethodsTo review the existing literature, we indexed articles from the IEEE Xplore, ACM Digital Library, ScienceDirect, and SpringerLink databases. The search was refined to combinations of 'authentication', 'multi-factor authentication', 'Internet of Things authentication', and 'medical authentication' to ensure that the retrieved journal articles and conference papers were relevant to healthcare and Internet of Things-oriented authentication research. ResultsThe concepts of MFA can be applied to healthcare where security can often be overlooked. The security requirements identified result in stronger methodologies of authentication such as hardware solutions in combination with biometric data to enhance MFA approaches. We identify the key vulnerabilities of weaker approaches to security such as password use against various cyber threats. Cyber threats and MFA solutions are categorised in this paper to facilitate readers' understanding of them in healthcare domains. ConclusionsWe contribute to an understanding of up-to-date MFA approaches and how they can be improved for use in the IoHT. This is achieved by discussing the challenges, benefits, and limitations of current methodologies and recommendations to improve access to eHealth resources through additional layers of security.
引用
下载
收藏
页数:20
相关论文
共 50 条
  • [21] Multi Factor User Authentication Mechanism using Internet of things
    Rao, M. Kameswara
    Santhi, S. G.
    Hussain, Md Ali
    PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON ADVANCED INFORMATICS FOR COMPUTING RESEARCH (ICAICR '19), 2019,
  • [22] Dynamic Multi-factor Authentication for Smartphone
    Yohan, Alexander
    Lo, Nai-Wei
    Lie, Henry Roes
    2016 IEEE 27TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2016, : 2448 - 2453
  • [23] Multi-factor authentication at jagged peak
    Gill G.
    Jones J.
    2016, Informing Science Institute (05) : 1 - 16
  • [24] Ubiquitous Desktops with Multi-factor Authentication
    Doyle, Paul
    Deegan, Mark
    O'Driscoll, Ciaran
    Gleeson, Michael
    Gillespie, Brian
    2008 THIRD INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION MANAGEMENT, VOLS 1 AND 2, 2008, : 201 - 206
  • [25] Enhanced Multi-factor Authentication on the Cloud
    Alyounis, Essa
    Dinah, Quanq
    INNOVATION MANAGEMENT AND SUSTAINABLE ECONOMIC COMPETITIVE ADVANTAGE: FROM REGIONAL DEVELOPMENT TO GLOBAL GROWTH, VOLS I - VI, 2015, 2015, : 69 - 77
  • [26] Practical Threshold Multi-Factor Authentication
    Li, Wenting
    Cheng, Haibo
    Wang, Ping
    Liang, Kaitai
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 3573 - 3588
  • [27] Multi-factor user authentication scheme for IoT-based healthcare services
    Dhillon P.K.
    Kalra S.
    Dhillon, Parwinder Kaur (parwindhillon@gmail.com), 2018, Springer Science and Business Media Deutschland GmbH (04) : 141 - 160
  • [28] Multi-Factor Authentication to Systems Login
    ALSaleem, Bandar Omar
    Alshoshan, Abdullah, I
    2021 IEEE NATIONAL COMPUTING COLLEGES CONFERENCE (NCCC 2021), 2021, : 1092 - 1095
  • [29] Commentary: Multi-factor identification and authentication
    Morrison, Rodger
    INFORMATION SYSTEMS MANAGEMENT, 2007, 24 (04) : 331 - 332
  • [30] Secure Remote Multi-Factor Authentication Scheme Based on Chaotic Map Zero-Knowledge Proof for Crowdsourcing Internet of Things
    Liu, Wenzheng
    Wang, Xiaofeng
    Peng, Wei
    IEEE ACCESS, 2020, 8 : 8754 - 8767