A review of multi-factor authentication in the Internet of Healthcare Things

被引:12
|
作者
Suleski, Tance [1 ]
Ahmed, Mohiuddin [2 ]
Yang, Wencheng [3 ]
Wang, Eugene [4 ,5 ]
机构
[1] Edith Cowan Univ, Cyber Secur Cooperat Res Ctr, Sch Sci, Joondalup, WA 6027, Australia
[2] Edith Cowan Univ, Sch Sci, Joondalup, Australia
[3] Univ Southern Queensland, Sch Math Phys & Comp, Toowoomba, Australia
[4] Walter & Eliza Hall Inst Med Res, Personalised Oncol Div, Parkville, Australia
[5] Monash Univ, Fac Med Nursing & Hlth Sci, Melbourne, Australia
来源
DIGITAL HEALTH | 2023年 / 9卷
关键词
Multi-factor authentication; MFA; healthcare; IoT; IoHT; USER AUTHENTICATION; PRIVACY; SECURE; CHALLENGES; PROTOCOL; ATTACKS;
D O I
10.1177/20552076231177144
中图分类号
R19 [保健组织与事业(卫生事业管理)];
学科分类号
摘要
ObjectiveThis review paper aims to evaluate existing solutions in healthcare authentication and provides an insight into the technologies incorporated in Internet of Healthcare Things (IoHT) and multi-factor authentication (MFA) applications for next-generation authentication practices. Our review has two objectives: (a) Review MFA based on the challenges, impact and solutions discussed in the literature; and (b) define the security requirements of the IoHT as an approach to adapting MFA solutions in a healthcare context. MethodsTo review the existing literature, we indexed articles from the IEEE Xplore, ACM Digital Library, ScienceDirect, and SpringerLink databases. The search was refined to combinations of 'authentication', 'multi-factor authentication', 'Internet of Things authentication', and 'medical authentication' to ensure that the retrieved journal articles and conference papers were relevant to healthcare and Internet of Things-oriented authentication research. ResultsThe concepts of MFA can be applied to healthcare where security can often be overlooked. The security requirements identified result in stronger methodologies of authentication such as hardware solutions in combination with biometric data to enhance MFA approaches. We identify the key vulnerabilities of weaker approaches to security such as password use against various cyber threats. Cyber threats and MFA solutions are categorised in this paper to facilitate readers' understanding of them in healthcare domains. ConclusionsWe contribute to an understanding of up-to-date MFA approaches and how they can be improved for use in the IoHT. This is achieved by discussing the challenges, benefits, and limitations of current methodologies and recommendations to improve access to eHealth resources through additional layers of security.
引用
下载
收藏
页数:20
相关论文
共 50 条
  • [31] Multi-factor based session secret key agreement for the Industrial Internet of Things
    Cui, Jie
    Cheng, Fangzheng
    Zhong, Hong
    Zhang, Qingyang
    Gu, Chengjie
    Liu, Lu
    AD HOC NETWORKS, 2023, 138
  • [32] Blockchain-based multi-factor authentication: A systematic literature review
    Almadani, Mwaheb S.
    Alotaibi, Suhair
    Alsobhi, Hada
    Hussain, Omar K.
    Hussain, Farookh Khadeer
    INTERNET OF THINGS, 2023, 23
  • [33] A Lightweight PUF based Multi-factor Authentication Technique for Intelligent Smart Healthcare System
    Chaudhary, Ravi Raushan Kumar
    Chatterjee, Kakali
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2023, 16 (04) : 1975 - 1992
  • [34] A Lightweight PUF based Multi-factor Authentication Technique for Intelligent Smart Healthcare System
    Ravi Raushan Kumar Chaudhary
    Kakali Chatterjee
    Peer-to-Peer Networking and Applications, 2023, 16 : 1975 - 1992
  • [35] Secure Internet Financial Transactions: A Framework Integrating Multi-Factor Authentication and Machine Learning
    Aburbeian, Alsharif Hasan Mohamad
    Fernandez-Veiga, Manuel
    AI, 2024, 5 (01) : 177 - 194
  • [36] Database Multi-factor Authentication via Pluggable Authentication Modules
    Hamilton, Cameron
    Olmstead, Aspen
    2017 12TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2017, : 367 - 368
  • [37] Multi-factor authentication using threshold cryptography
    1694, Institute of Electrical and Electronics Engineers Inc., United States
  • [38] Multi-Factor Authentication in Key Management Systems
    de Souza, Rick Lopes
    Lung, Lau Cheuk
    Custodio, Ricardo Felipe
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 746 - 752
  • [39] A Method of Risk Assessment for Multi-Factor Authentication
    Kim, Jae-Jung
    Hong, Seng-Phil
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2011, 7 (01): : 187 - 198
  • [40] Multi-Factor Authentication Using Threshold Cryptography
    Venukumar, Vishnu
    Pathari, Vinod
    2016 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2016, : 1694 - 1698