A review of multi-factor authentication in the Internet of Healthcare Things

被引:12
|
作者
Suleski, Tance [1 ]
Ahmed, Mohiuddin [2 ]
Yang, Wencheng [3 ]
Wang, Eugene [4 ,5 ]
机构
[1] Edith Cowan Univ, Cyber Secur Cooperat Res Ctr, Sch Sci, Joondalup, WA 6027, Australia
[2] Edith Cowan Univ, Sch Sci, Joondalup, Australia
[3] Univ Southern Queensland, Sch Math Phys & Comp, Toowoomba, Australia
[4] Walter & Eliza Hall Inst Med Res, Personalised Oncol Div, Parkville, Australia
[5] Monash Univ, Fac Med Nursing & Hlth Sci, Melbourne, Australia
来源
DIGITAL HEALTH | 2023年 / 9卷
关键词
Multi-factor authentication; MFA; healthcare; IoT; IoHT; USER AUTHENTICATION; PRIVACY; SECURE; CHALLENGES; PROTOCOL; ATTACKS;
D O I
10.1177/20552076231177144
中图分类号
R19 [保健组织与事业(卫生事业管理)];
学科分类号
摘要
ObjectiveThis review paper aims to evaluate existing solutions in healthcare authentication and provides an insight into the technologies incorporated in Internet of Healthcare Things (IoHT) and multi-factor authentication (MFA) applications for next-generation authentication practices. Our review has two objectives: (a) Review MFA based on the challenges, impact and solutions discussed in the literature; and (b) define the security requirements of the IoHT as an approach to adapting MFA solutions in a healthcare context. MethodsTo review the existing literature, we indexed articles from the IEEE Xplore, ACM Digital Library, ScienceDirect, and SpringerLink databases. The search was refined to combinations of 'authentication', 'multi-factor authentication', 'Internet of Things authentication', and 'medical authentication' to ensure that the retrieved journal articles and conference papers were relevant to healthcare and Internet of Things-oriented authentication research. ResultsThe concepts of MFA can be applied to healthcare where security can often be overlooked. The security requirements identified result in stronger methodologies of authentication such as hardware solutions in combination with biometric data to enhance MFA approaches. We identify the key vulnerabilities of weaker approaches to security such as password use against various cyber threats. Cyber threats and MFA solutions are categorised in this paper to facilitate readers' understanding of them in healthcare domains. ConclusionsWe contribute to an understanding of up-to-date MFA approaches and how they can be improved for use in the IoHT. This is achieved by discussing the challenges, benefits, and limitations of current methodologies and recommendations to improve access to eHealth resources through additional layers of security.
引用
收藏
页数:20
相关论文
共 50 条
  • [31] Blockchain-based multi-factor authentication: A systematic literature review
    Almadani, Mwaheb S.
    Alotaibi, Suhair
    Alsobhi, Hada
    Hussain, Omar K.
    Hussain, Farookh Khadeer
    [J]. INTERNET OF THINGS, 2023, 23
  • [32] A Lightweight PUF based Multi-factor Authentication Technique for Intelligent Smart Healthcare System
    Chaudhary, Ravi Raushan Kumar
    Chatterjee, Kakali
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2023, 16 (04) : 1975 - 1992
  • [33] A Lightweight PUF based Multi-factor Authentication Technique for Intelligent Smart Healthcare System
    Ravi Raushan Kumar Chaudhary
    Kakali Chatterjee
    [J]. Peer-to-Peer Networking and Applications, 2023, 16 : 1975 - 1992
  • [34] Secure Internet Financial Transactions: A Framework Integrating Multi-Factor Authentication and Machine Learning
    Aburbeian, Alsharif Hasan Mohamad
    Fernandez-Veiga, Manuel
    [J]. AI, 2024, 5 (01) : 177 - 194
  • [35] Database Multi-factor Authentication via Pluggable Authentication Modules
    Hamilton, Cameron
    Olmstead, Aspen
    [J]. 2017 12TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2017, : 367 - 368
  • [36] Multi-Factor Authentication in Key Management Systems
    de Souza, Rick Lopes
    Lung, Lau Cheuk
    Custodio, Ricardo Felipe
    [J]. 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 746 - 752
  • [37] Multi-factor authentication for shibboleth identity providers
    de Mello, Emerson Ribeiro
    Wangham, Michelle Silva
    Loli, Samuel Bristot
    da Silva, Carlos Eduardo
    da Silva, Gabriela Cavalcanti
    de Chaves, Shirlei Aparecida
    Loli, Bruno Bristot
    [J]. JOURNAL OF INTERNET SERVICES AND APPLICATIONS, 2020, 11 (01)
  • [38] Multi-Factor Authentication Using Threshold Cryptography
    Venukumar, Vishnu
    Pathari, Vinod
    [J]. 2016 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2016, : 1694 - 1698
  • [39] Privacy preserving multi-factor authentication with biometrics
    Bhargav-Spantzel, Abhilasha
    Squicciarini, Anna
    Modi, Shimon
    Young, Matthew
    Bertino, Elisa
    Elliott, Stephen
    [J]. JOURNAL OF COMPUTER SECURITY, 2007, 15 (05) : 529 - 560
  • [40] A Method of Risk Assessment for Multi-Factor Authentication
    Kim, Jae-Jung
    Hong, Seng-Phil
    [J]. JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2011, 7 (01): : 187 - 198