A review of multi-factor authentication in the Internet of Healthcare Things

被引:25
|
作者
Suleski, Tance [1 ]
Ahmed, Mohiuddin [2 ]
Yang, Wencheng [3 ]
Wang, Eugene [4 ,5 ]
机构
[1] Edith Cowan Univ, Cyber Secur Cooperat Res Ctr, Sch Sci, Joondalup, WA 6027, Australia
[2] Edith Cowan Univ, Sch Sci, Joondalup, Australia
[3] Univ Southern Queensland, Sch Math Phys & Comp, Toowoomba, Australia
[4] Walter & Eliza Hall Inst Med Res, Personalised Oncol Div, Parkville, Australia
[5] Monash Univ, Fac Med Nursing & Hlth Sci, Melbourne, Australia
来源
DIGITAL HEALTH | 2023年 / 9卷
关键词
Multi-factor authentication; MFA; healthcare; IoT; IoHT; USER AUTHENTICATION; PRIVACY; SECURE; CHALLENGES; PROTOCOL; ATTACKS;
D O I
10.1177/20552076231177144
中图分类号
R19 [保健组织与事业(卫生事业管理)];
学科分类号
摘要
ObjectiveThis review paper aims to evaluate existing solutions in healthcare authentication and provides an insight into the technologies incorporated in Internet of Healthcare Things (IoHT) and multi-factor authentication (MFA) applications for next-generation authentication practices. Our review has two objectives: (a) Review MFA based on the challenges, impact and solutions discussed in the literature; and (b) define the security requirements of the IoHT as an approach to adapting MFA solutions in a healthcare context. MethodsTo review the existing literature, we indexed articles from the IEEE Xplore, ACM Digital Library, ScienceDirect, and SpringerLink databases. The search was refined to combinations of 'authentication', 'multi-factor authentication', 'Internet of Things authentication', and 'medical authentication' to ensure that the retrieved journal articles and conference papers were relevant to healthcare and Internet of Things-oriented authentication research. ResultsThe concepts of MFA can be applied to healthcare where security can often be overlooked. The security requirements identified result in stronger methodologies of authentication such as hardware solutions in combination with biometric data to enhance MFA approaches. We identify the key vulnerabilities of weaker approaches to security such as password use against various cyber threats. Cyber threats and MFA solutions are categorised in this paper to facilitate readers' understanding of them in healthcare domains. ConclusionsWe contribute to an understanding of up-to-date MFA approaches and how they can be improved for use in the IoHT. This is achieved by discussing the challenges, benefits, and limitations of current methodologies and recommendations to improve access to eHealth resources through additional layers of security.
引用
收藏
页数:20
相关论文
共 50 条
  • [31] Secure Remote Multi-Factor Authentication Scheme Based on Chaotic Map Zero-Knowledge Proof for Crowdsourcing Internet of Things
    Liu, Wenzheng
    Wang, Xiaofeng
    Peng, Wei
    IEEE ACCESS, 2020, 8 : 8754 - 8767
  • [32] Multi-factor based session secret key agreement for the Industrial Internet of Things
    Cui, Jie
    Cheng, Fangzheng
    Zhong, Hong
    Zhang, Qingyang
    Gu, Chengjie
    Liu, Lu
    AD HOC NETWORKS, 2023, 138
  • [33] Blockchain-based multi-factor authentication: A systematic literature review
    Almadani, Mwaheb S.
    Alotaibi, Suhair
    Alsobhi, Hada
    Hussain, Omar K.
    Hussain, Farookh Khadeer
    INTERNET OF THINGS, 2023, 23
  • [34] A Lightweight PUF based Multi-factor Authentication Technique for Intelligent Smart Healthcare System
    Chaudhary, Ravi Raushan Kumar
    Chatterjee, Kakali
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2023, 16 (04) : 1975 - 1992
  • [35] Secure Internet Financial Transactions: A Framework Integrating Multi-Factor Authentication and Machine Learning
    Aburbeian, Alsharif Hasan Mohamad
    Fernandez-Veiga, Manuel
    AI, 2024, 5 (01) : 177 - 194
  • [36] A Lightweight PUF based Multi-factor Authentication Technique for Intelligent Smart Healthcare System
    Ravi Raushan Kumar Chaudhary
    Kakali Chatterjee
    Peer-to-Peer Networking and Applications, 2023, 16 : 1975 - 1992
  • [37] Database Multi-factor Authentication via Pluggable Authentication Modules
    Hamilton, Cameron
    Olmstead, Aspen
    2017 12TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2017, : 367 - 368
  • [38] Multi-factor authentication using threshold cryptography
    1694, Institute of Electrical and Electronics Engineers Inc., United States
  • [39] Multi-Factor Authentication in Key Management Systems
    de Souza, Rick Lopes
    Lung, Lau Cheuk
    Custodio, Ricardo Felipe
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 746 - 752
  • [40] Multi-factor authentication for shibboleth identity providers
    de Mello, Emerson Ribeiro
    Wangham, Michelle Silva
    Loli, Samuel Bristot
    da Silva, Carlos Eduardo
    da Silva, Gabriela Cavalcanti
    de Chaves, Shirlei Aparecida
    Loli, Bruno Bristot
    JOURNAL OF INTERNET SERVICES AND APPLICATIONS, 2020, 11 (01)