| Literature DB >> 35368929 |
Dhananjay Nigam1, Shilp Nirajbhai Patel1, P M Durai Raj Vincent2, Kathiravan Srinivasan1, Sinouvassane Arunmozhi3.
Abstract
Secure identification is a critical system requirement for patients seeking health-related services. In the event of critical, aged, or disabled patients who require frequent health treatments, quick and easy identification is vital. Researchers describe the notion of the unprotected environment in this study, in which patients can receive health services from the hospital's smart and intelligent surroundings without the use of explicit equipment. Patients would interact directly with the environment and be identified through it. We suggest a biometric-based authentication technique for the unprotected hospital environment that also safeguards the patient's identity privacy. Furthermore, we demonstrate that this authentication technique is resistant to many well-known assaults, including insider attacks, replay attacks, and identity privacy. Doctors and other staff members showed enthusiastic responses after installing 2-factor authentications, as it makes their workflow efficient and makes things easier for patients. It also lets them focus on other factors rather than worrying about data security; hence, we need biometric authentication in intelligent and privacy-preserving healthcare systems. The paper deals with two-factor biometric authentication, and despite the added security, two-factor authentication adoption is said to be poor. It is due to a lack of awareness and difficulty to use and configure two-factor authentication (2FA) into a particular application by some individuals who struggle with the concept of authentication and its technology. Also, many 2FA methods in widespread use today have not been subjected to adequate usability testing. Research focuses on the point that there is still a large section of people unaware of the use of biometric systems to protect their online data. Researchers collected quantitative and qualitative data from 96 individuals during a two-week between-subjects usability survey of some common and rarely used 2FA approaches. The survey allowed the researcher to investigate which authentication methods are given higher priority and why, along with the relationship between different usage patterns and perceived usability, and identify user misconceptions and insecure habits to determine ease of use. It was observed that the biometric-based method was given the utmost preferability.Entities:
Mesh:
Year: 2022 PMID: 35368929 PMCID: PMC8970854 DOI: 10.1155/2022/1789996
Source DB: PubMed Journal: J Healthc Eng ISSN: 2040-2295 Impact factor: 2.682
Figure 1Architecture of biometric authentication for digital healthcare services.
Figure 2Healthcare IT topology for medical devices.
Figure 3Flow of authentication.
List of existing methods with their approaches and limitations.
| Scheme | Year | Approach | Limitations |
|---|---|---|---|
| [ | 2012 | Asymmetric | Forgery attacks are possible |
| [ | 2015 | Cryptographic hash function | Vulnerable to impersonation attacks and insider attacks |
| [ | 2012 | Symmetric encryption | User tracking attacks are possible |
| [ | 2016 | Cryptographic hash function | Experiencing issues with transmitting secrecy and revocability |
| [ | 2018 | Fingerprint verification | Fingerprints can also be stolen by capturing your prints without you knowing |
| [ | 2015 | Hardware tokens | Many people find it difficult to carry hardware tokens and may lose them sometimes |
| [ | 2020 | Bloom filter and format-preserving encryption | The primary downside is its probabilistic nature |
Figure 4Survey query 1.
Figure 5Survey query 2.
Figure 6Survey query 3.
Figure 7Survey query 4.
Figure 8Survey query 5.
Figure 9Survey query 6.
Figure 10Survey query 7.
Figure 11Survey query 8.
Figure 12Survey query 9.
Comparison results for privacy and security characteristic features.
| Features | [ | [ | [ | [ |
|---|---|---|---|---|
| User anonymity | Yes | Yes | No | No |
| Mutual authentication | Yes | Yes | Yes | Yes |
| Off-line PW guessing attack | Yes | No | No | No |
| Impersonation attack | Yes | Yes | Yes | No |
| Replay attack | Yes | No | No | Yes |
| Provides formal security | Yes | Yes | No | No |
Figure 13Functional platform of the intelligent and privacy-preserving healthcare system.
Figure 14Healthcare data breach record.
A summary of the protocol, results, and key contributions from authentication and privacy-preserving healthcare systems.
| Reference | Year | Protocol | Results | Key contributions |
|---|---|---|---|---|
| [ | 2019 | Health screening for people who have diabetes | Smart services do the whole screening autonomously | They do not describe how a procedure is performed but why, when, where, and by whom the care is given |
| [ | 2015 | Security | Promotes public confidence in healthcare services | Provides a secure environment for people using the services |
| [ | 2019 | Decentralized privacy-preserving healthcare blockchain for IoT | Secures data transfers and logging of data and storage on the blockchain | Security through blockchain |
| [ | 2017 | Radiofrequency identification | Tracks hospital supplies, medical equipment, medications | Privacy-preserving access controls |
| [ | 2013 | Wireless medical sensor network | Sensitive patient information is sent through the open air. | The lightweight encryption algorithm is proposed to secure communication between the sensor node and the Sharemind system. |
A classification of healthcare apps: authentication and privacy-preserving healthcare systems.
| Category | Common apps | Description |
|---|---|---|
| Medicine delivery app | Netmeds, PharmEasy, Medlife | Delivery anywhere |
| Telenursing applications | Practo | Online doctor consultation |
| Medicine reminders app | Medisafe Pill reminder, Bedside Reminders | Alerting with push notification |
| Appointment scheduling apps | AppointmentPlus, PatientPop | Set online scheduler with doctor |
| Mindfulness, health, and fitness apps | MyFitnessPal, Headspace | Records your heart rate, water level, sugar level, and gives you a full report at the end |
| Patient health education apps | CardioTech, Simply Sayin' | Educates patients about different diseases, what causes them, and what are the symptoms |
Different types of attacks: authentication and privacy-preserving healthcare systems.
| Reference | Year | Attacks | Description |
|---|---|---|---|
| [ | 2012 | Dictionary and password guessing attack | Guessing the password from a password list |
| [ | 2013 | Denial of service | Denying service to the user by creating unnecessary traffic |
| [ | 2012 | Impersonation attacks | Impersonating to be someone and stealing information |
| [ | 2013 | Patient anonymity violation | Exploiting the hidden identity of the patient |
| [ | 2014 | Spoofing | The act of misrepresenting a communication from an unknown source as coming from a recognized, reliable source. |
| [ | 2012 | Malware infusion | Ingesting malware into the system so that it does not work properly |
| [ | 2016 | Man in the middle | Capturing and listening to the information being passed from the sender to the receiver and vice versa. |
| [ | 2015 | Tracing attacks | In each session, the patient uses the same identifier, leading to the disclosure of private information. |
Figure 15Open challenges: authentication and privacy-preserving healthcare systems.
Figure 16Operating model: authentication and privacy-preserving healthcare systems.
Figure 17Future research directions: authentication and privacy-preserving healthcare systems.