fuzzy notes
fuzzy notes
Viewpoint
Corresponding Author:
Tance Suleski, BA
School of Science
Edith Cowan University
270 Joondalup Dr, Joondalup WA
Perth, 6027
Australia
Phone: 61 13 43 28
Email: tsuleski@our.ecu.edu.au
Abstract
The health care industry has faced various challenges over the past decade as we move toward a digital future where services and
data are available on demand. The systems of interconnected devices, users, data, and working environments are referred to as
the Internet of Health Care Things (IoHT). IoHT devices have emerged in the past decade as cost-effective solutions with large
scalability capabilities to address the constraints on limited resources. These devices cater to the need for remote health care
services outside of physical interactions. However, IoHT security is often overlooked because the devices are quickly deployed
and configured as solutions to meet the demands of a heavily saturated industry. During the COVID-19 pandemic, studies have
shown that cybercriminals are exploiting the health care industry, and data breaches are targeting user credentials through
authentication vulnerabilities. Poor password use and management and the lack of multifactor authentication security posture
within IoHT cause a loss of millions according to the IBM reports. Therefore, it is important that health care authentication
security moves toward adaptive multifactor authentication (AMFA) to replace the traditional approaches to authentication. We
identified a lack of taxonomy for data models that particularly focus on IoHT data architecture to improve the feasibility of
AMFA. This viewpoint focuses on identifying key cybersecurity challenges in a theoretical framework for a data model that
summarizes the main components of IoHT data. The data are to be used in modalities that are suited for health care users in
modern IoHT environments and in response to the COVID-19 pandemic. To establish the data taxonomy, a review of recent
IoHT papers was conducted to discuss the related work in IoHT data management and use in next-generation authentication
systems. Reports, journal articles, conferences, and white papers were reviewed for IoHT authentication data technologies in
relation to the problem statement of remote authentication and user management systems. Only publications written in English
from the last decade were included (2012-2022) to identify key issues within the current health care practices and their management
of IoHT devices. We discuss the components of the IoHT architecture from the perspective of data management and sensitivity
to ensure privacy for all users. The data model addresses the security requirements of IoHT users, environments, and devices
toward the automation of AMFA in health care. We found that in health care authentication, the significant threats occurring
were related to data breaches owing to weak security options and poor user configuration of IoHT devices. The security requirements
of IoHT data architecture and identified impactful methods of cybersecurity for health care devices, data, and their respective
attacks are discussed. Data taxonomy provides better understanding, solutions, and improvements of user authentication in remote
working environments for security features.
KEYWORDS
health care; authentication; contextual data model; Internet of Health Care Things; multifactor; mobile phone
Sharma and Kalra [14] proposed a lightweight secure and answer algorithm to reduce user interaction throughout the
authentication scheme for remote monitoring of patients using authentication process. However, the scheme promotes
an automated validity tool. The protocol in this paper uses centralized systems that would not be secure against various
timestamps in sensor monitors to mitigate various attacks. cyberattacks outside their controlled environments, such as in
However, the proposed solution focuses on an approach to remote authentication scenarios. Baker et al [9] proposed a
establishing configurations to authentication that is static in 4-part model for the IoHT based on a body area network
nature, which would be unsuitable for an adaptive system that composed of wearable sensors for health care data. The proposed
must deploy reactive measures. Azzawi et al [8] proposed an model of this solution is designed to implement various
authentication mechanism to reduce the exhaustion of resources communication technologies such as in Bluetooth or Bluetooth
in IoT environments. The protocol in this paper uses elliptic Low Energy (BLE), which are common in small IoT devices
curve cryptography to support minimized overhead of resources owing to their power constraints [9]. However, the proposed
for encryption. The proposed scheme would be suitable in the encryption of authentication in these technologies is
IoHT to replace the use of Rivest-Shamir-Adleman encryption Rivest-Shamir-Adleman encryption, which contains larger key
to minimize the power constraints on smaller sensor node sizes and can constrain IoT devices. The proposed solution also
devices. Papaioannou et al [12] found that the resource does not protect users from broken authentication should a
constraint on IoHT devices lowers the feasibility of many password system be used, which would be because of poor
proposed schemes in the domain of medical authentication security posture or overlooking IoT configurations. Bhatt and
schemes. According to their findings, authentication schemes Chakraborty [10] proposed a smart system for orchestration of
that aimed to implement lower key size solutions would result health care services to support data sharing in IoHT networks.
in lightweight applications that would be well suited to the IoHT The research toward this scheme aims to integrate sensor-based
to ensure authentication. Scarpato et al [13] proposed a privacy devices for real-time environments such as hospitals. This
design for IoHT devices, in particular sensors, as their data solution requires artificial intelligence for the smart system,
should not be accessible to all users of the device. However, which would be beneficial in an AMFA system to govern
their principle has not been tested against common IoT attacks, changing environments of user authentication. As shown in
which could be achieved through a user-based AMFA scheme. Figure 1, a wireless node network in the human body uses an
Kumar et al [11] suggested that biometric authentication has an IoHT environment to generate health care data. Body nodes can
important role in the IoHT, as lightweight solutions can be use various technologies to facilitate the sensors and monitoring
designed with high security owing to the strength in biometric devices for patient care.
solutions. The proposed solution in this paper uses a request
Figure 1. The wireless network of body nodes in an Internet of Health Care Things environment.
are then labeled in their respective categories to improve the data inputs of heterogeneous IoHT data within the data
contextual analysis of AMFA systems in future research and taxonomy in relation to authentication solutions. We believe
work. To the best of our knowledge, the structured data that all findings and recommendations were to the best of our
taxonomy and architecture of IoHT data can help identify and knowledge at the time to categorize authentication data.
improve the security features of the IoHT by providing a
complete overview of the environment.
Organization of Sections
The Research Design and Results section includes the
Research Criteria and Threats to Validity architecture of the IoHT authentication systems related to health
It is noted that potential oversight in the selection of research care devices and their respective data. This includes IoHT
papers and flaws pose the greatest challenges to the validity of devices and the communication channels or technologies that
this viewpoint, and inconsistencies may exist in the data are implemented to facilitate their use in health care applications.
taxonomy structure. We set the research questions and scopes The Security Threats in IoHT Authentication section includes
in advance and manage the selection of research papers based the threats toward authentication in IoT and IoHT networks to
on the 4 methodologies in Table 1 to explore the relevant work establish the security requirements of the proposed
of IoHT data management and use in next-generation contextualized data model for AMFA. The Theoretical
authentication systems. Reports, journal articles, conference Framework and Discussion of AMFA section elaborates the
proceedings, and white papers related to remote authentication theoretical approach toward the contextualized data modality
and user management systems were selected. We also used a for the AMFA system with respect to each sections’
variety of search engines to confirm the accuracy of selected requirement. Finally, the viewpoint is concluded in the
content. However, given that this is a nontrivial activity, it is Conclusions section. The categorization of the requirements for
difficult to locate and include all essential research articles in the data model is provided in Figure 2, showing the main
our literature review without excluding any major study efforts. components of the IoHT architecture.
For the validity of this viewpoint, there is a possibility for bias
Figure 2. The Internet of Health Care Things authentication layout of the categorized architecture.
Figure 3. Wireless sensor network of nodes within a human body for health care data generation. ECG: electrocardiogram; EEG: electroencephalogram.
devices to store biometric data [25]. 5G networks are being used not actively protected by cloud-dependent security services
in the health care sector in combination with IoHT devices to [36].
provide fast, reliable, and cost-effective solutions for information
communication [31]. Sigwele et al [31] proposed a framework
Implantable Medical Devices
that would use a user’s smartphone as the gateway device Implantable medical devices are often seen as a subcategory of
between multiple devices to use Bluetooth as a networking monitoring and sensor devices that analyze patient data, allowing
application to transmit data and offer an energy-efficient solution for a contactless approach to persistent observation of vital data
to health care services where gateway resources are limited and offering a secure service that ensures that a patient’s medical
[31]. Cloud computing within health care conveniently data are kept private, available, and accessible remotely [37].
accommodates the capabilities of IoHT mobile devices, allowing These devices allow for large data-sharing operations between
them to be used further from on-site facilities, such as at home multiple hardware components such as smartphones, tablets,
or on the move. This can be achieved through web applications and display units. From the perspective of authentication
that integrate a user interface for patients to store and access technologies, these devices can be configured to allow the use
their digital health data while allowing physicians to access the of biometric factors in combination with the device’s physical
same records from their own office or homes [29]. mechanism to authenticate a user and allow for the transmission,
storage, and observations of their personal medical data [35].
Wearable Medical Devices The application of wireless biometric sensor nodes in a body
The wearable medical devices in the IoHT are responsible for network can be established through biometric data within a
contextualizing real-time data, often from a patient to an human to identify and authenticate the user when their health
electronic record system that can then be further monitored as record data are being transmitted via communication channels
real-time values or stored values of data for physicians [33]. [25].
Wearable medical devices have emerged as a primary approach
to handling the large quantities of data shared across devices
Applications for IoHT Authentication
and systems in health care, with some examples of their use Overview
being insulin pumps or other health wellness observation devices
In this section, we discuss the applications of IoHT devices,
that can track and transmit live data in health services [35].
that is, the communication technologies of each category. These
Wearable devices use their integrated sensor technologies to
applications play a crucial role in identifying and mapping the
capture patient data such as temperature, heartbeat, oxygen, or
specific attacks that target various devices within a health care
glucose, and they transmit their data through these sensor nodes
authentication environment. The 4 objectives chosen in this
onto monitoring devices, which can then be further measured
section are provided in Textbox 2, demonstrating the
and analyzed in short- or long-term observations [34]. Wearable
classification of the technologies and elaborating on the
devices are an essential tool in health care settings as they
examples of real-world health care practices of these IoHT
advance the flexibility of health care services and can track not
devices and their respective data. The examples from Textbox
only biomedical data but also cognitive or behavioral metrics
2 provide a concise overview of patient monitoring,
of a patient such as their mobility- or fitness-related metrics
rehabilitation, and observation devices. These examples
through devices such as smart watches or fitness wrist bands,
illustrated the current technological landscape within health
which can store data over longer periods [32]. Wearable devices
care organizations. This section categorizes these devices to
have increasing varieties of application in health care, often
establish a framework for defining IoHT elements. This
leaving them vulnerable as their technology’s pursuit robust
framework addresses the data they manage and the
and lightweight designs that overlook security over functionality
authentication requirements based on user roles, whether they
[28]. Mo et al [27] proposed a wearable medical device
are patients or health care workers. Patients may interact with
architecture that secures the authentication security of devices
a device either for personal use or under the guidance of a health
through privileged resource management and 2-factor
care worker. In such cases, the data generated would pertain to
authentication key agreements [27]; this is impactful as the
the patient and might not necessitate direct access by the patient
sensitive data found in these IoHT devices are categorized.
themselves. Instead, access might be required solely by the
Wearable devices alongside implantable devices are often
health care worker responsible for monitoring or observing the
limited in their power consumption as they tend to be battery
patient’s data, whether within a health care facility or remotely.
run, and therefore, their security concerns and attack surface
In addition, devices such as implants, or wearables could also
must cover offline-based attacks during which the devices are
be assigned for rehabilitation objectives.
• Wireless networks: Wi-Fi, 4G, 5G, 6G, Bluetooth, and Bluetooth Low Energy [9,28,42]
Patient monitoring
• Electrocardiogram monitors, electroencephalogram, electrocardiogram, blood pressure, and blood oxygen [9,23,32,33,43]
Patient observation
Patient rehabilitation
• Cloud computing, active assistance, and detection and prevention systems [9,23]
high level of security to ensure that only authenticated users Patient Rehabilitation
can access and interact with the data being recorded by these Health care rehabilitation has also been improved with IoHT
IoHT devices as an adversary could potentially manipulate the devices and data management in wearable and implantable
data and misdiagnose a patient or obtain access to prescription devices that can provide a service to patients remotely and
drugs that would not otherwise be required [32]. within a health care facility. Remote consultation through a
Patient Observation physician uses the health care data recorded within the devices
in conjunction with patient monitoring and observations to
Observation shares a field with patient monitoring when we
provide a smart service to users, which is desirable with the
consider sensor technologies and the nature of IoHT device
current COVID-19 restrictions in most countries. The
architecture. The data from a sensor include a patient’s health
monitoring of patients remotely allows artificial intelligence
history, records, or even real-life data such as their vitals that
applications to be developed in conjunction with IoHT devices
are being transmitted through the IoHT. These sensors are often
to help patient recovery [10]. IoT-based devices in the health
small communication devices that use various wireless
care domain also improve assistance services where wearable
applications of technologies to transmit their data, and their
or implanted sensors can alert or request resources from health
storage space is often small and relies on real-time processing
care direct to the patient [23]. Examples of these devices are
to ensure a reliable flow of power and data in their constrained
pushed through the devices to alert health care service providers
size limits to fit into common sensor or wearables devices such
that a patient requires a service or consulting on demand.
as smart watches or wearable bands. An example of an
Detection and prevention systems are popular in cybersecurity
observation device is fall or faint detection sensors that were
and have application within health care as they allow patient
primarily used within health care facilities for a physician to
vital information to become reactive [23]. This is useful when
monitor and observe their patients during a time of
applied to biometrics as patient biomedical data such as their
rehabilitation, but with IoHT advancements, this technology
blood flow could allow for automated administration of
has found itself to be viable remotely, and patients can use these
medicines. Cloud-based resources further improve the service
devices from home to alert an authority of their incident [44].
of IoHT capabilities by facilitating the management of big data
Mobile devices such as fall detection can use wireless
and real-time resource constraints between IoHT devices that
technologies to track movement of a patient through wearable
are constrained by power consumption [9].
or implantable devices using a sensor such as gyroscope [45].
These data can be sent to a gateway or mobile monitoring Security Threats in IoHT Authentication
device; Bluetooth and NFC can be used within health care
facilities to monitor patients who are physically present, whereas Overview
Wi-Fi can be used for remote monitoring [45]. IoHT devices The main objective of next-generation solutions in this field is
can also use cloud resources to reduce overhead of data to promote a strong posture of security hygiene in the IoT space
communication on local resources within a health care of health care practices. Security of authentication must be
organization or even on remote resources such as a patient’s ensured through best practice solutions. To understand how to
gateway devices as they upload and store data from their approach this, we discuss the security requirements of the IoHT
personal IoHT devices [23]. devices and their threat and risk landscapes. As shown in Table
2, the threats are categorized, and the security requirements of
the IoHT device data taxonomy are discussed.
a
IoHT: Internet of Health Care Things.
Social Engineering Authentication Threats networks between IoHT devices. Network configurations are
Social engineering attacks take advantage of the human factor designed to be flexible and automated gateways of
in a system. In health care, this can be the patients using the communication for IoHT devices and their data; however, once
services or the physicians interacting with the devices through an attack is successful, it can quickly scale and increase its
observation and remediation of their patients’ health [46]. In volatility through a compromised network [51]. A sybil or
regard to authenticating IoHT devices, social engineering threats replication attack can affect a user identity system, which is
revolve around gathering information concerning a target’s often overlooked in terms of security approaches to
knowledge, possessions, or identity to achieve a position of authentication in IoT networks [12], thus increasing the attack
informational superiority over the target. Social engineering is surface of the IoHT through their network communication
similar to the reconnaissance phase where the attacker uses their channels, which must be considered when contextualizing the
understanding of a system to identify vulnerabilities and get a security of an adaptive model for authenticating users.
user or authority with privileges within the system to divulge Broken Authentication Threats
sensitive information such as credentials or information that
This threat type is based on a subcategory of web applications
would expose the architecture of the authentication system [47].
as its direct platform for staging an attack, but from the
The most known social engineering attack is a phishing attack,
perspective of health care authentication, it can also be used
where the attacker sends an email or other type of message to
through network-based attacks to attack ≥1 accounts in a system
their targets, often containing a malicious link that once opened
to escalate privileges. User management security is often
can infect a system and exfiltrate credentials or other sensitive
overlooked, and active sessions of a user log-in are not
information [48]. However, attackers could potentially use
monitored by traditional MFA systems, which will not ensure
techniques used in conventional user system attacks to
validity that the user who provided the factors of authentication
compromise IoHT devices operating autonomously to deliver
is the legitimate owner of the user account [52]. Web
health services to patients. This could be done in an attempt to
vulnerabilities exist in poorly configured session management
escalate ransomware or initial denial of services [49]. Health
systems that can allow for an adversary to manipulate a session,
care data are a high-value target for attackers, who leverage it
even copy it, or forge a malicious session that imitates the
to exploit patients by establishing their own authenticity as
legitimate one to avoid detection from users and security
legitimate entities during communications. This manipulation
authorities of the system during an attack [52]. This type of
frequently results in the coerced divulgence of sensitive
threat can establish the basis of the previously mentioned threat
information [46].
types as a starting point for an adversary to further escalate their
Web Application and Network Authentication Threats attacks within a system once they have obtained credentials
Network-based threats exist through an authentication systems relevant to the network [53]. Offline attacks are another angle
network or through web applications that facilitate the that an adversary can take toward broken authentication of users.
authentication process. These types of attacks are categorized Password authentication poses a great threat in this category
based on web applications that could be vulnerable to injection because there are many applications for staging an attack on an
or forgery of a user or node within an IoHT device that would authentication factor such as a smart card, where an adversary
authenticate malicious attempts from an adversary to attack a can replicate or clone a device and begin to attempt every
system. In web application threats, an adversary can manipulate possible password combination until they are successful without
a weakness or vulnerability found in an application to extract ever alerting the actual system [54].
credentials from the user; this can be achieved through IoHT Attacks
interception of the data through a malicious site, injecting
malicious code within a vulnerable application and directing Overview
the user to it, or even by tampering local resources on the In this section, we discuss the attacks that IoHT authentication
application [50]. Regarding authentication, web applications architecture faces in a health care context. Figure 4 shows the
with inadequate security against access attacks, create a threat 5 major components of security research: confidentiality,
surface for attacks with weak or poor management of integrity, availability, authorization, and authentication. The
authentication factors such as using a password [12]. These scope of these attacks lies within authentication factors and their
attacks are especially efficient against IoHT devices, as it is corresponding data management within the health care context.
common in IoT devices for security to be set to default In this section, we define the threats and attacks to IoHT data
parameters that will not detect additional components of a user and devices for categorization. In Table 3, we summarize the
log-in session such as when or where they logged in from and attack types as they are mapped out to their relevant threat
other security checks to ensure the user is who they claim they categories regarding IoHT authentication. It is important to note
are through MFA. Network-based attacks are a category of that these are the in-scope objectives of this paper, but many
threats in authentication such as web applications but are not threats arise and challenge the health care sector as more data
bound to devices or servers, as they can access and manage become digitalized.
cloud services, local networks, and other interconnected
Figure 4. Attack chart for the authentication category in the field of computer science.
then uses this deceptive identity to entice genuine users into measures and can be related to social engineering approaches.
engaging with their forged attack [12]. In the second part of this Access attacks are an attempt by an adversary to access a
attack, the adversary can fabricate IoHT devices and other nodes legitimate user’s account through manipulation, intrusion, or
to steal existing authentications from legitimate users and forceful measures, often using third-party information where a
maintain their leverage within a system [12]. Remote user data breach or use of a reused password that has been exposed
authentication suffers from having lower security postures in in the past has been used again [15]. Weak passwords can be
bad practices such as the handling of passwords in IoHT devices obtained through brute forcing, dictionary attacks, or by using
where credentials are not hashed with cryptographic measures rainbow tables. Adversaries exploit system vulnerabilities to
to obscure plaintext stored information [58]. It is easy for an acquire passwords, attempting every conceivable combination
adversary to fake certificates on public key exchanges, which based on their findings related to the user account [62].
can extract the private key of a legitimate user, during interaction According to Bošnjak et al [62], weak passwords are still being
with a client, website, or service from a fraudulent source that used presently despite the vast range of research and statistics
an adversary has prepared [57]. that point to the use of passwords being one of the weakest
approaches to authentication security, and they claim that a
Replication Attacks
modern graphics processing unit can crack >95% of passwords
In the context of health care authentication, a replication attack in only a few days. Botnets are another way that an adversary
can involve the cloning or replication of a device that often is can perform access attacks on authentication systems as they
linked to a singular device or sensor via a unique identifier such use a large volume of bots to perform password guessing or
as a MAC address [12]. An adversary can take advantage of password cracking attacks on large identity systems such as a
devices that do not provide authentication security options for health care identity database, attempting to escalate their
detecting log-ins from a given location based on where the privileges in the network through higher-value users [63].
device should be situated in its given work environment [12]. Offline password guessing is mainly a weakness in wireless
Often a sybil attack occurs on IoT devices as they use wireless sensor nodes found in IoHT devices because of the lack of an
technology to communicate and store the data within the device MFA security feature configuration. An example of a threat to
through the sensor nodes. Wireless sensor technology networks an authentication factor’s security features is within single-factor
are vulnerable to node replication and sybil attacks because authentication security. A device such as a smart card is
many of the components that make up a node are left defenseless vulnerable to tampering if a weak or stolen password can bypass
and often on their default configurations out of the box, making the single layer of security during authentication, thereby
their attempts at security often trivial to attackers with exposing the user’s data [54].
knowledge of the device [59]. Wireless sensor devices are often
lightweight technologies that communicate closely with other Theoretical Framework and Discussion
IoHT devices to form a large network of monitorable sensitive
data in which an adversary will manipulate interception of of AMFA
communicating applications to control these nodes and where
Overview
they send their data [14].
Throughout this paper, we have discussed the applications of
Sybil Attacks AMFA in IoHT domains based on authentication security
Sybil attacks share some properties with replication attacks, requirements. In addition, we have discussed AMFA in the
except that the adversary can extend a hijacked or replicated context of health care environments and evaluated the feasibility
node to gain influence within the network through other created of an improved AMFA model that can address security concerns
identities or nodes [12]. This type of attack affects an identity over IoHT methodologies. In the design of this data taxonomy,
network by gaining a large portion of nodes within an IoT device we consolidated the 4 domains of MFA systems: user
and overcoming a “reputation system,” which refers to identity information, working environments, device information, and
structures where poor security has been implemented by giving use-case settings.
users rights to certain actions within a system that they would
In the following sections, we discuss the foundation of the data
not normally have without many identities [20]. In a remote
taxonomy proposed as a solution for AMFA data management.
IoHT device where mobile networks are being used, the
We elaborate on the categorization of the attributes that are
adversary can manipulate local resources within the system.
regarded for an AMFA systems in relation to the 4 domains of
They can exploit their majority of identities to influence
the data taxonomy. On the basis of our findings, the relationship
decisions that would be unobtainable for a single user [60]. By
between MFA attributes and IoHT data is summarized in a data
publishing multiple malicious nodes of the adversary’s identity,
model. The resulting taxonomy of the AMFA-IoHT data
it is possible for the attacker to route messages or other types
consolidates the emerging disciplines of AMFA research fields
of sensitive information within the IoHT device into their
to improve security requirements in adaptive authentication
possession for manipulation or exfiltration [61].
systems. These data can be used to improve the scalability of
Access Attacks, Weak Passwords, and Stolen Credentials existing MFA solutions in the current health care environment,
Broken authentication is a broader category of challenges and and the adaptability of authentication systems can be improved
attacks such as brute force, weak passwords, stolen credentials, with privacy and security.
and credential stuffing. This category shares similar principles
among each subcategory of attack based on weak security
System Architecture of an IoHT Data Model and setup complexity associated with automating an AMFA
solution. This is particularly important as human errors and
Overview negligence tend to arise when transitioning toward enhanced
The attributes discussed in this section can be categorized, as security measures that moves beyond reliance on passwords.
shown in Figure 5, to contextualize the data model within their
Building upon the insights from our analysis in Figure 5, the
respective categories, which combines user types with data types
elements selected for the IoHT architecture contribute toward
and device types. The security requirements of an AMFA system
an AMFA approach to security requirements. The threats that
in the IoHT must ensure reliability, scalability, and lightweight
challenge IoHT data are based on data breaches and attacks that
design to reduce constraints on resources, especially where
affect user nodes through creation or manipulation. Health care
smaller technologies such as sensors are used. These attributes
requirements against these challenges persist even after the
form a taxonomy of IoHT data structures categorized by devices,
current situation of the COVID-19 pandemic. The leading cause
users, and the corresponding environment of use. This
of poor security approaches to these challenges is poor or weak
classification also takes into account the potential threats that
authentication methods, such as the use of passwords in
these entities might encounter. We generate these attributes to
user-based systems. Our solution provides a data model for the
be used in the autonomy of security approaches to an AMFA
automation of IoHT architecture to reduce user interaction with
solution that benefits users such as the older adults who could
the selection criteria of authentication factors. The proposed
be overwhelmed with the authentication options they are
system was designed to adapt on the changing features of the
presented with. In addition, we aim to minimize the expenses
IoHT environment.
Figure 5. Elements of heterogeneous data in the Internet of Health Care Things. AMFA: adaptive multifactor authentication.
a
IoHT: Internet of Health Care Things.
a
IoHT: Internet of Health Care Things.
have. These categories cover the known and most used factors scheme. The structured data ensure that when health care
in authentication security approaches and do not need to be workers begin authentication, it is safe and time efficient,
improved because they cover the parameters of adaptive security meaning there is less unnecessary complexity for security
appropriately. To ensure adaptive security, our research adopts features. This supports a better understanding of the devices
the approach of a passwordless MFA security system. As shown that are affected (ie, sensors, monitors, and other remote
in Figure 6, data communicate between sensors and monitoring devices), allowing for appropriate classification based on
devices in a health care environment and contain crucial authentication factors chosen. The outcome of this phase creates
information to be transmitted in real time. This is classified as an algorithmic metric that gives resources a weighting to
sensitive data important for authentication and a classification categorize them as low, medium, or high sensitivity.
Figure 6. A conceptual structure of data in motion in an Internet of Health Care Things environment. C1: remote access authentication; C2: Working
from home authentication; C3: Working from within the organization authentication; U1: health care employee; U2: patient; U3: guest.
Figure 7. Contextualized Internet of Health Care Things (IoHT) architecture toward an adaptive multifactor authentication (MFA) model. A1: spoofing
or masquerading attacks from the social engineering category; A2: forgery attacks from the web application category; A3-1: replication attacks from
the network category; A3-2: sybil attacks from the network category; A4-1: weak password attacks from the Broken Authentication category, A4-2:
stolen credential attacks from the Broken Authentication category; A4-3: access attacks from the Broken Authentication category; C1: remote access
authentication; C2: Working from home authentication; C3: Working from within the organization authentication; GID: gateway device; IID: implantable
device; L1: low sensitivity; L2: medium sensitivity; L3: high sensitivity; MID: monitoring device; SID: sensor device; U1: health care employee; U2:
patient; U3: guest; WID: wearable device.
Figure 8. Adaptive multifactor authentication (MFA) model flowchart with the current stage of research. IoHT: Internet of Health Care Things.
Acknowledgments
This work was supported by the Cyber Security Research Centre Limited, whose activities were partially funded by the Australian
Government’s Cooperative Research Centres Programme.
Data Availability
All data generated or analyzed during this viewpoint are included in this manuscript.
Conflicts of Interest
None declared.
References
1. Javaid M, Khan IH. Internet of Things (IoT) enabled healthcare helps to take the challenges of COVID-19 Pandemic. J
Oral Biol Craniofac Res 2021;11(2):209-214 [FREE Full text] [doi: 10.1016/j.jobcr.2021.01.015] [Medline: 33665069]
2. Bradley C, El-Tawab S, Heydari MH. Security analysis of an IoT system used for indoor localization in healthcare facilities.
In: Proceedings of the Systems and Information Engineering Design Symposium (SIEDS). 2018 Presented at: Systems and
Information Engineering Design Symposium (SIEDS); April 27, 2018; Charlottesville, VA URL: https://doi.org/10.1109/
SIEDS.2018.8374726 [doi: 10.1109/SIEDS.2018.8374726]
3. Adetunji CO, Olaniyan OT, Adeyomoye O, Dare A, Adeniyi MJ, Alex E, et al. Internet of Health Things (IoHT) for
COVID-19. In: Pani SK, Dash S, dos Santos WP, Chan Bukhari SA, Flammini F, editors. Assessing COVID-19 and Other
Pandemics and Epidemics using Computational Modelling and Data Analysis. Cham, Switzerland: Springer; 2022.
4. Fagroud FZ, Toumi H, Ben Lahmar EH, Talhaoui MA, Achtaich K, Filali SE. Impact of IoT devices in e-health: a review
on IoT in the context of COVID-19 and its variants. Procedia Comput Sci 2021;191:343-348 [FREE Full text] [doi:
10.1016/j.procs.2021.07.046] [Medline: 34512818]
5. Murugan S, Vijayakumar K, Sivakumar V, Manikandan R, Kumar A, Saikumar K. Impact of Internet of Health Things
(IoHT) on COVID-19 disease detection and its treatment using single hidden layer feed forward neural networks (SIFN).
In: Anandan R, Suseendran G, Chatterjee P, Jhanjhi NZ, Ghosh U, editors. How COVID-19 is Accelerating the Digital
Revolution. Cham, Switzerland: Springer; 2022.
6. IBM report: cost of a data breach hits record high during pandemic. IBM Newsroom. 2021 Jul 28. URL: https://newsroom.
ibm.com/2021-07-28-IBM-Report-Cost-of-a-Data-Breach-Hits-Record-High-During-Pandemic [accessed 2022-06-13]
7. Cost of a data breach report 2022. IBM Corp. URL: https://www.ibm.com/au-en/security/data-breach [accessed 2022-06-13]
8. Azzawi MA, Hassan R, Bakar KA. A review on Internet of Things (IoT) in healthcare. Int J Appl Eng Res 2016
Nov;11(20):10216-10221
9. Baker SB, Xiang W, Atkinson I. Internet of things for smart healthcare: technologies, challenges, and opportunities. IEEE
Access 2017 Nov 29;5:26521-26544 [FREE Full text] [doi: 10.1109/ACCESS.2017.2775180]
10. Bhatt V, Chakraborty S. Real-time healthcare monitoring using smart systems: a step towards healthcare service orchestration
smart systems for futuristic healthcare. In: Proceedings of the International Conference on Artificial Intelligence and Smart
Systems (ICAIS). 2021 Presented at: International Conference on Artificial Intelligence and Smart Systems (ICAIS); March
25-27, 2021; Coimbatore, India [doi: 10.1109/icais50930.2021.9396029]
11. Kumar T, Braeken A, Liyanage M, Ylianttila M. Identity privacy preserving biometric based authentication scheme for
Naked healthcare environment. In: Proceedings of the IEEE International Conference on Communications (ICC). 2017
Presented at: IEEE International Conference on Communications (ICC); May 21-25, 2017; Paris, France [doi:
10.1109/icc.2017.7996966]
12. Papaioannou M, Karageorgou M, Mantas G, Sucasas V, Essop I, Rodriguez J, et al. A survey on security threats and
countermeasures in Internet of Medical Things (IoMT). Trans Emerging Telecommun Technol 2020 Jul 23;33(6):e4049
[FREE Full text] [doi: 10.1002/ett.4049]
13. Scarpato N, Pieroni A, Di Nunzio L, Fallucchi F. E-health-IoT universe: a review. Int J Adv Sci Eng Inf Technol
2017;7(6):2328-2336 [doi: 10.18517/ijaseit.7.6.4467]
14. Sharma G, Kalra S. A lightweight user authentication scheme for cloud-IoT based healthcare services. Iran J Sci Technol
Trans Electr Eng 2018 Oct 9;43(S1):619-636 [FREE Full text] [doi: 10.1007/s40998-018-0146-5]
15. Ometov A, Petrov V, Bezzateev S, Andreev S, Koucheryavy Y, Gerla M. Challenges of multi-factor authentication for
securing advanced IoT applications. IEEE Network 2019 Mar;33(2):82-88 [FREE Full text] [doi: 10.1109/mnet.2019.1800240]
16. Ometov A, Bezzateev S, Mäkitalo N, Andreev S, Mikkonen T, Koucheryavy Y. Multi-factor authentication: a survey.
Cryptography 2018 Jan 05;2(1):1 [FREE Full text] [doi: 10.3390/cryptography2010001]
17. Arias-Cabarcos P, Krupitzer C, Becker C. A survey on adaptive authentication. ACM Comput Surv 2019 Sep 11;52(4):1-30
[FREE Full text] [doi: 10.1145/3336117]
18. Thara DK, Premasudha BG, Ram VR, Suma R. Impact of big data in healthcare: a survey. In: Proceedings of the 2nd
International Conference on Contemporary Computing and Informatics (IC3I). 2016 Presented at: 2nd International
Conference on Contemporary Computing and Informatics (IC3I); December 14-17, 2016; Greater Noida, India URL: https:/
/doi.org/10.1109/IC3I.2016.7918057 [doi: 10.1109/ic3i.2016.7918057]
19. Mamdouh M, Awad AI, Khalaf AA, Hamed HF. Authentication and identity management of IoHT devices: achievements,
challenges, and future directions. Comput Secur 2021 Dec;111:102491 [FREE Full text] [doi: 10.1016/j.cose.2021.102491]
20. Arshad A, Mohd Hanapi Z, Subramaniam S, Latip R. A survey of Sybil attack countermeasures in IoT-based wireless
sensor networks. PeerJ Comput Sci 2021;7:e673 [FREE Full text] [doi: 10.7717/peerj-cs.673] [Medline: 34712787]
21. Kirsal Ever Y. Secure-anonymous user authentication scheme for e-healthcare application using wireless medical sensor
networks. IEEE Syst J 2019 Mar;13(1):456-467 [FREE Full text] [doi: 10.1109/JSYST.2018.2866067]
22. Javaid S, Zeadally S, Fahim H, He B. Medical sensors and their integration in wireless body area networks for pervasive
healthcare delivery: a review. IEEE Sensors J 2022 Mar 1;22(5):3860-3877 [FREE Full text] [doi: 10.1109/jsen.2022.3141064]
23. Mora H, Gil D, Terol RM, Azorín J, Szymanski J. An IoT-based computational framework for healthcare monitoring in
mobile environments. Sensors (Basel) 2017 Oct 10;17(10):2302 [FREE Full text] [doi: 10.3390/s17102302] [Medline:
28994743]
24. Yu S, Park Y. A robust authentication protocol for wireless medical sensor networks using blockchain and physically
unclonable functions. IEEE Internet Things J 2022 Oct 15;9(20):20214-20228 [FREE Full text] [doi:
10.1109/jiot.2022.3171791]
25. Anwar M, Abdullah AH, Qureshi KN, Majid AH. Wireless body area networks for healthcare applications: an overview.
Telkomnika 2017 Sep 01;15(3) [FREE Full text] [doi: 10.12928/telkomnika.v15i3.5793]
26. Kintzlinger M, Nissim N. Keep an eye on your personal belongings! The security of personal medical devices and their
ecosystems. J Biomed Inform 2019 Jul;95:103233 [FREE Full text] [doi: 10.1016/j.jbi.2019.103233] [Medline: 31201966]
27. Mo J, Shen W, Pan W. An improved anonymous authentication protocol for wearable health monitoring systems. Wirel
Commun Mob Comput 2020;2020:1-13 [FREE Full text] [doi: 10.1155/2020/5686498]
28. Yaqoob T, Abbas H, Atiquzzaman M. Security vulnerabilities, attacks, countermeasures, and regulations of networked
medical devices—a review. IEEE Commun Surv Tutor 2019 Apr 30;21(4):3723-3768 [FREE Full text] [doi:
10.1109/comst.2019.2914094]
29. Jemal H, Kechaou Z, Ayed MB, Alimi AM. Cloud computing and mobile devices based system for healthcare application.
In: Proceedings of the IEEE International Symposium on Technology and Society (ISTAS). 2015 Presented at: IEEE
International Symposium on Technology and Society (ISTAS); November 11-12, 2015; Dublin, Ireland URL: https://doi.
org/10.1109/ISTAS.2015.7439407 [doi: 10.1109/istas.2015.7439407]
30. Pradhan B, Bhattacharyya S, Pal K. IoT-based applications in healthcare devices. J Healthc Eng 2021;2021:6632599 [FREE
Full text] [doi: 10.1155/2021/6632599] [Medline: 33791084]
31. Sigwele T, Hu YF, Ali M, Hou J, Susanto M, Fitriawan H. Intelligent and energy efficient mobile smartphone gateway for
healthcare smart devices based on 5G. In: Proceedings of the IEEE Global Communications Conference (GLOBECOM).
2018 Presented at: IEEE Global Communications Conference (GLOBECOM); December 9-13, 2018; Abu Dhabi, United
Arab Emirates [doi: 10.1109/glocom.2018.8648031]
32. Albesher AA. Iot in health-care: recent advances in the development of smart cyber-physical ubiquitous environments. Int
J Comput Sci Netw Secur 2019;19(2):181-186
33. Fernandez F, Pallis G. Opportunities and challenges of the Internet of Things for healthcare. In: Proceedings of the 4th
International Conference on Wireless Mobile Communication and Healthcare - "Transforming healthcare through innovations
in mobile and wireless technologies". 2014 Presented at: 4th International Conference on Wireless Mobile Communication
and Healthcare - "Transforming healthcare through innovations in mobile and wireless technologies"; November 3-5, 2014;
Athens, Greece URL: https://doi.org/10.1109/MOBIHEALTH.2014.7015961 [doi: 10.4108/icst.mobihealth.2014.257276]
34. Haghi M, Thurow K, Stoll R. Wearable devices in medical Internet of Things: scientific research and commercially available
devices. Healthc Inform Res 2017 Jan;23(1):4-15 [FREE Full text] [doi: 10.4258/hir.2017.23.1.4] [Medline: 28261526]
35. Hudson F, Clark C. Wearables and medical interoperability: the evolving frontier. Computer 2018 Sep;51(9):86-90 [FREE
Full text] [doi: 10.1109/MC.2018.3620987]
36. Tawalbeh L, Muheidat F, Tawalbeh M, Quwaider M. IoT privacy and security: challenges and solutions. Appl Sci 2020
Jun 15;10(12):4102 [FREE Full text] [doi: 10.3390/app10124102]
37. Wu L, Du X, Guizani M, Mohamed A. Access control schemes for implantable medical devices: a survey. IEEE Internet
Things J 2017 Oct;4(5):1272-1283 [FREE Full text] [doi: 10.1109/jiot.2017.2708042]
38. Kang J, Fan K, Zhang K, Cheng X, Li H, Yang Y. An ultra light weight and secure RFID batch authentication scheme for
IoMT. Comput Commun 2021 Feb 1;167:48-54 [FREE Full text] [doi: 10.1016/j.comcom.2020.12.004]
39. Al-Saedi SB, Azim MM. Radio Frequency Near Communication (RFNC) technology: an integrated RFID-NFC system
for objects' localization. In: PrOceedings of the 9th IEEE-GCC Conference and Exhibition (GCCCE). 2017 Presented at:
9th IEEE-GCC Conference and Exhibition (GCCCE); May 8-11, 2017; Manama, Bahrain [doi:
10.1109/ieeegcc.2017.8448129]
40. Newaz AI, Sikder AK, Rahman MA, Uluagac AS. A survey on security and privacy issues in modern healthcare systems:
attacks and defenses. ACM Trans Comput Healthc 2021 Jul 21;2(3):1-44 [FREE Full text] [doi: 10.1145/3453176]
41. Urbanczyk T, Peter L. Database development for the urgent department of hospital based on tagged entity storage following
the IoT concept. In: Proceedings of the 14th IFAC Conference on Programmable Devices and Embedded Systems PDES
2016. 2016 Presented at: 14th IFAC Conference on Programmable Devices and Embedded Systems PDES 2016; October
5-7, 2016; Brno, Czech Republic [doi: 10.1016/j.ifacol.2016.12.047]
42. Shahid J, Ahmad R, Kiani AK, Ahmad T, Saeed S, Almuhaideb AM. Data protection and privacy of the internet of healthcare
things (IoHTs). Appl Sci 2022 Feb 12;12(4):1927 [FREE Full text] [doi: 10.3390/app12041927]
43. Iliev IT, Badarov DH, Tabakov SD, Ganev BT, Kanev IK. Fully analogue ECG front-end applicable in remote patient
monitoring. In: Proceedings of the XXIX International Scientific Conference Electronics (ET). 2020 Presented at: XXIX
International Scientific Conference Electronics (ET); September 16-18, 2020; Sozopol, Bulgaria [doi:
10.1109/et50336.2020.9238247]
44. Fersi G. Study of middleware for Internet of healthcare things and their applications. In: Proceedings of the International
Conference on Smart Homes and Health Telematics. 2020 Presented at: International Conference on Smart Homes and
Health Telematics; June 24–26, 2020; Hammamet, Tunisia [doi: 10.1007/978-3-030-51517-1_18]
45. Vishnu S, Ramson SR, Jegan R. Internet of medical things (IoMT)- an overview. In: Proceedings of the 5th International
Conference on Devices, Circuits and Systems (ICDCS). 2020 Presented at: 5th International Conference on Devices, Circuits
and Systems (ICDCS); March 5-6, 2020; Coimbatore, India [doi: 10.1109/icdcs48716.2020.243558]
46. Venkatesha S, Reddy KR, Chandavarkar BR. Social engineering attacks during the COVID-19 pandemic. SN Comput Sci
2021;2(2):78-79 [FREE Full text] [doi: 10.1007/s42979-020-00443-1] [Medline: 33585823]
47. Leonov PY, Vorobyev AV, Ezhova AA, Kotelyanets OS, Zavalishina AK, Morozov NV. The main social engineering
techniques aimed at hacking information systems. In: Proceedings of the Ural Symposium on Biomedical Engineering,
Radioelectronics and Information Technology (USBEREIT). 2021 Presented at: Ural Symposium on Biomedical Engineering,
Radioelectronics and Information Technology (USBEREIT); May 13-14, 2021; Yekaterinburg, Russia [doi:
10.1109/usbereit51232.2021.9455031]
48. Gupta S, Singhal A, Kapoor A. A literature survey on social engineering attacks: phishing attack. In: Proceedings of the
International Conference on Computing, Communication and Automation (ICCCA). 2016 Presented at: International
Conference on Computing, Communication and Automation (ICCCA); April 29-30, 2016; Greater Noida, India [doi:
10.1109/ccaa.2016.7813778]
49. Gan D, Heartfield R. Social engineering in the internet of everything. Cut IT J 2016;29(7):20-29 [FREE Full text]
50. Ingle DR, Meshram BB. Attacks on web based software and modelling defence mechanisms. Int J UbiComp 2012
Jul;3(3):11-30 [FREE Full text] [doi: 10.5121/iju.2012.3302]
51. Fang L, Li Y, Yun X, Wen Z, Ji S, Meng W, et al. THP: a novel authentication scheme to prevent multiple attacks in
SDN-based IOT network. IEEE Internet Things J 2020 Jul;7(7):5745-5759 [FREE Full text] [doi: 10.1109/jiot.2019.2944301]
52. Hassan MM, Nipa SS, Akter M, Haque R, Deepa FN, Rahman MM, et al. Broken authentication and session management
vulnerability: a case study of web application. Int J Simul Syst Sci Technol 2018 Apr 30;19(2):1-11 [FREE Full text] [doi:
10.5013/IJSSST.a.19.02.06]
53. Nadar VM, Chatterjee M, Jacob L. A defensive approach for CSRF and broken authentication and session management
attack. In: Proceedings of the International Conference on Recent Advancements in Computer, Communication and
Computational Sciences (RACCCS-2017). 2017 Presented at: RACCCS-2017; September 2-3, 2017; Ajmer, India URL:
https://doi.org/10.1007/978-981-10-7386-1_49 [doi: 10.1007/978-981-10-7386-1_49]
54. Wang D, Wang P. Offline dictionary attack on password authentication schemes using smart cards. In: Proceedings of the
16th International Conference, ISC 2013. 2013 Presented at: 16th International Conference, ISC 2013; November 13-15,
2013; Dallas, TX [doi: 10.1007/978-3-319-27659-5_16]
55. Dewangan K, Mishra M. Internet of things for healthcare: a review. Int J Adv Manag Technol Eng Sci 2018
Mar;8(III):526-534
56. Li CT, Shih DH, Wang CC. Cloud-assisted mutual authentication and privacy preservation protocol for telecare medical
information systems. Comput Methods Programs Biomed 2018 Apr;157:191-203 [FREE Full text] [doi:
10.1016/j.cmpb.2018.02.002] [Medline: 29477428]
57. Shim KA. Universal forgery attacks on remote authentication schemes for wireless body area networks based on internet
of things. IEEE Internet Things J 2019 Oct;6(5):9211-9212 [FREE Full text] [doi: 10.1109/jiot.2019.2922701]
58. Soni M, Patel T, Jain A. Security analysis on remote user authentication methods. In: Proceeding of the International
Conference on Computer Networks, Big Data and IoT (ICCBI - 2018). 2018 Presented at: International Conference on
Computer Networks, Big Data and IoT (ICCBI - 2018); December 19–20, 2018; Madurai, India [doi:
10.1007/978-3-030-24643-3_60]
59. Shaukat HR, Hashim F, Sali A, Abdul Rasid MF. Node replication attacks in mobile wireless sensor network: a survey. Int
J Distrib Sens Netw 2014 Dec 08;10(12) [FREE Full text] [doi: 10.1155/2014/402541]
60. Manjula V, Chellappan C. The replication attack in wireless sensor networks: analysis and defenses. In: Proceedings of the
International Conference on Computer Science and Information Technology. 2011 Presented at: CCSIT 2011; January 2-4,
2011; Bangalore, India URL: https://doi.org/10.1007/978-3-642-17878-8_18 [doi: 10.1007/978-3-642-17878-8_18]
61. Mishra AK, Tripathy AK, Puthal D, Yang LT. Analytical model for Sybil attack phases in internet of things. IEEE Internet
Things J 2019 Feb;6(1):379-387 [FREE Full text] [doi: 10.1109/jiot.2018.2843769]
62. Bošnjak L, Sreš J, Brumen B. Brute-force and dictionary attack on hashed real-world passwords. In: Proceedings of the
41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).
2018 Presented at: 41st International Convention on Information and Communication Technology, Electronics and
Microelectronics (MIPRO); May 21-25, 2018; Opatija, Croatia URL: https://doi.org/10.23919/MIPRO.2018.8400211 [doi:
10.23919/mipro.2018.8400211]
63. Salamatian S, Huleihel W, Beirami A, Cohen A, Medard M. Why botnets work: distributed brute-force attacks need no
synchronization. IEEE Trans Inform Forensic Secur 2019 Sep;14(9):2288-2299 [FREE Full text] [doi:
10.1109/tifs.2019.2895955]
64. Singh P, Basit A, Kumar NC, Venkaiah VC. Towards a hybrid Public Key Infrastructure (PKI): a review. Cryptology ePrint
Archive. Preprint posted online July 14, 2019 2023 [FREE Full text] [doi: 10.1002/047148296x.tie149]
65. Nag AK, Dasgupta D. An adaptive approach for continuous multi-factor authentication in an identity eco-system. In:
Proceedings of the 9th Annual Cyber and Information Security Research Conference. 2014 Presented at: CISR '14; April
8-10, 2014; Oak Ridge, TN URL: https://doi.org/10.1145/2602087.2602112 [doi: 10.1145/2602087.2602112]
66. Muhammad G, Alqahtani S, Alelaiwi A. Pandemic management for diseases similar to COVID-19 using deep learning and
5G communications. IEEE Netw 2021 May;35(3):21-26 [FREE Full text] [doi: 10.1109/mnet.011.2000739]
Abbreviations
AMFA: adaptive multifactor authentication
BLE: Bluetooth Low Energy
ECG: electrocardiogram
IoHT: Internet of Health Care Things
IoT: Internet of Things
MFA: multifactor authentication
NFC: near-field communication
RFID: Radio Frequency Identification
Edited by T Leung; submitted 07.11.22; peer-reviewed by K Gupta, D Tlapa; comments to author 16.02.23; revised version received
16.03.23; accepted 23.07.23; published 29.08.23
Please cite as:
Suleski T, Ahmed M
A Data Taxonomy for Adaptive Multifactor Authentication in the Internet of Health Care Things
J Med Internet Res 2023;25:e44114
URL: https://www.jmir.org/2023/1/e44114
doi: 10.2196/44114
PMID: 37490633
©Tance Suleski, Mohiuddin Ahmed. Originally published in the Journal of Medical Internet Research (https://www.jmir.org),
29.08.2023. This is an open-access article distributed under the terms of the Creative Commons Attribution License
(https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium,
provided the original work, first published in the Journal of Medical Internet Research, is properly cited. The complete bibliographic
information, a link to the original publication on https://www.jmir.org/, as well as this copyright and license information must
be included.