0% found this document useful (0 votes)
15 views22 pages

fuzzy notes

Uploaded by

sohambackup46
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
Download as pdf or txt
0% found this document useful (0 votes)
15 views22 pages

fuzzy notes

Uploaded by

sohambackup46
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 22

JOURNAL OF MEDICAL INTERNET RESEARCH Suleski & Ahmed

Viewpoint

A Data Taxonomy for Adaptive Multifactor Authentication in the


Internet of Health Care Things

Tance Suleski*, BA; Mohiuddin Ahmed*, PhD


School of Science, Edith Cowan University, Perth, Australia
*
all authors contributed equally

Corresponding Author:
Tance Suleski, BA
School of Science
Edith Cowan University
270 Joondalup Dr, Joondalup WA
Perth, 6027
Australia
Phone: 61 13 43 28
Email: tsuleski@our.ecu.edu.au

Abstract
The health care industry has faced various challenges over the past decade as we move toward a digital future where services and
data are available on demand. The systems of interconnected devices, users, data, and working environments are referred to as
the Internet of Health Care Things (IoHT). IoHT devices have emerged in the past decade as cost-effective solutions with large
scalability capabilities to address the constraints on limited resources. These devices cater to the need for remote health care
services outside of physical interactions. However, IoHT security is often overlooked because the devices are quickly deployed
and configured as solutions to meet the demands of a heavily saturated industry. During the COVID-19 pandemic, studies have
shown that cybercriminals are exploiting the health care industry, and data breaches are targeting user credentials through
authentication vulnerabilities. Poor password use and management and the lack of multifactor authentication security posture
within IoHT cause a loss of millions according to the IBM reports. Therefore, it is important that health care authentication
security moves toward adaptive multifactor authentication (AMFA) to replace the traditional approaches to authentication. We
identified a lack of taxonomy for data models that particularly focus on IoHT data architecture to improve the feasibility of
AMFA. This viewpoint focuses on identifying key cybersecurity challenges in a theoretical framework for a data model that
summarizes the main components of IoHT data. The data are to be used in modalities that are suited for health care users in
modern IoHT environments and in response to the COVID-19 pandemic. To establish the data taxonomy, a review of recent
IoHT papers was conducted to discuss the related work in IoHT data management and use in next-generation authentication
systems. Reports, journal articles, conferences, and white papers were reviewed for IoHT authentication data technologies in
relation to the problem statement of remote authentication and user management systems. Only publications written in English
from the last decade were included (2012-2022) to identify key issues within the current health care practices and their management
of IoHT devices. We discuss the components of the IoHT architecture from the perspective of data management and sensitivity
to ensure privacy for all users. The data model addresses the security requirements of IoHT users, environments, and devices
toward the automation of AMFA in health care. We found that in health care authentication, the significant threats occurring
were related to data breaches owing to weak security options and poor user configuration of IoHT devices. The security requirements
of IoHT data architecture and identified impactful methods of cybersecurity for health care devices, data, and their respective
attacks are discussed. Data taxonomy provides better understanding, solutions, and improvements of user authentication in remote
working environments for security features.

(J Med Internet Res 2023;25:e44114) doi: 10.2196/44114

KEYWORDS
health care; authentication; contextual data model; Internet of Health Care Things; multifactor; mobile phone

https://www.jmir.org/2023/1/e44114 J Med Internet Res 2023 | vol. 25 | e44114 | p. 1


(page number not for citation purposes)
XSL• FO
RenderX
JOURNAL OF MEDICAL INTERNET RESEARCH Suleski & Ahmed

the amount of physical interaction needed between people as


Introduction social distancing was enforced across many countries to combat
Overview the threat of COVID-19 [4]. The IoHT not only improves these
services but also increases the capabilities of innovating new
There is an emergence of research on the Internet of Health ways by which services can be delivered. Technologies can be
Care Things (IoHT) in the past decade as the introduction of applied to medical practices to reduce the social impact that
Internet of Things (IoT) devices overseeing sensitive health COVID-19 has caused the world, and experimental studies show
care data has dynamically shaped the environment of higher accuracy and confidence toward the real-world markets
authentication. This viewpoint explores the current challenges of these applications [5]. In authentication security, a data breach
to the IoHT and the technologies that are being used with health to an organization can expose both its customers such as patients
care data. The data are assessed based on communication as a in health care and organization workers such as physicians,
service between providers and their patients through various doctors, or nurses. The cost of a data breach can be scaled
environments. Related work is reviewed with the addition of depending on the size of the organization and the type of data
COVID-19–related environments to support an improved that are affected, and the health care industry is targeted because
mapping of current IoHT architectures. These data will benefit of the large volume of sensitive information becoming
future research and development of authentication approaches digitalized. According to the 2021 IBM report on the Cost of a
to IoHT data modeling. The purpose of the data classification Data Breach, a study showed that remotely working away from
model is to contextualize the attributes that make up an IoHT the office during the pandemic led to expensive data breaches
device’s data structure. To achieve this, we discuss these reaching an average of US $4.96 million per breach when remote
attributes as entities within the data model and how they are working occurred, and stolen user information was the lead
related to authentication security, that is, mapping the data to cause in a data breach [6]. According to the 2022 IBM report
the distinct categories of devices and the threats that are present on the Cost of a Data Breach, this was the 12th year in a row
or emerging against those categories of IoHT devices. From the where the average cost of a data breach had increased from the
perspective of a viewpoint, we discuss adaptive multifactor previous year, showing an average cost of US $4.35 million up
authentication (AMFA) in the context of health care. The results from US $4.24 million in 2021 and US $3.86 million in 2020
are an evaluation of the feasibility for improved AMFA model [7]. This viewpoint aims to establish a contextualized model of
to address security concerns with regard to IoHT methodologies. the IoHT devices’ data that is to be analyzed for assessment of
The main contributions of the structured model of IoHT data the feasibility of application within AMFA systems. In the
with regard to AMFA are as follows: System Architecture of an IoHT Data Model section, we provide
a detailed description of the labels used in the data model
1. Establishing a viewpoint of security requirements of proposed for AMFA mutual authentication encryption schemes.
authentication systems from a cybersecurity perspective The impact of the data classification model is to group the
and discussing the challenges on the domain of IoHT data attributes of IoHT environment devices into their respective
2. Establishing the architecture of IoHT data requirements, as categories for future research and development purposes. By
attributes, and forming a categorization of the 4 domains grouping the devices and their data structures, we aim to provide
within our scope: user information, working environments, a foundation to fill the knowledge gap of IoHT systems and
device information, and use-case settings their authentication security efforts based on the IoHT literature.
3. Discussing and summarizing the data taxonomy of
AMFA-IoHT data in relation to the current challenges and Literature Review
future directions Authentication in the IoHT is the process of granting access to
Background a user through various steps of multifactor authentication (MFA)
to ensure that the user is legitimate. The IoHT is interconnected
The COVID-19 pandemic has created a lot of interest in the through numerous applications of communication channels to
research community to address concerns against security issues remotely access and use health data. Remote health care services
regarding the constraints and limitations of IoT devices used in are more important than ever, not only because of the pandemic
health care and seeking to improve the overall organization and but also because of the shift for industries to digitize all their
security posture of authentication identity management systems services for better scalability and cost-effective solutions. Table
[1]. The technology present in current health care industries 1 evaluates the literature review for authentication solutions in
facilitates the advancement of authentication practices with a health care in relation to this paper’s objective toward AMFA.
better understanding of how AMFA can improve the IoHT and Static authentication is the methodology of an authentication
the ubiquity of these existing technologies such as in Bluetooth system or solution that configures or has a default setup with
and Wi-Fi communications [2]. Many health care services have no capabilities or intentions to change based on changing
become remotely accessible from home and on the go as environments. Dynamic solutions are those that follow a reactive
organizations remediate against the high demand for their approach where the authentication methodologies can be
resources and the physical capabilities of their workers and changed, or solutions have been provided for restructuring of
assets. The IoHT has been a crucial part of increasing the the authentication system’s capabilities. AMFA seeks to govern
scalability of these services [3]. The IoHT has helped to reduce or automate the authentication process by considering the
the cost of services for both the organizations and the patients security requirements of a system and allowing a proactive
through telecommunication advances, remote treatment and approach to security.
monitoring of patients for health care workers, and reducing
https://www.jmir.org/2023/1/e44114 J Med Internet Res 2023 | vol. 25 | e44114 | p. 2
(page number not for citation purposes)
XSL• FO
RenderX
JOURNAL OF MEDICAL INTERNET RESEARCH Suleski & Ahmed

Table 1. Review of related work based on security features.


Study Remote authentication Static authentication solu- Dynamic authentication Adaptive authentication
solution tion solution solution
Our paper ✓ ✓ ✓
Azzawi et al [8], 2016 ✓ ✓
Baker et al [9], 2017 ✓ ✓
Bhatt and Chakraborty [10], 2021 ✓ ✓
Kumar et al [11], 2017 ✓ ✓
Papaioannou et al [12], 2020 ✓
Scarpato et al [13], 2017 ✓
Sharma and Kalra [14], 2019 ✓ ✓

Sharma and Kalra [14] proposed a lightweight secure and answer algorithm to reduce user interaction throughout the
authentication scheme for remote monitoring of patients using authentication process. However, the scheme promotes
an automated validity tool. The protocol in this paper uses centralized systems that would not be secure against various
timestamps in sensor monitors to mitigate various attacks. cyberattacks outside their controlled environments, such as in
However, the proposed solution focuses on an approach to remote authentication scenarios. Baker et al [9] proposed a
establishing configurations to authentication that is static in 4-part model for the IoHT based on a body area network
nature, which would be unsuitable for an adaptive system that composed of wearable sensors for health care data. The proposed
must deploy reactive measures. Azzawi et al [8] proposed an model of this solution is designed to implement various
authentication mechanism to reduce the exhaustion of resources communication technologies such as in Bluetooth or Bluetooth
in IoT environments. The protocol in this paper uses elliptic Low Energy (BLE), which are common in small IoT devices
curve cryptography to support minimized overhead of resources owing to their power constraints [9]. However, the proposed
for encryption. The proposed scheme would be suitable in the encryption of authentication in these technologies is
IoHT to replace the use of Rivest-Shamir-Adleman encryption Rivest-Shamir-Adleman encryption, which contains larger key
to minimize the power constraints on smaller sensor node sizes and can constrain IoT devices. The proposed solution also
devices. Papaioannou et al [12] found that the resource does not protect users from broken authentication should a
constraint on IoHT devices lowers the feasibility of many password system be used, which would be because of poor
proposed schemes in the domain of medical authentication security posture or overlooking IoT configurations. Bhatt and
schemes. According to their findings, authentication schemes Chakraborty [10] proposed a smart system for orchestration of
that aimed to implement lower key size solutions would result health care services to support data sharing in IoHT networks.
in lightweight applications that would be well suited to the IoHT The research toward this scheme aims to integrate sensor-based
to ensure authentication. Scarpato et al [13] proposed a privacy devices for real-time environments such as hospitals. This
design for IoHT devices, in particular sensors, as their data solution requires artificial intelligence for the smart system,
should not be accessible to all users of the device. However, which would be beneficial in an AMFA system to govern
their principle has not been tested against common IoT attacks, changing environments of user authentication. As shown in
which could be achieved through a user-based AMFA scheme. Figure 1, a wireless node network in the human body uses an
Kumar et al [11] suggested that biometric authentication has an IoHT environment to generate health care data. Body nodes can
important role in the IoHT, as lightweight solutions can be use various technologies to facilitate the sensors and monitoring
designed with high security owing to the strength in biometric devices for patient care.
solutions. The proposed solution in this paper uses a request

https://www.jmir.org/2023/1/e44114 J Med Internet Res 2023 | vol. 25 | e44114 | p. 3


(page number not for citation purposes)
XSL• FO
RenderX
JOURNAL OF MEDICAL INTERNET RESEARCH Suleski & Ahmed

Figure 1. The wireless network of body nodes in an Internet of Health Care Things environment.

attributes that are requirements in IoHT systems. As mentioned


Proposed Methodology in the Proposed Methodology section, the four core domains of
Overview authentication systems that are crucial to this data taxonomy
are as follows: (1) user information, (2) working environments,
IoHT environment security has become a widespread technology (3) device information, and (4) use-case settings.
of various devices, data, and users to improve health care. To
analyze the security requirements of IoHT data classification, The capabilities of IoHT systems operate on the premise of
it is important to identify the key security features from a these 4 domains in relation to AMFA. For the purpose of a data
cybersecurity perspective. To increase the viability of AMFA taxonomy, the attributes are categorized within each of these
in the health care industry, we discovered a shortage of domains and are used to contextualize the data model for a
taxonomy for data models that concentrate primarily on IoHT health care environment. Smart eHealth applications such as
data architecture. In a theoretical framework for a data model wearable devices or implantable devices are considered as
that encapsulates the fundamental elements of IoHT data, the advanced technologies from an IoT perspective, which rely on
purpose of this viewpoint is to identify the major cybersecurity privacy and security for their users [15]. These technologies
problems. The information is to be applied in ways that are come with unique challenges from a cybersecurity perspective.
suitable for the COVID-19 pandemic response and current IoHT Research Purpose and Contributions
settings for health care users. A data taxonomy is structured to
group data into distinct classes based on shared traits, and the Traditionally, IoT authentication data are handled by default
architecture will enhance the comprehension of IoHT data. The configurations in devices and technologies that are deployed in
taxonomy offers a practical method of categorizing data to health care environments owing to their growing number and
demonstrate that it is distinct and without duplication, and these high demand. This can cause an oversight in security
groups contain attributes that serve a purpose in AMFA requirements and establish a safe and secure approach to
solutions. authentication security. This viewpoint contributes toward a
better understanding of IoHT data management for AMFA
Why the IoHT? systems by contextualizing security features based on the 4
MFA-IoHT refers to the principles of authentication systems domains mentioned in the Why the IoHT? section. Contextual
functioning in a health care environment. To improve adaptive features are analyzed and discussed such as the attributes of
systems through machine learning and data models, the heterogeneous data in the IoHT, that is, user types, device types,
MFA-IoHT data must be categorized to consolidate the core use cases, and working environments. The heterogeneous data

https://www.jmir.org/2023/1/e44114 J Med Internet Res 2023 | vol. 25 | e44114 | p. 4


(page number not for citation purposes)
XSL• FO
RenderX
JOURNAL OF MEDICAL INTERNET RESEARCH Suleski & Ahmed

are then labeled in their respective categories to improve the data inputs of heterogeneous IoHT data within the data
contextual analysis of AMFA systems in future research and taxonomy in relation to authentication solutions. We believe
work. To the best of our knowledge, the structured data that all findings and recommendations were to the best of our
taxonomy and architecture of IoHT data can help identify and knowledge at the time to categorize authentication data.
improve the security features of the IoHT by providing a
complete overview of the environment.
Organization of Sections
The Research Design and Results section includes the
Research Criteria and Threats to Validity architecture of the IoHT authentication systems related to health
It is noted that potential oversight in the selection of research care devices and their respective data. This includes IoHT
papers and flaws pose the greatest challenges to the validity of devices and the communication channels or technologies that
this viewpoint, and inconsistencies may exist in the data are implemented to facilitate their use in health care applications.
taxonomy structure. We set the research questions and scopes The Security Threats in IoHT Authentication section includes
in advance and manage the selection of research papers based the threats toward authentication in IoT and IoHT networks to
on the 4 methodologies in Table 1 to explore the relevant work establish the security requirements of the proposed
of IoHT data management and use in next-generation contextualized data model for AMFA. The Theoretical
authentication systems. Reports, journal articles, conference Framework and Discussion of AMFA section elaborates the
proceedings, and white papers related to remote authentication theoretical approach toward the contextualized data modality
and user management systems were selected. We also used a for the AMFA system with respect to each sections’
variety of search engines to confirm the accuracy of selected requirement. Finally, the viewpoint is concluded in the
content. However, given that this is a nontrivial activity, it is Conclusions section. The categorization of the requirements for
difficult to locate and include all essential research articles in the data model is provided in Figure 2, showing the main
our literature review without excluding any major study efforts. components of the IoHT architecture.
For the validity of this viewpoint, there is a possibility for bias
Figure 2. The Internet of Health Care Things authentication layout of the categorized architecture.

https://www.jmir.org/2023/1/e44114 J Med Internet Res 2023 | vol. 25 | e44114 | p. 5


(page number not for citation purposes)
XSL• FO
RenderX
JOURNAL OF MEDICAL INTERNET RESEARCH Suleski & Ahmed

are often health-related data that are communicated and stored


Research Design and Results as electronic health records [18]. IoHT devices store, transmit,
IoHT Authentication Architecture and communicate data in real time, and these data are often used
in critical settings to measure the health of a patient for
Authentication is categorized based on our understanding of observation, rehabilitation, and recovery, making protected
the 3 common fields of something you are, something you know, methodologies of passing the data between legitimate entities
and something you have, allowing us to create MFA a necessity [19].
combinations of physical traits, knowledge-based traits, and
inherence-based traits for security [15]. However, with the IoHT Devices
requirement for scalability of the growing IoT technologies that
Overview
emerge, we seek to advance our capabilities with the addition
of time and location features in our smart technologies to The architecture discussed in this paper relates to similar systems
enhance automation and artificial intelligence–driven responses found in the IoT; in the IoHT, these interconnected systems are
to handling authenticators [16]. Therefore, in an adaptive contextualized in health care settings, and often, the devices
solution of the health care data architecture, we must support and their users are shared as public resources within a confined
the diversity and continuity of the authenticators, which are practice. Authentication among these devices is important as
referred to as managed resources that create the elements of the initial line of security to establish a safe and secure channel
authentication [17]. IoHT data can be large in volume, known of communication of sensitive information. Textbox 1 shows
as big data, and this comes from the vast number of devices that the categories of devices that we consider in this IoHT
could be used per patient depending on the service being authentication architecture. Each category is discussed in detail,
provided; thus, the data become sensitive information as these and the related papers are assigned in a table format.

Textbox 1. Notation of Internet of Health Care Things devices.


Device categories and their notations

• SID: Sensor device [20-25]

• MID: Monitoring device [10,23,26-28]

• GID: Gateway device [25,29-31]

• WID: Wearable device [27,28,32-36]

• IID: Implantable device [28,35,37]

from the challenge of reproducing human traits accurately [25].


Sensor Devices Health care monitoring devices have profited from the
Devices based on sensor node technologies can transmit and advancements in sensor technology as collecting personal health
communicate data from the sensor device to a monitoring device data as digital health data and the ability to use cloud resources
or storage device either wirelessly or through a wired allow for better use of real-time data in the observation and
connection. Wireless sensor devices have emerged in the past recovery of patients [23]. Sensor nodes have begun developing
decade as physical objects integrated with internet capabilities 4G and 5G networking capabilities in the health care
that provide advanced use of real-time data from the objects environments, allowing for allocation of stronger security
node, which gives us the terminology of sensor nodes, depicting configurations such as unclonable functions in these sensor
that IoT devices that can send and receive data [20]. In the nodes to protect against a vast range of threats such as
context of health care, sensors commonly take the form of replication attacks, further using existing technologies accessible
wireless medical nodes. These nodes can be implanted, worn, on most mobile devices to improve scalability [24]. Anwar et
or integrated into patient monitoring systems as a service to al [25] proposed a paradigm for the sensor networks that can
oversee various real-time applications. For instance, they can be applied to the human body, to read vitals that have expanded
regulate and transmit data such as a patient’s glucose levels or as devices become wearable, implantable, and a part of the IoHT
temperature [21]. Medical sensors have improved the quality architecture. The network is introduced as a Wireless Body Area
of life of many IoT devices in health care environments, and Network and can be used in health care environments for
they have emerged in the last decade as an industry leader for monitoring various IoHT services for patient care. As shown
biomedical data monitoring, known as biosensors, and they can in Figure 3, sensor nodes in the human body generate biometric
be found in various operating or surgical practices [22]. IoHT data that can be transmitted to health care workers. The different
applications are greatly improving the use of biometric data applications of sensors in this figure display examples that can
reading in health care practices. Biometrics are widely regarded be applied to IoHT networking and then the health care data
as a robust option for authentication owing to their inherent can be shown in monitoring devices.
resistance against replication and forgery. The resilience stems

https://www.jmir.org/2023/1/e44114 J Med Internet Res 2023 | vol. 25 | e44114 | p. 6


(page number not for citation purposes)
XSL• FO
RenderX
JOURNAL OF MEDICAL INTERNET RESEARCH Suleski & Ahmed

Figure 3. Wireless sensor network of nodes within a human body for health care data generation. ECG: electrocardiogram; EEG: electroencephalogram.

different users in a health care environment in on-site


Monitoring Devices environments such as clinics or hospitals, where data are read
These devices are used to monitor other devices such as during an appointment, as opposed to home monitoring devices.
wearable devices, sensors, and implantable technologies, often Yaqoob et al [28] suggested that monitoring frameworks of IoT
with their own operating system, and they can use resources applications can be improved with distributed systems that
such as web applications. Monitoring devices are used for would allow for multiple patients to be able to use a wearable
continuous observation and evaluation of patients in a health device that would otherwise experience high use of its limited
care environment, meaning that the system is of high importance computational resources when treating multiple patients.
in critical situations, which could involve monitoring sleep, Monitoring devices can communicate through various
heart rate, or blood pressure from electrocardiogram (ECG) technologies such as wirelessly through Bluetooth, Wi-Fi (IPv4
sensors [10]. Remote monitoring services can also improve the and IPv6), Ethernet wired connections, or even radio
quality of IoT devices in health care settings, as patients can be frequencies, which are handled by gateway devices that govern
watched through embedded medical sensors that transmit the standards and security of communications [27].
real-time data, even from home monitors that allow larger
volumes of data to be collected over a period to help physicians Gateway Devices
make better medical evaluations that would not have been A gateway device is the communication point between devices
possible without constant monitoring at a hospital or clinic in where data are transmitted, communicated, or stored, and it
previous times [26]. In addition, in remote health care manages various technologies such as public key infrastructure
monitoring, it is possible for these devices to track patient cryptography, wireless protocols, or Bluetooth communications
wearable devices such as wristbands with biosensors or that make up the networking applications in IoHT architecture.
implantable devices such as insulin pumps or pacemakers and Gateway interfaces include devices that serve as a bridge
transmit or store the data to be reviewed later by health care between the monitoring devices and the data acquisition devices
service workers [27]. Monitoring devices also exist as wearable such as wearables and implantable devices, and they address
technology that can improve the care of patients through remote networking protocols to route data in its 3 forms: transmission,
or on-site based equipment to collect and monitor their health storage, and in use [30]. Gateway devices can also be classified
data, offering mobility and flexibility of patients and the way as networks of a collection of IoHT devices that interconnect
health care workers can offer their services in working from communication application. With the emerging biosensor
home or working on-the-go environments that we are seeing technologies, wireless body networks are being included as
more owing to COVID-19 [23]. It is common for real-time gateway communication nodes within a patient’s body in
monitoring devices to be shared and used by a large volume of conjunction with sensors, implants, wearables, and other IoHT

https://www.jmir.org/2023/1/e44114 J Med Internet Res 2023 | vol. 25 | e44114 | p. 7


(page number not for citation purposes)
XSL• FO
RenderX
JOURNAL OF MEDICAL INTERNET RESEARCH Suleski & Ahmed

devices to store biometric data [25]. 5G networks are being used not actively protected by cloud-dependent security services
in the health care sector in combination with IoHT devices to [36].
provide fast, reliable, and cost-effective solutions for information
communication [31]. Sigwele et al [31] proposed a framework
Implantable Medical Devices
that would use a user’s smartphone as the gateway device Implantable medical devices are often seen as a subcategory of
between multiple devices to use Bluetooth as a networking monitoring and sensor devices that analyze patient data, allowing
application to transmit data and offer an energy-efficient solution for a contactless approach to persistent observation of vital data
to health care services where gateway resources are limited and offering a secure service that ensures that a patient’s medical
[31]. Cloud computing within health care conveniently data are kept private, available, and accessible remotely [37].
accommodates the capabilities of IoHT mobile devices, allowing These devices allow for large data-sharing operations between
them to be used further from on-site facilities, such as at home multiple hardware components such as smartphones, tablets,
or on the move. This can be achieved through web applications and display units. From the perspective of authentication
that integrate a user interface for patients to store and access technologies, these devices can be configured to allow the use
their digital health data while allowing physicians to access the of biometric factors in combination with the device’s physical
same records from their own office or homes [29]. mechanism to authenticate a user and allow for the transmission,
storage, and observations of their personal medical data [35].
Wearable Medical Devices The application of wireless biometric sensor nodes in a body
The wearable medical devices in the IoHT are responsible for network can be established through biometric data within a
contextualizing real-time data, often from a patient to an human to identify and authenticate the user when their health
electronic record system that can then be further monitored as record data are being transmitted via communication channels
real-time values or stored values of data for physicians [33]. [25].
Wearable medical devices have emerged as a primary approach
to handling the large quantities of data shared across devices
Applications for IoHT Authentication
and systems in health care, with some examples of their use Overview
being insulin pumps or other health wellness observation devices
In this section, we discuss the applications of IoHT devices,
that can track and transmit live data in health services [35].
that is, the communication technologies of each category. These
Wearable devices use their integrated sensor technologies to
applications play a crucial role in identifying and mapping the
capture patient data such as temperature, heartbeat, oxygen, or
specific attacks that target various devices within a health care
glucose, and they transmit their data through these sensor nodes
authentication environment. The 4 objectives chosen in this
onto monitoring devices, which can then be further measured
section are provided in Textbox 2, demonstrating the
and analyzed in short- or long-term observations [34]. Wearable
classification of the technologies and elaborating on the
devices are an essential tool in health care settings as they
examples of real-world health care practices of these IoHT
advance the flexibility of health care services and can track not
devices and their respective data. The examples from Textbox
only biomedical data but also cognitive or behavioral metrics
2 provide a concise overview of patient monitoring,
of a patient such as their mobility- or fitness-related metrics
rehabilitation, and observation devices. These examples
through devices such as smart watches or fitness wrist bands,
illustrated the current technological landscape within health
which can store data over longer periods [32]. Wearable devices
care organizations. This section categorizes these devices to
have increasing varieties of application in health care, often
establish a framework for defining IoHT elements. This
leaving them vulnerable as their technology’s pursuit robust
framework addresses the data they manage and the
and lightweight designs that overlook security over functionality
authentication requirements based on user roles, whether they
[28]. Mo et al [27] proposed a wearable medical device
are patients or health care workers. Patients may interact with
architecture that secures the authentication security of devices
a device either for personal use or under the guidance of a health
through privileged resource management and 2-factor
care worker. In such cases, the data generated would pertain to
authentication key agreements [27]; this is impactful as the
the patient and might not necessitate direct access by the patient
sensitive data found in these IoHT devices are categorized.
themselves. Instead, access might be required solely by the
Wearable devices alongside implantable devices are often
health care worker responsible for monitoring or observing the
limited in their power consumption as they tend to be battery
patient’s data, whether within a health care facility or remotely.
run, and therefore, their security concerns and attack surface
In addition, devices such as implants, or wearables could also
must cover offline-based attacks during which the devices are
be assigned for rehabilitation objectives.

https://www.jmir.org/2023/1/e44114 J Med Internet Res 2023 | vol. 25 | e44114 | p. 8


(page number not for citation purposes)
XSL• FO
RenderX
JOURNAL OF MEDICAL INTERNET RESEARCH Suleski & Ahmed

Textbox 2. Objectives of Internet of Health Care Things devices and data.


Remote data communication

• Radio Frequency Identification [9,38]

• Near-field communication [39-41]

• Wireless networks: Wi-Fi, 4G, 5G, 6G, Bluetooth, and Bluetooth Low Energy [9,28,42]

Patient monitoring

• Electrocardiogram monitors, electroencephalogram, electrocardiogram, blood pressure, and blood oxygen [9,23,32,33,43]

Patient observation

• Fall or faint detection [44]

• Gyroscope, fitness tracker, and pedometers [45]

Patient rehabilitation

• Cloud computing, active assistance, and detection and prevention systems [9,23]

lower amount of power consumption overall, and BLE-capable


Remote Data Communication devices are specifically useful in the design to be fast,
In the IoT, there are various technologies that currently exist cost-effective, and smaller in physical size [28]. Bluetooth
and are used within the IoHT environments, and remotely technologies can be configured to use different types of
communicating data rely on lightweight and robust advances encryptions for authentication security and are applied in many
owing to the limitations and constraints of a wireless device to real-world environments to connect and share data among large
have its own power source [9]. In short-range communications, volumes of devices [9].
Radio Frequency Identification (RFID) technology is commonly
applied to possession-based factors, such as smart cards or Patient Monitoring
security tags, and is implemented into IoT devices for identity The traditional concept of human monitoring has advanced with
control [38]. Per-tag identification using RFID cards allows for the emergence of information and communications technology.
the authentication of a single tag per session by an authenticated These advancements allow complex but lightweight solutions
user, which can assist in mitigating against the threat of users to examine a patient’s health data from a physical perspective
replicating a user session or hijacking, which will be discussed to a logical perspective as digital data. To elaborate, this includes
further in the IoHT Attacks section [38]. Near-field remote patient monitoring through IoHT devices as IoT
communication (NFC) is another short-range localized technologies have implemented secure and accurate
technology [39] that provides access controls to physical representations of collecting, storing, and interacting with
locations and can be used to restrict user access in physical sensitive health data from various environments such as a
security efforts to ensure that users are authenticated before physician interacting with their patients in their workplaces, at
accessing physical resources. Asymmetric cryptography can be home, or on the go. Patient monitoring as a field considers the
added to tags in addition to one-time passwords to enable remote way medical or health care equipment can display or represent
user identification by keeping the public key inside the device the data of a patient such as displaying their vital signs through
and interacting with the private key inside RFID readers [40]. screens, displays, or other wearable or mobile devices such as
NFC can also be used in health care monitors to capture the ECGs [43]. To contextualize the data, it is crucial to comprehend
identification of a user or the health care record being used to the heterogeneous data generated by these IoHT devices in
authenticate the use of the data and then tag or label the entity health care monitoring. As health care has become more remote
for tracking as a system [41]. Another set of technologies used owing to the pandemic affecting the world and restraining the
in remote data communication are the wireless networks (Wi-Fi), health care sector for resources and time, it is important that
which are very common in most health care industries. These adaptive authentication can follow suite and allow for better
networks use technologies from a wide range of standards such remote authentication options. The IoHT allows monitoring
as cellular networks (3G, 4G, and 5G) to Bluetooth for IoHT techniques to be applied via take-home or on-the-go devices
devices to become interconnected [42]. Bluetooth can be used that use technologies to securely store and transmit their data
with IoHT devices for short-range communications with shared back to a hospital or personal monitoring device such as a
key authentication across many IoT devices and is found in smartphone to display vital health information [9]. An example
most IoT devices in modern times. Bluetooth primarily is of a monitoring IoHT device is the ECG monitors, blood
designed and used for short-range communication to form monitors, glucose monitors, or other biometric readable devices;
smaller networks that are quite flexible, as they support these can exist in many forms such as personal devices with
compatibility over various devices, which is favorable in the displays to show the readings from a small sensor, wearable
IoHT [28]. Bluetooth can also be used in BLE modes, which device, or implantable devices and translate the data into health
are common in sensor types of IoHT devices as they require a records of the patient using them [33]. Monitoring requires a

https://www.jmir.org/2023/1/e44114 J Med Internet Res 2023 | vol. 25 | e44114 | p. 9


(page number not for citation purposes)
XSL• FO
RenderX
JOURNAL OF MEDICAL INTERNET RESEARCH Suleski & Ahmed

high level of security to ensure that only authenticated users Patient Rehabilitation
can access and interact with the data being recorded by these Health care rehabilitation has also been improved with IoHT
IoHT devices as an adversary could potentially manipulate the devices and data management in wearable and implantable
data and misdiagnose a patient or obtain access to prescription devices that can provide a service to patients remotely and
drugs that would not otherwise be required [32]. within a health care facility. Remote consultation through a
Patient Observation physician uses the health care data recorded within the devices
in conjunction with patient monitoring and observations to
Observation shares a field with patient monitoring when we
provide a smart service to users, which is desirable with the
consider sensor technologies and the nature of IoHT device
current COVID-19 restrictions in most countries. The
architecture. The data from a sensor include a patient’s health
monitoring of patients remotely allows artificial intelligence
history, records, or even real-life data such as their vitals that
applications to be developed in conjunction with IoHT devices
are being transmitted through the IoHT. These sensors are often
to help patient recovery [10]. IoT-based devices in the health
small communication devices that use various wireless
care domain also improve assistance services where wearable
applications of technologies to transmit their data, and their
or implanted sensors can alert or request resources from health
storage space is often small and relies on real-time processing
care direct to the patient [23]. Examples of these devices are
to ensure a reliable flow of power and data in their constrained
pushed through the devices to alert health care service providers
size limits to fit into common sensor or wearables devices such
that a patient requires a service or consulting on demand.
as smart watches or wearable bands. An example of an
Detection and prevention systems are popular in cybersecurity
observation device is fall or faint detection sensors that were
and have application within health care as they allow patient
primarily used within health care facilities for a physician to
vital information to become reactive [23]. This is useful when
monitor and observe their patients during a time of
applied to biometrics as patient biomedical data such as their
rehabilitation, but with IoHT advancements, this technology
blood flow could allow for automated administration of
has found itself to be viable remotely, and patients can use these
medicines. Cloud-based resources further improve the service
devices from home to alert an authority of their incident [44].
of IoHT capabilities by facilitating the management of big data
Mobile devices such as fall detection can use wireless
and real-time resource constraints between IoHT devices that
technologies to track movement of a patient through wearable
are constrained by power consumption [9].
or implantable devices using a sensor such as gyroscope [45].
These data can be sent to a gateway or mobile monitoring Security Threats in IoHT Authentication
device; Bluetooth and NFC can be used within health care
facilities to monitor patients who are physically present, whereas Overview
Wi-Fi can be used for remote monitoring [45]. IoHT devices The main objective of next-generation solutions in this field is
can also use cloud resources to reduce overhead of data to promote a strong posture of security hygiene in the IoT space
communication on local resources within a health care of health care practices. Security of authentication must be
organization or even on remote resources such as a patient’s ensured through best practice solutions. To understand how to
gateway devices as they upload and store data from their approach this, we discuss the security requirements of the IoHT
personal IoHT devices [23]. devices and their threat and risk landscapes. As shown in Table
2, the threats are categorized, and the security requirements of
the IoHT device data taxonomy are discussed.

Table 2. Mapping of devices to their corresponding authentication threat types.

IoHTa device Threat categories

Social engineering Web application Network Broken authentication


Sensor device ✓ ✓ ✓
Monitoring device ✓ ✓ ✓ ✓
Gateway device ✓ ✓ ✓ ✓
Wearable device ✓ ✓ ✓
Implantable device ✓ ✓ ✓

a
IoHT: Internet of Health Care Things.

based on threats to the IoHT within the past decade. Security


IoHT Threats requirements of the proposed solution were considered from
Overview the assessment of the following criteria, social engineering
The following 3 subsections represent the categories of IoHT attacks, web application and network authentication threats,
threats discussed from the perspective of health care and broken authentication attacks.
authentication. Threats are categorized as a part of the IoHT
taxonomy of data, the model’s threat analysis generates data
https://www.jmir.org/2023/1/e44114 J Med Internet Res 2023 | vol. 25 | e44114 | p. 10
(page number not for citation purposes)
XSL• FO
RenderX
JOURNAL OF MEDICAL INTERNET RESEARCH Suleski & Ahmed

Social Engineering Authentication Threats networks between IoHT devices. Network configurations are
Social engineering attacks take advantage of the human factor designed to be flexible and automated gateways of
in a system. In health care, this can be the patients using the communication for IoHT devices and their data; however, once
services or the physicians interacting with the devices through an attack is successful, it can quickly scale and increase its
observation and remediation of their patients’ health [46]. In volatility through a compromised network [51]. A sybil or
regard to authenticating IoHT devices, social engineering threats replication attack can affect a user identity system, which is
revolve around gathering information concerning a target’s often overlooked in terms of security approaches to
knowledge, possessions, or identity to achieve a position of authentication in IoT networks [12], thus increasing the attack
informational superiority over the target. Social engineering is surface of the IoHT through their network communication
similar to the reconnaissance phase where the attacker uses their channels, which must be considered when contextualizing the
understanding of a system to identify vulnerabilities and get a security of an adaptive model for authenticating users.
user or authority with privileges within the system to divulge Broken Authentication Threats
sensitive information such as credentials or information that
This threat type is based on a subcategory of web applications
would expose the architecture of the authentication system [47].
as its direct platform for staging an attack, but from the
The most known social engineering attack is a phishing attack,
perspective of health care authentication, it can also be used
where the attacker sends an email or other type of message to
through network-based attacks to attack ≥1 accounts in a system
their targets, often containing a malicious link that once opened
to escalate privileges. User management security is often
can infect a system and exfiltrate credentials or other sensitive
overlooked, and active sessions of a user log-in are not
information [48]. However, attackers could potentially use
monitored by traditional MFA systems, which will not ensure
techniques used in conventional user system attacks to
validity that the user who provided the factors of authentication
compromise IoHT devices operating autonomously to deliver
is the legitimate owner of the user account [52]. Web
health services to patients. This could be done in an attempt to
vulnerabilities exist in poorly configured session management
escalate ransomware or initial denial of services [49]. Health
systems that can allow for an adversary to manipulate a session,
care data are a high-value target for attackers, who leverage it
even copy it, or forge a malicious session that imitates the
to exploit patients by establishing their own authenticity as
legitimate one to avoid detection from users and security
legitimate entities during communications. This manipulation
authorities of the system during an attack [52]. This type of
frequently results in the coerced divulgence of sensitive
threat can establish the basis of the previously mentioned threat
information [46].
types as a starting point for an adversary to further escalate their
Web Application and Network Authentication Threats attacks within a system once they have obtained credentials
Network-based threats exist through an authentication systems relevant to the network [53]. Offline attacks are another angle
network or through web applications that facilitate the that an adversary can take toward broken authentication of users.
authentication process. These types of attacks are categorized Password authentication poses a great threat in this category
based on web applications that could be vulnerable to injection because there are many applications for staging an attack on an
or forgery of a user or node within an IoHT device that would authentication factor such as a smart card, where an adversary
authenticate malicious attempts from an adversary to attack a can replicate or clone a device and begin to attempt every
system. In web application threats, an adversary can manipulate possible password combination until they are successful without
a weakness or vulnerability found in an application to extract ever alerting the actual system [54].
credentials from the user; this can be achieved through IoHT Attacks
interception of the data through a malicious site, injecting
malicious code within a vulnerable application and directing Overview
the user to it, or even by tampering local resources on the In this section, we discuss the attacks that IoHT authentication
application [50]. Regarding authentication, web applications architecture faces in a health care context. Figure 4 shows the
with inadequate security against access attacks, create a threat 5 major components of security research: confidentiality,
surface for attacks with weak or poor management of integrity, availability, authorization, and authentication. The
authentication factors such as using a password [12]. These scope of these attacks lies within authentication factors and their
attacks are especially efficient against IoHT devices, as it is corresponding data management within the health care context.
common in IoT devices for security to be set to default In this section, we define the threats and attacks to IoHT data
parameters that will not detect additional components of a user and devices for categorization. In Table 3, we summarize the
log-in session such as when or where they logged in from and attack types as they are mapped out to their relevant threat
other security checks to ensure the user is who they claim they categories regarding IoHT authentication. It is important to note
are through MFA. Network-based attacks are a category of that these are the in-scope objectives of this paper, but many
threats in authentication such as web applications but are not threats arise and challenge the health care sector as more data
bound to devices or servers, as they can access and manage become digitalized.
cloud services, local networks, and other interconnected

https://www.jmir.org/2023/1/e44114 J Med Internet Res 2023 | vol. 25 | e44114 | p. 11


(page number not for citation purposes)
XSL• FO
RenderX
JOURNAL OF MEDICAL INTERNET RESEARCH Suleski & Ahmed

Figure 4. Attack chart for the authentication category in the field of computer science.

Table 3. Threat categories of different authentication attack types.


Threat tag Threat category Attack type
A1 Social engineering Spoofing or masquerading attacks [19,28,55]

A2 Web application Forgery attacks [12,56-58]

A3-1 Network Replication attacks [12,14,59]

A3-2 Network Sybil attacks [12,20,60,61]

A4-1 Broken authentication Weak passwords [15]

A4-2 Broken authentication Stolen credentials [54,62]

A4-3 Broken authentication Access attacks [63]

masquerading, as the users they have affected to further


Masquerading or Spoofing Attacks
exfiltrate sensitive data or spread their attack capabilities from
Masquerading or spoofing attacks in the context of within the system [19]. Adversaries can spoof medical practices
authentication fall under the social engineering threat category. to intercept patient medical data transmitted or stored in IoHT
Masquerade attacks against IoT devices can affect both wired devices in combination with other attacks and vulnerabilities,
and wireless technologies in a health care setting and can be including wearable and implantable devices [28].
used to remotely impact a user’s authentication process and
affect the privacy of a system [55]. Spoofing a user’s Forgery Attacks
authentication involves the manipulation of a legitimate user Forgery attacks are often cross-site requests or scripting attacks
through vulnerabilities in the IoHT device or application being found in web browser applications and target authentication or
used, such as through redirection to a malicious source of a authenticated users. This attack forces interactions with
session that impersonates a legitimate channel of communication exploited services that can lead to exposed credentials or
or site [19]. Once an attacker has spoofed the legitimate user, unauthorized actions through remote user manipulation [56].
they can manipulate credentials or other sensitive data that can Forgery attacks are similar to masquerading attacks and involve
be used to leverage their way through the authentication system a 2-part process. The first part involves creating an identity
by elevating their node, and it is often achieved by within the system to pose as a legitimate entity; an adversary

https://www.jmir.org/2023/1/e44114 J Med Internet Res 2023 | vol. 25 | e44114 | p. 12


(page number not for citation purposes)
XSL• FO
RenderX
JOURNAL OF MEDICAL INTERNET RESEARCH Suleski & Ahmed

then uses this deceptive identity to entice genuine users into measures and can be related to social engineering approaches.
engaging with their forged attack [12]. In the second part of this Access attacks are an attempt by an adversary to access a
attack, the adversary can fabricate IoHT devices and other nodes legitimate user’s account through manipulation, intrusion, or
to steal existing authentications from legitimate users and forceful measures, often using third-party information where a
maintain their leverage within a system [12]. Remote user data breach or use of a reused password that has been exposed
authentication suffers from having lower security postures in in the past has been used again [15]. Weak passwords can be
bad practices such as the handling of passwords in IoHT devices obtained through brute forcing, dictionary attacks, or by using
where credentials are not hashed with cryptographic measures rainbow tables. Adversaries exploit system vulnerabilities to
to obscure plaintext stored information [58]. It is easy for an acquire passwords, attempting every conceivable combination
adversary to fake certificates on public key exchanges, which based on their findings related to the user account [62].
can extract the private key of a legitimate user, during interaction According to Bošnjak et al [62], weak passwords are still being
with a client, website, or service from a fraudulent source that used presently despite the vast range of research and statistics
an adversary has prepared [57]. that point to the use of passwords being one of the weakest
approaches to authentication security, and they claim that a
Replication Attacks
modern graphics processing unit can crack >95% of passwords
In the context of health care authentication, a replication attack in only a few days. Botnets are another way that an adversary
can involve the cloning or replication of a device that often is can perform access attacks on authentication systems as they
linked to a singular device or sensor via a unique identifier such use a large volume of bots to perform password guessing or
as a MAC address [12]. An adversary can take advantage of password cracking attacks on large identity systems such as a
devices that do not provide authentication security options for health care identity database, attempting to escalate their
detecting log-ins from a given location based on where the privileges in the network through higher-value users [63].
device should be situated in its given work environment [12]. Offline password guessing is mainly a weakness in wireless
Often a sybil attack occurs on IoT devices as they use wireless sensor nodes found in IoHT devices because of the lack of an
technology to communicate and store the data within the device MFA security feature configuration. An example of a threat to
through the sensor nodes. Wireless sensor technology networks an authentication factor’s security features is within single-factor
are vulnerable to node replication and sybil attacks because authentication security. A device such as a smart card is
many of the components that make up a node are left defenseless vulnerable to tampering if a weak or stolen password can bypass
and often on their default configurations out of the box, making the single layer of security during authentication, thereby
their attempts at security often trivial to attackers with exposing the user’s data [54].
knowledge of the device [59]. Wireless sensor devices are often
lightweight technologies that communicate closely with other Theoretical Framework and Discussion
IoHT devices to form a large network of monitorable sensitive
data in which an adversary will manipulate interception of of AMFA
communicating applications to control these nodes and where
Overview
they send their data [14].
Throughout this paper, we have discussed the applications of
Sybil Attacks AMFA in IoHT domains based on authentication security
Sybil attacks share some properties with replication attacks, requirements. In addition, we have discussed AMFA in the
except that the adversary can extend a hijacked or replicated context of health care environments and evaluated the feasibility
node to gain influence within the network through other created of an improved AMFA model that can address security concerns
identities or nodes [12]. This type of attack affects an identity over IoHT methodologies. In the design of this data taxonomy,
network by gaining a large portion of nodes within an IoT device we consolidated the 4 domains of MFA systems: user
and overcoming a “reputation system,” which refers to identity information, working environments, device information, and
structures where poor security has been implemented by giving use-case settings.
users rights to certain actions within a system that they would
In the following sections, we discuss the foundation of the data
not normally have without many identities [20]. In a remote
taxonomy proposed as a solution for AMFA data management.
IoHT device where mobile networks are being used, the
We elaborate on the categorization of the attributes that are
adversary can manipulate local resources within the system.
regarded for an AMFA systems in relation to the 4 domains of
They can exploit their majority of identities to influence
the data taxonomy. On the basis of our findings, the relationship
decisions that would be unobtainable for a single user [60]. By
between MFA attributes and IoHT data is summarized in a data
publishing multiple malicious nodes of the adversary’s identity,
model. The resulting taxonomy of the AMFA-IoHT data
it is possible for the attacker to route messages or other types
consolidates the emerging disciplines of AMFA research fields
of sensitive information within the IoHT device into their
to improve security requirements in adaptive authentication
possession for manipulation or exfiltration [61].
systems. These data can be used to improve the scalability of
Access Attacks, Weak Passwords, and Stolen Credentials existing MFA solutions in the current health care environment,
Broken authentication is a broader category of challenges and and the adaptability of authentication systems can be improved
attacks such as brute force, weak passwords, stolen credentials, with privacy and security.
and credential stuffing. This category shares similar principles
among each subcategory of attack based on weak security

https://www.jmir.org/2023/1/e44114 J Med Internet Res 2023 | vol. 25 | e44114 | p. 13


(page number not for citation purposes)
XSL• FO
RenderX
JOURNAL OF MEDICAL INTERNET RESEARCH Suleski & Ahmed

System Architecture of an IoHT Data Model and setup complexity associated with automating an AMFA
solution. This is particularly important as human errors and
Overview negligence tend to arise when transitioning toward enhanced
The attributes discussed in this section can be categorized, as security measures that moves beyond reliance on passwords.
shown in Figure 5, to contextualize the data model within their
Building upon the insights from our analysis in Figure 5, the
respective categories, which combines user types with data types
elements selected for the IoHT architecture contribute toward
and device types. The security requirements of an AMFA system
an AMFA approach to security requirements. The threats that
in the IoHT must ensure reliability, scalability, and lightweight
challenge IoHT data are based on data breaches and attacks that
design to reduce constraints on resources, especially where
affect user nodes through creation or manipulation. Health care
smaller technologies such as sensors are used. These attributes
requirements against these challenges persist even after the
form a taxonomy of IoHT data structures categorized by devices,
current situation of the COVID-19 pandemic. The leading cause
users, and the corresponding environment of use. This
of poor security approaches to these challenges is poor or weak
classification also takes into account the potential threats that
authentication methods, such as the use of passwords in
these entities might encounter. We generate these attributes to
user-based systems. Our solution provides a data model for the
be used in the autonomy of security approaches to an AMFA
automation of IoHT architecture to reduce user interaction with
solution that benefits users such as the older adults who could
the selection criteria of authentication factors. The proposed
be overwhelmed with the authentication options they are
system was designed to adapt on the changing features of the
presented with. In addition, we aim to minimize the expenses
IoHT environment.
Figure 5. Elements of heterogeneous data in the Internet of Health Care Things. AMFA: adaptive multifactor authentication.

computational assessments of the proposed solution. The


Use-Case Settings environments are described based on theoretical data gathered
The criteria for the 3 use cases are used within the conceptual from our research on the security requirements and nature of
model for remote access to health care data, as shown in Table IoHT devices and their respective data. Our proposed solution
4. In Table 4, the decision-making criteria for the use-case is suitable for the current restrictions and constraints, which
settings are used to address COVID-19 constraints on physicians promote authentication toward a passwordless approach to
and patients that would be impacted when authenticating adaptive security systems.
remotely. Each use-case is labeled with (C#) to be used in further

https://www.jmir.org/2023/1/e44114 J Med Internet Res 2023 | vol. 25 | e44114 | p. 14


(page number not for citation purposes)
XSL• FO
RenderX
JOURNAL OF MEDICAL INTERNET RESEARCH Suleski & Ahmed

Table 4. Table of use cases for health care environment labels.


Label Name Description
C1 Remote access authentication Whether a device is being accessed remotely outside of the health care fixed network and beyond
private firewalls or session security on business networks; this could be outside of business hours
and includes free Wi-Fi networks from public access networks
C2 Working from home authentica- A device being accessed from a home network either through a personal network or a business portal
tion that is regulated
C3 Working from within the organi- Fixed networks being used through organization networks, portals, servers, or cloud resources with
zation authentication security configurations within business hours or from within the organization’s geolocation

devices. As discussed in the Literature Review section, it is


Data Classification Criteria important for there to be a distinction of data classification to
As shown in Table 5, the classification of the data for the improve security features. The requirements of the data model
proposed model can be labeled as (L#) depending on the findings can be expanded with each level applied to the data in these
of the research once it commences. Each level can be determined IoHT devices when research and development of real-world
through an analysis of the related studies to design a comparative solutions are applied.
study of the sensitivity of the data contained within IoHT

Table 5. Table of data sensitivity labels.


Label Name Description
L1 Low sensitivity Low sensitivity depending on the nature of the data on the device such as name of the patient or workers, home
address, the preferred or most recently used health care services, email address, and contact details
L2 Medium sensitivity A medium sensitivity rating for IoHTa data that include identifying information such as government number, in-
come-related information, health care information, date of birth, and other identifiers of the persons
L3 High sensitivity High sensitivity data are labeled for IoHT data that include personal information such as health conditions, health
history, prescription history, medical records, payments for health care such as Medicare in Australia, biometric
data, or media files regarding the patient or workers (photo identification, user credentials, etc)

a
IoHT: Internet of Health Care Things.

be defined as (U#). The user information is an important


User Information Criteria
requirement of the data model to ensure data privacy in
As shown in Table 6, the user information labels are set based conjunction with data sensitivity. This allows future research
on the findings of the user types we have established within the and development of IoHT devices such as sensors as a
paper for health care environments, as both workers and patients requirement of ensuring privacy over shared devices that handle
of health care services. The label for the proposed model can many users’ digital health data.

Table 6. User information labels.


Label Name Description
U1 Health care employee This includes doctors, nurses, physicians, or any other form of certified user that has a legitimate account with
the health care organization.
U2 Patient This includes any person or entity tied to an account receiving a health care service either remotely or from
within a health care organization using IoHTa devices.
U3 Guests This includes any type of user who is accessing limited access from an account to display IoHT data with
constraints on their access.

a
IoHT: Internet of Health Care Things.

features based on the following requirements: the “entities” in


Limitations of the Data Model Taxonomy a conceptual model are components of the overall system or the
The IoHT network architecture comprises numerous security essential resources and services that make the entire system
domains, including sensors, monitoring equipment, data functional. The IoHT is a large and continuously evolving
management, and dispensary systems [12]. The attack surface industry of products that facilitate in digitalizing services,
of IoHT networks is large and vulnerable to a variety of cyber networks, and information systems. Identifying the key
threats internally and externally [12] as discussed in our threat objectives with a focus on AMFA, based on the reviewed
categories. The purpose of this data model is to establish a literature, contributes toward adaptive factor selection.
categorization for authentication and the security threats to IoHT Authentication factors are categorized into the 3 classifications:
networks. Categorization is essential for improving security something you are, something you know, and something you
https://www.jmir.org/2023/1/e44114 J Med Internet Res 2023 | vol. 25 | e44114 | p. 15
(page number not for citation purposes)
XSL• FO
RenderX
JOURNAL OF MEDICAL INTERNET RESEARCH Suleski & Ahmed

have. These categories cover the known and most used factors scheme. The structured data ensure that when health care
in authentication security approaches and do not need to be workers begin authentication, it is safe and time efficient,
improved because they cover the parameters of adaptive security meaning there is less unnecessary complexity for security
appropriately. To ensure adaptive security, our research adopts features. This supports a better understanding of the devices
the approach of a passwordless MFA security system. As shown that are affected (ie, sensors, monitors, and other remote
in Figure 6, data communicate between sensors and monitoring devices), allowing for appropriate classification based on
devices in a health care environment and contain crucial authentication factors chosen. The outcome of this phase creates
information to be transmitted in real time. This is classified as an algorithmic metric that gives resources a weighting to
sensitive data important for authentication and a classification categorize them as low, medium, or high sensitivity.
Figure 6. A conceptual structure of data in motion in an Internet of Health Care Things environment. C1: remote access authentication; C2: Working
from home authentication; C3: Working from within the organization authentication; U1: health care employee; U2: patient; U3: guest.

the devices in the context of health care distributed networks


Adapting Traditional MFA to IoHT Authentication and categorize them into different groups or modalities for the
As discussed in the previous sections, AMFA uses entities to data classification proposed model, creating a platform of which
improve the scalability and allocation of the administrative different authentication factors or devices can be introduced
system that determines which factors to present to a user based into the developing algorithms that are expected to be developed
on their given environment. The current solution for IoHT from these findings and discussions. Furthermore, this will
authentication is the traditional public key infrastructure enable a push forward for adaptive security efforts by providing
structure, which uses certificate-based methodologies to store, a novel direction in building an open platform model that can
verify, and monitor permissions or trust that a user has within adapt to the emerging environments in the IoHT as modern
a system or network [64]. Nag and Dasgupta [65] proposed a technologies and conditions develop. AMFA can derive
continuous MFA solution for identification of users through advantages from a contextually structured data model
virtualization of resources that could distribute user meticulously crafted for the health care sector. This involves
authentication and allow controlled access through an designing and implementing authentication factors that align
established server access network. The issue we find in these with the unique requirements of health care organizations and
solutions comes from the possibility of forgery attacks, the IoHT devices’ perspective on data. Moreover, it entails
masquerading attacks, or replication attacks that would allow determining how these methods can be effectively applied to
a perpetrator to obtain complete control of the AMFA system, users based on temporal and environmental factors. The
thus making previous approaches infeasible to modern IoHT objective is to balance the security needs of both the users and
networks. A recent survey on adaptive authentication claims the sensitivity of the data being stored, transmitted, or used, and
that the challenge with implementing an adaptive security factor when this occurs, as shown in Figure 7, the labels created within
into integrated systems is the inability to reuse or introduce new this paper can be used to conceptualize a future approach to
authentication factors as they arise in emerging trends of AMFA options.
passwordless approaches to MFA [17]. To address this, we label

https://www.jmir.org/2023/1/e44114 J Med Internet Res 2023 | vol. 25 | e44114 | p. 16


(page number not for citation purposes)
XSL• FO
RenderX
JOURNAL OF MEDICAL INTERNET RESEARCH Suleski & Ahmed

Figure 7. Contextualized Internet of Health Care Things (IoHT) architecture toward an adaptive multifactor authentication (MFA) model. A1: spoofing
or masquerading attacks from the social engineering category; A2: forgery attacks from the web application category; A3-1: replication attacks from
the network category; A3-2: sybil attacks from the network category; A4-1: weak password attacks from the Broken Authentication category, A4-2:
stolen credential attacks from the Broken Authentication category; A4-3: access attacks from the Broken Authentication category; C1: remote access
authentication; C2: Working from home authentication; C3: Working from within the organization authentication; GID: gateway device; IID: implantable
device; L1: low sensitivity; L2: medium sensitivity; L3: high sensitivity; MID: monitoring device; SID: sensor device; U1: health care employee; U2:
patient; U3: guest; WID: wearable device.

authentication and become passwordless. The data taxonomy


Conclusions of the 4 domains we have discussed as security requirements
We have designed various approaches toward labeling a of AMFA-IoHT data promote the privacy and security features
complete data model taxonomy for IoHT networks. This paper for authentication systems in health care. An adaptive
demonstrates our categorization of devices and their respective authentication system’s feasibility consolidates the 4 domains
data in correspondence with health care objectives and services as primary principles for user authentication schemes and the
such as patient monitoring, observation, and recovery. Health cyber threats that they face. As shown in Figure 8 and Table 3,
care as a service through the IoHT has vastly improved the a conceptual data model can be used in combination with
capabilities of the industry and how patients can access the authentication factors and consideration of a user’s working
services from home or on the go as social distancing mandates environment toward the feasibility of an AMFA-IoHT model.
in many countries around the world are still in place to help
reduce outbreaks of new variants of COVID-19 [4]. Information Heterogeneous data collected from an improved adaptive
and communication technologies through wireless networks authentication factor selection criterion in our future research
such as existing 4G and 5G networks have facilitated the remote development can be applied to the flowchart depicted in Figure
access or working from home trends in recent years as 7 to help improve our understanding of IoHT devices and data
organizations have been forced to move most of their services information and how cyberattacks impact their deployment
through digital communication to mitigate the threat of the virus ability within a health care enterprise. Numerous MFA solutions
and the social impacts to their workforce [66]. The IoHT domain are appropriate for selection in the AMFA system, which
is vulnerable to many cyber threats; therefore, IoHT devices extends the scope and timeline of the security requirements.
must be designed with these security requirements to ensure Therefore, to mitigate scope creep in the decision-making
reliable authentication practices. By reviewing the literature in criteria for authentication factors, the following future research
this paper, we have established a theoretical framework toward and development criteria will be established:
AMFA in an IoHT network addressing the privacy concerns of 1. Factors from each category of knowledge, possession, and
users and the data management of these devices in a health care inherence will be selected based on their feasibility in an
environment. IoHT environment.
2. For the AMFA as a service, the factor combinations must
With the main objective of mapping out the IoHT architecture
to include devices and their data with respect to the technologies be flexible while maintaining practicality.
3. The factor list can be expanded or contracted based on
used to digitalize communications in an interconnected IoT
network, we can see that further research will be required to reiteration of the literature and findings in the contextualized
help improve the health care industry toward an AMFA model, data model during informal analysis of the data
where a user can be authenticated without reliance of weak classification attributes in the existing models.

https://www.jmir.org/2023/1/e44114 J Med Internet Res 2023 | vol. 25 | e44114 | p. 17


(page number not for citation purposes)
XSL• FO
RenderX
JOURNAL OF MEDICAL INTERNET RESEARCH Suleski & Ahmed

Figure 8. Adaptive multifactor authentication (MFA) model flowchart with the current stage of research. IoHT: Internet of Health Care Things.

Acknowledgments
This work was supported by the Cyber Security Research Centre Limited, whose activities were partially funded by the Australian
Government’s Cooperative Research Centres Programme.

Data Availability
All data generated or analyzed during this viewpoint are included in this manuscript.

Conflicts of Interest
None declared.

References
1. Javaid M, Khan IH. Internet of Things (IoT) enabled healthcare helps to take the challenges of COVID-19 Pandemic. J
Oral Biol Craniofac Res 2021;11(2):209-214 [FREE Full text] [doi: 10.1016/j.jobcr.2021.01.015] [Medline: 33665069]
2. Bradley C, El-Tawab S, Heydari MH. Security analysis of an IoT system used for indoor localization in healthcare facilities.
In: Proceedings of the Systems and Information Engineering Design Symposium (SIEDS). 2018 Presented at: Systems and
Information Engineering Design Symposium (SIEDS); April 27, 2018; Charlottesville, VA URL: https://doi.org/10.1109/
SIEDS.2018.8374726 [doi: 10.1109/SIEDS.2018.8374726]
3. Adetunji CO, Olaniyan OT, Adeyomoye O, Dare A, Adeniyi MJ, Alex E, et al. Internet of Health Things (IoHT) for
COVID-19. In: Pani SK, Dash S, dos Santos WP, Chan Bukhari SA, Flammini F, editors. Assessing COVID-19 and Other
Pandemics and Epidemics using Computational Modelling and Data Analysis. Cham, Switzerland: Springer; 2022.
4. Fagroud FZ, Toumi H, Ben Lahmar EH, Talhaoui MA, Achtaich K, Filali SE. Impact of IoT devices in e-health: a review
on IoT in the context of COVID-19 and its variants. Procedia Comput Sci 2021;191:343-348 [FREE Full text] [doi:
10.1016/j.procs.2021.07.046] [Medline: 34512818]
5. Murugan S, Vijayakumar K, Sivakumar V, Manikandan R, Kumar A, Saikumar K. Impact of Internet of Health Things
(IoHT) on COVID-19 disease detection and its treatment using single hidden layer feed forward neural networks (SIFN).
In: Anandan R, Suseendran G, Chatterjee P, Jhanjhi NZ, Ghosh U, editors. How COVID-19 is Accelerating the Digital
Revolution. Cham, Switzerland: Springer; 2022.
6. IBM report: cost of a data breach hits record high during pandemic. IBM Newsroom. 2021 Jul 28. URL: https://newsroom.
ibm.com/2021-07-28-IBM-Report-Cost-of-a-Data-Breach-Hits-Record-High-During-Pandemic [accessed 2022-06-13]
7. Cost of a data breach report 2022. IBM Corp. URL: https://www.ibm.com/au-en/security/data-breach [accessed 2022-06-13]
8. Azzawi MA, Hassan R, Bakar KA. A review on Internet of Things (IoT) in healthcare. Int J Appl Eng Res 2016
Nov;11(20):10216-10221
9. Baker SB, Xiang W, Atkinson I. Internet of things for smart healthcare: technologies, challenges, and opportunities. IEEE
Access 2017 Nov 29;5:26521-26544 [FREE Full text] [doi: 10.1109/ACCESS.2017.2775180]
10. Bhatt V, Chakraborty S. Real-time healthcare monitoring using smart systems: a step towards healthcare service orchestration
smart systems for futuristic healthcare. In: Proceedings of the International Conference on Artificial Intelligence and Smart
Systems (ICAIS). 2021 Presented at: International Conference on Artificial Intelligence and Smart Systems (ICAIS); March
25-27, 2021; Coimbatore, India [doi: 10.1109/icais50930.2021.9396029]
11. Kumar T, Braeken A, Liyanage M, Ylianttila M. Identity privacy preserving biometric based authentication scheme for
Naked healthcare environment. In: Proceedings of the IEEE International Conference on Communications (ICC). 2017
Presented at: IEEE International Conference on Communications (ICC); May 21-25, 2017; Paris, France [doi:
10.1109/icc.2017.7996966]

https://www.jmir.org/2023/1/e44114 J Med Internet Res 2023 | vol. 25 | e44114 | p. 18


(page number not for citation purposes)
XSL• FO
RenderX
JOURNAL OF MEDICAL INTERNET RESEARCH Suleski & Ahmed

12. Papaioannou M, Karageorgou M, Mantas G, Sucasas V, Essop I, Rodriguez J, et al. A survey on security threats and
countermeasures in Internet of Medical Things (IoMT). Trans Emerging Telecommun Technol 2020 Jul 23;33(6):e4049
[FREE Full text] [doi: 10.1002/ett.4049]
13. Scarpato N, Pieroni A, Di Nunzio L, Fallucchi F. E-health-IoT universe: a review. Int J Adv Sci Eng Inf Technol
2017;7(6):2328-2336 [doi: 10.18517/ijaseit.7.6.4467]
14. Sharma G, Kalra S. A lightweight user authentication scheme for cloud-IoT based healthcare services. Iran J Sci Technol
Trans Electr Eng 2018 Oct 9;43(S1):619-636 [FREE Full text] [doi: 10.1007/s40998-018-0146-5]
15. Ometov A, Petrov V, Bezzateev S, Andreev S, Koucheryavy Y, Gerla M. Challenges of multi-factor authentication for
securing advanced IoT applications. IEEE Network 2019 Mar;33(2):82-88 [FREE Full text] [doi: 10.1109/mnet.2019.1800240]
16. Ometov A, Bezzateev S, Mäkitalo N, Andreev S, Mikkonen T, Koucheryavy Y. Multi-factor authentication: a survey.
Cryptography 2018 Jan 05;2(1):1 [FREE Full text] [doi: 10.3390/cryptography2010001]
17. Arias-Cabarcos P, Krupitzer C, Becker C. A survey on adaptive authentication. ACM Comput Surv 2019 Sep 11;52(4):1-30
[FREE Full text] [doi: 10.1145/3336117]
18. Thara DK, Premasudha BG, Ram VR, Suma R. Impact of big data in healthcare: a survey. In: Proceedings of the 2nd
International Conference on Contemporary Computing and Informatics (IC3I). 2016 Presented at: 2nd International
Conference on Contemporary Computing and Informatics (IC3I); December 14-17, 2016; Greater Noida, India URL: https:/
/doi.org/10.1109/IC3I.2016.7918057 [doi: 10.1109/ic3i.2016.7918057]
19. Mamdouh M, Awad AI, Khalaf AA, Hamed HF. Authentication and identity management of IoHT devices: achievements,
challenges, and future directions. Comput Secur 2021 Dec;111:102491 [FREE Full text] [doi: 10.1016/j.cose.2021.102491]
20. Arshad A, Mohd Hanapi Z, Subramaniam S, Latip R. A survey of Sybil attack countermeasures in IoT-based wireless
sensor networks. PeerJ Comput Sci 2021;7:e673 [FREE Full text] [doi: 10.7717/peerj-cs.673] [Medline: 34712787]
21. Kirsal Ever Y. Secure-anonymous user authentication scheme for e-healthcare application using wireless medical sensor
networks. IEEE Syst J 2019 Mar;13(1):456-467 [FREE Full text] [doi: 10.1109/JSYST.2018.2866067]
22. Javaid S, Zeadally S, Fahim H, He B. Medical sensors and their integration in wireless body area networks for pervasive
healthcare delivery: a review. IEEE Sensors J 2022 Mar 1;22(5):3860-3877 [FREE Full text] [doi: 10.1109/jsen.2022.3141064]
23. Mora H, Gil D, Terol RM, Azorín J, Szymanski J. An IoT-based computational framework for healthcare monitoring in
mobile environments. Sensors (Basel) 2017 Oct 10;17(10):2302 [FREE Full text] [doi: 10.3390/s17102302] [Medline:
28994743]
24. Yu S, Park Y. A robust authentication protocol for wireless medical sensor networks using blockchain and physically
unclonable functions. IEEE Internet Things J 2022 Oct 15;9(20):20214-20228 [FREE Full text] [doi:
10.1109/jiot.2022.3171791]
25. Anwar M, Abdullah AH, Qureshi KN, Majid AH. Wireless body area networks for healthcare applications: an overview.
Telkomnika 2017 Sep 01;15(3) [FREE Full text] [doi: 10.12928/telkomnika.v15i3.5793]
26. Kintzlinger M, Nissim N. Keep an eye on your personal belongings! The security of personal medical devices and their
ecosystems. J Biomed Inform 2019 Jul;95:103233 [FREE Full text] [doi: 10.1016/j.jbi.2019.103233] [Medline: 31201966]
27. Mo J, Shen W, Pan W. An improved anonymous authentication protocol for wearable health monitoring systems. Wirel
Commun Mob Comput 2020;2020:1-13 [FREE Full text] [doi: 10.1155/2020/5686498]
28. Yaqoob T, Abbas H, Atiquzzaman M. Security vulnerabilities, attacks, countermeasures, and regulations of networked
medical devices—a review. IEEE Commun Surv Tutor 2019 Apr 30;21(4):3723-3768 [FREE Full text] [doi:
10.1109/comst.2019.2914094]
29. Jemal H, Kechaou Z, Ayed MB, Alimi AM. Cloud computing and mobile devices based system for healthcare application.
In: Proceedings of the IEEE International Symposium on Technology and Society (ISTAS). 2015 Presented at: IEEE
International Symposium on Technology and Society (ISTAS); November 11-12, 2015; Dublin, Ireland URL: https://doi.
org/10.1109/ISTAS.2015.7439407 [doi: 10.1109/istas.2015.7439407]
30. Pradhan B, Bhattacharyya S, Pal K. IoT-based applications in healthcare devices. J Healthc Eng 2021;2021:6632599 [FREE
Full text] [doi: 10.1155/2021/6632599] [Medline: 33791084]
31. Sigwele T, Hu YF, Ali M, Hou J, Susanto M, Fitriawan H. Intelligent and energy efficient mobile smartphone gateway for
healthcare smart devices based on 5G. In: Proceedings of the IEEE Global Communications Conference (GLOBECOM).
2018 Presented at: IEEE Global Communications Conference (GLOBECOM); December 9-13, 2018; Abu Dhabi, United
Arab Emirates [doi: 10.1109/glocom.2018.8648031]
32. Albesher AA. Iot in health-care: recent advances in the development of smart cyber-physical ubiquitous environments. Int
J Comput Sci Netw Secur 2019;19(2):181-186
33. Fernandez F, Pallis G. Opportunities and challenges of the Internet of Things for healthcare. In: Proceedings of the 4th
International Conference on Wireless Mobile Communication and Healthcare - "Transforming healthcare through innovations
in mobile and wireless technologies". 2014 Presented at: 4th International Conference on Wireless Mobile Communication
and Healthcare - "Transforming healthcare through innovations in mobile and wireless technologies"; November 3-5, 2014;
Athens, Greece URL: https://doi.org/10.1109/MOBIHEALTH.2014.7015961 [doi: 10.4108/icst.mobihealth.2014.257276]
34. Haghi M, Thurow K, Stoll R. Wearable devices in medical Internet of Things: scientific research and commercially available
devices. Healthc Inform Res 2017 Jan;23(1):4-15 [FREE Full text] [doi: 10.4258/hir.2017.23.1.4] [Medline: 28261526]

https://www.jmir.org/2023/1/e44114 J Med Internet Res 2023 | vol. 25 | e44114 | p. 19


(page number not for citation purposes)
XSL• FO
RenderX
JOURNAL OF MEDICAL INTERNET RESEARCH Suleski & Ahmed

35. Hudson F, Clark C. Wearables and medical interoperability: the evolving frontier. Computer 2018 Sep;51(9):86-90 [FREE
Full text] [doi: 10.1109/MC.2018.3620987]
36. Tawalbeh L, Muheidat F, Tawalbeh M, Quwaider M. IoT privacy and security: challenges and solutions. Appl Sci 2020
Jun 15;10(12):4102 [FREE Full text] [doi: 10.3390/app10124102]
37. Wu L, Du X, Guizani M, Mohamed A. Access control schemes for implantable medical devices: a survey. IEEE Internet
Things J 2017 Oct;4(5):1272-1283 [FREE Full text] [doi: 10.1109/jiot.2017.2708042]
38. Kang J, Fan K, Zhang K, Cheng X, Li H, Yang Y. An ultra light weight and secure RFID batch authentication scheme for
IoMT. Comput Commun 2021 Feb 1;167:48-54 [FREE Full text] [doi: 10.1016/j.comcom.2020.12.004]
39. Al-Saedi SB, Azim MM. Radio Frequency Near Communication (RFNC) technology: an integrated RFID-NFC system
for objects' localization. In: PrOceedings of the 9th IEEE-GCC Conference and Exhibition (GCCCE). 2017 Presented at:
9th IEEE-GCC Conference and Exhibition (GCCCE); May 8-11, 2017; Manama, Bahrain [doi:
10.1109/ieeegcc.2017.8448129]
40. Newaz AI, Sikder AK, Rahman MA, Uluagac AS. A survey on security and privacy issues in modern healthcare systems:
attacks and defenses. ACM Trans Comput Healthc 2021 Jul 21;2(3):1-44 [FREE Full text] [doi: 10.1145/3453176]
41. Urbanczyk T, Peter L. Database development for the urgent department of hospital based on tagged entity storage following
the IoT concept. In: Proceedings of the 14th IFAC Conference on Programmable Devices and Embedded Systems PDES
2016. 2016 Presented at: 14th IFAC Conference on Programmable Devices and Embedded Systems PDES 2016; October
5-7, 2016; Brno, Czech Republic [doi: 10.1016/j.ifacol.2016.12.047]
42. Shahid J, Ahmad R, Kiani AK, Ahmad T, Saeed S, Almuhaideb AM. Data protection and privacy of the internet of healthcare
things (IoHTs). Appl Sci 2022 Feb 12;12(4):1927 [FREE Full text] [doi: 10.3390/app12041927]
43. Iliev IT, Badarov DH, Tabakov SD, Ganev BT, Kanev IK. Fully analogue ECG front-end applicable in remote patient
monitoring. In: Proceedings of the XXIX International Scientific Conference Electronics (ET). 2020 Presented at: XXIX
International Scientific Conference Electronics (ET); September 16-18, 2020; Sozopol, Bulgaria [doi:
10.1109/et50336.2020.9238247]
44. Fersi G. Study of middleware for Internet of healthcare things and their applications. In: Proceedings of the International
Conference on Smart Homes and Health Telematics. 2020 Presented at: International Conference on Smart Homes and
Health Telematics; June 24–26, 2020; Hammamet, Tunisia [doi: 10.1007/978-3-030-51517-1_18]
45. Vishnu S, Ramson SR, Jegan R. Internet of medical things (IoMT)- an overview. In: Proceedings of the 5th International
Conference on Devices, Circuits and Systems (ICDCS). 2020 Presented at: 5th International Conference on Devices, Circuits
and Systems (ICDCS); March 5-6, 2020; Coimbatore, India [doi: 10.1109/icdcs48716.2020.243558]
46. Venkatesha S, Reddy KR, Chandavarkar BR. Social engineering attacks during the COVID-19 pandemic. SN Comput Sci
2021;2(2):78-79 [FREE Full text] [doi: 10.1007/s42979-020-00443-1] [Medline: 33585823]
47. Leonov PY, Vorobyev AV, Ezhova AA, Kotelyanets OS, Zavalishina AK, Morozov NV. The main social engineering
techniques aimed at hacking information systems. In: Proceedings of the Ural Symposium on Biomedical Engineering,
Radioelectronics and Information Technology (USBEREIT). 2021 Presented at: Ural Symposium on Biomedical Engineering,
Radioelectronics and Information Technology (USBEREIT); May 13-14, 2021; Yekaterinburg, Russia [doi:
10.1109/usbereit51232.2021.9455031]
48. Gupta S, Singhal A, Kapoor A. A literature survey on social engineering attacks: phishing attack. In: Proceedings of the
International Conference on Computing, Communication and Automation (ICCCA). 2016 Presented at: International
Conference on Computing, Communication and Automation (ICCCA); April 29-30, 2016; Greater Noida, India [doi:
10.1109/ccaa.2016.7813778]
49. Gan D, Heartfield R. Social engineering in the internet of everything. Cut IT J 2016;29(7):20-29 [FREE Full text]
50. Ingle DR, Meshram BB. Attacks on web based software and modelling defence mechanisms. Int J UbiComp 2012
Jul;3(3):11-30 [FREE Full text] [doi: 10.5121/iju.2012.3302]
51. Fang L, Li Y, Yun X, Wen Z, Ji S, Meng W, et al. THP: a novel authentication scheme to prevent multiple attacks in
SDN-based IOT network. IEEE Internet Things J 2020 Jul;7(7):5745-5759 [FREE Full text] [doi: 10.1109/jiot.2019.2944301]
52. Hassan MM, Nipa SS, Akter M, Haque R, Deepa FN, Rahman MM, et al. Broken authentication and session management
vulnerability: a case study of web application. Int J Simul Syst Sci Technol 2018 Apr 30;19(2):1-11 [FREE Full text] [doi:
10.5013/IJSSST.a.19.02.06]
53. Nadar VM, Chatterjee M, Jacob L. A defensive approach for CSRF and broken authentication and session management
attack. In: Proceedings of the International Conference on Recent Advancements in Computer, Communication and
Computational Sciences (RACCCS-2017). 2017 Presented at: RACCCS-2017; September 2-3, 2017; Ajmer, India URL:
https://doi.org/10.1007/978-981-10-7386-1_49 [doi: 10.1007/978-981-10-7386-1_49]
54. Wang D, Wang P. Offline dictionary attack on password authentication schemes using smart cards. In: Proceedings of the
16th International Conference, ISC 2013. 2013 Presented at: 16th International Conference, ISC 2013; November 13-15,
2013; Dallas, TX [doi: 10.1007/978-3-319-27659-5_16]
55. Dewangan K, Mishra M. Internet of things for healthcare: a review. Int J Adv Manag Technol Eng Sci 2018
Mar;8(III):526-534

https://www.jmir.org/2023/1/e44114 J Med Internet Res 2023 | vol. 25 | e44114 | p. 20


(page number not for citation purposes)
XSL• FO
RenderX
JOURNAL OF MEDICAL INTERNET RESEARCH Suleski & Ahmed

56. Li CT, Shih DH, Wang CC. Cloud-assisted mutual authentication and privacy preservation protocol for telecare medical
information systems. Comput Methods Programs Biomed 2018 Apr;157:191-203 [FREE Full text] [doi:
10.1016/j.cmpb.2018.02.002] [Medline: 29477428]
57. Shim KA. Universal forgery attacks on remote authentication schemes for wireless body area networks based on internet
of things. IEEE Internet Things J 2019 Oct;6(5):9211-9212 [FREE Full text] [doi: 10.1109/jiot.2019.2922701]
58. Soni M, Patel T, Jain A. Security analysis on remote user authentication methods. In: Proceeding of the International
Conference on Computer Networks, Big Data and IoT (ICCBI - 2018). 2018 Presented at: International Conference on
Computer Networks, Big Data and IoT (ICCBI - 2018); December 19–20, 2018; Madurai, India [doi:
10.1007/978-3-030-24643-3_60]
59. Shaukat HR, Hashim F, Sali A, Abdul Rasid MF. Node replication attacks in mobile wireless sensor network: a survey. Int
J Distrib Sens Netw 2014 Dec 08;10(12) [FREE Full text] [doi: 10.1155/2014/402541]
60. Manjula V, Chellappan C. The replication attack in wireless sensor networks: analysis and defenses. In: Proceedings of the
International Conference on Computer Science and Information Technology. 2011 Presented at: CCSIT 2011; January 2-4,
2011; Bangalore, India URL: https://doi.org/10.1007/978-3-642-17878-8_18 [doi: 10.1007/978-3-642-17878-8_18]
61. Mishra AK, Tripathy AK, Puthal D, Yang LT. Analytical model for Sybil attack phases in internet of things. IEEE Internet
Things J 2019 Feb;6(1):379-387 [FREE Full text] [doi: 10.1109/jiot.2018.2843769]
62. Bošnjak L, Sreš J, Brumen B. Brute-force and dictionary attack on hashed real-world passwords. In: Proceedings of the
41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).
2018 Presented at: 41st International Convention on Information and Communication Technology, Electronics and
Microelectronics (MIPRO); May 21-25, 2018; Opatija, Croatia URL: https://doi.org/10.23919/MIPRO.2018.8400211 [doi:
10.23919/mipro.2018.8400211]
63. Salamatian S, Huleihel W, Beirami A, Cohen A, Medard M. Why botnets work: distributed brute-force attacks need no
synchronization. IEEE Trans Inform Forensic Secur 2019 Sep;14(9):2288-2299 [FREE Full text] [doi:
10.1109/tifs.2019.2895955]
64. Singh P, Basit A, Kumar NC, Venkaiah VC. Towards a hybrid Public Key Infrastructure (PKI): a review. Cryptology ePrint
Archive. Preprint posted online July 14, 2019 2023 [FREE Full text] [doi: 10.1002/047148296x.tie149]
65. Nag AK, Dasgupta D. An adaptive approach for continuous multi-factor authentication in an identity eco-system. In:
Proceedings of the 9th Annual Cyber and Information Security Research Conference. 2014 Presented at: CISR '14; April
8-10, 2014; Oak Ridge, TN URL: https://doi.org/10.1145/2602087.2602112 [doi: 10.1145/2602087.2602112]
66. Muhammad G, Alqahtani S, Alelaiwi A. Pandemic management for diseases similar to COVID-19 using deep learning and
5G communications. IEEE Netw 2021 May;35(3):21-26 [FREE Full text] [doi: 10.1109/mnet.011.2000739]

Abbreviations
AMFA: adaptive multifactor authentication
BLE: Bluetooth Low Energy
ECG: electrocardiogram
IoHT: Internet of Health Care Things
IoT: Internet of Things
MFA: multifactor authentication
NFC: near-field communication
RFID: Radio Frequency Identification

Edited by T Leung; submitted 07.11.22; peer-reviewed by K Gupta, D Tlapa; comments to author 16.02.23; revised version received
16.03.23; accepted 23.07.23; published 29.08.23
Please cite as:
Suleski T, Ahmed M
A Data Taxonomy for Adaptive Multifactor Authentication in the Internet of Health Care Things
J Med Internet Res 2023;25:e44114
URL: https://www.jmir.org/2023/1/e44114
doi: 10.2196/44114
PMID: 37490633

©Tance Suleski, Mohiuddin Ahmed. Originally published in the Journal of Medical Internet Research (https://www.jmir.org),
29.08.2023. This is an open-access article distributed under the terms of the Creative Commons Attribution License
(https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium,

https://www.jmir.org/2023/1/e44114 J Med Internet Res 2023 | vol. 25 | e44114 | p. 21


(page number not for citation purposes)
XSL• FO
RenderX
JOURNAL OF MEDICAL INTERNET RESEARCH Suleski & Ahmed

provided the original work, first published in the Journal of Medical Internet Research, is properly cited. The complete bibliographic
information, a link to the original publication on https://www.jmir.org/, as well as this copyright and license information must
be included.

https://www.jmir.org/2023/1/e44114 J Med Internet Res 2023 | vol. 25 | e44114 | p. 22


(page number not for citation purposes)
XSL• FO
RenderX

You might also like