Submitted:
23 August 2024
Posted:
27 August 2024
You are already at the latest version
Abstract
Keywords:
1. Introduction
2. Analysis of Various Authenticators
2.1. Knowledge Based Authenticators
2.2. Biometric Authenticators
2.2.1. Physiological Based Biometric Authenticators
2.2.2. Behaviour Based Authentication
2.3. Smartphones and Wearables
2.4. Adaptive Authentication
2.4.1. Risk-based Authentication
3. Related Work
3.1. IoMT Authentication
3.2. Adaptive Authentication
4. Research Method
4.1. Naïve Bayes Machine Learning Algorithm
4.1.1. Proposed System Overview
| Algorithm1. Adaptive Authentication for elderly users. | |
| Input: | Mobile_Browser, Mobile_OS, IPAddress, Network_Type, |
| GPS_Coordinates, Access_Time, Knowledge_based data, | |
| Biometric_data. | |
| Output: | Risk Score, Trust Score, Age and Authentication Result. |
| Assumption: | The usability of authenticators is significantly influenced by age |
| and medical condition. | |
- Start Adaptive App by clicking icon.
-
Get User Verification Information:
- User- Begin Signup if no account exists, or Login if already registered.
- User - During Signup, select Medical Condition(s) for App to determine the usable authenticators for user.
- App- Verifies User email address/phone number and password or PIN.
-
Define partial conditional probabilities as weights using Naïve Bayes Theorem:
- App- Use Naïve Bayes to define conditional probabilities of deviation of input.
- App- Capture all background and active data that define a user.
-
Calculate first level weighted risk score:
- App- Get email/username and device parameters.
If account is verified on device, request adaptive authentication PIN or passwordelseInvoke other available and usable verification methods. -
Calculate second level weighted risk score:
- Verify user against device.
If user and device match, invoke one usable authenticator and update trust scoreelseInvoke other available and usable authenticators. -
Iterate Through User Profiles:Begin: While Trust Score < Threshold
- Iteratively continue through each user profile, calculating the risk score, and initial trust score.
- Authenticate with available and usable authenticators, one at a time.
-
Update trust score at each iteration:Trust Score+=Trust ScoreEnd
-
Display Results:
- Show each user’s risk score, trust score and whether authenticated or not.
Pre-Study Survey
Study Setup
Tasks
4.2. Participants
4.2.1. Population
4.2.2. Sample Size
4.2.3. Sampling Technique
4.2.4. Inclusion and Exclusion Criteria
4.3. Data Collection
5. Results
5.1. Confusion Matrix and Statistics for Overall Authorisation
5.2. Usability Evaluation
5.3. User Health Impact on Authentication
5.4. Train Test Split and Cross-Validation
5.4.1. Train Test Split
5.5. Cross Validation
5.6. Distance Analysis
Effectiveness
Efficiency
6. Discussion
7. Conclusion and Future Work
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
Abbreviations
| SSA | Sub-Saharan Africa |
| IoMT | Internet of Medical Things |
| IoHT | Internet of Health Things |
| IoT | Internet of Things |
| MFA | Multi-Factor Authentication |
| LAS | Lightweight Authentication Scheme |
| PSSUQ | Post-Study System Usability Questionnaire |
| DID | Decentralised identifier |
| VC | Verifiable Credentials |
| CASA | Context Aware Scalable Authentication |
| CYOA | Choose Your Own Authenticator |
| AUC | Area Under the Curve |
| PPv | Positive Predictive Value |
| NPV | Negative Predictive Value |
| FPR | False Positive Rate |
| FNR | False Negative Rate |
| FRR | False Rejection Rate |
| FAR | False Acceptance Rate |
References
- Sun, F.; Zang, W.; Gravina, R.; Fortino, G.; Li, Y. Gait-based identification for elderly users in wearable healthcare systems. Information Fusion 2020, 53, 134–144. [Google Scholar] [CrossRef]
- Ncoa. The Top 10 Most Common Chronic Conditions in Older Adults, 2023.
- United Nations. World Population Ageing 2019 Highlights. Technical report, United Nations, 2019. [CrossRef]
- The World Bank. Population ages 65 and above (% of total population) - Sub-Saharan Africa | Data, 2021.
- Ten Brink, R.N.; Scollan, R.I.; Bedford, M.A. Usability of Biometric Authentication Methods for Citizens with Disabilities. IRS-TPC 2019, September, 40.
- Kante, M.; Ndayizigamiye, P. Internet of medical things, policies and geriatrics: An analysis of the national digital health strategy for South Africa 2019–2024 from the policy triangle framework perspective. Scientific African 2021, 12, e00759. [Google Scholar] [CrossRef]
- Mtonga, K.; Kumaran, S.; Mikeka, C.; Jayavel, K. Machine Learning-Based Patient Load Prediction and IoT Integrated Intelligent Patient Transfer Systems. Future Internet 2019, 11, 1–24. [Google Scholar] [CrossRef]
- Jyotheeswari, P.; Jeyanthi, N. An Adaptive Authentication Scheme based on the User Mobility in Medical-IoT. International Journal of Engineering and Advanced Technology (IJEAT) 2019, Volume-9 I, 2708–2713. [CrossRef]
- Hazratifard, M.; Gebali, F.; Mamun, M. Using Machine Learning for Dynamic Authentication in Telehealth: A Tutorial. Sensors 2022, 22, 1–20. [Google Scholar] [CrossRef]
- Santana-Mancilla, P.C.; Anido-Rifon, L.E.; Contreras-Castillo, J.; Buenrostro-Mariscal, R. Heuristic evaluation of an IoMT system for remote health monitoring in senior care. International Journal of Environmental Research and Public Health 2020, 17. [Google Scholar] [CrossRef]
- Al-zubaidie, M.; Zhang, Z.; Zhang, J. RAMHU: A New Robust Lightweight Scheme for Mutual Users Authentication in Healthcare Applications. Security and Communication Networks 2019, 2019. [Google Scholar] [CrossRef]
- Nkomo, D.; Brown, R. Hybrid Cyber Security Framework for the Internet of Medical Things. In Blockchain and Clinical Trial, Advanced Sciences and Technologies for Security Applications; IEEE Xplore, 2019; pp. 211–229.
- Michael, T.O.; Amunga, O.B.; Rajasvaran, L. Usability Evaluation Criteria for Internet of Things. International Journal of Information Technology and Computer Science 2016, 8, 10–18. [Google Scholar] [CrossRef]
- Blythe, J.M.; Johnson, S.D. The Consumer Security Index for IoT: A protocol for developing an index to improve consumer decision making and to incentivize greater security provision in IoT devices. IEEE Explore 2018. [Google Scholar]
- Das, S.; Kim, A.; Jelen, B.; Huber, L.L.; Camp, L.J. Non-Inclusive Online Security: Older Adults’ Experience with Two-Factor Authentication. In Proceedings of the 54th Hawaii International Conference on System Sciences (HICSS 2021), 2021.
- Meli, S.; Nasabeh, S.; Luj, S. MoSIoT: Modeling and Simulating IoT Healthcare-Monitoring Systems for People with Disabilities. International Journal of Environmental Research and Public Health 2021, 18, 6357. [Google Scholar] [CrossRef]
- Mavhemwa, P.M.; Zennaro, M.; Nsengiyumva, P.; Nzanywayingoma, F. User-Centred Design of Machine Learning Based Internet of Medical Things (IoMT) Adaptive User Authentication Using Wearables and Smartphones. Artificial Intelligence Application in Networks and Systems; Silhavy, R., Silhavy, P., Eds.; Springer International Publishing: Cham, 2023; pp. 783–799. [Google Scholar]
- Powell, A.Y. Ensuring biometrics work for everyone - Raconteur. https://www.raconteur.net/hr/diversity-inclusion/ensuring-biometrics-work-for-everyone/, 2021. Accessed: 2021-04-23.
- O’Dea, S. Mobile OS share in Africa 2018-2021 | Statista. https://www.statista.com/statistics/1045247/share-of-mobile-operating-systems-in-africa-by-month/, 2021. Accessed: 2022-01-16.
- Grindrod, K.; Khan, H.; Hengartner, U.; Ong, S.; Logan, A.G.; Vogel, D.; Gebotys, R.; Yang, J. Evaluating authentication options for mobile health applications in younger and older adults. PLoS ONE 2018, 13, e0189048. [Google Scholar] [CrossRef]
- Khan, H.; Grindrod, K. Evaluating Smartphone Authentication Schemes with Older Adults. In Proc. of SOUPS 2016, 2016.
- Silva, H.L.S.R.P.D.; Wittebron, D.C.; Lahiru, A.M.R.; Madumadhavi, K.L.; Rupasinghe, L.; Abeywardena, K.Y. AuthDNA : An Adaptive Authentication Service for any Identity Server. International Conference on Advancements in Computing (ICAC) December 5-6, 2019. Malabe, Sri Lanka, 2019.
- Gebrie, M.T.; Abie, H. Risk-Based Adaptive Authentication for Internet of Things in Smart Home eHealth. Proceedings of ECSA’17, September 11–15, 2017, Canterbury, United Kingdom, 7 pages., 2017. [CrossRef]
- Azmi, K.; Bakar, A.; Daud, N.I. Adaptive Authentication: A Case Study for Unified Authentication Platform. CS and IT-CSCP 2015, 2015, pp. 61–72. [Google Scholar]
- Ehatisham-ul Haq, M.; Azam, M.A.; Loo, J.; Shuang, K.; Islam, S.; Naeem, U.; Amin, Y. Authentication of smartphone users based on activity recognition and mobile sensing. Sensors (Switzerland) 2017, 17. [Google Scholar] [CrossRef]
- Chakraborty, N.; Li, J.; Mondal, S.; Chen, F.; Pan, Y. On overcoming the identified limitations of a usable pin entry method. IEEE Access 2019, 7, 124366–124378. [Google Scholar] [CrossRef]
- Singh, J.; Kam, Y.H.s. Usable Authentication Methods for Seniors. International Journal of Recent Technology and Engineering (IJRTE) 2019, 8, 94–100. [Google Scholar] [CrossRef]
- Hoobi, M.M. Keystroke Dynamics Authentication based on Naïve Bayes Classifier. Iraqi Journal of Science 2015, 56, 1176–1184. [Google Scholar]
- Grassi, P.A.; Fenton, J.L.; Newton, E.M.; Perlner, R.A.; Regenscheid, A.R.; Burr, W.E.; Richer, J.P.; Lefkovitz, N.B.; Danker, J.M.; Choong, Y.Y.; Greene, K.K.; Theofanos, M.F. Digital identity guidelines: authentication and lifecycle management. Technical report, National Institute of Standards and Technology, Gaithersburg, MD, 2017. [CrossRef]
- Zheng, Z.; Pan, T.; Song, Y. Development of Human Action Feature Recognition Using Sensors. Information Technology Journal 2022, 21, 8–13. [Google Scholar] [CrossRef]
- Ometov, A.; Petrov, V.; Bezzateev, S.; Andreev, S.; Koucheryavy, Y.; Gerla, M. INTERNET OF THINGS FOR SMART CITITES : Challenges of Multi-Factor Authentication for Securing Advanced IoT Applications. IEEE Network 2019, 33, 82–88. [Google Scholar] [CrossRef]
- Shi, C.; Liu, J.; Liu, H.; Chen, Y. Smart User authentication through actuation of daily activities leveraging WiFi-enabled IoT. Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), 2017, Vol. Part F1291. [CrossRef]
- Batool, S.; Saqib, N.A.; Khattack, M.K.; Hassan, A. Identification of remote IoT users using sensor data analytics; Vol. 69, Springer International Publishing, 2020; pp. 328–337. [CrossRef]
- Gonzalez-manzano, L.; Fuentes, J.M.D.E.; Ribagorda, A. Leveraging User-related Internet of Things for Continuous Authentication: A Survey. ACM Comput. Surv. 2019, 52. [Google Scholar] [CrossRef]
- Dasgupta, D.; Roy, A.; Nag, A. Toward the design of adaptive selection strategies for multi-factor authentication. Computers and Security 2016, 63, 85–116. [Google Scholar] [CrossRef]
- Hintze, D.; Koch, E.; Scholz, S.; Mayrhofer, R. Location-based risk assessment for mobile authentication. Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct; Association for Computing Machinery: New York, NY, USA, 2016. [Google Scholar] [CrossRef]
- Arias-cabarcos, P. A Survey on Adaptive Authentication. ACM Comput. Surv. 2019, 52, 80. [Google Scholar] [CrossRef]
- V, P.; G., R.M.L.; Mathews, M.M.; Justine, S. A Provably Secure,Privacy-Preserving Lightweight Authentication Scheme for Peer-to-Peer Communication in Healthcare Systems based on Internet of Medical Things. Computer Communications 2023, 212, 284–297. [CrossRef]
- Khan, M.A.; Din, I.U.; Almogren, A. Securing Access to Internet of Medical Things Using a Graphical-Password-Based User Authentication Scheme. Sustainability 2023, 15, 5207–5207. [Google Scholar] [CrossRef]
- Kim, K.; Ryu, J.; Lee, Y.; Won, D. An Improved Lightweight User Authentication Scheme for the Internet of Medical Things. Sensors 2023, 23, 1122–1122. [Google Scholar] [CrossRef]
- Farhan, M.; Salih, A.; Butt, U. Enhancing Secure Access and Authorization in Healthcare IoT through an Innovative Framework: Integrating OAuth, DIDs, and VCs. Proceedings of the 2023 6th International Conference on Information Science and Systems; Association for Computing Machinery: New York, NY, USA, 2023; ICISS ’23, p. 254–261. [CrossRef]
- Bali, M.; Yenkikar, A., IOT-BASED SECURE WIRELESS MEDICAL SENSOR NETWORKS USINGMULTIFACTOR AUTHENTICATION. In Futuristic Trends in IOT Volume 3 Book 2; IIP Edited Book Series, 2024; pp. 146–162. [CrossRef]
- Enamamu, T.S., Intelligent Authentication Framework for Internet of Medical Things (IoMT). In Illumination of Artificial Intelligence in Cybersecurity and Forensics; Springer International Publishing: Cham, 2022; pp. 97–121. [CrossRef]
- Khan, H.; Ali, Y.; Khan, F. A Features-Based Privacy Preserving Assessment Model for Authentication of Internet of Medical Things (IoMT) Devices in Healthcare. Mathematics 2023, 11, 1197. [Google Scholar] [CrossRef]
- Kumar, T.; Braeken, A.; Liyanage, M.; Ylianttila, M. Identity Privacy Preserving Biometric Based Authentication Scheme for Naked Healthcare Environment. 2017 IEEE International Conference on Communications (ICC), 2017. [CrossRef]
- Sharma, G.; Singh, G. , Robust User Authentication Scheme for IoT-Based Healthcare applications. In Recent Advancements in Smart Remote Patient Monitoring, Wearable Devices, and Diagnostics Systems; IGI Global, 2023; pp. 170–182. [CrossRef]
- Khan, M.; Ud Din, I.; Majali, T.; Kim, B.S. A Survey of Authentication in Internet of Things-Enabled Healthcare Systems. Sensors 2022, 22, 9089. [Google Scholar] [CrossRef]
- Hayashi, E.; Hong, J.; Das, S.; Amini, S.; Oakley, I. CASA : Context - Aware Scalable Authentication. Symposium on Usable Privacy and Security (SOUPS) 2013, July 24–26, 2013, Newcastle, UK., 2013, pp. 1–10.
- Forget, A.; Chiasson, S.; Biddle, R. Choose Your Own Authentication. NSPW, 2015.
- Wójtowicz, A.; Chmielewski, J. Model for adaptable context-based biometric authentication for mobile devices. Pers Ubiquit Comput 2016, 20, 195–207. [Google Scholar] [CrossRef]
- Arias-Cabarcos, P.; Krupitzer, C. On the design of distributed adaptive authentication systems. Proceedings of the 13th Symposium on Usable Privacy and Security (SOUPS 2017) 2017.
- Department of Health, Education, and Welfare. The Belmont Report, 1979. A foundational document in the field of bioethics.











| Metric | Value |
|---|---|
| Accuracy | 1 |
| Sensitivity(Recall) | 1 |
| Specificity | 1 |
| Precision(PPV) | 1 |
| NPV | 1 |
| Balanced Accuracy | 1 |
| Metric | Value |
|---|---|
| False Rejection Rate | 0 |
| False Acceptance Rate | 0 |
| Metric | Value |
|---|---|
| Average Success Ratio | 0.47 |
| Overall Success Rate | 0.49 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).