Affiliation:
1. School of Computer Science and Engineering, Vellore Institute of Technology, Vellore, India
2. School of Information Technology and Engineering, Vellore Institute of Technology, Vellore, India
3. Department of Electronics and Communication Engineering, Manakula Vinayagar Institute of Technology, Puducherry, India
Abstract
Secure identification is a critical system requirement for patients seeking health-related services. In the event of critical, aged, or disabled patients who require frequent health treatments, quick and easy identification is vital. Researchers describe the notion of the unprotected environment in this study, in which patients can receive health services from the hospital’s smart and intelligent surroundings without the use of explicit equipment. Patients would interact directly with the environment and be identified through it. We suggest a biometric-based authentication technique for the unprotected hospital environment that also safeguards the patient’s identity privacy. Furthermore, we demonstrate that this authentication technique is resistant to many well-known assaults, including insider attacks, replay attacks, and identity privacy. Doctors and other staff members showed enthusiastic responses after installing 2-factor authentications, as it makes their workflow efficient and makes things easier for patients. It also lets them focus on other factors rather than worrying about data security; hence, we need biometric authentication in intelligent and privacy-preserving healthcare systems. The paper deals with two-factor biometric authentication, and despite the added security, two-factor authentication adoption is said to be poor. It is due to a lack of awareness and difficulty to use and configure two-factor authentication (2FA) into a particular application by some individuals who struggle with the concept of authentication and its technology. Also, many 2FA methods in widespread use today have not been subjected to adequate usability testing. Research focuses on the point that there is still a large section of people unaware of the use of biometric systems to protect their online data. Researchers collected quantitative and qualitative data from 96 individuals during a two-week between-subjects usability survey of some common and rarely used 2FA approaches. The survey allowed the researcher to investigate which authentication methods are given higher priority and why, along with the relationship between different usage patterns and perceived usability, and identify user misconceptions and insecure habits to determine ease of use. It was observed that the biometric-based method was given the utmost preferability.
Subject
Health Informatics,Biomedical Engineering,Surgery,Biotechnology
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Multi-factor Authentication Framework for Secured Data Access in Cloud Computing;Recent Advances in Electrical & Electronic Engineering (Formerly Recent Patents on Electrical & Electronic Engineering);2024-07-18
2. Safeguarding the Future;Advances in Healthcare Information Systems and Administration;2024-05-28
3. Multimodal biometric user authentication using improved decentralized fuzzy vault scheme based on Blockchain network;Journal of Information Security and Applications;2024-05
4. EVALUATION OF CURRENT KNOWLEDGE LEVEL ON DATA SECURITY OF PEOPLE WORKING IN A MEDICAL ENVIRONMENT;ROM J ORAL REHABIL;2024
5. Enhancing Cloud and IoT Security;Advances in Information Security, Privacy, and Ethics;2024-02-23