8 research outputs found

    A data taxonomy for adaptive multifactor authentication in the internet of health care things

    Get PDF
    The health care industry has faced various challenges over the past decade as we move toward a digital future where services and data are available on demand. The systems of interconnected devices, users, data, and working environments are referred to as the Internet of Health Care Things (IoHT). IoHT devices have emerged in the past decade as cost-effective solutions with large scalability capabilities to address the constraints on limited resources. These devices cater to the need for remote health care services outside of physical interactions. However, IoHT security is often overlooked because the devices are quickly deployed and configured as solutions to meet the demands of a heavily saturated industry. During the COVID-19 pandemic, studies have shown that cybercriminals are exploiting the health care industry, and data breaches are targeting user credentials through authentication vulnerabilities. Poor password use and management and the lack of multifactor authentication security posture within IoHT cause a loss of millions according to the IBM reports. Therefore, it is important that health care authentication security moves toward adaptive multifactor authentication (AMFA) to replace the traditional approaches to authentication. We identified a lack of taxonomy for data models that particularly focus on IoHT data architecture to improve the feasibility of AMFA. This viewpoint focuses on identifying key cybersecurity challenges in a theoretical framework for a data model that summarizes the main components of IoHT data. The data are to be used in modalities that are suited for health care users in modern IoHT environments and in response to the COVID-19 pandemic. To establish the data taxonomy, a review of recent IoHT papers was conducted to discuss the related work in IoHT data management and use in next-generation authentication systems. Reports, journal articles, conferences, and white papers were reviewed for IoHT authentication data technologies in relation to the problem statement of remote authentication and user management systems. Only publications written in English from the last decade were included (2012-2022) to identify key issues within the current health care practices and their management of IoHT devices. We discuss the components of the IoHT architecture from the perspective of data management and sensitivity to ensure privacy for all users. The data model addresses the security requirements of IoHT users, environments, and devices toward the automation of AMFA in health care. We found that in health care authentication, the significant threats occurring were related to data breaches owing to weak security options and poor user configuration of IoHT devices. The security requirements of IoHT data architecture and identified impactful methods of cybersecurity for health care devices, data, and their respective attacks are discussed. Data taxonomy provides better understanding, solutions, and improvements of user authentication in remote working environments for security features

    On the Usability of Next-Generation Authentication: A Study on Eye Movement and Brainwave-based Mechanisms

    Full text link
    Passwords remain a widely-used authentication mechanism, despite their well-known security and usability limitations. To improve on this situation, next-generation authentication mechanisms, based on behavioral biometric factors such as eye movement and brainwave have emerged. However, their usability remains relatively under-explored. To fill this gap, we conducted an empirical user study (n=32 participants) to evaluate three brain-based and three eye-based authentication mechanisms, using both qualitative and quantitative methods. Our findings show good overall usability according to the System Usability Scale for both categories of mechanisms, with average SUS scores in the range of 78.6-79.6 and the best mechanisms rated with an "excellent" score. Participants particularly identified brainwave authentication as more secure yet more privacy-invasive and effort-intensive compared to eye movement authentication. However, the significant number of neutral responses indicates participants' need for more detailed information about the security and privacy implications of these authentication methods. Building on the collected evidence, we identify three key areas for improvement: privacy, authentication interface design, and verification time. We offer recommendations for designers and developers to improve the usability and security of next-generation authentication mechanisms

    PUPy: A Generalized, Optimistic Context Detection Framework

    Get PDF
    In modern life, the usage of smart devices like smartphones and laptops that allow for access to information, communication with friends and colleagues and other indispensable services has become ubiquitous. People have gradually taken to performing more and more of their daily tasks on and through these devices. Therefore, all modern smart devices employ some form of authentication to ensure that access to this confidential data by the wrong person is avoided. This authentication method is usually some form of explicit authentication, which can be detrimental to the user's experience, often leading to users forgoing authentication entirely. Implicit authentication aims to limit the amount of explicit authentications that are necessary for the user, using passive approaches to authenticate the user instead. Context detection frameworks aim to reduce explicit authentications by disabling explicit authentication entirely when appropriate. Since these two approaches are not mutually exclusive, there exist frameworks that will use the context around them to make decisions when authenticating on which approach to use. This combination of context detection with implicit authentication is the approach taken in this work, though we focus mainly on the context detection part of this hybrid approach. We aim to build upon existing works through wider applicability, better accuracy through numerous data sources, and most importantly, an optimistic approach to context detection. We build a framework based on the assumption that the absence of data can, in some cases, be taken as a sign the context is safe. This optimistic approach provides a less secure method of determining the context of the device, but simultaneously provides a significantly improved user experience. In this thesis, we outline a theoretical context detection framework that is based on a novel set of values. These values are called privacy, unfamiliarity and proximity, each describing a different aspect of the current context. Privacy tracks the privacy of the current context, while unfamiliarity tracks how many unfamiliar people are around. Finally, proximity estimates the distance between the device and the user. These values are calculated using a method we devise that better adapts to different contexts. We provide an Android implementation of the framework, including an API that allows other developers to contribute modules to the system. These modules can provide additional input data for PUPy, or build functionality that uses the calculated values. Finally, we evaluate the theoretical framework, using two datasets - Cambridge/Haggle and the MDC dataset. We conduct visual and statistical analysis of how the system functions using data from the datasets. Through this analysis, we find that PUPy compares favourably to existing works, permitting a 77% reduction on average in the number of explicit authentications

    Defensa en profundidad en sistemas de control de accesos mediante autenticaci贸n continua

    Get PDF
    La seguridad de los sistemas de informaci贸n depende, en gran medida, de que el proceso de control de accesos funcione correctamente. Pero, en los modelos cl谩sicos, la identidad del operador s贸lo se autentica en momentos puntuales. Tras d茅cadas de implantaci贸n de dispositivos m贸viles en la sociedad [2], se encuentran presentes en pr谩cticamente todos los procesos de negocio, pero estos activos sufren de debilidades en la gesti贸n de su seguridad: no se ubican en per铆metros de red bien definidos y bastionables, son m谩s susceptibles de ser robados, etc.; y en un modelo cl谩sico de control de accesos, una vez iniciada la sesi贸n, carecer铆amos de medidas para combatir estas amenazas. Activar el proceso de autenticaci贸n peri贸dicamente ser铆a molesto y contraproducente, pero mediante biometr铆a conductual (i.e., caracterizando la identidad de un usuario por c贸mo se comporta con el sistema), s铆 podr铆a implementarse un sistema que validase la identidad del operador sin interferir en su sesi贸n de trabajo: un sistema de autenticaci贸n continua. En esta tesis se aborda c贸mo la autenticaci贸n continua puede ayudar a mitigar los riesgos comentados, convirti茅ndose en una tecnolog铆a diferenciadora al implantar medidas de defensa en profundidad en los sistemas de control de accesos. Al no existir un criterio claro para definir la autenticaci贸n continua, en primer lugar se ha desarrollado un estudio sistem谩tico de la literatura, que permite caracterizar este 谩rea de investigaci贸n. En el segundo art铆culo se plantea un caso de uso, donde se refuerza la seguridad de un sistema distribuido aplicando principios de la autenticaci贸n continua; evidenciando al mismo tiempo las carencias de los sistemas din谩micos, y acotando la definici贸n de autenticaci贸n continua. Finalmente, se estudia, experimentalmente, el rendimiento de 7 algoritmos supervisados de clasificaci贸n en el 谩mbito de la autenticaci贸n continua. Este estudio, junto con los resultados previos, sirve de soporte a la toma de decisiones en la implantaci贸n de la autenticaci贸n continua. Fija una base homog茅nea de conocimiento, que permite comparar las particularidades de estos algoritmos en el procesado de datos de biometr铆a conductual, y discute su utilidad en funci贸n de los requisitos del sistema de control de accesos. Esta tesis evidencia que el uso de autenticaci贸n continua contribuye a la defensa en profundidad de los sistemas de control de accesos, especialmente, aunque exclusivamente, a la de aquellos con un operador cuya sesi贸n de trabajo debe ser autenticada

    A survey on adaptive authentication

    Full text link
    corecore