Nothing Special   »   [go: up one dir, main page]

Skip to main content

User-Centred Design of Machine Learning Based Internet of Medical Things (IoMT) Adaptive User Authentication Using Wearables and Smartphones

  • Conference paper
  • First Online:
Artificial Intelligence Application in Networks and Systems (CSOC 2023)

Abstract

As the world grapples with an increase in diseases including COVID-19, the Internet of Medical Things (IoMT) emerges as a complementary technology to the healthcare staff, which is constantly overburdened. Untrained users’ increased online presence exposes them to cyberattack threats. Authentication is the first line of defense for protecting medical data, but existing solutions do not consider the user’s context and capabilities, making them unusable for some groups of users who eventually shun them. This paper proposes a Machine Learning based adaptive user authentication framework that adapts to user profiles and context during login to determine the likelihood of the attempt being illegitimate before assigning appropriate authentication mechanisms. The proposed edge-centric framework fuses the Naive Bayes classifier and CoFRA model to determine the risk associated with a login attempt based on biometric wearable sensor data, non-biometric smartphone sensor data, and some predefined data. User backgrounds and preferences were solicited, and results showed that users despite their ICTSkills, ages, jobs, and years of experience prefer to use simple physiological biometrics for authentication. An Android App was then developed using the User-Centred design and installed on a smartphone which communicated with a PineTime smartwatch. Sensor data was used as input in calculating the risk associated with an access request to decide whether to authenticate, step up authentication, or block a request using rule and role-based access control techniques while also non-intrusively monitoring health. Once implemented, the framework is expected to improve user experience in authentication promoting the use of IoT in healthcare.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Shaikh, A.A., Gupta, N.S., Din, A., Khan, M., Artist, H.T.: Android and Internet of Things (IOT) based alzheimer care/rehabilitation system to moniter. Int. J. Innov. Res. Comput. Commun. Eng. 5(3), 5531–5539 (2017). https://doi.org/10.15680/IJIRCCE.2017

    Article  Google Scholar 

  2. Lindgren, T.: Using IoT to Fight Covid-19. Unissu (2020). https://www.eetasia.com/using-iot-to-fight-covid-19-pandemic/. Accessed 31 Mar 2021

  3. Rahman, M.S., Peeri, N.C., Shrestha, N., Zaki, R., Haque, U., Hamid, S.H.A.: Defending against the Novel Coronavirus (COVID-19) outbreak: how can the Internet of Things (IoT) help to save the world? Heal. Policy Technol. 9(2), 136–138 (2020). https://doi.org/10.1016/j.hlpt.2020.04.005

    Article  Google Scholar 

  4. Zakaria, H., Azaliah, N., Bakar, A., Hassan, N.H., Yaacob, S.: ScienceDirect IoT security risk management model for secured practice in IoT security risk management model for secured practice in healthcare environment healthcare environment. Procedia Comput. Sci. 161, 1241–1248 (2019). https://doi.org/10.1016/j.procs.2019.11.238

    Article  Google Scholar 

  5. Hazratifard, M., Gebali, F., Mamun, M.: Using machine learning for dynamic authentication in telehealth: a tutorial. Sensors 22(7655), 1–20 (2022)

    Google Scholar 

  6. Fang, H., Qi, A., Wang, X.: Fast authentication and progressive authorization in large-scale IoT: how to leverage AI for security enhancement. IEEE Netw. 34(3), 24–29 (2020). https://doi.org/10.1109/MNET.011.1900276

    Article  Google Scholar 

  7. Hayashi, E., Hong, J., Das, S., Amini, S., Oakley, I.: CASA : context - aware scalable authentication. In: Symposium on Usable Privacy and Security (SOUPS) 2013, 24–26 July 2013, Newcastle, UK, pp. 1–10 (2013)

    Google Scholar 

  8. Steger, A.: What Makes IoMT Devices So Difficult to Secure Against Cyberthreats. Health Magazine (2020). https://healthtechmagazine.net/article/2020/02/what-makes-iomt-devices-so-difficult-secure-perfcon. Accessed 25 Mar 2021

  9. Santana-Mancilla, P.C., Anido-Rifón, L.E., Contreras-Castillo, J., Buenrostro-Mariscal, R.: Heuristic evaluation of an IoMT system for remote health monitoring in senior care. Int. J. Environ. Res. Public Health 17(5), 1586 (2020). https://doi.org/10.3390/ijerph17051586

  10. Forget, A., Chiasson, S., Biddle, R.: Choose Your Own Authentication (2015)

    Google Scholar 

  11. Wójtowicz, A., Joachimiak, K.: Model for adaptable context-based biometric authentication for mobile devices. Pers. Ubiquit. Comput. 20(2), 195–207 (2016). https://doi.org/10.1007/s00779-016-0905-0

    Article  Google Scholar 

  12. Hintze, D., Scholz, S., Koch, E., Mayrhofer, R.: Location-based risk assessment for mobile authentication. In: UbiComp 2016 Adjunct – Proceedings of 2016 ACM International Joint Conference on Pervasive Ubiquitous Computing. no. September 2016, pp. 85–88 (2016). https://doi.org/10.1145/2968219.2971448

  13. Kumar, M.Y.T., Braeken, A., Liyanage, M.: Identity privacy preserving biometric based authentication scheme for Naked healthcare environment (2017)

    Google Scholar 

  14. Gebrie, M.T., Abie, H.: Risk-Based Adaptive Authentication for Internet of Things in Smart Home eHealth (2017). https://doi.org/10.1145/3129790.3129801

  15. Mohammed Misbahuddin, B.D., Bhindumadhava, B.S.: Design of a Risk Based Authentication System using Machine Learning Techniques. IEEE (2017)

    Google Scholar 

  16. Vhaduri, S., Poellabauer, C.: Biometric-Based Wearable User Authentication During Sedentary and Non-sedentary Periods, pp. 1–4 (2018). http://arxiv.org/abs/1811.07060

  17. He, W., et al.: Rethinking access control and authentication for the Home Internet of Things (IoT). In: Proceedings of the 27th USENIX Security Symposium, pp. 255–272 (2018)

    Google Scholar 

  18. Batool, S., Saqib, N.A., Khattack, M.K., Hassan, A.: Identification of remote IoT users using sensor data analytics. In: Arai, K., Bhatia, R. (eds.) FICC 2019. LNNS, vol. 69, pp. 328–337. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-12388-8_24

    Chapter  Google Scholar 

  19. Bumiller, A., Barais, O., Challita, S., Combemale, B., Aillery, N., Le Lan, G.: A context-driven modelling framework for dynamic authentication decisions. In: 48th Euromicro Conference on Software Engineering and Advanced Applications (SEAA), pp. 398–405 (2022). https://doi.org/10.1109/seaa56994.2022.00069

  20. Jeyanthi, N., Thandeeswaran, R.: IGI Global, Security Breaches and Threat Prevention in the Internet of Things. vol. i, no. February (2017)

    Google Scholar 

  21. Gordieiev, O., Kharchenko, V., Vereshchak, K.: Usable Security Versus Secure Usability: an Assessment of Attributes Interaction (2017)

    Google Scholar 

  22. Perera, C., Ranjan, R., Wang, L., Khan, S.U., Zomaya, A.Y.: Big data privacy in the Internet of Things era. IT Prof. 17(3), 32–39 (2015). https://doi.org/10.1109/MITP.2015.34

    Article  Google Scholar 

  23. Itai Greenberg. Fifth-generation cyberattacks are here. How can the IT industry adapt? World Economic Forum (2021). https://www.weforum.org/agenda/2021/02/fifth-generation-cyberattacks/. Accessed 30 May 2022

  24. Chavula, J., Phokeer, A., Feamster, N.: Insight Into Africa‘s Country-level Latencies. IEEE Africon, pp. 938–944 (2017)

    Google Scholar 

  25. Nizeyimana, E.: Design of a decentralized and predictive real- time framework for air pollution spikes monitoring. In: IEEE6 th International Conference on Cloud Computing and big Data Analytics, pp. 8–11 (2021)

    Google Scholar 

  26. Macrotrends. Sub-Saharan Africa Literacy Rate 1985–2021|MacroTrends (2021). https://www.macrotrends.net/countries/SSF/sub-saharan-africa-/literacy-rate. Accessed 12 Apr 2021

  27. Cleland-huang, J., Vierhauser, M., Murphy, M.: Extending MAPE-K to support human-machine teaming. In: 17th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS ‘22), May 18â•fi23, 2022, PITTSBURGH, PA, USA. vol. 1, no. 1 (2022). https://doi.org/10.1145/3524844.3528054

  28. Digital, T.: What are Smartwatch Sensors and How do they function? (2021). https://www.taggdigital.com/blog/what-are-smartwatch-sensors-and-how-do-they-function. Accessed 12 Mar 2023

  29. Mahbub, U., Sarkar, S., Patel, V.M., Chellappa, R.: Active user authentication for smartphones: a challenge data set and benchmark results. In: 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS), pp. 1–8 (2016). https://doi.org/10.1109/BTAS.2016.7791155

  30. GSMA Association. State of Mobile Internet Connectivity 2018. GSM Assoc., pp. 1–64 (2018)

    Google Scholar 

  31. Ehatisham-ul-Haq, M., et al.: Authentication of smartphone users based on activity recognition and mobile sensing. Sensors (Switzerland). 17(9), 2043 (2017). https://doi.org/10.3390/s17092043

  32. Grindrod, K., et al.: Evaluating authentication options for mobile health applications in younger and older adults. Appl. younger older adults. PLoS ONE 13(1), e0189048 (2018). https://doi.org/10.1371/journal.pone.0189048

  33. Amroun, H., Ammi, M.: Who used my smart object ? A flexible approach for the recognition of users. IEEE 3536, 1–12. (2017). https://doi.org/10.1109/ACCESS.2017.2776098

  34. Helkala, K., Snekkenes, E.: A method for ranking authentication products. In: Proceedings of the Second International Symposium on Human Aspects of Information Security & Assurance (HAISA 2008), pp 81–93 (2008)

    Google Scholar 

  35. Hausawi, Y.M., Allen, W.H.: Usable-security evaluation. In: Tryfonas, T., Askoxylakis, I. (eds.) HAS 2015. LNCS, vol. 9190, pp. 335–346. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-20376-8_30

    Chapter  Google Scholar 

Download references

Acknowledgements

This work was jointly supported by the African Center of Excellence in Internet of Things (ACEIoT) from College of Science and Technology, University of Rwanda, and The Regional Innovation Scholarship Fund (RSIF).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Prudence M. Mavhemwa .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mavhemwa, P.M., Zennaro, M., Nsengiyumva, P., Nzanywayingoma, F. (2023). User-Centred Design of Machine Learning Based Internet of Medical Things (IoMT) Adaptive User Authentication Using Wearables and Smartphones. In: Silhavy, R., Silhavy, P. (eds) Artificial Intelligence Application in Networks and Systems. CSOC 2023. Lecture Notes in Networks and Systems, vol 724. Springer, Cham. https://doi.org/10.1007/978-3-031-35314-7_65

Download citation

Publish with us

Policies and ethics