Sensor-Based mHealth Authentication for Real-Time Remote Healthcare Monitoring System: A Multilayer Systematic Review

被引:0
作者
Moceheb Lazam Shuwandy
B. B. Zaidan
A. A. Zaidan
A. S. Albahri
机构
[1] Universiti Pendidikan Sultan Idris,Department of Computing
来源
Journal of Medical Systems | 2019年 / 43卷
关键词
Real-time remote healthcare monitoring system; mHealth; Security and privacy; Sensor; Smartphone;
D O I
暂无
中图分类号
学科分类号
摘要
The new and groundbreaking real-time remote healthcare monitoring system on sensor-based mobile health (mHealth) authentication in telemedicine has considerably bounded and dispersed communication components. mHealth, an attractive part in telemedicine architecture, plays an imperative role in patient security and privacy and adapts different sensing technologies through many built-in sensors. This study aims to improve sensor-based defence and attack mechanisms to ensure patient privacy in client side when using mHealth. Thus, a multilayer taxonomy was conducted to attain the goal of this study. Within the first layer, real-time remote monitoring studies based on sensor technology for telemedicine application were reviewed and analysed to examine these technologies and provide researchers with a clear vision of security- and privacy-based sensors in the telemedicine area. An extensive search was conducted to find articles about security and privacy issues, review related applications comprehensively and establish the coherent taxonomy of these articles. ScienceDirect, IEEE Xplore and Web of Science databases were investigated for articles on mHealth in telemedicine-based sensor. A total of 3064 papers were collected from 2007 to 2017. The retrieved articles were filtered according to the security and privacy of sensor-based telemedicine applications. A total of 19 articles were selected and classified into two categories. The first category, 57.89% (n = 11/19), included survey on telemedicine articles and their applications. The second category, 42.1% (n = 8/19), included articles contributed to the three-tiered architecture of telemedicine. The collected studies improved the essential need to add another taxonomy layer and review the sensor-based smartphone authentication studies. This map matching for both taxonomies was developed for this study to investigate sensor field comprehensively and gain access to novel risks and benefits of the mHealth security in telemedicine application. The literature on sensor-based smartphones in the second layer of our taxonomy was analysed and reviewed. A total of 599 papers were collected from 2007 to 2017. In this layer, we obtained a final set of 81 articles classified into three categories. The first category of the articles [86.41% (n = 70/81)], where sensor-based smartphones were examined by utilising orientation sensors for user authentication, was used. The second category [7.40% (n = 6/81)] included attack articles, which were not intensively included in our literature analysis. The third category [8.64% (n = 7/81)] included ‘other’ articles. Factors were considered to understand fully the various contextual aspects of the field in published studies. The characteristics included the motivation and challenges related to sensor-based authentication of smartphones encountered by researchers and the recommendations to strengthen this critical area of research. Finally, many studies on the sensor-based smartphone in the second layer have focused on enhancing accurate authentication because sensor-based smartphones require sensors that could authentically secure mHealth.
引用
收藏
相关论文
共 264 条
  • [1] Hussain M(2016)The rise of keyloggers on smartphones: A survey and insight into motion-based tap inference attacks Pervasive Mob. Comput. 25 1-25
  • [2] Salem Y(2011)A review on multimedia communications cryptography Res. J. Inf. Technol. 3 146-152
  • [3] Watari MA(2013)Securing m-government transmission based on symmetric and asymmetric algorithms: A review Asian J. Sci. Res. 8 80-94
  • [4] Naji AW(2011)Security improvement of credit card online purchasing system Sci. Res. Essays 6 3357-3370
  • [5] Zaidan AA(2011)Spam influence on business and economy: Theoretical and experimental studies for textual anti-spam filtering using mature document processing and naive Bayesian classifier Afr. J. Bus. Manag. 5 596-607
  • [6] Raad M(2010)Impact of spam advertisement through e-mail: A study to assess the influence of the anti-spam on the e-mail marketing Afr. J. Bus. Manag. 4 2362-2367
  • [7] Zaidan BB(2017)Software and hardware FPGA-based digital watermarking and steganography approaches: Toward new methodology for evaluation and benchmarking using multi-criteria decision-making techniques J. Circ. Syst. Comput. 26 1750116-1392
  • [8] Zaidan BB(2017)A new digital watermarking evaluation and benchmarking methodology using an external group of evaluators and multi-criteria analysis based on ‘large-scale data’ Softw. Pract. Exp. 47 1365-294
  • [9] Zaidan BB(2018)Comparative study on the evaluation and benchmarking information hiding approaches based multi-measurement analysis using TOPSIS method with different normalisation, separation and context techniques Measurement 117 277-497
  • [10] Naji AW(2009)New approach of hidden data in the portable executable file without change the size of carrier file using distortion techniques Proc. World Acad. Sci. Eng. Technol. (WASET) 56 493-237