Sensor-Based mHealth Authentication for Real-Time Remote Healthcare Monitoring System: A Multilayer Systematic Review

被引:0
作者
Moceheb Lazam Shuwandy
B. B. Zaidan
A. A. Zaidan
A. S. Albahri
机构
[1] Universiti Pendidikan Sultan Idris,Department of Computing
来源
Journal of Medical Systems | 2019年 / 43卷
关键词
Real-time remote healthcare monitoring system; mHealth; Security and privacy; Sensor; Smartphone;
D O I
暂无
中图分类号
学科分类号
摘要
The new and groundbreaking real-time remote healthcare monitoring system on sensor-based mobile health (mHealth) authentication in telemedicine has considerably bounded and dispersed communication components. mHealth, an attractive part in telemedicine architecture, plays an imperative role in patient security and privacy and adapts different sensing technologies through many built-in sensors. This study aims to improve sensor-based defence and attack mechanisms to ensure patient privacy in client side when using mHealth. Thus, a multilayer taxonomy was conducted to attain the goal of this study. Within the first layer, real-time remote monitoring studies based on sensor technology for telemedicine application were reviewed and analysed to examine these technologies and provide researchers with a clear vision of security- and privacy-based sensors in the telemedicine area. An extensive search was conducted to find articles about security and privacy issues, review related applications comprehensively and establish the coherent taxonomy of these articles. ScienceDirect, IEEE Xplore and Web of Science databases were investigated for articles on mHealth in telemedicine-based sensor. A total of 3064 papers were collected from 2007 to 2017. The retrieved articles were filtered according to the security and privacy of sensor-based telemedicine applications. A total of 19 articles were selected and classified into two categories. The first category, 57.89% (n = 11/19), included survey on telemedicine articles and their applications. The second category, 42.1% (n = 8/19), included articles contributed to the three-tiered architecture of telemedicine. The collected studies improved the essential need to add another taxonomy layer and review the sensor-based smartphone authentication studies. This map matching for both taxonomies was developed for this study to investigate sensor field comprehensively and gain access to novel risks and benefits of the mHealth security in telemedicine application. The literature on sensor-based smartphones in the second layer of our taxonomy was analysed and reviewed. A total of 599 papers were collected from 2007 to 2017. In this layer, we obtained a final set of 81 articles classified into three categories. The first category of the articles [86.41% (n = 70/81)], where sensor-based smartphones were examined by utilising orientation sensors for user authentication, was used. The second category [7.40% (n = 6/81)] included attack articles, which were not intensively included in our literature analysis. The third category [8.64% (n = 7/81)] included ‘other’ articles. Factors were considered to understand fully the various contextual aspects of the field in published studies. The characteristics included the motivation and challenges related to sensor-based authentication of smartphones encountered by researchers and the recommendations to strengthen this critical area of research. Finally, many studies on the sensor-based smartphone in the second layer have focused on enhancing accurate authentication because sensor-based smartphones require sensors that could authentically secure mHealth.
引用
收藏
相关论文
共 264 条
  • [41] Ellouze N(2018)Conceptual framework for the security of mobile health applications on android platform Telematics Inform. 35 1335-1553
  • [42] Rekhis S(2018)A security framework for mHealth apps on android platform Comput. Sec. 75 191-224
  • [43] Boudriga N(2010)Novel approach for high (secure and rate) data hidden within triplex space for executable file Sci. Res. Essays 5 1965-69
  • [44] Allouche M(2010)Using the features of mosaic image and AES cryptosystem to implement an extremely high rate and high secure data hidden: Analytical study Sci. Res. Essays 5 3254-300
  • [45] Andriole KP(2010)Novel approach for cover file of hidden data in the unused area two within EXE file using distortion techniques and advance encryption standard Proc. World Acad. Sci. Eng. Technol. (WASET) 56 498-300
  • [46] Kiah MM(2010)On the differences between hiding information and cryptography techniques: An overview J. Appl. Sci. (Faisalabad) 10 1650-479
  • [47] Alanazi HO(2010)An overview on hiding information technique in images J. Appl. Sci. (Faisalabad) 10 2094-571
  • [48] Alanazi HO(2010)New frame work of hidden data with in non multimedia file Int. J. Comput. Netw. Secur. 2 46-678
  • [49] Zaidan BB(2010)New design for information hiding with in steganography using distortion techniques Int. J. Eng. Technol. 2 72-64
  • [50] Zaidan AA(2009)Quality of image vs. quantity of data hidden in the image IPCV 6 343-1649