User Authentication in Smartphones for Telehealth
نویسندگان
چکیده
Many functions previously conducted on desktop computers are now performed on smartphones. Smartphones provide convenience, portability, and connectivity. When smartphones are used in the conduct of telehealth, sensitive data is invariably accessed, rendering the devices in need of user authentication to ensure data protection. User authentication of smartphones can help mitigate potential Health Insurance Portability and Accountability Act (HIPAA) breaches and keep sensitive patient information protected, while also facilitating the convenience of smartphones within everyday life and healthcare. This paper presents and examines several types of authentication methods available to smartphone users to help ensure security of sensitive data from attackers. The applications of these authentication methods in telehealth are discussed.
منابع مشابه
FUEL: Fast, Ubiquitous, Easy-to-use, and Low-cost Authentication for Smartphones
As smartphones have become highly ubiquitous, it is often used as a primary gateway for many online services that require authentication. However, the traditional authentication approach using a user id and password can be inconvenient or impossible to use in certain cases. We propose Fast, Ubiquitous, Easy-to-use, and Low-cost (FUEL) scheme for authenticating users by leveraging existing ambie...
متن کاملPerformance Analysis of Motion-Sensor Behavior for User Authentication on Smartphones
The growing trend of using smartphones as personal computing platforms to access and store private information has stressed the demand for secure and usable authentication mechanisms. This paper investigates the feasibility and applicability of using motion-sensor behavior data for user authentication on smartphones. For each sample of the passcode, sensory data from motion sensors are analyzed...
متن کاملA Mutual Authentication Method for Internet of Things
Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...
متن کاملUnobservable Re-authentication for Smartphones
The widespread usage of smartphones gives rise to new security and privacy concerns. Smartphones are becoming a personal entrance to networks, and may store private information. Due to its small size, a smartphone could be easily taken away and used by an attacker. Using a victim’s smartphone, the attacker can launch an impersonation attack, which threatens the security of current networks, esp...
متن کاملTOKEN: Trustable Keystroke-Based Authentication for Web-Based Applications on Smartphones
Smartphones are increasingly being used to store personal information as well as to access sensitive data from the Internet and the cloud. Establishment of the identity of a user requesting information from smartphones is a prerequisite for secure systems in such scenarios. In the past, keystroke-based user identification has been successfully deployed on production-level mobile devices to miti...
متن کامل