Visible to the public Securing mHealth Applications with Grid-Based Honey Encryption

TitleSecuring mHealth Applications with Grid-Based Honey Encryption
Publication TypeConference Paper
Year of Publication2021
AuthorsTan, Soo-Fun, Lo, Ka-Man Chirs, Leau, Yu-Beng, Chung, Gwo-Chin, Ahmedy, Fatimah
Conference Name2021 IEEE International Conference on Artificial Intelligence in Engineering and Technology (IICAIET)
Date Publishedsep
Keywordsauthentication, Biological system modeling, biometric encryption, biometrics (access control), Force, grid-based authentication, honey encryption, Industries, Malware, Medical services, Metrics, mHealth, mobile healthcare, password-based authentication, privacy and security, pubcrawl, resilience, Resiliency, Scalability
AbstractMobile healthcare (mHealth) application and technologies have promised their cost-effectiveness to enhance healthcare quality, particularly in rural areas. However, the increased security incidents and leakage of patient data raise the concerns to address security risks and privacy issues of mhealth applications urgently. While recent mobile health applications that rely on password-based authentication cannot withstand password guessing and cracking attacks, several countermeasures such as One-Time Password (OTP), grid-based password, and biometric authentication have recently been implemented to protect mobile health applications. These countermeasures, however, can be thwarted by brute force attacks, man-in-the-middle attacks and persistent malware attacks. This paper proposed grid-based honey encryption by hybridising honey encryption with grid-based authentication. Compared to recent honey encryption limited in the hardening password attacks process, the proposed grid-based honey encryption can be further employed against shoulder surfing, smudge and replay attacks. Instead of rejecting access as a recent security defence mechanism in mobile healthcare applications, the proposed Grid-based Honey Encryption creates an indistinct counterfeit patient's record closely resembling the real patients' records in light of each off-base speculation legitimate password.
DOI10.1109/IICAIET51634.2021.9573645
Citation Keytan_securing_2021