Title | Securing mHealth Applications with Grid-Based Honey Encryption |
Publication Type | Conference Paper |
Year of Publication | 2021 |
Authors | Tan, Soo-Fun, Lo, Ka-Man Chirs, Leau, Yu-Beng, Chung, Gwo-Chin, Ahmedy, Fatimah |
Conference Name | 2021 IEEE International Conference on Artificial Intelligence in Engineering and Technology (IICAIET) |
Date Published | sep |
Keywords | authentication, Biological system modeling, biometric encryption, biometrics (access control), Force, grid-based authentication, honey encryption, Industries, Malware, Medical services, Metrics, mHealth, mobile healthcare, password-based authentication, privacy and security, pubcrawl, resilience, Resiliency, Scalability |
Abstract | Mobile healthcare (mHealth) application and technologies have promised their cost-effectiveness to enhance healthcare quality, particularly in rural areas. However, the increased security incidents and leakage of patient data raise the concerns to address security risks and privacy issues of mhealth applications urgently. While recent mobile health applications that rely on password-based authentication cannot withstand password guessing and cracking attacks, several countermeasures such as One-Time Password (OTP), grid-based password, and biometric authentication have recently been implemented to protect mobile health applications. These countermeasures, however, can be thwarted by brute force attacks, man-in-the-middle attacks and persistent malware attacks. This paper proposed grid-based honey encryption by hybridising honey encryption with grid-based authentication. Compared to recent honey encryption limited in the hardening password attacks process, the proposed grid-based honey encryption can be further employed against shoulder surfing, smudge and replay attacks. Instead of rejecting access as a recent security defence mechanism in mobile healthcare applications, the proposed Grid-based Honey Encryption creates an indistinct counterfeit patient's record closely resembling the real patients' records in light of each off-base speculation legitimate password. |
DOI | 10.1109/IICAIET51634.2021.9573645 |
Citation Key | tan_securing_2021 |