Next Article in Journal
Spatiotemporal Variations in Water Quality of the Transboundary Shari-Goyain River, Bangladesh
Next Article in Special Issue
Design of Efficient Based Artificial Intelligence Approaches for Sustainable of Cyber Security in Smart Industrial Control System
Previous Article in Journal
The Pandemic Puzzle—Reviewing the Existing Pieces, Searching for the Missing Ones
Previous Article in Special Issue
The Impact of Environmental Pollution on Residents’ Income Caused by the Imbalance of Regional Economic Development Based on Artificial Intelligence
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Securing Access to Internet of Medical Things Using a Graphical-Password-Based User Authentication Scheme

by
Mudassar Ali Khan
1,
Ikram Ud Din
1,* and
Ahmad Almogren
2,*
1
Department of Information Technology, The University of Haripur, Haripur 22620, Pakistan
2
Chair of Cyber Security, Department of Computer Science, College of Computer and Information Sciences, King Saud University, Riyadh 11633, Saudi Arabia
*
Authors to whom correspondence should be addressed.
Sustainability 2023, 15(6), 5207; https://doi.org/10.3390/su15065207
Submission received: 22 February 2023 / Revised: 14 March 2023 / Accepted: 14 March 2023 / Published: 15 March 2023
(This article belongs to the Special Issue Information, Cybersecurity and Modeling in Sustainable Future)

Abstract

:
Digital healthcare services have seen significant growth in this decade and many new technologies have been thoroughly examined to provide efficient services through secure infrastructures. The Internet of Medical Things (IoMT) revitalizes a healthcare infrastructure by creating an interconnected, intelligent, accessible, and efficient network. While there have been many studies on possible device authentication techniques for the IoMT, there is still much work to be done in user authentication to provide sustainable IoT solutions. Graphical passwords, which use visual content such as images instead of traditional text-based passwords, can help users authenticate themselves. However, current schemes have limitations. Therefore, this paper proposes a novel graphical authentication scheme that uses multiple factors to register and authenticate users using simple arithmetic operations, machine learning for hand gesture recognition, and medical images for recall purposes. The proposed method is designed to keep the authentication process simple, memorable, and robust. To evaluate the proposed scheme, we use the Post-Study System Usability Questionnaire (PSSUQ) to compare it with PIN-based and pattern-based authentication techniques. While comparing treatment and comparison groups, system quality showed a 16.7% better score, information quality a 25% increase, interface quality a 40% increase, and overall quality showed a 25% increase. The proposed method successfully revitalizes the use of graphical passwords, specifically in the field of IoMT, by developing a user-friendly, satisfying, and robust authentication scheme.

1. Introduction

In recent years, the Internet of Things (IoT) has become a subject of great interest in the healthcare industry. It is also known as the Internet of Medical Things (IoMT), and its aim is to facilitate communication between digitally equipped medical devices and healthcare systems, allowing them to provide quality services. The World Health Organization (WHO) notes that, due to increased life expectancy, a larger number of people are living to be over 60 years old [1,2,3]. Recent surveys such as [4,5,6,7] have systematically summarized the efforts made in the IoMT and shared valuable insights on various trends, strengths, and weaknesses of approaches. The US Census Bureau estimates [8] that the elderly population will reach approximately 1.3 billion by 2040. The recent COVID-19 pandemic has highlighted the fact that we are not fully equipped to handle health challenges, motivating many research projects and studies to fulfill changing requirements and achieve associated healthcare goals. The IoMT has proven to be a viable solution and a trend that has revitalized the role of ICT in healthcare [9].
The IoT [10] is a network of devices, sensors, and systems that work together to achieve collective goals. A “thing” in this context is any device with sufficient computational power and communicative ability to play its role in the IoT [11]. IoT-Analytics reports [12] that there will be approximately 12.2 billion active IoT connections by 2021, which is forecasted to increase 25% each year. According to the International Data Corporation (IDC) USA [13], approximately USD 1.3 trillion is expected to be spent globally on the IoT, with an estimated profit of USD 594 billion for the current year. Many sectors have already undergone IoT reforms, including smart homes [14,15,16], smart cities [17,18,19], agriculture and green IoT [20,21,22], industrial IoT [23,24], smart transportation [25,26,27], healthcare [28,29], and others [30,31,32,33].
The IoMT primarily helps manage health during prevention, diagnosis, or treatment using medical devices, sensors, and other systems. Leveraging the strengths of the IoT, it reduces human error and makes diagnosis more accessible and accurate. With the growth of the IoT, its use in the medical field has received significant attention [5,29]. Many research studies have been conducted on various layers of the IoT framework, such as [34,35,36,37,38] on the perception layer, [39,40,41,42] on the network layer, [43,44,45] as middleware, and [46,47,48] on the application layer.
Security, privacy, and dependability are vital for ensuring risk management of a digital system under development [49]. The security of such a system can further be sub-categorized into confidentiality, integrity, and availability (CIA). These three principles encompass many standards, which are improved over time to counter threats. Authentication and resilience are the two main components within confidentiality [49]. Authentication refers to proving an entity’s identity (user or system) through private credentials. Through an extensive survey, we discovered that lightweight strategies are necessary for a resource-constrained environment, such as IoT, that has limited storage, communication, and processing power [50,51]. Moreover, dataset creation in healthcare should focus on the generation of usable datasets for accurate simulation and approximation due to sensitive and immense repercussions [52,53]. To prevent the development of unnecessary security frameworks and ensure consistency across security models, standardization is necessary. Both formal and informal security analysis practices should be used to evaluate the security models consistently. This is recommended by experts in the field of security, including Koutras et al. [54] and Khan et al. [55]. The feature of providing usability with security and privacy is rarely found, and efforts should be made to bring in user-friendly technologies, such as mixed reality, sensors, and other satisfying strategies to enhance the user experience [56,57,58].
This study investigates existing authentication schemes that have been proposed for the IoMT. The contribution of the study is that we propose a novel graphical authentication scheme specifically for the IoMT architecture, which is intended to increase security and yet give users a satisfying experience. The proposed scheme is developed through an Android-based application which is later examined for system quality, information quality, and interface quality using the PSSUQ tool [59].
The rest of the article is organized as follows: Section 2 discusses the existing literature, followed by the motivation in Section 3 that led to the proposed solutions. Section 4 elaborates on the proposed architecture, algorithms used, and details regarding the development of the system. Section 5 elaborates on the methods utilized to perform the experiment, and Section 6 states the facts and findings of the experiment. Section 7 elaborates on the results with discussions and the limitations encountered while paving a path toward future directions. Finally, the article is concluded in Section 8.

2. Literature Review

The IoT in healthcare or the IoMT has significantly contributed to upgrading healthcare systems. It provides many benefits to all stakeholders in medical facilities. However, the ubiquitous devices and methodologies used to access and process information in the IoMT also have potential safety risks. Over time, researchers have focused on developing various general security techniques for IoMT devices at both the front and back ends.

2.1. Graphical Authentication Schemes

Authentication, in general, has evolved drastically with the advent of new technologies and hardware. This section highlights some of the prominent graphical authentication approaches proposed over the years.
An authentication technique [60], referred to as story technique, involves the user selecting a sequence of images in the correct order from a portfolio. The user can create a story based on the chosen image to remember the password. For authentication, the user must re-select the portfolio images in the same order they were selected during registration.
Deja Vu is a popular authentication approach that is based on the story technique, as proposed in [61]. This approach involves three key steps to authenticate a user. In the first step, portfolio creation, the user is required to create a collection of images provided by the system. The second step, training, involves a short training period during which the user memorizes the password. In the final step, authentication, the user is presented with a set of pictures and must identify the images as part of the authentication process. The story technique, on which this approach is based, is discussed in [60].
In [62], the “use your illusion” (UYI) technique was introduced, which is based on the human ability to recognize images. This technique consists of three phases: portfolio creation, practice, and authentication. During the authentication phase, a different version of images (filtered, altered, or degraded) is used, unlike the profile creation phase. In the portfolio creation phase, computer users can select images from a local drive, while mobile users can choose from a gallery or capture a new image. After the image selection process, the authentication device distorts most image details by applying a "lossy" filter. The training phase involves presenting users with a substantial collection of degraded images to practice their image portfolio. If a user selects the wrong password during this phase, the system provides feedback. Additionally, users can view their original portfolio images at any time during the practice phase. In the authentication phase, users must select the correct password from the image portfolio to be authenticated using this technique.
As described in [63], another user-friendly authentication technique suitable for small mobile devices involves two steps. In the first step, the registration phase, the user selects a username and a textual password. The user then chooses several objects from a set to act as the graphical password. To complete the registration process, the user has to hand-draw these objects using a stylus on a touch-sensitive screen. During the second step, the authentication phase, the user must provide the username and textual password and draw the graphical password in the same way as during the registration phase. The usability of this approach makes it ideal for small mobile devices.
The draw-a-secret (DAS) authentication technique is a method where a user creates a password on a 2D grid with single or multiple strokes, as described in [64]. To authenticate, the user must redraw the same password. Pass-doodles [65] is a variant of DAS that allows users to create any password but without a grid on the screen. Another variation of DAS is pass-shapes [66], which transforms passwords into alphanumeric characters. During the login phase, the user must draw shapes of different sizes and locations on the screen. Qualitative draw-a-secret (QDAS) [67] is a more secure version of DAS where each stroke on the grid is encoded as a password. This grid transformation hides the password creation process and makes it more secure than other DAS variants.
A combination of the DAS and story techniques was proposed in [68]. This approach uses a set of images with various categories, such as places, objects, and people, to create the password. During authentication, the user must select the images from the grid as their password in the same order.
The two-step authentication technique [69] adds an extra layer of security by combining text passwords with graphical passwords. In the first step, text passwords are used, whereas graphical passwords are used to register and authenticate a user in the second step.
The Rays technique [70] also combines textual and graphical passwords. In the first step, the user must write his or her username and textual password. In the next step, the user must select a minimum of four objects from the objects displayed on the screen to complete the password creation process.
The CAPTCHA authentication technique [71] is a hybrid of CAPTCHA technology and graphical passwords. During registration, the user must select an image as the password. Later, during the authentication phase, the user must type the text below the password image, otherwise referred to as CAPTCHA.
Another graphical authentication technique [72] allows the user to select an image from a 3 × 3 matrix. This technique shuffles the images to avoid attacks such as eavesdropping and shoulder surfing.
The PassBYOP technique [73] is a novel authentication method for public terminals that uses personalized physical tokens (in this case, digital images displayed on a mobile device owned by the user) as a dynamic password creation technique. Instead of using static images as graphical passwords, this technique allows the user to present digital pictures to the mobile camera and select a sequence of images on a live video of the token as their password.
Another study [74] proposes a new user authentication method, GRA-PIN, that combines the benefits of graphical and pin-based techniques. The research compared GRA-PIN to existing authentication methods and found it to be more user-friendly and secure, with a 94% usability score. The proposed method was also tested against shoulder surfing, guessing, and camera attack attempts, and was found to be secure.
In [75], the authors present a passnumbers graphical authentication scheme that consists of two stages: using coordinates of a graphical grid with numbered cells for entering the password and encrypting the password based on image pixels. The evaluation performed by the authors showed that the proposed scheme, passnumbers, had high security and usability scores. Passnumber provided high resistance against various graphical password attacks, including shoulder surfing and eavesdropping. The user interaction is easy and simple, making the approach effective, and it can be applied in various fields and systems.

2.2. Authentication in IoMT

When restricting the scope of authentication by focusing specifically on the IoMT, we note that the authentication is performed at various levels, such as device authentication, network authentication, and user authentication [76]. This section will explore user authentication techniques utilized in IoMT. Table 1 presents an overview of several studies on user authentication in IoMT.
In [77], an ECG authentication technique is proposed to extract Legendre polynomials and a multilayer perception neural network. It counters eavesdropping attacks, replay attacks, and man-in-the-middle attacks. However, the possible inaccuracies that may occur during the acquisition of ECG signals need to be properly handled. Similarly, [78] presents an advanced three-factor authentication system developed specifically for remote patient monitoring using wireless sensor networks (WSNs). The security of the system is formally evaluated using the AVISPA tool. Reply attacks, DOS attacks, smart card loss attacks, and password guessing attacks are countered using the proposed technique.
As proposed in [79], a layered framework, “spark”, is designed to enhance data transfer efficiency and improve overall throughput. The proposed framework securely transmits sensitive information and prevents unauthorized access to private data. However, the security and privacy analysis performed on the system are not discussed. In [80], the authors present a service-oriented structure that allows for dynamic elements of security to be implemented. This approach adapts to the specific medical services being provided at remote locations and continuously adjusts the level of protection based on the service being performed.
As discussed in [81], an authentication system is proposed that uses a combination of cryptographic mechanisms, such as symmetric encryption, bitwise exclusive-OR operator, and one-way hash function, to deliver the features of authentication and authorization. The authors claim that by using these cryptographic mechanisms, the system provides a secure method for identity authentication and authorization, making it a reliable and trustable solution.
A new two-factor authentication protocol for IoT in healthcare in post-quantum computing environments is proposed in a recent publication [82]. The protocol uses the post-quantum fuzzy commitment (PQFC) scheme for biometric protection, which is confirmed to be secure through a random oracle model. The protocol provides effortless authentication, user anonymity, mutual authentication, and protection against tampering, theft, and interior attacks. Compared to some previous methods, the protocol is more efficient, but it incurs some additional computational costs that are claimed to provide added security and functionality.
Despite the availability of a variety of security approaches, including those designed specifically for IoT/IoMT, our survey of the literature has highlighted the following persisting issues:
  • Firstly, there is limited work on creating, managing, and moving cryptographic keys in resource-constrained environments, which has remained a challenge in security architectures.
  • Secondly, the IoT needs to improve its usability and user interface to make security solutions more efficient. Neglecting end users in the creation of security solutions has resulted in a gap in usability and utility in security standards.
  • Thirdly, there is still a need for exploration of end-to-end user authentication in the context of IoT infrastructures and limited resource availability. Current security standards and authentication techniques have been limited to certain security threats, ignoring other potential attacks such as cloning, node compromise, desynchronization, and masquerading.
  • Finally, revamping authentication techniques for different types of IoT users can improve the overall security and privacy of the platform, maintaining users’ interest in keeping themselves secure. Updating security standards, specifically authentication techniques, is crucial for enhancing the overall security of the IoT platform.
Table 1. Authentication systems in IoMT.
Table 1. Authentication systems in IoMT.
StudyMain ContributionsAttacks CounteredLimitations
[77]An ECG authentication technique is proposed using the method of extracting Legendre polynomials. Additionally, a multilayer perception neural network is employed for training, recognition, and authentication, which utilizes ECG signals.Eavesdropping, replay, and man-in-the-middle attacksThe system does not consider the possible inaccuracies that may occur during the acquisition of ECG signals. Additionally, security evaluations that go beyond the scope of machine learning should be carried out.
 [78]An advanced three-factor authentication system is designed particularly for remote patient monitoring using wireless sensor networks (WSNs). The proposed approach aims to provide enhanced security to protect sensitive patient information during remote monitoring. To ensure the security of the proposed approach, an AVIS PA tool is used for formal security analysis. Overall, this approach is claimed to ensure the confidentiality, integrity, and availability of the patient’s data.DOS, Reply, password guessing, smart card loss attacks, etc.The cost of communication may be relatively high, but it has been thoroughly evaluated.
 [79]In order to enhance the efficiency of data transfer and improve overall throughput, a layered framework is proposed. This framework, spark, not only optimizes data transfer but also adds a layer of security and authentication, ensuring the safety and integrity of the transferred data. The proposed framework architecture is designed to transmit sensitive information securely. The added layers prevent unauthorized access to private data, thus making the data transfer more reliable, secure, and efficient.Insider attackNetwork simulations are employed to analyze the data transmission such as ECG. However, there is no information on the security and privacy analysis being performed.
 [80]A service-oriented structure is proposed, allowing for dynamic security elements to be implemented. This approach adapts to the specific medical services being provided at remote locations and continuously adjusts the level of security based on the service being performed. The dynamic approach ensures that the level of security is always appropriate for any specific medical service. Additionally, this approach improves scalability and flexibility by supporting various medical services and providing appropriate security measures.Spoofing, device masquerade, eavesdropping, and DoS attacksOnly a simple assessment and security analysis without disclosure of its details have been conducted. Both formal and informal security evaluations were supposed to be carried out.
 [81]An authentication system is designed that works with the combination of cryptographic mechanisms, such as symmetric encryption, bitwise exclusive-OR operator, and one-way hash function, to deliver authentication and authorization features. Using these cryptographic mechanisms ensures the protection of sensitive information and addresses issues of authentication, integrity, privacy, and nonrepudiation. The authors claim that by using these cryptographic mechanisms, the system can provide a secure method for identity authentication and authorization, making it a reliable and trustable solution for access control in the cloud. This approach provides a secure, reliable, and efficient way for the user to access the service, data, and system through the cloud.Offline password guessing, replay, impersonation, man-in-the-middle, andinsider attacksIn an emergency, it can be challenging to access information that has been overly secured. Moreover, if an attacker manages to obtain a patient’s mobile device or spoofs the IMEI on their cell phone, they may enter the system without authorization.
 [83]A system is proposed to increase the efficiency and security of data storage and transmission. It utilizes a scalable and efficient authentication technique involving an agent dedicated to encryption. However, this approach has some limitations, such as increased computational and communication costs due to multiple servers, which can lead to a less efficient system. Additionally, the lack of data headers for transmission may cause additional overhead costs, which can impact the system’s overall performance.Brute force, man-in-the-middle, and dimmingThe overall computational and communication expense of the system may be high due to the use of multiple servers in the proposed architecture. The data headers for transmission were not found to be labeled, which can later result in extra computational overhead.

3. Motivation

The growth in digital healthcare services is increasing the need to provide efficient and secure services. With the increase in the use of IoT-enabled healthcare systems, a considerable amount of attention is being focused on securing such systems, as discussed in Section 2.2. Many device authentication techniques for the IoMT are proposed; still, there is a need to offer reliable methods for user authentication techniques in IoMT, specifically while considering modern technologies.
Graphical passwords, which use visual content instead of traditional text-based passwords, can improve user authentication. Still, current schemes have limitations, such as low memorability and susceptibility to shoulder-surfing attacks, as discussed in Section 2.1. To address these limitations, this study proposes a novel graphical authentication scheme that uses multiple factors for user registration and authentication to create a simple, memorable, and robust authentication process for users of IoMT.

4. Proposed Solution

The proposed system would have two significant sub-tasks, i.e., registration of a new user and authentication of an already registered user. The working of the proposed approach is described in this section, which includes the details of the architecture and the algorithms utilized during different phases.

4.1. Architecture

As illustrated in Figure 1, whenever the proposed system is initiated, it will check whether a user record exists. If the record does not exist, which means the user has not yet registered, then the registration phase will be initiated with sub-phases. The first sub-phase includes selecting secret information such as secret number, secret color, and secret tap-mode (single or double), as shown in Figure 2. The tap-modes would represent addition or subtraction operations, later utilized in the log-in phase. Once the user has successfully configured these settings, the second sub-phase will be started, including handwriting tasks on the device’s touch screen using hand gestures. The user will be asked to draw different numbers repetitively, and each gesture affiliated with a specific number will be gathered and stored in the system.
Once a sufficient number of handwriting tasks are performed, the user will be provided with a grid of images (5 × 4) as represented in Figure 3. A randomly generated grid comprising images related to the medical field, such as X-rays, CT scans, MRIs, etc., will be displayed in the interface. As the possible users of such a system are supposed to be medical staff, doctors, and nurses, these images will not only be relevant but also trigger some relationship to their personal experiences. Once the user has selected three secret images, all the user’s secret information is then encrypted and stored in the firebase database. This multi-factor authentication process ensures a robust security mechanism while providing convenience to the user. Moreover, the use of medical-related images in the authentication process also makes it more likely that the users will remember the secret images, improving the memorability of the authentication process.
Once the user has completed the registration process, he or she can proceed to the authentication phase. During this phase, the system will prompt the user to scan a QR code to initiate the process and ensure the user’s physical presence at a specific proximity of IoT systems. Then, an interface of random numbers will be displayed as shown in Figure 4. These numbers will have random colors assigned to them, which can be viewed by clicking on the checkbox. Only one number having the secret color will be present on the screen. The user will recall the secret color and remember the given number. To decrease over-the-shoulder attacks, they will initially be shown in only black. By opting for either a single-tap or double-tap option, the user will be moved to the next phase, where he or she will draw the answer. Depending on the single-tap or double-tap, an addition or subtraction operation will be performed over the new number with the secret number. For example, the user had a secret number three in their memory. The number displayed on the screen in the secret color appeared to be five. By performing an addition operation, the result is supposed to be eight. Then, the user will perform a handwriting task on the touch screen and write the answer eight as shown in Figure 5. The system will then compare the user’s input to the correct answer and, if the information matches, the user will proceed to the next phase of authentication. A grid of randomly placed images (5 × 4) similar to the registration phase will be displayed in Figure 3. The user will then select any row of the grid. The goal is to determine the row with the secret image. If the user selects the correct row, he or she will obtain access to the system.
Overall, the proposed system is intended to provide a secure and convenient way for users to authenticate themselves while using IoMT systems. The use of graphical and multi-factor authentication methods is anticipated to help improve the security and usability of the system, making it suitable for use in sensitive medical applications.

4.2. Development

Android Studio and its libraries, such as PyTorch, GestureDetector, Tensorflow, and other cryptographic libraries, were used to develop the proposed authentication scheme. The code of the said project is available online at https://github.com/madilator/H-Auth.git, accessed on 1 March 2023. Figure 2, Figure 3, Figure 4 and Figure 5 show screenshots of the proposed application. It is important to mention here that only those smartphones with Android OS are compatible with the proposed solution having enough computation power to support Tensorflow libraries used during both the registration and authentication phases.

4.3. Algorithms

The system uses two main algorithms for its primary activities, i.e., registration and authentication. The following subsections will briefly explain its working.

4.3.1. Registration Phase

The first step in using the system is to utilize Algorithm 1, a registration phase algorithm performed to register users in the system. The main inputs to the algorithm include a secret number (S n ), a secret color (S c ), a single-tap operation (ST 0 ), a double-tap operation (DT 0 ), and a secret image (S i ).
The algorithm begins by selecting a secret number (S n ) and checking to see if it is within the specified range (greater than or equal to one and less than or equal to nine). If the number is not within the range, the user is prompted to select a number within the range and the selection process is repeated. If the number is within the range, the algorithm displays a color grid and prompts the user to select a secret color (S c ). The user must choose a color of the specified range (equal to one). If the user does not select an accurate color, he or she is prompted to do so, and the selection process is repeated.
Once the secret color has been selected, the algorithm prompts the user to choose a single-tap operation (ST 0 ) and a double-tap operation (DT 0 ) using radio button groups. The user must select one option from each group. If the user does not make a selection, the user is prompted to do so and the selection process is repeated.
After the single- and double-tap operations have been selected, the algorithm displays an image grid and prompts the user to choose a secret image (S i ). The user must select an image from the specified range (less than or equal to three). If the user does not select a valid image, he or she is prompted to do so, and the selection process is repeated.
Finally, the algorithm saves the selected secret number, color, single-tap operation, double-tap operation, and image, which completes the registration process.
The system utilizes a registration phase algorithm, Algorithm 1, to registered users. The main inputs to the algorithm include a secret number (S n ), a secret color (S c ), a single-tap operation (ST 0 ), a double-tap operation (DT 0 ), and a secret image (S i ). The algorithm begins by verifying the secret number, displaying a color grid, selecting a secret color, choosing single-tap and double-tap operations, displaying an image grid, and selecting a secret image. Finally, the selected inputs are saved to complete the registration process.
Algorithm 1 Registration Phase
( S n , S c , S T 0 , D T 0 , S i )
Procedure: Registration Phase
  1:
Select Secret Number ( S n );
  2:
if  S n 1 S n 9  then
  3:
    Display Color Grid; Exit(1);
  4:
else
  5:
    Print ( 1 R a n g e 9 )
  6:
    Repeat Select Secret Number Sequence;
  7:
end if
  8:
Display Color Grid ( S c );              ▹ Grid = 2 × 5
  9:
if  S c 1 S c 10  then
10:
    Single/Double Tap Operation; Exit(1);
11:
else
12:
    Print (Select one Secret Color);
13:
    Repeat Select Secret Color Sequence;
14:
end if
15:
Radio Button Group 1 Operation ( S T 0 );
16:
Select Single Tap Option ( S T 0 A d d i t i o n o r S u b t r a c t i o n );
17:
Radio Button Group 2 Operation ( D T 0 );
18:
Select Double Tap Option ( D T 0 A d d i t i o n o r S u b t r a c t i o n );
19:
if  S T 0 = = S e l e c t e d   &   &   D T 0 = = S e l e c t e d  then
20:
    Display Image Grid; Exit(1);
21:
else
22:
    Print (Select Options for Single/Double Tap Operation)
23:
    Repeat Single/Double tap Operation;
24:
end if
25:
Display Image Grid;                 ▹ G r i d = 4 × 5
26:
Select Secret Image ( S i );              ▹ R a n g e 3
27:
if  S i = = 3  then
28:
    Exit(1);
29:
else
30:
    Print (Select 3 Secret Images)
31:
    Repeat Display Image Grid Sequence;
32:
end if
33:
Save S n , S c , S T 0 , D T 0 , S i
34:
End

4.3.2. Authentication Phase

The second algorithm is an authentication phase algorithm used to verify the identity of a user attempting to access a system. The output of the algorithm is either “ACCESS GRANTED” or “ACCESS DENIED”, which is communicated to the system in the shape of tokens as shown in Algorithm 2.
The algorithm begins by displaying a QR code (TK 1 ) and prompting the user to scan the code using a camera. In order to ensure the user’s physical presence with respect to deployed IoT, the user will scan the code being displayed at a display unit. The scanned code (TK 2 ) is then compared to the original code (TK 1 ). If the codes do not match, the user is informed that there was an error detecting the user’s proximity to the system, and access is denied. If the codes do match, the algorithm proceeds to the next step.
Algorithm 2 Authentication Phase
(ACCESS GRANTED/ACCESS DENIED)
Procedure: Authentication Phase
  1:
QR Code Display ( T K 1 );
  2:
Camera_Scan QR Code ( T K 2 );
  3:
if  T K 1 = = T K 2  then
  4:
    Display Number Grid; Exit(1);
  5:
else
  6:
    Print (Error in Detecting Close Proximity);
  7:
    return ACCESS DENIED
  8:
end if
  9:
Display Number Grid with S o l u t i o n           ▹ G r i d = 3 × 4
10:
Detect Tap on Screen (Tap → Single Tap or Double Tap)
11:
Load Handwriting Recognition Interface()
12:
Scan Hand Writing( D i g i t )
13:
if Match( T a p , D i g i t , S o l u t i o n ) = = TRUE then
14:
    Display Image Grid; Exit(1);
15:
else
16:
    Print(Authentication Failed)
17:
    return ACCESS DENIED
18:
end if
19:
Display Image Grid with S i               ▹ G r i d = 4 × 5
20:
Select Row of Images I m a g e i , I m a g e j , I m a g e k
21:
if Match( I m a g e i , I m a g e j , I m a g e k , S i ) = = TRUE then
22:
    return ACCESS GRANTED
23:
else
24:
    Print (Authentication Failed)
25:
    return ACCESS DENIED
26:
end if
27:
End
Next, the algorithm displays a number grid with a solution and detects the user’s tap on the screen. The tap can be either a single tap or a double tap. The algorithm loads a handwriting recognition interface and scans the user’s handwriting for a digit. The user must calculate the answer by adding or subtracting the given number (in the secret color) with the secret number stored in the registration phase. If the scanned digit matches the solution, the algorithm proceeds to the next step. If they do not match, the user is informed that authentication has failed and access is denied.
Finally, the algorithm displays an image grid with the user’s secret image (S i ) and prompts the user to select a row of images. If the selected row of images contains the secret image, then the user is granted access. If they do not match, the user is informed that authentication has failed and access is denied. The authentication process is then complete.

5. Methods

We evaluated our proposed framework by conducting a user-centric survey with a post-test-only research design comprising two groups, comparison and treatment groups. The evaluation was based on the standard Post-Study System Usability Questionnaire (PSSUQ) [59,84], which is a well-known user-centric evaluation standard to perceive satisfaction for a given computer system or application. It was initially designed as a part of the IBM project SUMS (System Usability MetricS); later [59] published an 18-item questionnaire that was widely used. According to [85], a 16-item version of the PSSUQ was designed with 3 prominent sub-measures, i.e., system, information, and interface quality. We use the 16-item PSSUQ evaluation tool in the proposed study to measure our system for the given sub-measures.

5.1. Sampling

A sample of 19 participants was selected based on accessibility and convenience. Participants of the study were practicing doctors from different private hospitals in Islamabad, including Quaid-e-Azam International Hospital https://www.qih.com.pk/ accessed on 1 March 2023, Shifa International Hospital https://www.shifa.com.pk/ accessed on 1 March 2023, Maroof International Hospital https://www.maroof.com.pk/ accessed on 1 March 2023, and Medicsi Hospital https://www.medicsi.com/, accessed on 1 March 2023. The study’s participants were selected based on accessibility and were separated into two groups: the treatment group and the comparison group. The treatment group comprised 9 participants, while the comparison group comprised 10 participants.

5.2. Experiments

The treatment group used our proposed authentication framework, while the comparison group used simple authentication techniques available on smartphones (such as PIN, swipe, and pattern). Both groups were tasked with registering and authenticating their passwords using the given framework/technique before completing a questionnaire. To educate the users regarding the system and tasks, a demonstration of using the system was also provided to the participants. Their responses were measured on a 7-item Likert scale, where 1 represents “strongly agree” and 7 means “strongly disagree”. While interpreting the results, we inverted the scale score for better depiction by subtracting the score by 7 and then adding 1. Hence, in the given score, 1 represents “strongly disagree”, and 7 means “strongly agree”. Based on the obtained scores, we assessed overall quality, as well as sub-measures of system quality, information quality, and interface quality.

5.3. Hypotheses

We used the independent sample t-test (Table 2) to study the significance of the results obtained from a user-centric questionnaire survey. The t-test was chosen to make inferences about the whole population and generalize the statistics beyond the sample size. We formulated four null and four alternate hypotheses, mentioned in the following subsections.

5.3.1. Null Hypotheses

  • H 0 1 : Our proposed authentication technique and simple authentication techniques available on smartphones have no significant difference in overall quality.
  • H 0 2 : Our proposed authentication technique and simple authentication techniques available on smartphones have no significant difference in system quality.
  • H 0 3 : Our proposed authentication technique and simple authentication techniques available on smartphones have no significant difference in information quality.
  • H 0 3 : Our proposed authentication technique and simple authentication techniques available on smartphones have no significant difference in interface quality.

5.3.2. Alternate Hypotheses

  • H 0 1 : Our proposed authentication technique has significantly better overall quality compared to simple authentication techniques available on smartphones.
  • H 0 2 : Our proposed authentication technique has significantly better system quality compared to simple authentication techniques available on smartphones.
  • H 0 3 : Our proposed authentication technique has significantly better information quality compared to simple authentication techniques available on smartphones.
  • H 0 3 : Our proposed authentication technique has significantly better interface quality compared to simple authentication techniques available on smartphones.

6. Results and Analysis

We determined that the overall quality score for the treatment group is 6.4, while that of the comparison group is 4.8. The score of the system’s quality for the treatment group is 6.6, while that of the comparison group is 5.5. The information quality score determined from the responses obtained from the treatment group is 6.4, while, for the comparison group, the information quality score is 4.8. The interface quality score is 6.2 for the treatment group and 3.7 for the comparison group. A graphical illustration of these results is provided in Figure 6.
The first six questions of the PSSUQ analyzed the system quality as illustrated in Figure 7. A total of 85.71% of the participants in the comparison group (average = 6.0, median = 6.5, mode = 7.0, and std. deviation = 1.15) and 87.29% of the participants in the treatment group (average = 6.1, median = 5.0, mode = 5.0, and std. deviation = 1.36) agreed that it was easy for them to use the system overall. In the comparison group, 80% of the participants (average = 5.6, median = 5.5, mode = 5.0, and std. deviation = 0.70) and 96.86% of the participants in the treatment group (average = 6.8, median = 7.0, mode = 5.0, and std. deviation = 1.64) said that it was simple to use the system. Some 74.29% of the participants in the comparison group (average = 5.2, median = 5.0, mode = 5.0, and std. deviation = 0.79) and 98.43% of the participants in the treatment group (average = 6.9, median = 7.0, mode = 7.0, and std. deviation = 0.60) were able to complete the tasks and scenarios quickly using the system.
In the comparison group, 80% of the participants (average = 5.6, median = 5.5, mode = 5.0, and std. deviation = 1.17) and 90.43% of the participants in the treatment group (average = 6.3, median = 6.0, mode = 6.0, and std. deviation = 1.94) felt comfortable using the system. Next, 82.86% of the participants in the comparison group (average = 5.8, median = 6.0, mode = 6.0, and std. deviation = 0.92) and 93.71% of the participants in the treatment group (average = 6.6, median = 6.0, mode = 5.0, and std. deviation = 2.19) acknowledged that it was easy for them to learn to use the system. A total of 71.43% of the participants in the comparison group (average = 5.0, median = 5.0, mode = 4.0, and std. deviation = 1.05) and 100% of the participants in the treatment group (average = 7.0, median = 7.0, mode = 7.0, and std. deviation = 0.87) believed that they could become productive quickly using the system.
The following six questions evaluated the information quality, as illustrated in Figure 8. The comparison group, consisting of 57.14% of the participants (with an average of 4.0, median of 4.0, mode of 4.0, and standard deviation of 0.82), and the treatment group, made up of 88.86% of the participants (with an average of 6.2, median of 5.0, mode of 5.0, and standard deviation of 2.22), both reported that the system provided error messages that indicated how to fix any problems. In the event of making a mistake, 52.86% of the participants in the comparison group (with an average of 3.7, median of 3.5, mode of 3.0, and standard deviation of 0.82) and 93.71% of the participants in the treatment group (with an average of 6.6, median of 7.0, mode of 7.0, and standard deviation of 0.88) were able to recover easily and quickly. Additionally, 54.29% of the participants in the comparison group (with an average of 3.8, median of 4.0, mode of 4.0, and standard deviation of 0.79) and 95.29% of the participants in the treatment group (with an average of 6.7, median of 6.0, mode of 6.0, and standard deviation of 1.58) agreed that the provided information, including online help, on-screen messages, and other documentation, was clear. It was easy for 88.57% of the comparison group (with an average of 6.2, median of 6.0, mode of 6.0, and standard deviation of 0.79) and 87.29% of the participants in the treatment group (with an average of 6.1, median of 5.0, mode of 4.0, and standard deviation of 2.32) to find the necessary information. Furthermore, the information was effective in assisting with task completion and scenario performance for 81.43% of the participants in the comparison group (with an average of 5.7, median of 5.0, mode of 5.0, and standard deviation of 0.95) and 90.43% of the participants in the treatment group (with an average of 6.3, median of 7.0, mode of 7.0, and standard deviation of 0.87). Lastly, 74.29% of the participants in the comparison group (with an average of 5.2, median of 5.0, mode of 5.0, and standard deviation of 0.42) and 92.00% of the participants in the treatment group (with an average of 6.4, median of 6.0, mode of 5.0, and standard deviation of 1.42) agreed that the system’s information was organized clearly on the screen.
The following three questions evaluated the quality of the interface, the results of which are shown in Figure 9. Most participants in the comparison group (57.14%) and treatment group (88.86%) found the system’s interface pleasant. A large percentage of participants in the comparison group (52.86%) and treatment group (93.71%) enjoyed using the interface. A significant number of participants in the comparison group (40%) and treatment group (92%) felt that the system had all the necessary functions and capabilities.
Half of the participants in the comparison group (average satisfaction rating of 3.5, median of 3.5, mode of 5.0, and standard deviation of 1.58) and nearly 90% of the participants in the treatment group (average satisfaction rating of 6.2, median of 7.0, mode of 7.0, and standard deviation of 1.20) were satisfied with the system. Details regarding the results and their significance are shown in Figure 10, comprising the average, median, and mode of all the questions for both comparison and treatment groups. Results for an independent sample t-test in Table 2 show that the difference between the means of both groups does not happen by chance. We can reject the null hypothesis and consider the alternate hypotheses based on the t-test results. As shown in Table 2, the treatment group shows results significantly better for the overall quality of the treated framework than the comparison group, t(8.64) = 4.06, p = 0.0003. The treatment group’s system quality is also considered to be much better than the comparison group, t(8.97) = 2.54, p = 0.03. For information quality, the treatment group shows a significant difference from the comparison group, t(8.62) = 3.48, p = 0.007. For the last measure, interface quality, the treatment group showed significant improvement over the comparison group, t(9.92) = 6.31, p = 0.

7. Discussion

According to Figure 6 and Figure 10, the treatment group perceived the interface of the proposed scheme as more satisfactory than the comparison group, in terms of system quality, information quality, and interface quality. The treatment group obtained a higher overall quality score of 6.4, while the comparison group scored 4.8. Moreover, the treatment group scored higher in system quality (6.6 vs. 5.5 for the comparison group) and information quality (6.4 vs. 4.8 for the comparison group). The interface quality score was also higher for the treatment group (6.2 vs. 3.7 for the comparison group). The PSSUQ test demonstrated that the treatment group performed better than the comparison group in all six questions regarding system quality and information quality. These findings suggest that the treatment group had a more positive experience with the system than the comparison group.
Based on the subjective results from PSSUQ and statistical results from the t-test, we can conclude that our proposed authentication technique for IOMT interfaces outperforms other simple authentication techniques for smartphone users in terms of overall quality, system quality, and information and interface quality. However, future research should consider evaluating the given system through other tools, such as SUS, SUMS, etc. We also intend to evaluate the security strength of the proposed scheme against various attacks, such as over-the-shoulder attacks, forget-password attacks, impersonation attacks, etc.
Limitations observed for the system during discussions with participants include the use of multiple levels or multiple factors of security checks, which can be dynamically adjusted based on the user’s security needs. Future work will evaluate the scalability and performance of the proposed system under various network conditions and in real-world settings. Additionally, we will explore how the system can be integrated with existing healthcare systems and electronic medical records to improve the overall healthcare experience for patients and providers. Improving the user experience further and making the system more user-friendly could also be a worthwhile research direction. Finally, conducting a cost–benefit analysis of the proposed system could help determine its economic viability and affordability.
In conclusion, the proposed graphical password approach for user authentication in IoMT offers a more secure, simple, memorable, and robust user authentication process and overall experience compared to PIN-based and pattern-based authentication techniques. The graphical authentication approach can be used in a variety of applications, such as electronic medical records, telemedicine systems, and other IoMT-based health services. However, it is important to consider the limitations of the study, such as the small and homogenous sample size, and the need for future research to validate the results and assess the long-term effectiveness and usability of the proposed method.

8. Conclusions

This study describes a proposed user authentication method for the IoMT, which aims to ensure the security and sustainability of the IoT. The proposed method is based on graphical passwords and uses multiple factors for user registration and authentication.
The study evaluated the proposed method using the Post-Study System Usability Questionnaire (PSSUQ) and compared it to PIN-based and pattern-based authentication techniques. The study participants were practicing doctors from private hospitals in Islamabad, divided into treatment and comparison groups. Both groups were tasked with registering and authenticating their passwords before completing a questionnaire based on a 7-item Likert scale.
The study results showed that the proposed graphical authentication scheme was more effective in terms of overall quality, system quality, information quality, and interface quality. The treatment group had higher scores for all these factors compared to the comparison group. However, it is noted that further usability and security analysis may be necessary to validate these findings.
In conclusion, the proposed method seems promising in terms of improving user-friendliness and security of user authentication in IoMT, but more research is needed to fully assess its effectiveness.

Author Contributions

Conceptualization, M.A.K. and I.U.D.; methodology, A.A.; software, M.A.K.; validation, M.A.K., I.U.D. and A.A.; formal analysis, M.A.K. and A.A.; investigation, I.U.D. and A.A.; resources, A.A.; data curation, M.A.K. and A.A.; writing—original draft preparation, M.A.K.; writing—review and editing, I.U.D. and A.A.; visualization, M.A.K. and I.U.D.; supervision, I.U.D.; project administration, A.A.; funding acquisition, A.A. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the Deanship of Scientific Research at King Saud University, Riyadh, Saudi Arabia through the Vice Deanship of Scientific Research Chairs: Chair of Cyber Security.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Roy, M.; Chowdhury, C.; Aslam, N. Designing Transmission Strategies for Enhancing Communications in Medical IoT Using Markov Decision Process. Sensors 2018, 18, 4450. [Google Scholar] [CrossRef] [Green Version]
  2. Vishnu, S.; Ramson, S.J.; Jegan, R. Internet of Medical Things (IoMT)—An overview. In Proceedings of the 2020 5th International Conference on Devices, Circuits and Systems (ICDCS), Coimbatore, India, 5–6 March 2020; pp. 101–104. [Google Scholar] [CrossRef]
  3. Navarro, V. Assessment of the world health report 2000. Lancet 2000, 356, 1598–1601. [Google Scholar] [CrossRef]
  4. Aghdam, Z.N.; Rahmani, A.M.; Hosseinzadeh, M. The role of the Internet of Things in healthcare: Future trends and challenges. Comput. Methods Programs Biomed. 2021, 199, 105903. [Google Scholar] [CrossRef]
  5. Ketu, S.; Mishra, P.K. Internet of Healthcare Things: A contemporary survey. J. Netw. Comput. Appl. 2021, 192, 103179. [Google Scholar] [CrossRef]
  6. Ahmad, M.O.; Siddiqui, S.T. The Internet of Things for Healthcare: Benefits, Applications, Challenges, Use Cases and Future Directions. In Advances in Data and Information Sciences; Springer: Berlin/Heidelberg, Germany, 2022; pp. 527–537. [Google Scholar]
  7. Mohamad Jawad, H.H.; Bin Hassan, Z.; Zaidan, B.B.; Mohammed Jawad, F.H.; Mohamed Jawad, D.H.; Alredany, W.H.D. A Systematic Literature Review of Enabling IoT in Healthcare: Motivations, Challenges, and Recommendations. Electronics 2022, 11, 3223. [Google Scholar] [CrossRef]
  8. Ahmadi, H.; Arji, G.; Shahmoradi, L.; Safdari, R.; Nilashi, M.; Alizadeh, M. The application of internet of things in healthcare: A systematic literature review and classification. Univers. Access Inf. Soc. 2019, 18, 837–869. [Google Scholar] [CrossRef]
  9. Da Xu, L.; He, W.; Li, S. Internet of things in industries: A survey. IEEE Trans. Ind. Inform. 2014, 10, 2233–2243. [Google Scholar]
  10. Ashton, K. That ‘internet of things’ thing. RFID J. 2009, 22, 97–114. [Google Scholar]
  11. Kumar, S.; Tiwari, P.; Zymbler, M. Internet of Things is a revolutionary approach for future technology enhancement: A review. J. Big Data 2019, 6, 1–21. [Google Scholar] [CrossRef] [Green Version]
  12. Analytics, I. State of IoT 2022: Number of Connected IoT Devices Growing 18% to 14.4 Billion Globally. 2022. Available online: https://iot-analytics.com/number-connected-iot-devices/ (accessed on 1 March 2023).
  13. IDC. Worldwide Internet of Things Spending Guide. 2022. Available online: https://www.idc.com/getdoc.jsp?containerId=US49576022&pageType=PRINTFRIENDLY (accessed on 14 March 2023).
  14. Risteska Stojkoska, B.L.; Trivodaliev, K.V. A review of Internet of Things for smart home: Challenges and solutions. J. Clean. Prod. 2017, 140, 1454–1464. [Google Scholar] [CrossRef]
  15. Pirbhulal, S.; Zhang, H.; E Alahi, M.E.; Ghayvat, H.; Mukhopadhyay, S.C.; Zhang, Y.T.; Wu, W. A novel secure IoT-based smart home automation system using a wireless sensor network. Sensors 2016, 17, 69. [Google Scholar] [CrossRef] [PubMed]
  16. Ghayvat, H.; Liu, J.; Babu, A.; Alahi, E.; Gui, X.; Mukhopadhyay, S. Internet of Things for smart homes and buildings: Opportunities and Challenges. J. Telecommun. Digit. Econ. 2015, 3, 33–47. [Google Scholar] [CrossRef]
  17. Silva, B.N.; Khan, M.; Han, K. Towards sustainable smart cities: A review of trends, architectures, components, and open challenges in smart cities. Sustain. Cities Soc. 2018, 38, 697–713. [Google Scholar] [CrossRef]
  18. Yigitcanlar, T.; Kamruzzaman, M.; Foth, M.; Sabatini-Marques, J.; da Costa, E.; Ioppolo, G. Can cities become smart without being sustainable? A systematic review of the literature. Sustain. Cities Soc. 2019, 45, 348–365. [Google Scholar] [CrossRef]
  19. Syed, A.S.; Sierra-Sosa, D.; Kumar, A.; Elmaghraby, A. IoT in smart cities: A survey of technologies, practices and challenges. Smart Cities 2021, 4, 429–475. [Google Scholar] [CrossRef]
  20. Farooq, M.S.; Riaz, S.; Abid, A.; Abid, K.; Naeem, M.A. A Survey on the Role of IoT in Agriculture for the Implementation of Smart Farming. IEEE Access 2019, 7, 156237–156271. [Google Scholar] [CrossRef]
  21. Jaiganesh, S.; Gunaseelan, K.; Ellappan, V. IOT agriculture to improve food and farming technology. In Proceedings of the 2017 Conference on Emerging Devices and Smart Systems (ICEDSS), Piscataway, NJ, USA, 3–4 March 2017; pp. 260–266. [Google Scholar]
  22. Zhao, J.C.; Zhang, J.F.; Feng, Y.; Guo, J.X. The study and application of the IOT technology in agriculture. In Proceedings of the 2010 3rd International Conference on Computer Science and Information Technology, Chengdu, China, 9–11 July 2010; Volume 2, pp. 462–465. [Google Scholar]
  23. Sisinni, E.; Saifullah, A.; Han, S.; Jennehag, U.; Gidlund, M. Industrial internet of things: Challenges, opportunities, and directions. IEEE Trans. Ind. Informatics 2018, 14, 4724–4734. [Google Scholar] [CrossRef]
  24. Cheng, J.; Chen, W.; Tao, F.; Lin, C.L. Industrial IoT in 5G environment towards smart manufacturing. J. Ind. Inf. Integr. 2018, 10, 10–19. [Google Scholar] [CrossRef]
  25. Zantalis, F.; Koulouras, G.; Karabetsos, S.; Kandris, D. A review of machine learning and IoT in smart transportation. Future Internet 2019, 11, 94. [Google Scholar] [CrossRef] [Green Version]
  26. Muthuramalingam, S.; Bharathi, A.; Gayathri, N.; Sathiyaraj, R.; Balamurugan, B. IoT based intelligent transportation system (IoT-ITS) for global perspective: A case study. In Internet of Things and Big Data Analytics for Smart Generation; Springer: Berlin/Heidelberg, Germany, 2019; pp. 279–300. [Google Scholar]
  27. Chand, H.V.; Karthikeyan, J. Survey on the role of IoT in intelligent transportation system. Indones. J. Electr. Eng. Comput. Sci. 2018, 11, 936–941. [Google Scholar] [CrossRef]
  28. Selvaraj, S.; Sundaravaradhan, S. Challenges and opportunities in IoT healthcare systems: A systematic review. SN Appl. Sci. 2020, 2, 139. [Google Scholar] [CrossRef] [Green Version]
  29. Qadri, Y.A.; Nauman, A.; Zikria, Y.B.; Vasilakos, A.V.; Kim, S.W. The future of healthcare internet of things: A survey of emerging technologies. IEEE Commun. Surv. Tutor. 2020, 22, 1121–1167. [Google Scholar] [CrossRef]
  30. Cauteruccio, F.; Cinelli, L.; Fortino, G.; Savaglio, C.; Terracina, G.; Ursino, D.; Virgili, L. An approach to compute the scope of a social object in a Multi-IoT scenario. Pervasive Mob. Comput. 2020, 67, 101223. [Google Scholar] [CrossRef]
  31. Ojagh, S.; Cauteruccio, F.; Terracina, G.; Liang, S.H. Enhanced air quality prediction by edge-based spatiotemporal data preprocessing. Comput. Electr. Eng. 2021, 96, 107572. [Google Scholar] [CrossRef]
  32. Manavalan, E.; Jayakrishna, K. A review of Internet of Things (IoT) embedded sustainable supply chain for industry 4.0 requirements. Comput. Ind. Eng. 2019, 127, 925–953. [Google Scholar] [CrossRef]
  33. Boukerche, A.; Coutinho, R.W. Crowd management: The overlooked component of smart transportation systems. IEEE Commun. Mag. 2019, 57, 48–53. [Google Scholar] [CrossRef]
  34. Qureshi, F.; Krishnan, S. Wearable hardware design for the internet of medical things (IoMT). Sensors 2018, 18, 3812. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  35. Balestrieri, E.; Boldi, F.; Colavita, A.R.; De Vito, L.; Laudato, G.; Oliveto, R.; Picariello, F.; Rivaldi, S.; Scalabrino, S.; Torchitti, P.; et al. The architecture of an innovative smart T-shirt based on the Internet of Medical Things paradigm. In Proceedings of the 2019 IEEE International Symposium on Medical Measurements and Applications (MeMeA), Istanbul, Turkey, 26–28 June 2019; pp. 1–6. [Google Scholar]
  36. Balica, R.Ş. Networked Wearable Devices, Machine Learning-based Real-Time Data Sensing and Processing, and Internet of Medical Things in COVID-19 Diagnosis, Prognosis, and Treatment. Am. J. Med. Res. 2022, 9, 33–48. [Google Scholar]
  37. Rajavi, Y.; Taghivand, M.; Aggarwal, K.; Ma, A.; Poon, A.S. An energy harvested ultra-low power transceiver for Internet of Medical Things. In Proceedings of the ESSCIRC Conference 2016: 42nd European Solid-State Circuits Conference, Lausanne, Switzerland, 12–15 September 2016; pp. 133–136. [Google Scholar]
  38. Ahmed, S.; Naga Srinivasu, P.; Alhumam, A.; Alarfaj, M. AAL and Internet of Medical Things for Monitoring Type-2 Diabetic Patients. Diagnostics 2022, 12, 2739. [Google Scholar] [CrossRef] [PubMed]
  39. Wei, K.; Zhang, L.; Guo, Y.; Jiang, X. Health monitoring based on internet of medical things: Architecture, enabling technologies, and applications. IEEE Access 2020, 8, 27468–27478. [Google Scholar] [CrossRef]
  40. Askar, N.A.; Habbal, A.; Mohammed, A.H.; Sajat, M.S.; Yusupov, Z.; Kodirov, D. Architecture, Protocols, and Applications of the Internet of Medical Things (IoMT). J. Commun. 2022, 17, 900–918. [Google Scholar] [CrossRef]
  41. Zachos, G.; Essop, I.; Mantas, G.; Porfyrakis, K.; Ribeiro, J.C.; Rodriguez, J. An anomaly-based intrusion detection system for internet of medical things networks. Electronics 2021, 10, 2562. [Google Scholar] [CrossRef]
  42. Yang, B.; Cao, X.; Han, Z.; Qian, L. A machine learning enabled MAC framework for heterogeneous Internet-of-Things networks. IEEE Trans. Wirel. Commun. 2019, 18, 3697–3712. [Google Scholar] [CrossRef]
  43. Fersi, G. Study of middleware for Internet of healthcare things and their applications. In Proceedings of the International Conference on Smart Homes and Health Telematics, Hammamet, Tunisia, 24–26 June 2020; pp. 223–231. [Google Scholar]
  44. Ivanov, R.; Nguyen, H.; Weimer, J.; Sokolsky, O.; Lee, I. Openice-lite: Towards a connectivity platform for the internet of medical things. In Proceedings of the 2018 IEEE 21st International Symposium on Real-Time Distributed Computing (ISORC), Nashville, TN, USA, 19–21 May 2018; pp. 103–106. [Google Scholar]
  45. da Cruz, M.A.; Rodrigues, J.J.P.; Al-Muhtadi, J.; Korotaev, V.V.; de Albuquerque, V.H.C. A reference model for internet of things middleware. IEEE Internet Things J. 2018, 5, 871–883. [Google Scholar] [CrossRef]
  46. Phan, D.T.; Nguyen, C.H.; Nguyen, T.D.P.; Tran, L.H.; Park, S.; Choi, J.; Lee, B.I.; Oh, J. A Flexible, Wearable, and Wireless Biosensor Patch with Internet of Medical Things Applications. Biosensors 2022, 12, 139. [Google Scholar] [CrossRef]
  47. Rubí, J.N.S.; Gondim, P.R.D.L. Interoperable internet of medical things platform for e-health applications. Int. J. Distrib. Sens. Networks 2020, 16, 1550147719889591. [Google Scholar] [CrossRef] [Green Version]
  48. Nayyar, A.; Puri, V.; Nguyen, N.G. BioSenHealth 1.0: A novel internet of medical things (IoMT)-based patient health monitoring system. In Proceedings of the International Conference on Innovative Computing and Communications, Delhi, India, 5–6 May 2018; Springer: Berlin/Heidelberg, Germany, 2019; pp. 155–164. [Google Scholar]
  49. Hatzivasilis, G.; Papaefstathiou, I.; Manifavas, H. Software Security, Privacy and Dependability: Metrics and Measurement. IEEE Software 2016, 33, 46–54. [Google Scholar] [CrossRef]
  50. Khan, L.U.; Saad, W.; Han, Z.; Hossain, E.; Hong, C.S. Federated learning for internet of things: Recent advances, taxonomy, and open challenges. IEEE Commun. Surv. Tutor. 2021, 23, 1759–1799. [Google Scholar] [CrossRef]
  51. Agrawal, M.; Zhou, J.; Chang, D. A survey on lightweight authenticated encryption and challenges for securing industrial IoT. In Security and Privacy Trends in the Industrial Internet of Things; Springer: Berlin/Heidelberg, Germany, 2019; pp. 71–94. [Google Scholar]
  52. Hazratifard, M.; Gebali, F.; Mamun, M. Using machine learning for dynamic authentication in telehealth: A tutorial. Sensors 2022, 22, 7655. [Google Scholar] [CrossRef]
  53. El-Hajj, M.; Fadlallah, A.; Chamoun, M.; Serhrouchni, A. A survey of internet of things (IoT) authentication schemes. Sensors 2019, 19, 1141. [Google Scholar] [CrossRef] [Green Version]
  54. Koutras, D.; Stergiopoulos, G.; Dasaklis, T.; Kotzanikolaou, P.; Glynos, D.; Douligeris, C. Security in IoMT communications: A survey. Sensors 2020, 20, 4828. [Google Scholar] [CrossRef] [PubMed]
  55. Khan, M.A.; Din, I.U.; Majali, T.; Kim, B.S. A Survey of Authentication in Internet of Things-Enabled Healthcare Systems. Sensors 2022, 22, 9089. [Google Scholar] [CrossRef] [PubMed]
  56. Baig, A.F.; Eskeland, S. Security, privacy, and usability in continuous authentication: A survey. Sensors 2021, 21, 5967. [Google Scholar] [CrossRef] [PubMed]
  57. Reese, K.; Smith, T.; Dutson, J.; Armknecht, J.; Cameron, J.; Seamons, K. A usability study of five two-factor authentication methods. In Proceedings of the 15th Symposium on Usable Privacy and Security, Santa Clara, CA, USA, 11–13 August 2019. [Google Scholar]
  58. Lennartsson, M.; Kävrestad, J.; Nohlberg, M. Exploring the meaning of usable security–a literature review. Inf. Comput. Secur. 2021, 29, 647–663. [Google Scholar] [CrossRef]
  59. Lewis, J.R. Psychometric Evaluation of the PSSUQ Using Data from Five Years of Usability Studies. Int. J. Human–Comput. Interact. 2002, 14, 463–488. [Google Scholar] [PubMed]
  60. Davis, D.; Monrose, F.; Reiter, M.K. On User Choice in Graphical Password Schemes. In Proceedings of the 13th USENIX Security Symposium (USENIX Security 04), San Diego, CA, USA, 9–13 August 2004; USENIX Association: San Diego, CA, USA, 2004. [Google Scholar]
  61. Dhamija, R.; Perrig, A. Deja Vu–A User Study: Using Images for Authentication. In Proceedings of the 9th USENIX Security Symposium (USENIX Security 00), Denver, CO, USA, 14–17 August 2000; USENIX Association: Denver, CO, USA, 2000. [Google Scholar]
  62. Hayashi, E.; Dhamija, R.; Christin, N.; Perrig, A. Use Your Illusion: Secure Authentication Usable Anywhere. In Proceedings of the 4th Symposium on Usable Privacy and Security, Pittsburgh, PA, USA, 23–25 July 2008; Association for Computing Machinery: New York, NY, USA, 2008; pp. 35–45. [Google Scholar] [CrossRef]
  63. Khan, W.; Aalsalem, M.; Xiang, Y. A Graphical Password Based System for Small Mobile Devices. arXiv 2011, arXiv:1110.3844. [Google Scholar]
  64. Jermyn, I.; Mayer, A.; Monrose, F.; Reiter, M.K.; Rubin, A.D. The Design and Analysis of Graphical Passwords. In Proceedings of the 8th Conference on USENIX Security Symposium, Washington, DC, USA, 23–26 August 1999; USENIX Association: Berkeley, CA, USA, 1999; Volume 8, p. 1. [Google Scholar]
  65. Varenhorst, C.; Van Kleek, M.; Rudolph, L. Passdoodles: A Lightweight Authentication Method; Research Science Institute: Cambridge, MA, USA, 2004. [Google Scholar]
  66. Weiss, R.; De Luca, A. PassShapes: Utilizing Stroke Based Authentication to Increase Password Memorability; Association for Computing Machinery: New York City, NY, USA, 2008; NordiCHI ’08; pp. 383–392. [Google Scholar] [CrossRef]
  67. Lin, D.; Dunphy, P.; Olivier, P.; Yan, J. Graphical passwords & qualitative spatial relations. ACM 2007, 229, 161–162. [Google Scholar] [CrossRef]
  68. Liu, X.; Qiu, J.; Ma, L.; Gao, H.; Ren, Z. A Novel Cued-recall Graphical Password Scheme. In Proceedings of the 2011 6th International Conference on Image and Graphics, Hefei, China, 12–15 August 2011; pp. 949–956. [Google Scholar] [CrossRef]
  69. van Oorschot, P.C.; Wan, T. TwoStep: An Authentication Method Combining Text and Graphical Passwords. In MCETECH 2009: E-Technologies: Innovation in an Open World; Babin, G., Kropf, P., Weiss, M., Eds.; Springer: Berlin/Heidelberg, Germany, 2009; pp. 233–239. [Google Scholar]
  70. Ray, P.P. Ray’s Scheme: Graphical Password Based Hybrid Authentication System for Smart Hand Held Devices. J. Inf. Eng. Appl. 2012, 2, 1–11. [Google Scholar]
  71. Gao, H.; Liu, X. A new graphical password scheme against spyware by using CAPTCHA. In Proceedings of the SOUPS, Mountain View, CA, USA, 15–17 July 2009. [Google Scholar]
  72. Joshi, A.M.; Muniyal, B. Authentication Using Text and Graphical Password. In Proceedings of the 2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI), Bangalore, India, 19–22 September 2018; pp. 381–386. [Google Scholar] [CrossRef]
  73. Bianchi, A.; Oakley, I.; Kim, H. PassBYOP: Bring Your Own Picture for Securing Graphical Passwords. IEEE Trans. -Hum. -Mach. Syst. 2016, 46, 380–389. [Google Scholar] [CrossRef]
  74. Kausar, N.; Din, I.U.; Khan, M.A.; Almogren, A.; Kim, B.S. GRA-PIN: A Graphical and PIN-Based Hybrid Authentication Approach for Smart Devices. Sensors 2022, 22, 1349. [Google Scholar] [CrossRef]
  75. Jirjees, S.W.; Mahmood, A.M.; Nasser, A.R. Passnumbers: An approach of graphical password authentication based on grid selection. IJSSE 2022, 12, 21–29. [Google Scholar] [CrossRef]
  76. Alsaeed, N.; Nadeem, F. Authentication in the Internet of Medical Things: Taxonomy, Review, and Open Issues. Appl. Sci. 2022, 12, 7487. [Google Scholar] [CrossRef]
  77. Rathore, H.; Fu, C.; Mohamed, A.; Al-Ali, A.; Du, X.; Guizani, M.; Yu, Z. Multi-layer security scheme for implantable medical devices. Neural Comput. Appl. 2020, 32, 4347–4360. [Google Scholar] [CrossRef]
  78. Soni, P.; Pal, A.K.; Islam, S.H. An improved three-factor authentication scheme for patient monitoring using WSN in remote health-care system. Comput. Methods Programs Biomed. 2019, 182, 105054. [Google Scholar] [CrossRef] [PubMed]
  79. Akrivopoulos, O.; Chatzigiannakis, I.; Tselios, C.; Antoniou, A. On the deployment of healthcare applications over fog computing infrastructure. In Proceedings of the 2017 IEEE 41st AnnualComputer Software and Applications Conference (COMPSAC), Turin, Italy, 4–8 July 2017; Volume 2, pp. 288–293. [Google Scholar]
  80. Lee, J.D.; Yoon, T.S.; Chung, S.H.; Cha, H.S. Service-oriented security framework for remote medical services in the Internet of Things environment. Healthc. Inform. Res. 2015, 21, 271–282. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  81. Chen, C.L.; Yang, T.T.; Leu, F.Y.; Huang, Y.L. Designing a healthcare authorization model based on cloud authentication. Intell. Autom. Soft Comput. 2014, 20, 365–379. [Google Scholar] [CrossRef]
  82. Al-Saggaf, A.A.; Sheltami, T.; Alkhzaimi, H.; Ahmed, G. Lightweight Two-Factor-Based User Authentication Protocol for IoT-Enabled Healthcare Ecosystem in Quantum Computing. Arab. J. Sci. Eng. 2022, 48, 2347–2357. [Google Scholar] [CrossRef] [PubMed]
  83. Moghaddam, F.F.; Moghaddam, S.G.; Rouzbeh, S.; Araghi, S.K.; Alibeigi, N.M.; Varnosfaderani, S.D. A scalable and efficient user authentication scheme for cloud computing environments. In Proceedings of the 2014 IEEE Region 10 Symposium, Kuala Lumpur, Malaysia, 14–16 April 2014; pp. 508–513. [Google Scholar]
  84. James R, L. Handbook of Human Factors and Ergonomics, 4th ed.; Chapter Usability Testing; Wiley: Hoboken, NJ, USA, 2012; pp. 1267–1312. [Google Scholar] [CrossRef]
  85. Sauro, J.; Lewis, J.R. Quantifying the User Experience: Practical Statistics for User Research; Morgan Kaufmann: Burlginton, MA, USA, 2016. [Google Scholar]
Figure 1. Flow diagram of the proposed architecture.
Figure 1. Flow diagram of the proposed architecture.
Sustainability 15 05207 g001
Figure 2. Registration sub-phase 1: selection of secret number, secret color, and secret tap-mode.
Figure 2. Registration sub-phase 1: selection of secret number, secret color, and secret tap-mode.
Sustainability 15 05207 g002
Figure 3. Interface of secret image selection phase.
Figure 3. Interface of secret image selection phase.
Sustainability 15 05207 g003
Figure 4. Authentication phase: random number generator, with and without colors.
Figure 4. Authentication phase: random number generator, with and without colors.
Sustainability 15 05207 g004
Figure 5. Hand drawing the answer calculated after the arithmetic operation.
Figure 5. Hand drawing the answer calculated after the arithmetic operation.
Sustainability 15 05207 g005
Figure 6. Overall results for Post-Study System Usability Questionnaire (PSSUQ).
Figure 6. Overall results for Post-Study System Usability Questionnaire (PSSUQ).
Sustainability 15 05207 g006
Figure 7. PSSUQ results of system quality.
Figure 7. PSSUQ results of system quality.
Sustainability 15 05207 g007
Figure 8. PSSUQ results of information quality.
Figure 8. PSSUQ results of information quality.
Sustainability 15 05207 g008
Figure 9. PSSUQ results of interface quality.
Figure 9. PSSUQ results of interface quality.
Sustainability 15 05207 g009
Figure 10. Detailed results of comparison and treatment groups.
Figure 10. Detailed results of comparison and treatment groups.
Sustainability 15 05207 g010
Table 2. Results for independent sample statistical t-test.
Table 2. Results for independent sample statistical t-test.
VariablestdfSig. (2-Tailed)Cohen’s d
Overall Quality4.068.640.0031.92
System Quality2.548.970.031.2
Information Quality3.488.620.0071.64
Interface Quality6.319.9202.96
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Khan, M.A.; Din, I.U.; Almogren, A. Securing Access to Internet of Medical Things Using a Graphical-Password-Based User Authentication Scheme. Sustainability 2023, 15, 5207. https://doi.org/10.3390/su15065207

AMA Style

Khan MA, Din IU, Almogren A. Securing Access to Internet of Medical Things Using a Graphical-Password-Based User Authentication Scheme. Sustainability. 2023; 15(6):5207. https://doi.org/10.3390/su15065207

Chicago/Turabian Style

Khan, Mudassar Ali, Ikram Ud Din, and Ahmad Almogren. 2023. "Securing Access to Internet of Medical Things Using a Graphical-Password-Based User Authentication Scheme" Sustainability 15, no. 6: 5207. https://doi.org/10.3390/su15065207

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop