2019 International Conference on Innovative Computing (ICIC) 2019
DOI: 10.1109/icic48496.2019.8966699
|View full text |Cite
|
Sign up to set email alerts
|

Biometric Authentication in Health Care Sector: A Survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 32 publications
0
2
0
Order By: Relevance
“…Implementing robust authentication mechanisms is paramount to thwart unauthorized access attempts. Incorporating multifactor authentication (MFA) [18], biometric verification [19], and hardware-based cryptographic keys [20] can significantly enhance the authentication process. This ensures that only authorized individuals can interact with BioMEMS, thereby minimizing the risk of malicious infiltration.…”
Section: Mitigating Security Risks In Biomems For Enhanced Iot Commun...mentioning
confidence: 99%
“…Implementing robust authentication mechanisms is paramount to thwart unauthorized access attempts. Incorporating multifactor authentication (MFA) [18], biometric verification [19], and hardware-based cryptographic keys [20] can significantly enhance the authentication process. This ensures that only authorized individuals can interact with BioMEMS, thereby minimizing the risk of malicious infiltration.…”
Section: Mitigating Security Risks In Biomems For Enhanced Iot Commun...mentioning
confidence: 99%
“…The usability issues are therefore related to unsteady or inconsistent biometrics samples. For example, cardioid disease or high blood pressure might have an effect a retina vein patterns (Fatima et al 2019). It might also affect persons walking capabilities (Bloem et al 2015) and therefore impact upon the effectiveness of gait recognition.…”
Section: Life Functionmentioning
confidence: 99%
“…It is difficult for some hospitals or medical centers to migrate their medical records to new systems, e.g., for factors such as budget, data format, or time; this could be a disadvantage from a cybersecurity perspective. Some research is focused on improving authentication methods to reduce this gap [79], following the topics related to healthcare cybersecurity: The growth of new electronic services and technologies such as IoT, big data, and artificial intelligence have allowed the development of new attack vectors [81,82]. IoT has generated interest by adversaries in carrying out security attacks due to its lack of advanced security and great coverage [83].…”
Section: Financial Servicesmentioning
confidence: 99%