Enhancing User Authentication through the Implementation of the ForestPA Algorithm for Smart Healthcare Systems
Main Article Content
Abstract
The machine learning-based authentication model for smart healthcare systems represents a crucial step in addressing the needs of an ever-evolving healthcare industry. The need to protect sensitive patient data, ensure regulatory compliance, and reduce medical errors, especially in the context of telemedicine and remote monitoring, underscores the importance of such systems. Traditional authentication methods frequently lack sufficient security, resulting in potential breaches. Relying solely on usernames and passwords, without supplementary authentication measures, exposes systems to advanced security attacks. As it involves patients’ health and human lives, it is important to provide additional authentication, fast machine learning-based authentication models and high accuracy at the same time. This study involves five participants with devices and performs various finger-based interactions (raising, lowering, moving the finger, applying pressure, adjusting orientation, and utilizing multiple hikes) while completing reading and image comparison tasks across multiple sessions. Each experiment lasted between 25 and 50 minutes for one participant, with reading tasks typically taking 10--15 minutes and image comparison tasks requiring 3--4 minutes, all measured in milliseconds. All these activities are recorded as a dataset for model training. A model was trained via the forest penalizing attributes (ForestPA) algorithm, which can classify profiles into real or fake profiles on the basis of their behavioral patterns. The results revealed a 99.99% accuracy rate in identifying fake profiles and avoiding them by accessing medical data even though they were able to bypass the username and password.
Article Details
Issue
Section

This work is licensed under a Creative Commons Attribution 4.0 International License.
How to Cite
References
[1] S. Namasudra, “Taxonomy of DNA-based security models,” in Advances of DNA Computing in Cryptography, 2018, pp. 37–52.
[2] M. Zubair et al., “Secure bluetooth communication in smart healthcare systems: a novel community dataset and intrusion detection system,” Sensors, vol. 22, no. 21, Nov. 2022, doi: 10.3390/s22218280.
[3] D. Xu, W. H. Chan, H. Haron, H. W. Nies, and K. Moorthy, “From COVID-19 to monkeypox: a novel predictive model for emerging infectious diseases,” BioData Min, vol. 17, no. 1, Dec. 2024, doi: 10.1186/s13040-024-00396-8.
[4] S. Das and S. Namasudra, “MACPABE: Multi authority-based CP-ABE with efficient attribute revocation for IoT-enabled healthcare infrastructure,” International Journal of Network Management, vol. 33, no. 3, 2023.
[5] M. Rahman, A. Murmu, P. Kumar, N. R. Moparthi, and S. Namasudra, “A novel compression-based 2D-chaotic sine map for enhancing privacy and security of biometric identification systems,” Journal of Information Security and Applications, vol. 80, Feb. 2024, doi: 10.1016/j.jisa.2023.103677.
[6] P. Kumar, M. Rahman, S. Namasudra, and N. R. Moparthi, “Enhancing security of medical images using deep learning, chaotic map, and hash table,” Mobile Networks and Applications, 2023, doi: 10.1007/s11036-023-02158-y.
[7] P. O. A. de la Rosa, “The alarming reality of cyberattacks on our healthcare information.” Accessed: Dec. 03, 2023. [Online]. Available: https://laopinion.com/2023/11/27/the-alarming-reality-of-cyberattacks-on-our-healthcare-information/
[8] J. Mohamad Arif, M. F. Ab Razak, S. Awang, S. R. Tuan Mat, N. S. N. Ismail, and A. Firdaus, “A static analysis approach for Android permission-based malware detection systems,” PLoS One, vol. 16, no. 9, pp. 1–23, 2021, doi: 10.1371/journal.pone.0257968.
[9] A. Karim, V. Chang, and A. Firdaus, “Android botnets: A proof-of-concept using hybrid analysis approach,” Journal of Organizational and End User Computing, vol. 32, no. 3, pp. 50–67, 2020, doi: 10.4018/JOEUC.2020070105.
[10] N. J. Palatty, “80+ Healthcare Data Breach Statistics 2023.” Accessed: Dec. 03, 2023. [Online]. Available: https://www.getastra.com/blog/security-audit/healthcare-data-breach-statistics/
[11] J. Yang, “Healthcare cybersecurity spending globally 2023 Statista.” Accessed: Dec. 03, 2023. [Online]. Available: https://www.statista.com/statistics/1359081/cybersecurity-spending-in-healthcare-sector-worldwide/
[12] S. Kamil, H. S. A. Siti Norul, A. Firdaus, and O. L. Usman, “The rise of ransomware: a review of attacks, detection techniques, and future challenges,” in 2022 International Conference on Business Analytics for Technology and Security, ICBATS 2022, Institute of Electrical and Electronics Engineers Inc., 2022, pp. 1–7. doi: 10.1109/ICBATS54253.2022.9759000.
[13] M. L. Shuwandy, R. A. F. Alsharida, and M. M. Hammood, “Smartphone Authentication Based on 3D Touch Sensor and Finger Locations on Touchscreens via Decision-Making Techniques,” Mesopotamian Journal of CyberSecurity, vol. 5, no. 1, pp. 165–177, Jan. 2025, doi: 10.58496/MJCS/2025/011.
[14] S. A. Hussein et al., “Integrating Law, Cybersecurity, and AI: Deep Learning for Securing Iris-Based Biometric Systems,” Mesopotamian Journal of CyberSecurity, vol. 5, no. 2, pp. 319–336, May 2025, doi: 10.58496/MJCS/2025/020.
[15] C. Chen, H. Guo, Y. Wu, B. Shen, M. Ding, and J. Liu, “A lightweight authentication and key agreement protocol for IoT-enabled smart grid system,” Sensors, vol. 23, no. 8, Apr. 2023, doi: 10.3390/s23083991.
[16] S. Namasudra and P. Roy, “A new table based protocol for data accessing in cloud computing,” Journal of Information Science and Engineering, vol. 33, no. 3, pp. 585–609, May 2017, doi: 10.6688/JISE.2017.33.3.1.
[17] N. N. C. Razali, N. A. Ghani, S. I. Hisham, S. Kasim, N. S. Widodo, and T. Sutikno, “Rainfall-runoff modelling using adaptive neuro-fuzzy inference system,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 17, no. 2, pp. 1117–1126, Feb. 2020, doi: 10.11591/IJEECS.V17.I2.PP1117-1126.
[18] Soni, M. A. Remli, K. M. Daud, and J. Al Amien, “Ensemble learning approach to enhancing binary classification in Intrusion Detection System for Internet of Things,” International Journal of Electronics and Telecommunications, vol. 70, no. 2, pp. 465–472, Jun. 2024, doi: 10.24425/ijet.2024.149567.
[19] L. Breiman, “Random forests,” Mach Learn, pp. 5–32, 2001, doi: 10.1023/A:1010933404324.
[20] A. Nur Iman and T. Ahmad, “Improving intrusion detection system by estimating parameters of Random Forest in Boruta,” in International Conference on Smart Technology and Applications (ICoSTA), 2020, pp. 1–6. doi: 10.1109/ICoSTA48221.2020.1570609975.
[21] Y. M. Putra Abdullah, S. Abu Bakar, W. N. J. Wan Yussof, R. Hamzah, R. A Hamid, and D. Satria, “A comparative study of image retrieval algorithm in medical imaging,” International Journal on Informatics Visualization, no. 8, pp. 1567–1572, Nov. 2024, [Online]. Available: www.joiv.org/index.php/joiv
[22] M. Christine, H. H. Nuha, M. Irsan, A. G. Putrada, and S. Izhar Hisham, “Object tracking in surveillance system using extended Kalman Filter and ACF detection,” in International Conference on Decision Aid Sciences and Applications (DASA), Institute of Electrical and Electronics Engineers Inc., 2024. doi: 10.1109/DASA63652.2024.10836597.
[23] M. Frank, R. Biedert, E. Ma, I. Martinovic, and D. Song, “Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication,” IEEE Transactions on Information Forensics and Security, vol. 8, no. 1, pp. 136–148, 2013, doi: 10.1109/TIFS.2012.2225048.
[24] R. Brown, G. Bendiab, S. Shiaeles, and B. Ghita, “A novel multimodal biometric authentication system using machine learning and blockchain,” in 12th International Network Conference, 2020, pp. 31–46. doi: 10.1007/978-3-030-64758-2_3.
[25] E. A. Sağbaş and S. Ballı, “Machine learning-based novel continuous authentication system using soft keyboard typing behavior and motion sensor data,” Neural Comput Appl, 2024, doi: 10.1007/s00521-023-09360-9.
[26] X. Qiu, X. Sun, and X. Si, “Machine learning-based security authentication for IoT networks,” in Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, Springer Science and Business Media Deutschland GmbH, 2021, pp. 106–115. doi: 10.1007/978-3-030-69514-9_10.
[27] M. N. Adnan and M. Z. Islam, “Forest PA: Constructing a decision forest by penalizing attributes used in previous trees,” Expert Syst Appl, vol. 89, pp. 389–403, Dec. 2017, doi: 10.1016/j.eswa.2017.08.002.
[28] E. H. Tusher, M. A. Ismail, M. A. Rahman, A. H. Alenezi, and M. Uddin, “Email spam: A comprehensive review of optimize detection methods, challenges, and open research problems,” IEEE Access, vol. 12, Oct. 2024, doi: 10.1109/ACCESS.2024.3467996.
[29] E. H. Tusher, M. A. Ismail, and A. F. Mat Raffei, “Email spam classification based on deep learning methods: a review,” Iraqi Journal for Computer Science and Mathematics, vol. 6, no. 1, Feb. 2025, doi: 10.52866/2788-7421.1236.
[30] M. Al-Zubaidie and W. Jebbar, “Transaction security and management of blockchain-based smart contracts in e-banking-employing microsegmentation and yellow saddle goatfish,” Mesopotamian Journal of CyberSecurity, vol. 4, no. 2, pp. 71–89, May 2024, doi: 10.58496/mjcs/2024/005.
[31] L. Wang, Z. H. You, Y. M. Li, K. Zheng, and Y. A. Huang, “GCNCDA: A new method for predicting circRNA-disease associations based on Graph Convolutional Network Algorithm,” PLoS Comput Biol, vol. 16, no. 5, May 2020, doi: 10.1371/journal.pcbi.1007568.
[32] Y. A. Alsariera, A. V. Elijah, and A. O. Balogun, “Phishing website detection: forest by penalizing attributes algorithm and its enhanced variations,” Arab J Sci Eng, vol. 45, pp. 10459–10470, 2020.
[33] M. Montgomery, P. Chatterjee, J. Jenkins, and K. Roy, “Touch analysis: an empirical evaluation of machine learning classification algorithms on touch data,” in Information Security and Cryptology 8th International Conference, Inscrypt, Beijing, China, Springer Verlag, 2012, pp. 147–156. doi: 10.1007/978-3-030-24907-6_12.
[34] L. A. Al-Haddad, H. A. H. Kahachi, H. Z. Ur Rehman, A. A. Al-Zubaidi, M. I. Al-Karkhi, and B. Al-Oubaidi, "Advancing sustainability in buildings using an integrated aerodynamic façade: Potential of artificial intelligence," Terra Joule Journal, vol. 1, no. 1, Art. no. 1, 2024. https://doi.org/10.64071/3080-5724.1006