A review: a new authentication protocol for real-time healthcare monitoring system
- PMID: 33145637
- DOI: 10.1007/s11845-020-02425-x
A review: a new authentication protocol for real-time healthcare monitoring system
Abstract
Internet of Things is a fast growing technology and a network of devices in which everything (smart objects or smart devices) are associated to the internet for effective exchange of information between these connected objects. Internet of Things (IoT) serves as a method for healthcare and acts as an essential part in broad range of real-time healthcare monitoring applications. Previous work shows networked sensor devices, either equipped on the body or embedded inside living being or a camera, make possible in gathering real-time information to evaluate physical and mental health state of the patient by collecting body temperature, blood pressure, patient's image, etc. Communicating this collected real-time data to the doctor, making accurate assessment on the data gathered and notifying the patient is challenging task in the IoT. The architechture of Internet of Things comprises of three layers, and it is the network of devices embedded with sensor, software, and electronics, enabling this device to communicate with each other and exchange data over a computer network. The IoT-based real-time healthcare systems are highly vulnerable to cyber-attacks as the numbers of sensors are deployed in an unprotected network. These may even introduce the attacks, which cannot be monitored and controlled. This paper attempts to review the previous work done and a new scheme has been proposed, the new lightweight authentication protocol for smart real-time healthcare. The proposed scheme requires implementation with the authentication protocol. It is important to satisfy the major parameters of security: confidentiality, integrity, authentication, and access control. In this paper our focus is on the authentication of devices.
Keywords: Authentication; Domain Name Server (DNS); Elliptic Curve Cryptography (ECC); Internet of Things (IoT); Secure Hash Algorithm (SHA).
© 2020. Royal Academy of Medicine in Ireland.
Similar articles
-
A Secure and Lightweight Three-Factor-Based Authentication Scheme for Smart Healthcare Systems.Sensors (Basel). 2020 Dec 12;20(24):7136. doi: 10.3390/s20247136. Sensors (Basel). 2020. PMID: 33322813 Free PMC article.
-
An Improved Lightweight User Authentication Scheme for the Internet of Medical Things.Sensors (Basel). 2023 Jan 18;23(3):1122. doi: 10.3390/s23031122. Sensors (Basel). 2023. PMID: 36772160 Free PMC article.
-
Blockchain Enabled Anonymous Privacy-Preserving Authentication Scheme for Internet of Health Things.Sensors (Basel). 2022 Dec 26;23(1):240. doi: 10.3390/s23010240. Sensors (Basel). 2022. PMID: 36616838 Free PMC article.
-
A Comparative Analysis on Blockchain versus Centralized Authentication Architectures for IoT-Enabled Smart Devices in Smart Cities: A Comprehensive Review, Recent Advances, and Future Research Directions.Sensors (Basel). 2022 Jul 10;22(14):5168. doi: 10.3390/s22145168. Sensors (Basel). 2022. PMID: 35890848 Free PMC article. Review.
-
Smart Home-based IoT for Real-time and Secure Remote Health Monitoring of Triage and Priority System using Body Sensors: Multi-driven Systematic Review.J Med Syst. 2019 Jan 15;43(3):42. doi: 10.1007/s10916-019-1158-z. J Med Syst. 2019. PMID: 30648217
Cited by
-
Emerging IoT Applications in Sustainable Smart Cities for COVID-19: Network Security and Data Preservation Challenges with Future Directions.Sustain Cities Soc. 2021 Dec;75:103311. doi: 10.1016/j.scs.2021.103311. Epub 2021 Sep 11. Sustain Cities Soc. 2021. PMID: 34540568 Free PMC article.
-
Recent Advances on IoT-Assisted Wearable Sensor Systems for Healthcare Monitoring.Biosensors (Basel). 2021 Oct 4;11(10):372. doi: 10.3390/bios11100372. Biosensors (Basel). 2021. PMID: 34677328 Free PMC article. Review.
References
-
- Varadharajan V, Tupakula, U, Karmakar K. (2018) Lightweight authentication mechanism and OAuth protocol for IoT devices, Draft, Technical Report TR2: ISIF ASIA Funded Project.
-
- Durairaj M, Muthuramalingam K (2018) A new authentication scheme with elliptical curve cryptography for Internet of Things (IoT) environments. Int J Eng Technol 7:119–124 - DOI
-
- Zhou L, Li X, Yeh KH, Su C, Chiu W (2019) Lightweight IoT-based authentication scheme in cloud computing circumstance. Future Gen Comput Syst 91:244–251 - DOI
-
- Wu ZQ, Zhou YW, Ma JF (2011) A security transmission model for Internet of Things. Chin J Comput 34:1351–1364 - DOI
-
- Schmitt, C.; Noack, M.; Stiller, B. Tiny TO (2016) Two-way authentication for constrained devices in the Internet of Things. In Internet of Things; Elsevier: Amsterdam, pp. 239–258.
Publication types
MeSH terms
LinkOut - more resources
Full Text Sources