Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
Review
. 2021 Aug;190(3):927-932.
doi: 10.1007/s11845-020-02425-x. Epub 2020 Nov 3.

A review: a new authentication protocol for real-time healthcare monitoring system

Affiliations
Review

A review: a new authentication protocol for real-time healthcare monitoring system

Kiran Dewangan et al. Ir J Med Sci. 2021 Aug.

Abstract

Internet of Things is a fast growing technology and a network of devices in which everything (smart objects or smart devices) are associated to the internet for effective exchange of information between these connected objects. Internet of Things (IoT) serves as a method for healthcare and acts as an essential part in broad range of real-time healthcare monitoring applications. Previous work shows networked sensor devices, either equipped on the body or embedded inside living being or a camera, make possible in gathering real-time information to evaluate physical and mental health state of the patient by collecting body temperature, blood pressure, patient's image, etc. Communicating this collected real-time data to the doctor, making accurate assessment on the data gathered and notifying the patient is challenging task in the IoT. The architechture of Internet of Things comprises of three layers, and it is the network of devices embedded with sensor, software, and electronics, enabling this device to communicate with each other and exchange data over a computer network. The IoT-based real-time healthcare systems are highly vulnerable to cyber-attacks as the numbers of sensors are deployed in an unprotected network. These may even introduce the attacks, which cannot be monitored and controlled. This paper attempts to review the previous work done and a new scheme has been proposed, the new lightweight authentication protocol for smart real-time healthcare. The proposed scheme requires implementation with the authentication protocol. It is important to satisfy the major parameters of security: confidentiality, integrity, authentication, and access control. In this paper our focus is on the authentication of devices.

Keywords: Authentication; Domain Name Server (DNS); Elliptic Curve Cryptography (ECC); Internet of Things (IoT); Secure Hash Algorithm (SHA).

PubMed Disclaimer

Similar articles

Cited by

References

    1. Varadharajan V, Tupakula, U, Karmakar K. (2018) Lightweight authentication mechanism and OAuth protocol for IoT devices, Draft, Technical Report TR2: ISIF ASIA Funded Project.
    1. Durairaj M, Muthuramalingam K (2018) A new authentication scheme with elliptical curve cryptography for Internet of Things (IoT) environments. Int J Eng Technol 7:119–124 - DOI
    1. Zhou L, Li X, Yeh KH, Su C, Chiu W (2019) Lightweight IoT-based authentication scheme in cloud computing circumstance. Future Gen Comput Syst 91:244–251 - DOI
    1. Wu ZQ, Zhou YW, Ma JF (2011) A security transmission model for Internet of Things. Chin J Comput 34:1351–1364 - DOI
    1. Schmitt, C.; Noack, M.; Stiller, B. Tiny TO (2016) Two-way authentication for constrained devices in the Internet of Things. In Internet of Things; Elsevier: Amsterdam, pp. 239–258.

LinkOut - more resources