Skip to main content
Top
Published in: Irish Journal of Medical Science (1971 -) 3/2021

01-08-2021 | Review Article

A review: a new authentication protocol for real-time healthcare monitoring system

Authors: Kiran Dewangan, Mina Mishra, Naveen Kumar Dewangan

Published in: Irish Journal of Medical Science (1971 -) | Issue 3/2021

Login to get access

Abstract

Internet of Things is a fast growing technology and a network of devices in which everything (smart objects or smart devices) are associated to the internet for effective exchange of information between these connected objects. Internet of Things (IoT) serves as a method for healthcare and acts as an essential part in broad range of real-time healthcare monitoring applications. Previous work shows networked sensor devices, either equipped on the body or embedded inside living being or a camera, make possible in gathering real-time information to evaluate physical and mental health state of the patient by collecting body temperature, blood pressure, patient’s image, etc. Communicating this collected real-time data to the doctor, making accurate assessment on the data gathered and notifying the patient is challenging task in the IoT. The architechture of Internet of Things comprises of three layers, and it is the network of devices embedded with sensor, software, and electronics, enabling this device to communicate with each other and exchange data over a computer network. The IoT-based real-time healthcare systems are highly vulnerable to cyber-attacks as the numbers of sensors are deployed in an unprotected network. These may even introduce the attacks, which cannot be monitored and controlled. This paper attempts to review the previous work done and a new scheme has been proposed, the new lightweight authentication protocol for smart real-time healthcare. The proposed scheme requires implementation with the authentication protocol. It is important to satisfy the major parameters of security: confidentiality, integrity, authentication, and access control. In this paper our focus is on the authentication of devices.
Literature
1.
go back to reference Varadharajan V, Tupakula, U, Karmakar K. (2018) Lightweight authentication mechanism and OAuth protocol for IoT devices, Draft, Technical Report TR2: ISIF ASIA Funded Project. Varadharajan V, Tupakula, U, Karmakar K. (2018) Lightweight authentication mechanism and OAuth protocol for IoT devices, Draft, Technical Report TR2: ISIF ASIA Funded Project.
2.
go back to reference Durairaj M, Muthuramalingam K (2018) A new authentication scheme with elliptical curve cryptography for Internet of Things (IoT) environments. Int J Eng Technol 7:119–124CrossRef Durairaj M, Muthuramalingam K (2018) A new authentication scheme with elliptical curve cryptography for Internet of Things (IoT) environments. Int J Eng Technol 7:119–124CrossRef
3.
go back to reference Zhou L, Li X, Yeh KH, Su C, Chiu W (2019) Lightweight IoT-based authentication scheme in cloud computing circumstance. Future Gen Comput Syst 91:244–251CrossRef Zhou L, Li X, Yeh KH, Su C, Chiu W (2019) Lightweight IoT-based authentication scheme in cloud computing circumstance. Future Gen Comput Syst 91:244–251CrossRef
4.
go back to reference Wu ZQ, Zhou YW, Ma JF (2011) A security transmission model for Internet of Things. Chin J Comput 34:1351–1364CrossRef Wu ZQ, Zhou YW, Ma JF (2011) A security transmission model for Internet of Things. Chin J Comput 34:1351–1364CrossRef
5.
go back to reference Schmitt, C.; Noack, M.; Stiller, B. Tiny TO (2016) Two-way authentication for constrained devices in the Internet of Things. In Internet of Things; Elsevier: Amsterdam, pp. 239–258. Schmitt, C.; Noack, M.; Stiller, B. Tiny TO (2016) Two-way authentication for constrained devices in the Internet of Things. In Internet of Things; Elsevier: Amsterdam, pp. 239–258.
6.
go back to reference Porambage, P.; Schmitt, C.; Kumar, P.; Gurtov, A.; Ylianttila, M. (2014) Two-phase authentication protocol for wireless sensor networks in distributed IoT applications. In Proceedings of the 2014 IEEE Wireless Communications and Networking Conference (WCNC), Istanbul, Turkey, 6–9 April 2014. Porambage, P.; Schmitt, C.; Kumar, P.; Gurtov, A.; Ylianttila, M. (2014) Two-phase authentication protocol for wireless sensor networks in distributed IoT applications. In Proceedings of the 2014 IEEE Wireless Communications and Networking Conference (WCNC), Istanbul, Turkey, 6–9 April 2014.
7.
go back to reference Lai C, Li H, Lu R, Shen XS (2013) SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks. Comput Netw 57:3492–3510CrossRef Lai C, Li H, Lu R, Shen XS (2013) SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks. Comput Netw 57:3492–3510CrossRef
8.
go back to reference Lai C, Lu R, Zheng D, Li H, Shen XS (2016) GLARM: Group-based lightweight authentication scheme for resource-constrained machine to machine communications. Comput Netw 99:66–81CrossRef Lai C, Lu R, Zheng D, Li H, Shen XS (2016) GLARM: Group-based lightweight authentication scheme for resource-constrained machine to machine communications. Comput Netw 99:66–81CrossRef
9.
go back to reference Sun X, Men S, Zhao C, Zhou Z (2012) A security authentication scheme in machine-to-machine home network service. Secur Commun Netw 8:2678–2686CrossRef Sun X, Men S, Zhao C, Zhou Z (2012) A security authentication scheme in machine-to-machine home network service. Secur Commun Netw 8:2678–2686CrossRef
10.
go back to reference Li Q, Cao G (2011) Multicast authentication in the smart grid with one-time signature. IEEE Trans Smart Grid 2:686–696CrossRef Li Q, Cao G (2011) Multicast authentication in the smart grid with one-time signature. IEEE Trans Smart Grid 2:686–696CrossRef
11.
go back to reference Cespedes S, Taha S, Shen X (2013) A Multihop-Authenticated Proxy Mobile IP Scheme for Asymmetric VANETs. IEEE Trans Veh Technol 62:3271–3286CrossRef Cespedes S, Taha S, Shen X (2013) A Multihop-Authenticated Proxy Mobile IP Scheme for Asymmetric VANETs. IEEE Trans Veh Technol 62:3271–3286CrossRef
12.
go back to reference Chung Y, Choi S, Lee Y, Park N, Won D (1653) An Enhanced Lightweight Anonymous Authentication Scheme for a Scalable Localization Roaming Service in Wireless Sensor Networks. Sensors 2016:16 Chung Y, Choi S, Lee Y, Park N, Won D (1653) An Enhanced Lightweight Anonymous Authentication Scheme for a Scalable Localization Roaming Service in Wireless Sensor Networks. Sensors 2016:16
13.
go back to reference Jan MA, Khan F, Alam M, Usman M (2019) A payload-based mutual authentication scheme for Internet of Things. Future Gen Comput Syst 92:1028–1039CrossRef Jan MA, Khan F, Alam M, Usman M (2019) A payload-based mutual authentication scheme for Internet of Things. Future Gen Comput Syst 92:1028–1039CrossRef
14.
go back to reference Kothmayr T, Schmitt C, Hu W, Brünig M, Carle G (2013) DTLS based security and two-way authentication for the Internet of Things. Ad Hoc Netw 11:2710–2723CrossRef Kothmayr T, Schmitt C, Hu W, Brünig M, Carle G (2013) DTLS based security and two-way authentication for the Internet of Things. Ad Hoc Netw 11:2710–2723CrossRef
15.
go back to reference Gope P, Hwang T (2016) A realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks. IEEE Trans Ind Electron 63:7124–7132CrossRef Gope P, Hwang T (2016) A realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks. IEEE Trans Ind Electron 63:7124–7132CrossRef
16.
go back to reference Kumar P, Lee SG, Lee HJ (1625–1647) E-SAP: Efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks. Sensors 2012:12 Kumar P, Lee SG, Lee HJ (1625–1647) E-SAP: Efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks. Sensors 2012:12
17.
go back to reference Das ML (2009) Two-factor user authentication in wireless sensor networks. IEEE Trans Wirel Commun 8:1086–1090CrossRef Das ML (2009) Two-factor user authentication in wireless sensor networks. IEEE Trans Wirel Commun 8:1086–1090CrossRef
18.
go back to reference Hamidi H (2019) An approach to develop the smart health using Internet of Things and authentication based on biometric technology. Future Gen Comput Syst 91:434–449CrossRef Hamidi H (2019) An approach to develop the smart health using Internet of Things and authentication based on biometric technology. Future Gen Comput Syst 91:434–449CrossRef
19.
go back to reference Alotaibi M (2018) An enhanced symmetric cryptosystem and biometric-based anonymous user authentication and session key establishment scheme for WSN. IEEE Access 6:70072–70087CrossRef Alotaibi M (2018) An enhanced symmetric cryptosystem and biometric-based anonymous user authentication and session key establishment scheme for WSN. IEEE Access 6:70072–70087CrossRef
20.
go back to reference Hammi MT, Hammi B, Bellot P, Serhrouchni A (2018) Bubbles of trust: a decentralized blockchain-based authentication system for IoT. Comput Secur 78:126–142CrossRef Hammi MT, Hammi B, Bellot P, Serhrouchni A (2018) Bubbles of trust: a decentralized blockchain-based authentication system for IoT. Comput Secur 78:126–142CrossRef
21.
go back to reference Karthikeyan S, Patan R, Balamurugan B (2019) Enhancement of security in the Internet of Things (IoT) by using X.509 authentication mechanism. In Recent trends in communication, computing, and electronics. Springer, Singapore, pp 217–225 Karthikeyan S, Patan R, Balamurugan B (2019) Enhancement of security in the Internet of Things (IoT) by using X.509 authentication mechanism. In Recent trends in communication, computing, and electronics. Springer, Singapore, pp 217–225
22.
go back to reference El-hajj M, Fadlallah A, Chamoun M, Serhrouchni A (2019) A survey of Internet of Things (IoT) authentication schemes. Sensors. 19:1141CrossRef El-hajj M, Fadlallah A, Chamoun M, Serhrouchni A (2019) A survey of Internet of Things (IoT) authentication schemes. Sensors. 19:1141CrossRef
23.
go back to reference Almulhim M, Islam N, Zaman N (2019) A Lightweight and secure authentication scheme for IoT based E-Health applications. International Journal of Computer Science and Network Security 19(1):107–120 Almulhim M, Islam N, Zaman N (2019) A Lightweight and secure authentication scheme for IoT based E-Health applications. International Journal of Computer Science and Network Security 19(1):107–120
24.
go back to reference Martínez-Peláez R, Toral-Cruz H, Parra-Michel JR, García V, Mena LJ, Félix VG, Ochoa-Brust A (2019) An enhanced lightweight IoT-based authentication scheme in cloud computing circumstances. Sensors 19:2098CrossRef Martínez-Peláez R, Toral-Cruz H, Parra-Michel JR, García V, Mena LJ, Félix VG, Ochoa-Brust A (2019) An enhanced lightweight IoT-based authentication scheme in cloud computing circumstances. Sensors 19:2098CrossRef
Metadata
Title
A review: a new authentication protocol for real-time healthcare monitoring system
Authors
Kiran Dewangan
Mina Mishra
Naveen Kumar Dewangan
Publication date
01-08-2021
Publisher
Springer International Publishing
Published in
Irish Journal of Medical Science (1971 -) / Issue 3/2021
Print ISSN: 0021-1265
Electronic ISSN: 1863-4362
DOI
https://doi.org/10.1007/s11845-020-02425-x

Other articles of this Issue 3/2021

Irish Journal of Medical Science (1971 -) 3/2021 Go to the issue
Live Webinar | 27-06-2024 | 18:00 (CEST)

Keynote webinar | Spotlight on medication adherence

Live: Thursday 27th June 2024, 18:00-19:30 (CEST)

WHO estimates that half of all patients worldwide are non-adherent to their prescribed medication. The consequences of poor adherence can be catastrophic, on both the individual and population level.

Join our expert panel to discover why you need to understand the drivers of non-adherence in your patients, and how you can optimize medication adherence in your clinics to drastically improve patient outcomes.

Prof. Kevin Dolgin
Prof. Florian Limbourg
Prof. Anoop Chauhan
Developed by: Springer Medicine
Obesity Clinical Trial Summary

At a glance: The STEP trials

A round-up of the STEP phase 3 clinical trials evaluating semaglutide for weight loss in people with overweight or obesity.

Developed by: Springer Medicine