2020
DOI: 10.1007/s11845-020-02425-x
|View full text |Cite
|
Sign up to set email alerts
|

A review: a new authentication protocol for real-time healthcare monitoring system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 19 publications
0
6
0
Order By: Relevance
“…It involves data consumption privileges that might be assigned to various professionals in the context of big H-IoT applications employed in the consolidation of COVID-19. The efficiency and scheduling limits of access control in these networks or applications are a consequential provocation because the computational intensity of these applications is greater than that of the standard Database Management System (DBMS) ( Dewangan et al., 2020 ). Therefore, this argument also necessitates noteworthy consciousness from the research community to compose reliable and computation fewer accessibility schemes for these networks.…”
Section: Network and Security Challenges In H-iotmentioning
confidence: 99%
“…It involves data consumption privileges that might be assigned to various professionals in the context of big H-IoT applications employed in the consolidation of COVID-19. The efficiency and scheduling limits of access control in these networks or applications are a consequential provocation because the computational intensity of these applications is greater than that of the standard Database Management System (DBMS) ( Dewangan et al., 2020 ). Therefore, this argument also necessitates noteworthy consciousness from the research community to compose reliable and computation fewer accessibility schemes for these networks.…”
Section: Network and Security Challenges In H-iotmentioning
confidence: 99%
“…We believe this compilation will be a footnote for future research and help us make healthcare accessible to more people. After consulting all of these papers, we could draw a few conclusions on the basic architecture of the IoT-assisted wearable sensor system [97][98][99].…”
Section: Discussionmentioning
confidence: 99%
“…When considering the application of these proposals in a general IoT environment, keys are not expected to be based on physiological signals. Still, for IoT-based real-time healthcare systems, it is common to find solutions that use other techniques for the generation of cryptography materials (e.g., Elliptic Curve Cryptography (ECC) and Secure Hash Algorithm (SHA)) [23]. Mehdi et al [22] discussed the possibility of incorporating Physical Unclonable Function (PUF) as a basis for group key generation.…”
Section: Related Workmentioning
confidence: 99%