2015
DOI: 10.1155/2015/183659
|View full text |Cite
|
Sign up to set email alerts
|

Novel Authentication Schemes for IoT Based Healthcare Systems

Abstract: With the advancement of information communication technologies, the evolution of the Internet has given rise to a ubiquitous network consisting of interconnected objects (or things), called the Internet of Things (IoT). Recently, the academic community has made great strides in researching and developing security for IoT based applications, focusing, in particular, on healthcare systems based on IoT networks. In this paper, we propose a sensor (or sensor tags) based communication architecture for future IoT ba… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
14
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 50 publications
(14 citation statements)
references
References 28 publications
0
14
0
Order By: Relevance
“…A cloud computing platform for managing the sensors and wearable is presented in [27], which depict the application of the IoT paradigm for providing pervasive healthcare. The authors in [28] proposed a "single sign-on"-based authentication scheme for securing medical IoT data. The authors in [29] propose an interoperable "Smart Hospital System (SHS)" based on technologies like "RFID," "WSN," and "smart mobile" using the "Constrained Application Protocol (CoAP)/IPv6" over the "low-power wireless personal area network (6LoWPAN)" and "representational state transfer (REST) network infrastructure."…”
Section: Related Workmentioning
confidence: 99%
“…A cloud computing platform for managing the sensors and wearable is presented in [27], which depict the application of the IoT paradigm for providing pervasive healthcare. The authors in [28] proposed a "single sign-on"-based authentication scheme for securing medical IoT data. The authors in [29] propose an interoperable "Smart Hospital System (SHS)" based on technologies like "RFID," "WSN," and "smart mobile" using the "Constrained Application Protocol (CoAP)/IPv6" over the "low-power wireless personal area network (6LoWPAN)" and "representational state transfer (REST) network infrastructure."…”
Section: Related Workmentioning
confidence: 99%
“…54 [67] The security requirements of RFID authentication schemes for Internet of Things-based healthcare surveillance systems. The authors presented the overall architecture of the RFID-based authentication system and their requirements 55 [68] The security of IoT-based health systems. They proposed a communication architecture based on sensors in health service systems integrating a secure authentication scheme and a protocol for the coexistence of multiple health systems operating under the technology of the IoT.…”
Section: [66]mentioning
confidence: 99%
“…Generally, the scheme using symmetric key cryptography [5][6][7][8][9][10][11][12][13][14] has better performance while it cannot achieve forward security. For the scheme using asymmetric cryptography [15][16][17][18][19][20][21][22][23], the balance between security and performance is a crucial problem. In 2016, He et al presented an anonymous authentication protocol [24], which is based on asymmetric cryptography.…”
Section: Introductionmentioning
confidence: 99%