Authentication in the Internet of Medical Things: Taxonomy, Review, and Open Issues

被引:25
作者
Alsaeed, Norah [1 ,2 ]
Nadeem, Farrukh [1 ]
机构
[1] King Abdulaziz Univ, Fac Comp & Informat Technol, Dept Informat Syst, Jeddah 21589, Saudi Arabia
[2] King Khalid Univ, Dept Comp Sci, Appl Coll, Abha 61421, Saudi Arabia
来源
APPLIED SCIENCES-BASEL | 2022年 / 12卷 / 15期
关键词
Internet of Medical Things; security requirements; IoMT authentication scheme; IoMT authentication attacks; KEY AGREEMENT SCHEME; LIGHTWEIGHT MUTUAL AUTHENTICATION; HEALTH-CARE APPLICATIONS; PROVABLY SECURE; EFFICIENT; PROTOCOL; ROBUST; SYSTEMS; VERIFICATION; PRIVACY;
D O I
10.3390/app12157487
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
The Internet of Medical Things (IoMT) has revolutionized the world of healthcare by remotely connecting patients to healthcare providers through medical devices connected over the Internet. IoMT devices collect patients' medical data and share them with healthcare providers, who analyze it for early control of diseases. The security of patients' data is of prime importance in IoMT. Authentication of users and devices is the first layer of security in IoMT. However, because of diverse and resource-constrained devices, authentication in IoMT is a challenging task. Several authentication schemes for IoMT have been proposed in the literature. However, each of them has its own pros and cons. To identify, evaluate and summarize the current literature on authentication in IoMT, we conducted a systematic review of 118 articles published between 2016 and 2021. We also established a taxonomy of authentication schemes in IoMT from seven different perspectives. We observed that most of the authentication schemes use a distributed architecture and public key infrastructure. It was also observed that hybrid cryptography approaches have become popular to overcome the shortcomings of single cryptographic approaches. Authentication schemes in IoMT need to support end-to-end, cross-layer, and cross-domain authentication. Finally, we discuss some open issues and future directions.
引用
收藏
页数:30
相关论文
共 133 条
[1]   DITrust Chain: Towards Blockchain-Based Trust Models for Sustainable Healthcare IoT Systems [J].
Abou-Nassar, Eman M. ;
Iliyasu, Abdullah M. ;
El-Kafrawy, Passent M. ;
Song, Oh-Young ;
Bashir, Ali Kashif ;
Abd El-Latif, Ahmed A. .
IEEE ACCESS, 2020, 8 :111223-111238
[2]   On the designing a secure biometric-based remote patient authentication scheme for mobile healthcare environments [J].
Adeli, Morteza ;
Bagheri, Nasour ;
Meimani, Hamid Reza .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (02) :3075-3089
[3]   SecLAP: Secure and lightweight RFID authentication protocol for Medical IoT [J].
Aghili, Seyed Farhad ;
Mala, Hamid ;
Kaliyar, Pallavi ;
Conti, Mauro .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 101 :621-634
[4]   LACO: Lightweight Three-Factor Authentication, Access Control and Ownership Transfer Scheme for E-Health Systems in IoT [J].
Aghili, Seyed Farhad ;
Mala, Hamid ;
Shojafar, Mohammad ;
Peris-Lopez, Pedro .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 96 :410-424
[5]   CAB-IoT: Continuous authentication architecture based on Blockchain for internet of things [J].
Al-Naji, Fatimah Hussain ;
Zagrouba, Rachid .
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (06) :2497-2514
[6]   A survey on continuous authentication methods in Internet of Things environment [J].
Al-Naji, Fatimah Hussain ;
Zagrouba, Rachid .
COMPUTER COMMUNICATIONS, 2020, 163 :109-133
[7]  
Albalawi A., 2019, 2019 INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCES (ICCIS), P1, DOI 10.1109/ICCISci.2019.8716401
[8]   An enhanced three factor based authentication protocol using wireless medical sensor networks for healthcare monitoring [J].
Ali R. ;
Pal A.K. ;
Kumari S. ;
Sangaiah A.K. ;
Li X. ;
Wu F. .
Journal of Ambient Intelligence and Humanized Computing, 2024, 15 (01) :1165-1186
[9]   Cryptanalysis and Biometric-Based Enhancement of a Remote User Authentication Scheme for E-Healthcare System [J].
Ali, Rifaqat ;
Pal, Arup Kumar .
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2018, 43 (12) :7837-7852
[10]   EPPDA: An Efficient and Privacy-Preserving Data Aggregation Scheme with Authentication and Authorization for IoT-Based Healthcare Applications [J].
Almalki, Faris A. ;
Soufiene, Ben Othman .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021