Cargando…

A Survey of Authentication in Internet of Things-Enabled Healthcare Systems

The Internet of medical things (IoMT) provides an ecosystem in which to connect humans, devices, sensors, and systems and improve healthcare services through modern technologies. The IoMT has been around for quite some time, and many architectures/systems have been proposed to exploit its true poten...

Descripción completa

Detalles Bibliográficos
Autores principales: Khan, Mudassar Ali, Din, Ikram Ud, Majali, Tha’er, Kim, Byung-Seo
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9738756/
https://www.ncbi.nlm.nih.gov/pubmed/36501799
http://dx.doi.org/10.3390/s22239089
_version_ 1784847628053250048
author Khan, Mudassar Ali
Din, Ikram Ud
Majali, Tha’er
Kim, Byung-Seo
author_facet Khan, Mudassar Ali
Din, Ikram Ud
Majali, Tha’er
Kim, Byung-Seo
author_sort Khan, Mudassar Ali
collection PubMed
description The Internet of medical things (IoMT) provides an ecosystem in which to connect humans, devices, sensors, and systems and improve healthcare services through modern technologies. The IoMT has been around for quite some time, and many architectures/systems have been proposed to exploit its true potential. Healthcare through the Internet of things (IoT) is envisioned to be efficient, accessible, and secure in all possible ways. Even though the personalized health service through IoT is not limited to time or location, many associated challenges have emerged at an exponential pace. With the rapid shift toward IoT-enabled healthcare systems, there is an extensive need to examine possible threats and propose countermeasures. Authentication is one of the key processes in a system’s security, where an individual, device, or another system is validated for its identity. This survey explores authentication techniques proposed for IoT-enabled healthcare systems. The exploration of the literature is categorized with respect to the technology deployment region, as in cloud, fog, and edge. A taxonomy of attacks, comprehensive analysis, and comparison of existing authentication techniques opens up possible future directions and paves the road ahead.
format Online
Article
Text
id pubmed-9738756
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-97387562022-12-11 A Survey of Authentication in Internet of Things-Enabled Healthcare Systems Khan, Mudassar Ali Din, Ikram Ud Majali, Tha’er Kim, Byung-Seo Sensors (Basel) Review The Internet of medical things (IoMT) provides an ecosystem in which to connect humans, devices, sensors, and systems and improve healthcare services through modern technologies. The IoMT has been around for quite some time, and many architectures/systems have been proposed to exploit its true potential. Healthcare through the Internet of things (IoT) is envisioned to be efficient, accessible, and secure in all possible ways. Even though the personalized health service through IoT is not limited to time or location, many associated challenges have emerged at an exponential pace. With the rapid shift toward IoT-enabled healthcare systems, there is an extensive need to examine possible threats and propose countermeasures. Authentication is one of the key processes in a system’s security, where an individual, device, or another system is validated for its identity. This survey explores authentication techniques proposed for IoT-enabled healthcare systems. The exploration of the literature is categorized with respect to the technology deployment region, as in cloud, fog, and edge. A taxonomy of attacks, comprehensive analysis, and comparison of existing authentication techniques opens up possible future directions and paves the road ahead. MDPI 2022-11-23 /pmc/articles/PMC9738756/ /pubmed/36501799 http://dx.doi.org/10.3390/s22239089 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Review
Khan, Mudassar Ali
Din, Ikram Ud
Majali, Tha’er
Kim, Byung-Seo
A Survey of Authentication in Internet of Things-Enabled Healthcare Systems
title A Survey of Authentication in Internet of Things-Enabled Healthcare Systems
title_full A Survey of Authentication in Internet of Things-Enabled Healthcare Systems
title_fullStr A Survey of Authentication in Internet of Things-Enabled Healthcare Systems
title_full_unstemmed A Survey of Authentication in Internet of Things-Enabled Healthcare Systems
title_short A Survey of Authentication in Internet of Things-Enabled Healthcare Systems
title_sort survey of authentication in internet of things-enabled healthcare systems
topic Review
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9738756/
https://www.ncbi.nlm.nih.gov/pubmed/36501799
http://dx.doi.org/10.3390/s22239089
work_keys_str_mv AT khanmudassarali asurveyofauthenticationininternetofthingsenabledhealthcaresystems
AT dinikramud asurveyofauthenticationininternetofthingsenabledhealthcaresystems
AT majalithaer asurveyofauthenticationininternetofthingsenabledhealthcaresystems
AT kimbyungseo asurveyofauthenticationininternetofthingsenabledhealthcaresystems
AT khanmudassarali surveyofauthenticationininternetofthingsenabledhealthcaresystems
AT dinikramud surveyofauthenticationininternetofthingsenabledhealthcaresystems
AT majalithaer surveyofauthenticationininternetofthingsenabledhealthcaresystems
AT kimbyungseo surveyofauthenticationininternetofthingsenabledhealthcaresystems