Cargando…
A Survey of Authentication in Internet of Things-Enabled Healthcare Systems
The Internet of medical things (IoMT) provides an ecosystem in which to connect humans, devices, sensors, and systems and improve healthcare services through modern technologies. The IoMT has been around for quite some time, and many architectures/systems have been proposed to exploit its true poten...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9738756/ https://www.ncbi.nlm.nih.gov/pubmed/36501799 http://dx.doi.org/10.3390/s22239089 |
_version_ | 1784847628053250048 |
---|---|
author | Khan, Mudassar Ali Din, Ikram Ud Majali, Tha’er Kim, Byung-Seo |
author_facet | Khan, Mudassar Ali Din, Ikram Ud Majali, Tha’er Kim, Byung-Seo |
author_sort | Khan, Mudassar Ali |
collection | PubMed |
description | The Internet of medical things (IoMT) provides an ecosystem in which to connect humans, devices, sensors, and systems and improve healthcare services through modern technologies. The IoMT has been around for quite some time, and many architectures/systems have been proposed to exploit its true potential. Healthcare through the Internet of things (IoT) is envisioned to be efficient, accessible, and secure in all possible ways. Even though the personalized health service through IoT is not limited to time or location, many associated challenges have emerged at an exponential pace. With the rapid shift toward IoT-enabled healthcare systems, there is an extensive need to examine possible threats and propose countermeasures. Authentication is one of the key processes in a system’s security, where an individual, device, or another system is validated for its identity. This survey explores authentication techniques proposed for IoT-enabled healthcare systems. The exploration of the literature is categorized with respect to the technology deployment region, as in cloud, fog, and edge. A taxonomy of attacks, comprehensive analysis, and comparison of existing authentication techniques opens up possible future directions and paves the road ahead. |
format | Online Article Text |
id | pubmed-9738756 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-97387562022-12-11 A Survey of Authentication in Internet of Things-Enabled Healthcare Systems Khan, Mudassar Ali Din, Ikram Ud Majali, Tha’er Kim, Byung-Seo Sensors (Basel) Review The Internet of medical things (IoMT) provides an ecosystem in which to connect humans, devices, sensors, and systems and improve healthcare services through modern technologies. The IoMT has been around for quite some time, and many architectures/systems have been proposed to exploit its true potential. Healthcare through the Internet of things (IoT) is envisioned to be efficient, accessible, and secure in all possible ways. Even though the personalized health service through IoT is not limited to time or location, many associated challenges have emerged at an exponential pace. With the rapid shift toward IoT-enabled healthcare systems, there is an extensive need to examine possible threats and propose countermeasures. Authentication is one of the key processes in a system’s security, where an individual, device, or another system is validated for its identity. This survey explores authentication techniques proposed for IoT-enabled healthcare systems. The exploration of the literature is categorized with respect to the technology deployment region, as in cloud, fog, and edge. A taxonomy of attacks, comprehensive analysis, and comparison of existing authentication techniques opens up possible future directions and paves the road ahead. MDPI 2022-11-23 /pmc/articles/PMC9738756/ /pubmed/36501799 http://dx.doi.org/10.3390/s22239089 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Review Khan, Mudassar Ali Din, Ikram Ud Majali, Tha’er Kim, Byung-Seo A Survey of Authentication in Internet of Things-Enabled Healthcare Systems |
title | A Survey of Authentication in Internet of Things-Enabled Healthcare Systems |
title_full | A Survey of Authentication in Internet of Things-Enabled Healthcare Systems |
title_fullStr | A Survey of Authentication in Internet of Things-Enabled Healthcare Systems |
title_full_unstemmed | A Survey of Authentication in Internet of Things-Enabled Healthcare Systems |
title_short | A Survey of Authentication in Internet of Things-Enabled Healthcare Systems |
title_sort | survey of authentication in internet of things-enabled healthcare systems |
topic | Review |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9738756/ https://www.ncbi.nlm.nih.gov/pubmed/36501799 http://dx.doi.org/10.3390/s22239089 |
work_keys_str_mv | AT khanmudassarali asurveyofauthenticationininternetofthingsenabledhealthcaresystems AT dinikramud asurveyofauthenticationininternetofthingsenabledhealthcaresystems AT majalithaer asurveyofauthenticationininternetofthingsenabledhealthcaresystems AT kimbyungseo asurveyofauthenticationininternetofthingsenabledhealthcaresystems AT khanmudassarali surveyofauthenticationininternetofthingsenabledhealthcaresystems AT dinikramud surveyofauthenticationininternetofthingsenabledhealthcaresystems AT majalithaer surveyofauthenticationininternetofthingsenabledhealthcaresystems AT kimbyungseo surveyofauthenticationininternetofthingsenabledhealthcaresystems |