A Survey of Authentication in Internet of Things-Enabled Healthcare Systems
Abstract
:1. Introduction
2. Fundamentals of Internet of Things-Enabled Healthcare Systems
2.1. Internet of Things
2.2. Internet of Things-Enabled Healthcare Systems
- Control over medication and equipment: Although not restricting the scope within a healthcare infrastructure, the IoT empowers the management and control over medication [62] and medical sensory equipment [63]. Continuous as well as real-time monitoring [64] and control of production units [65] can help such automated industries keep up with the challenges faced while meeting end users’ expectations.
- Health data management: It is a fact that in healthcare environmental spaces, such as hospitals, record generation takes place continuously. Though digital systems that help control healthcare infrastructure have been used for a couple of decades, many advancements, including the IoT, can further benefit mankind tremendously [66]. In an IoT-enabled infrastructure, the following tasks are given importance: management of data of patients [67], emergency management [68,69], management of inventory [70,71,72], resource scheduling [73], error prevention [74,75], etc.
- Medical administration and telemedicine: Administration of medical practice and consultation specifically had been limited within hospitals ensuring the physical presence of patients. Covid-19 has made us learn many lessons, including preparedness and remote treatments. Fortunately, with IoT, remote consultation is efficient [76,77,78], and sensory devices play an important role in the recognition of vitals and symptoms [79]. Over the last two years, many e-health systems have been launched to provide proper care to patients across the globe [80,81].
2.3. Security Risks and Attacks
3. Literature Review
3.1. Cloud-Based Authentication Frameworks for Patient Monitoring
3.1.1. Client-Based User Authentication Agent (CUA)
3.1.2. Modified Diffie–Hellman Agent (MDHA)
3.2. Fog-Based Authentication Frameworks for Patient Monitoring
3.3. Edge-Based Authentication Frameworks for Patient Monitoring
3.4. Comparison with Other Surveys
4. Key Findings
4.1. Lessons Learned
4.2. The Road Ahead
- Use of cryptographic keys is found to be abundant in security architectures; still, very little work is performed in creating, managing, and moving such keys in resource constraint environments. Moreover, trusted platform module (TPM) or similar hardware-based solutions may be utilized on various levels of IoT to provide secure utilization of keys.
- In the context of the IoT in general, usability and interfacing of its various layers is compelled to be kept very limited. Usable privacy and security with the help of modern UI/UX standards can help make many efficient solutions. It has also been observed that the end user has been neglected during the creation of specialized solutions, creating a gap in usability and utility in security standards.
- End-to-end authentication of users has yet to be explored, keeping IoT infrastructures and limited resource availability in context. Moreover, the perspective of provision of security standards, authentication in specific, has been limited to a certain number of security threats, and many other attacks may also be given importance, such as cloning attacks, node compromise issues, desynchronization attacks, and masquerading problems, etc.
- Authentication techniques may also be revised to provide better security and privacy to different types of end users of the IoT. It has been observed that the process of revamping of security standards, specifically authentication techniques, improves the security of the platform, which is not compromised easily, and the end user stays interested in keeping itself secure and updated. Keeping in view the limitations and strengths of different types of specialized IoTs, end-to-end user authentication may also be improved.
5. Conclusions
Author Contributions
Funding
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Roy, M.; Chowdhury, C.; Aslam, N. Designing transmission strategies for enhancing communications in medical IoT using Markov decision process. Sensors 2018, 18, 4450. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Vishnu, S.; Ramson, S.J.; Jegan, R. Internet of medical things (IoMT)-An overview. In Proceedings of the 2020 5th International Conference on Devices, Circuits and Systems (ICDCS), Coimbatore, India, 5–6 March 2020; pp. 101–104. [Google Scholar]
- Qureshi, F.; Krishnan, S. Wearable hardware design for the internet of medical things (IoMT). Sensors 2018, 18, 3812. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- AlShorman, O.; AlShorman, B.; Alkhassaweneh, M.; Alkahtani, F. A review of internet of medical things (IoMT)-based remote health monitoring through wearable sensors: A case study for diabetic patients. Indones. J. Electr. Eng. Comput. Sci. 2020, 20, 414–422. [Google Scholar] [CrossRef]
- Kelly, J.T.; Campbell, K.L.; Gong, E.; Scuffham, P. The Internet of Things: Impact and implications for health care delivery. J. Med. Internet Res. 2020, 22, e20135. [Google Scholar] [CrossRef] [PubMed]
- Rayan, R.A.; Tsagkaris, C.; Papazoglou, A.S.; Moysidis, D.V. The Internet of Medical Things for Monitoring Health. In Internet of Things; CRC Press: Boca Raton, FL, USA, 2022; pp. 213–228. [Google Scholar]
- Arora, S. IoMT (Internet of Medical Things): Reducing cost while improving patient care. IEEE Pulse 2020, 11, 24–27. [Google Scholar] [CrossRef] [PubMed]
- Ahmadi, H.; Arji, G.; Shahmoradi, L.; Safdari, R.; Nishi, M.; Alizadeh, M. The application of Internet of things in healthcare: A systematic literature review and classification. Univers. Access Inf. Soc. 2019, 18, 837–869. [Google Scholar] [CrossRef]
- Tun, S.Y.Y.; Madanian, S.; Mirza, F. Internet of things (IoT) applications for elderly care: A reflective review. Aging Clin. Exp. Res. 2021, 33, 855–867. [Google Scholar] [CrossRef] [PubMed]
- Kinsella, K.; He, W. An Aging World: 2008, International Population Reports; U.S. Department of Health and Human Services & U.S. Department of Commerce: Washington, DC, USA, 2009. [Google Scholar]
- Hasan, K.; Biswas, K.; Ahmed, K.; Nafi, N.S.; Islam, M.S. A comprehensive review of wireless body area network. J. Netw. Comput. Appl. 2019, 143, 178–198. [Google Scholar] [CrossRef]
- Ali, S.; Singh, R.P.; Javaid, M.; Haleem, A.; Pasricha, H.; Suman, R.; Karloopia, J. A review of the role of smart wireless medical sensor network in COVID-19. J. Ind. Integr. Manag. 2020, 5, 413–425. [Google Scholar] [CrossRef]
- Khan, R.A.; Pathan, A.S.K. The state-of-the-art wireless body area sensor networks: A survey. Int. J. Distrib. Sens. Netw. 2018, 14. [Google Scholar] [CrossRef]
- Kris, D.; Nakas, C.; Vomvas, D.; Koulouras, G. Applications of wireless sensor networks: An up-to-date survey. Appl. Syst. Innov. 2020, 3, 14. [Google Scholar]
- Sinha, A.; Singh, S. Detailed Analysis of Medical IoT Using Wireless Body Sensor Network and Application of IoT in Healthcare. In Human Communication Technology: Internet of Robotic Things and Ubiquitous Computing; Wiley: New York, NY, USA, 2021; pp. 401–434. [Google Scholar]
- Ray, P.P.; Dash, D.; Kumar, N. Sensors for internet of medical things: State-of-the-art, security and privacy issues, challenges and future directions. Comput. Commun. 2020, 160, 111–131. [Google Scholar] [CrossRef]
- Karthick, R.; Ramkumar, R.; Akram, M.; Kumar, M.V. Overcome the challenges in bio-medical instruments using IOT—A review. Mater. Today Proc. 2021, 45, 1614–1619. [Google Scholar] [CrossRef]
- Al-Turjman, F.; Nawaz, M.H.; Ulusar, U.D. Intelligence in the Internet of Medical Things era: A systematic review of current and future trends. Comput. Commun. 2020, 150, 644–660. [Google Scholar] [CrossRef]
- Paul, A.; Jeyaraj, R. Internet of Things: A primer. Hum. Behav. Emerg. Technol. 2019, 1, 37–47. [Google Scholar] [CrossRef] [Green Version]
- Alizadeh, M.; Shaker, G.; De Almeida, J.C.M.; Morita, P.P.; Safavi-Naeini, S. Remote monitoring of human vital signs using mm-wave FMCW radar. IEEE Access 2019, 7, 54958–54968. [Google Scholar] [CrossRef]
- Kebe, M.; Gadhafi, R.; Mohammad, B.; Sanduleanu, M.; Saleh, H.; Al-Qutayri, M. Human vital signs detection methods and potential using radars: A review. Sensors 2020, 20, 1454. [Google Scholar] [CrossRef] [Green Version]
- Kumar, P.; Lee, H.J. Security issues in healthcare applications using wireless medical sensor networks: A survey. Sensors 2012, 12, 55–91. [Google Scholar] [CrossRef] [Green Version]
- Grammatikis, P.I.R.; Sarigiannidis, P.G.; Moscholios, I.D. Securing the Internet of Things: Challenges, threats and solutions. Internet Things 2019, 5, 41–70. [Google Scholar] [CrossRef]
- Nižetić, S.; Šolić, P.; González-de, D.L.D.I.; Patrono, L. Internet of Things (IoT): Opportunities, issues and challenges towards a smart and sustainable future. J. Clean. Prod. 2020, 274, 122877. [Google Scholar] [CrossRef]
- Manogaran, G.; Chilamkurti, N.; Hsu, C.H. Emerging trends, issues, and challenges in Internet of Medical Things and wireless networks. Pers. Ubiquitous Comput. 2018, 22, 879–882. [Google Scholar] [CrossRef]
- Hatzivasilis, G.; Soultatos, O.; Ioannidis, S.; Verikoukis, C.; Demetriou, G.; Tsatsoulis, C. Review of security and privacy for the Internet of Medical Things (IoMT). In Proceedings of the 2019 15th International Conference on Distributed Computing in Sensor Systems (DCOSS), Santorini, Greece, 29–31 May 2019; pp. 457–464. [Google Scholar]
- Da Xu, L.; He, W.; Li, S. Internet of things in industries: A survey. IEEE Trans. Ind. Inform. 2014, 10, 2233–2243. [Google Scholar]
- Pierleoni, P.; Concetti, R.; Belli, A.; Palma, L. Amazon, Google and Microsoft solutions for IoT: Architectures and a performance comparison. IEEE Access 2019, 8, 5455–5470. [Google Scholar] [CrossRef]
- Ucuz, D. Comparison of the IoT platform vendors, microsoft Azure, Amazon web services, and Google cloud, from users’ perspectives. In Proceedings of the 2020 8th International Symposium on Digital Forensics and Security (ISDFS), Beirut, Lebanon, 1–2 June 2020; pp. 1–4. [Google Scholar]
- Bakhshi, Z.; Balador, A.; Mustafa, J. Industrial IoT security threats and concerns by considering Cisco and Microsoft IoT reference models. In Proceedings of the 2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW), Barcelona, Spain, 15–18 April 2018; pp. 173–178. [Google Scholar]
- Dohr, A.; Modre-Opsrian, R.; Drobics, M.; Hayn, D.; Schreier, G. The internet of things for ambient assisted living. In Proceedings of the 2010 Seventh International Conference on Information Technology: New Generations, Las Vegas, NV, USA, 12–14 April 2010; pp. 804–809. [Google Scholar]
- Ashton, K. That ‘internet of things’ thing. RFID J. 2009, 22, 97–114. [Google Scholar]
- Kumar, S.; Tiwari, P.; Zymbler, M. Internet of Things is a revolutionary approach for future technology enhancement: A review. J. Big Data 2019, 6, 111. [Google Scholar] [CrossRef] [Green Version]
- Srinivasan, C.R.; Rajesh, B.; Saikalyan, P.; Premsagar, K.; Yadav, E.S. A review on the different types of Internet of Things (IoT). J. Adv. Res. Dyn. Control Syst. 2019, 11, 154–158. [Google Scholar]
- Cisco Systems Inc. Internet of Things at a Glance. Available online: https://emarsonindia.com/wp-content/uploads/2020/02/Internet-of-Things.pdf (accessed on 22 November 2022).
- IDC Corporate USA. Worldwide Internet of Things Spending Guide. Available online: https://www.idc.com/getdoc.jsp?containerId=IDC_P29475 (accessed on 22 November 2022).
- Stojkoska, B.L.R.; Trivodaliev, K.V. A review of Internet of Things for smart home: Challenges and solutions. J. Clean. Prod. 2017, 140, 1454–1464. [Google Scholar] [CrossRef]
- Ghayvat, H.; Liu, J.; Babu, A.; Alahi, E.E.; Gui, X.; Mukhopadhyay, S.C. Internet of Things for smart homes and buildings: Opportunities and Challenges. J. Telecommun. Digit. Econ. 2015, 3, 33–47. [Google Scholar] [CrossRef]
- Zanella, A.; Bui, N.; Castellani, A.; Vangelista, L.; Zorzi, M. Internet of things for smart cities. IEEE Internet Things J. 2014, 1, 22–32. [Google Scholar] [CrossRef]
- Alavi, A.H.; Jiao, P.; Buttlar, W.G.; Lajnef, N. Internet of Things-enabled smart cities: State-of-the-art and future trends. Measurement 2018, 129, 589–606. [Google Scholar] [CrossRef]
- Lai, K.L.; Chen, J.I.Z.; Zong, J.I. Development of smart cities with fog computing and internet of things. J. Ubiquitous Comput. Commun. Technol. (UCCT) 2021, 3, 52–60. [Google Scholar]
- Malik, P.K.; Sharma, R.; Singh, R.; Gehlot, A.; Satapathy, S.C.; Alnumay, W.S.; Pelusi, D.; Ghosh, U.; Nayak, J. Industrial Internet of Things and its applications in industry 4.0: State of the art. Comput. Commun. 2021, 166, 125–139. [Google Scholar] [CrossRef]
- Sisinni, E.; Saifullah, A.; Han, S.; Jennehag, U.; Gidlund, M. Industrial internet of things: Challenges, opportunities, and directions. IEEE Trans. Ind. Inform. 2018, 14, 4724–4734. [Google Scholar] [CrossRef]
- Khan, W.Z.; Rehman, M.H.; Zangoti, H.M.; Afzal, M.K.; Armi, N.; Salah, K. Industrial internet of things: Recent advances, enabling technologies and open challenges. Comput. Electr. Eng. 2020, 81, 106522. [Google Scholar] [CrossRef]
- Kim, W.S.; Lee, W.S.; Kim, Y.J. A review of the applications of the internet of things (IoT) for agricultural automation. J. Biosyst. Eng. 2020, 45, 385–400. [Google Scholar] [CrossRef]
- Salam, A. Internet of things in agricultural innovation and security. In Internet of Things for Sustainable Community Development; Springer: Cham, Switerland, 2020; pp. 71–112. [Google Scholar]
- Ojha, T.; Misra, S.; Raghuwanshi, N.S. Internet of things for agricultural applications: The state of the art. IEEE Internet Things J. 2021, 8, 10973–10997. [Google Scholar] [CrossRef]
- Bai, B.; Nazir, S.; Bai, Y.; Anees, A. Security and provenance for Internet of Health Things: A systematic literature review. J. Software Evol. Process. 2021, 33, e2335. [Google Scholar] [CrossRef]
- Zaman, U.; Mehmood, F.; Iqbal, N.; Kim, J.; Ibrahim, M. Towards Secure and Intelligent Internet of Health Things: A Survey of Enabling Technologies and Applications. Electronics 2022, 11, 1893. [Google Scholar] [CrossRef]
- Fantin Irudaya Raj, E.; Appadurai, M. Internet of Things-Based Smart Transportation System for Smart Cities. In Intelligent Systems for Social Good; Springer: Singapore, 2022; pp. 39–50. [Google Scholar]
- Sharma, A.; Battula, R.B. The Internet of Things Solutions for Transportation. In AI and IoT for Sustainable Development in Emerging Countries; Springer: Cham, Switerland, 2022; pp. 291–324. [Google Scholar]
- Jan, B.; Farman, H.; Khan, M.; Talha, M.; Din, I.U. Designing a smart transportation system: An internet of things and big data approach. IEEE Wirel. Commun. 2019, 26, 73–79. [Google Scholar] [CrossRef]
- Manavalan, E.; Jayakrishna, K. A review of Internet of Things (IoT) embedded sustainable supply chain for industry 4.0 requirements. Comput. Ind. Eng. 2019, 127, 925–953. [Google Scholar] [CrossRef]
- Ghasempour, A. Internet of things in smart grid: Architecture, applications, services, key technologies, and challenges. Inventions 2019, 4, 22. [Google Scholar] [CrossRef] [Green Version]
- Caro, F.; Sadr, R. The Internet of Things (IoT) in retail: Bridging supply and demand. Bus. Horizons 2019, 62, 47–54. [Google Scholar] [CrossRef] [Green Version]
- Priyan, M.K.; Devi, G.U. A survey on internet of vehicles: Applications, technologies, challenges and opportunities. Int. J. Adv. Intell. Paradig. 2019, 12, 98–119. [Google Scholar] [CrossRef]
- Gbadamosi, A.Q.; Oyedele, L.; Mahamadu, A.M.; Kusimo, H.; Olawale, O. The role of internet of things in delivering smart construction. In Proceedings of the CIB World Building Congress 2019, Hong Kong, China, 17–21 June 2019. [Google Scholar]
- Car, T.; Stifanich, L.P.; Šimunić, M. Internet of things (iot) in tourism and hospitality: Opportunities and challenges. Tour. South East Eur. 2019, 5, 163–175. [Google Scholar]
- Karako, K.; Song, P.; Chen, Y.; Tang, W. Increasing demand for point-of-care testing and the potential to incorporate the Internet of medical things in an integrated health management system. BioScience Trends 2022, 16, 4–6. [Google Scholar] [CrossRef]
- Naresh, V.S.; Pericherla, S.S.; Murty, P.S.R.; Sivaranjani, R. Internet of Things in Healthcare: Architecture, Applications, Challenges, and Solutions. Comput. Syst. Sci. Eng. 2020, 35, 411–421. [Google Scholar] [CrossRef]
- Morgan, V.; Birtus, M.; Zauskova, A. Medical internet of Things-based Healthcare Systems, wearable biometric sensors, and personalized clinical care in remotely monitoring and caring for confirmed or suspected COVID-19 patients. Am. J. Med Res. 2021, 8, 81–90. [Google Scholar]
- Reddy, M.A.; Pradhan, B.K.; Qureshi, D.; Pal, S.K.; Pal, K. Internet-of-things-enabled dual-channel iontophoretic drug delivery system for elderly patient medication management. J. Med. Devices 2020, 14, 011104. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Latif, G.; Shankar, A.; Alghazo, J.M.; Kalyanasundaram, V.; Boopathi, C.S.; Arfan Jaffar, M. I-CARES: Advancing health diagnosis and medication through IoT. Wirel. Netw. 2020, 26, 2375–2389. [Google Scholar] [CrossRef]
- Kang, M.; Park, E.; Cho, B.H.; Lee, K.S. Recent patient health monitoring platforms incorporating internet of things-enabled smart devices. Int. Neurourol. J. 2018, 22 (Suppl. 2), S76. [Google Scholar] [CrossRef] [Green Version]
- Ashima, R.; Haleem, A.; Bahl, S.; Javaid, M.; Mahla, S.K.; Singh, S. Automation and manufacturing of smart materials in Additive Manufacturing technologies using Internet of Things towards the adoption of Industry 4.0. Mater. Today Proc. 2021, 45, 5081–5088. [Google Scholar] [CrossRef]
- Ismail, L.; Materwala, H.; Karduck, A.P.; Adem, A. Requirements of health data management systems for biomedical care and research: Scoping review. J. Med. Internet Res. 2020, 22, e17508. [Google Scholar] [CrossRef] [PubMed]
- Setiawan, R.; Budiman, F.; Basori, W.I. Stress diagnostic system and digital medical record based on Internet of Things. In Proceedings of the 2019 International Seminar on Intelligent Technology and Its Applications (ISITIA), Surabaya, Indonesia, 28–29 August 2019; pp. 348–353. [Google Scholar]
- Feng, Y.; Pan, Z. Optimization of remote public medical emergency management system with low delay based on internet of things. J. Healthc. Eng. 2021, 2021, 5570500. [Google Scholar] [CrossRef] [PubMed]
- Rathore, M.M.; Ahmad, A.; Paul, A. The Internet of Things based medical emergency management using Hadoop ecosystem. In Proceedings of the 2015 IEEE SENSORS, Busan, Republic of Korea, 1–4 November 2015; pp. 1–4. [Google Scholar]
- Yerpude, S.; Singhal, T.K. Smart warehouse with internet of things supported inventory management system. Int. J. Pure Appl. Math. 2018, 118, 1–15. [Google Scholar]
- Mathaba, S.; Adigun, M.; Oladosu, J.; Oki, O. On the use of the Internet of Things and Web 2.0 in inventory management. J. Intell. Fuzzy Syst. 2017, 32, 3091–3101. [Google Scholar] [CrossRef]
- Velasco, J.; Alberto, L.; Ambatali, H.D.; Canilang, M.; Daria, V.; Liwanag, J.B.; Madrigal, G.A. Internet of things-based (IoT) inventory monitoring refrigerator using arduino sensor network. arXiv 2019, arXiv:1911.11265. [Google Scholar] [CrossRef] [Green Version]
- Qiu, T.; Qiao, R.; Wu, D.O. EABS: An event-aware backpressure scheduling scheme for emergency Internet of Things. IEEE Trans. Mob. Comput. 2017, 17, 72–84. [Google Scholar] [CrossRef]
- Yaacoub, J.P.A.; Noura, M.; Noura, H.N.; Salman, O.; Yaacoub, E.; Couturier, R.; Chehab, A. Securing internet of medical things systems: Limitations, issues and recommendations. Future Gener. Comput. Syst. 2020, 105, 581–606. [Google Scholar] [CrossRef]
- Abbas, A.; Alroobaea, R.; Krichen, M.; Rubaiee, S.; Vimal, S.; Almansour, F.M. Blockchain-assisted secured data management framework for health information analysis based on Internet of Medical Things. Pers. Ubiquitous Comput. 2021, 1–14. [Google Scholar] [CrossRef]
- Marwah, K.; Hajati, F. A Survey on Internet of Things in Telehealth. In Proceedings of the Conference on Complex, Intelligent, and Software Intensive Systems, Asan, Republic of Korea, 1–3 July 2021; Springer: Cham, Switerland, 2021; pp. 235–248. [Google Scholar]
- Mendes, D.; Jorge, D.; Pires, G.; Panda, R.; António, R.; Dias, P.; Oliveira, L. VITASENIOR-MT: A distributed and scalable cloud-based telehealth solution. In Proceedings of the 2019 IEEE 5th World Forum on Internet of Things (WF-IoT), Limerick, Ireland, 15–18 April 2019; pp. 767–772. [Google Scholar]
- Emokpae, L.E.; Emokpae, R.N.; Lalouani, W.; Younis, M. Smart multimodal telehealth-IoT system for COVID-19 patients. IEEE Pervasive Comput. 2021, 20, 73–80. [Google Scholar] [CrossRef]
- Albahri, A.S.; Alwan, J.K.; Taha, Z.K.; Ismail, S.F.; Hamid, R.A.; Zaidan, A.A.; Albahri, O.S.; Zaidan, B.B.; Alamoodi, A.H.; Alsalem, M.A. IoT-based telemedicine for disease prevention and health promotion: State-of-the-Art. J. Netw. Comput. Appl. 2021, 173, 102873. [Google Scholar] [CrossRef]
- Bayo-Monton, J.L.; Martinez-Millana, A.; Han, W.; Fernandez-Llatas, C.; Sun, Y.; Traver, V. Wearable sensors integrated with Internet of Things for advancing eHealth care. Sensors 2018, 18, 1851. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Amira, A.; Agoulmine, N.; Bensaali, F.; Bermak, A.; Dimitrakopoulos, G. Empowering eHealth with smart internet of things (IoT) medical devices. J. Sens. Actuator Netw. 2019, 8, 33. [Google Scholar] [CrossRef] [Green Version]
- Chanal, P.M.; Kakkasageri, M.S. Security and privacy in IOT: A survey. Wirel. Pers. Commun. 2020, 115, 1667–1693. [Google Scholar] [CrossRef]
- Hassija, V.; Chamola, V.; Saxena, V.; Jain, D.; Goyal, P.; Sikdar, B. A survey on IoT security: Application areas, security threats, and solution architectures. IEEE Access 2019, 7, 82721–82743. [Google Scholar] [CrossRef]
- Khanam, S.; Ahmedy, I.B.; Idris, M.Y.I.; Jaward, M.H.; Sabri, A.Q.B.M. A Survey of Security Challenges, Attacks Taxonomy and Advanced Countermeasures in the Internet of Things. IEEE Access 2020, 8, 219709–219743. [Google Scholar] [CrossRef]
- Abosata, N.; Al-Rubaye, S.; Inalhan, G.; Emmanouilidis, C. Internet of things for system integrity: A comprehensive survey on security, attacks and countermeasures for industrial applications. Sensors 2021, 21, 3654. [Google Scholar] [CrossRef]
- Ghubaish, A.; Salman, T.; Zolanvari, M.; Unal, D.; Al-Ali, A.; Jain, R. Recent advances in the internet-of-medical-things (IoMT) systems security. IEEE Internet Things J. 2020, 8, 8707–8718. [Google Scholar] [CrossRef]
- Chen, C.L.; Yang, T.T.; Leu, F.Y.; Huang, Y.L. Designing a healthcare authorization model based on cloud authentication. Intell. Autom. Soft Comput. 2014, 20, 65–379. [Google Scholar] [CrossRef]
- Moghaddam, F.F.; Moghaddam, S.G.; Rouzbeh, S.; Araghi, S.K.; Alibeigi, N.M.; Varnosfaderani, S.D. A scalable and efficient user authentication scheme for cloud computing environments. In Proceedings of the 2014 IEEE Region 10 Symposium, Kuala Lumpur, Malaysia, 14–16 April 2014; pp. 508–513. [Google Scholar]
- Shrestha, N.M.; Alsadoon, A.; Prasad, P.W.; Hourany, L.; Elchouemi, A. Enhanced e-health framework for security and privacy in healthcare system. In Proceedings of the 2016 Sixth International Conference on Digital Information Processing and Communications (ICDIPC), Beirut, Lebanon, 21–23 April 2016; pp. 75–79. [Google Scholar]
- Kumari, A.; Kumar, V.; Abbasi, M.Y.; Kumari, S.; Chaudhary, P.; Chen, C.M. CSEF: Cloud-Based Secure and Efficient Framework for Smart Medical System Using ECC. IEEE Access 2020, 8, 107838–107852. [Google Scholar] [CrossRef]
- Soni, P.; Pal, A.K.; Islam, S.H. An Improved Three-Factor Authentication Scheme for Patient Monitoring using WSN in Remote Health-care System. Comput. Methods Programs Biomed. 2019, 182, 105054. [Google Scholar] [CrossRef]
- Sharma, G.; Kalra, S. A Lightweight User Authentication Scheme for Cloud-IoT Based Healthcare Services. Iran J. Sci. Technol. Trans. Electr. Eng. 2019, 43, 619–636. [Google Scholar] [CrossRef]
- Sultan, N. Making use of cloud computing for healthcare provision: Opportunities and challenges. Int. J. Inf. Manag. 2014, 34, 177–184. [Google Scholar] [CrossRef]
- Allouzi, M.A.; Khan, J.I. Soter: Trust Discovery Framework for Internet of Medical Things (IoMT). In Proceedings of the 2019 IEEE 20th International Symposium on “A World of Wireless, Mobile and Multimedia Networks” (WoWMoM), Washington, DC, USA, 10–12 June 2019; pp. 1–9. [Google Scholar]
- Moosavi, S.R.; Nigussie, E.; Levorato, M.; Virtanen, S.; Isoaho, J. Performance analysis of end-to-end security schemes in healthcare IoT. Procedia Comput. Sci. 2018, 130, 432–439. [Google Scholar] [CrossRef]
- Challa, S.; Das, A.K.; Odelu, V.; Kumar, N.; Kumari, S.; Khan, M.K.; Vasilakos, A.V. An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks. Comput. Electr. Eng. 2017, 69, 534–554. [Google Scholar] [CrossRef]
- Almogren, A.; Mohiuddin, I.; Din, I.U.; Almajed, H.; Guizani, N. FTM-IoMT: Fuzzy-based Trust Management for Preventing Sybil Attacks in Internet of Medical Things. IEEE Internet Things J. 2020, 8, 4485–4497. [Google Scholar] [CrossRef]
- Kumar, R.; Tripathi, R. Towards design and implementation of security and privacy framework for Internet of Medical Things (IoMT) by leveraging blockchain and IPFS technology. J. Supercomput. 2021, 77, 7916–7955. [Google Scholar] [CrossRef]
- Klonoff, D.C. Fog computing and edge computing architectures for processing data from diabetes devices connected to the medical Internet of things. J. Diabetes Sci. Technol. 2017, 11, 647–652. [Google Scholar] [CrossRef]
- Borthakur, D.; Dubey, H.; Constant, N.; Mahler, L.; Mankodiya, K. Smart fog: Fog computing framework for unsupervised clustering analytics in wearable Internet of things. In Proceedings of the 2017 IEEE Global Conference on Signal and Information Processing (GlobalSIP), Montreal, QC, Canada, 14–16 November 2017; pp. 472–476. [Google Scholar]
- Dastjerdi, A.V.; Buyya, R. Fog computing: Helping the Internet of Things realize its potential. Computer 2016, 49, 112–116. [Google Scholar] [CrossRef]
- Engineer, M.; Tusha, R.; Shah, A.; Adhvaryu, K. Insight into the Importance of Fog Computing in Internet of Medical Things (IoMT). In Proceedings of the 2019 International Conference on Recent Advances in Energy-efficient Computing and Communication (ICRAECC), Nagercoil, India, 7–8 March 2019; pp. 1–7. [Google Scholar]
- Wang, X.; Wang, L.; Li, Y.; Gai, K. Privacy-aware efficient fine-grained data access control in Internet of medical things based fog computing. IEEE Access 2018, 6, 47657–47665. [Google Scholar] [CrossRef]
- Akrivopoulos, O.; Chatzigiannakis, I.; Tselios, C.; Antoniou, A. On the deployment of healthcare applications over fog computing infrastructure. In Proceedings of the 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC), Turin, Italy, 4–8 July 2017; Volume 2, pp. 288–293. [Google Scholar]
- Kang, J.; Fan, K.; Zhang, K.; Cheng, X.; Li, H.; Yang, Y. An ultra-lightweight and secure RFID batch authentication scheme for IoMT. Comput. Commun. 2021, 167, 48–54. [Google Scholar] [CrossRef]
- Cha, J.R.; Kim, J.H. Dynamic framed slotted ALOHA algorithms using fast tag estimation method for RFID system. In Proceedings of the CCNC 2006, 2006 3rd IEEE Consumer Communications and Networking Conference, Las Vegas, NV, USA, 8–10 January 2006; Volume 2, pp. 768–772. [Google Scholar]
- Han, T.; Zhang, L.; Pirbhulal, S.; Wu, W.; de Albuquerque, V.H.C. A novel cluster head selection technique for edge-computing based IoMT systems. Comput. Netw. 2019, 158, 114–122. [Google Scholar] [CrossRef]
- Saeed, M.E.S.; Liu, Q.Y.; Tian, G.; Gao, B.; Li, F. Remote authentication schemes for wireless body area networks based on the Internet of Things. IEEE Internet Things J. 2018, 5, 4926–4944. [Google Scholar] [CrossRef]
- Lee, J.D.; Yoon, T.S.; Chung, S.H.; Cha, H.S. Service-oriented security framework for remote medical services in the Internet of Things environment. Healthc. Inform. Res. 2015, 21, 271–282. [Google Scholar] [CrossRef] [Green Version]
- Gope, P.; Hwang, T. BSN-Care: A secure IoT-based modern healthcare system using body sensor network. IEEE Sens. J. 2015, 16, 1368–1376. [Google Scholar] [CrossRef]
- Rathore, H.; Fu, C.; Mohamed, A.; Al-Ali, A.; Du, X.; Guizani, M.; Yu, Z. Multi-layer security scheme for implantable medical devices. Neural Comput. Appl. 2018, 32, 4347–4360. [Google Scholar] [CrossRef]
- Fotouhi, M.; Bayat, M.; Das, A.K.; Far, H.A.; Pournaghi, S.M.; Doostari, M.A. A lightweight and secure two-factor authentication scheme for wireless body area networks in healthcare IoT. Comput. Netw. 2020, 177, 107333. [Google Scholar] [CrossRef]
- Mawgoud, A.A.; Karadawy, A.I.; Tawfik, B.S. A Secure Authentication Technique in Internet of Medical Things through Machine Learning. J. Contrib. 2020. [Google Scholar] [CrossRef]
- Yanambaka, V.; Mohanty, S.; Kougianos, E.; Puthal, D.; Rachakonda, L. PMsec: PUF-Based Energy-Efficient Authentication of Devices in the Internet of Medical Things (IoMT). In Proceedings of the 2019 IEEE International Symposium on Smart Electronic Systems (iSES) (Formerly iNiS), Rourkela, India, 16–18 December 2019; pp. 320–321. [Google Scholar]
- Yang, J.C.; Hao, P.A.N.G.; Zhang, X. Enhanced mutual authentication model of IoT. J. China Univ. Posts Telecommun. 2013, 20, 69–74. [Google Scholar] [CrossRef]
- Odelu, V.; Saha, S.; Prasath, R.; Sadineni, L.; Conti, M.; Jo, M. Efficient Privacy-Preserving Device Authentication in WBANs for Industrial e-Health Applications. Comput. Secur. 2019, 83, 300–312. [Google Scholar] [CrossRef]
- Amintoosi, H.; Nikooghadam, M.; Shojafar, M.; Kumari, S.; Alazab, M. Slight: A lightweight authentication scheme for smart healthcare services. Comput. Electr. Eng. 2022, 99, 107803. [Google Scholar] [CrossRef]
- Kumar, A.; Saha, R.; Conti, M.; Kumar, G.; Buchanan, W.J.; Kim, T.H. A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions. J. Netw. Comput. Appl. 2022, 204, 103414. [Google Scholar] [CrossRef]
- Sun, Y.; Lo, F.P.W.; Lo, B. Security and privacy for the Internet of medical things enabled healthcare systems: A survey. IEEE Access 2019, 7, 183339–183355. [Google Scholar] [CrossRef]
- Kashani, M.H.; Madanipour, M.; Nikravan, M.; Asghari, P.; Mahdipour, E. A systematic review of IoT in healthcare: Applications, techniques, and trends. J. Netw. Comput. Appl. 2021, 192, 103164. [Google Scholar] [CrossRef]
- Gopalan, S.S.; Raza, A.; Almobaideen, W. IoT security in healthcare using AI: A survey. In Proceedings of the 2020 International Conference on Communications, Signal Processing, and Their Applications (ICCSPA), Sharjah, United Arab Emirates, 16–18 March 2021; pp. 1–6. [Google Scholar]
- Somasundaram, R.; Thirugnanam, M. Review of security challenges in healthcare internet of things. Wirel. Netw. 2021, 27, 5503–5509. [Google Scholar] [CrossRef]
- Rajasekar, V.; Premalatha, J.; Sathya, K.; Saračević, M. Secure remote user authentication scheme on health care, IoT and cloud applications: A Multilayer Systematic Survey. Acta Polytech. Hung. 2021, 18, 87–106. [Google Scholar] [CrossRef]
- Papaioannou, M.; Karageorgou, M.; Mantas, G.; Sucasas, V.; Essop, I.; Rodriguez, J.; Lymberopoulos, D. A survey on security threats and countermeasures in Internet of medical things (IoMT). Trans. Emerg. Telecommun. Technol. 2022, 33, e4049. [Google Scholar] [CrossRef]
- Trnka, M.; Abdelfattah, A.S.; Shrestha, A.; Coffey, M.; Cerny, T. Systematic Review of Authentication and Authorization Advancements for the Internet of Things. Sensors 2022, 22, 1361. [Google Scholar] [CrossRef]
Acronym | Full Form |
---|---|
AES | Advanced Encryption Standard |
CUA | Client-based User Authentication |
CBAC | Contextual Based Access Control |
CV | Credential Vault |
DED | Data Encryption/Decryption |
DoS | Denial of Service |
DA | Device Authentication |
DACP | Dynamic Access Control Policy |
ECC | Elliptic Curve Cryptographic |
EHR | Electronic Health Record |
EMR | Electronic Medical Record |
EMR | Electronic Medical Records |
HE-RSA | Homomorphic Encryption- Rivest Shamir Adleman |
IMDs | Implantable Medical Devices |
IaaS | Infrastructure as a Service |
IMEI | International Mobile Equipment Identity |
IoMT | Internet of Medical Things |
IoT | Internet of Things |
IPFS | Interplanetary File Systems |
JPBC | Java Pairing-Based Cryptography Library |
LPU | Local Processing Unit |
MSN | Medical Sensor Network |
MDHA | Modified Diffie-Hellman Agent |
MA-EBA | Multi-Authority Encryption-Based Attribute |
PHI | Personal Health Information |
PUFs | Physical Unclonable Functions |
PaaS | Platform as a Service |
QoE | Quality of Experience |
RFID | Radio-Frequency Identification authentication |
RBAC | Role-based Access Control |
SEA | Secured and Efficient Authentication |
SPoC | Single Point of Contact |
SaaS | Software as a Service |
SSDP | Simple Service Discovery Protocol |
SEMTN | Stateless Multiparty Trust Negotiation |
TC | Trust Circles |
TN | Trust Negotiation |
TPM | Trusted Platform Module |
UA | User Authentication |
VF | Virtual Federations |
WBAN | Wireless Body Area Network |
WMSN | Wireless Medical Sensor Network |
WSN | Wireless Sensor Network |
WHO | World Health Organization |
ZKP | Zero-Knowledge-Proof |
Study | Technique Used | Attacks Overcome | Main Contributions | Limitations |
---|---|---|---|---|
[87] | Asymmetric cryptography | Offline password guessing, replay, impersonation, man-in-the-middle andinsider attacks | Cryptographic mechanisms, one-way hash function, symmetric encryption and the bit-wise exclusive-or operator are utilized to provide identity authentication and authorization through the cloud. The authors claim that authentication, integrity, privacy, and nonrepudiation issues are resolved. | At times of hurry, information that has been oversecured by encryption and digital signatures can become difficult to access. Moreover, if an adversary gets access to a patient’s mobile or impersonates the IMEI on its cell phone, it can gain access and cause damage. |
[88] | Client-based user authentication agent and modified Diffie–Hellman agent | Man-in-the-middleBrute Force Dimming | Scalable and efficient authentication technique is proposed. A cryptography agent is introduced to encrypt data before its storage | Use of multiple servers increase overall computational and communication cost. Data headers for transmission are not tagged and can cause additional overhead cost. |
[89] | Multiauthority attribute-based encryption | Man-in-the-middleEavesdroppingDOS | Advance encryption standard is used to make the data secured. It is explored how a single point of contact can assist security e-health | Very limited analysis is performed and the approach may be prone to attacks like shoulder surfing attacks, impersonation attacks, etc. |
[90] | ECC and hash function | Man-in-the-middleImpersonationNonrepudiationTraceabilityReplay | HIPAA compliant framework ‘SOTER’ is proposed which is distributed personalized authentication based on MTN. Limitations of Identity Access Control Policies are attempted to be resolved primarily. | Limited Authorization model, having only a few stages. Formal or informal security evaluation lacks. |
[91] | Multifactor mutual authentication | Reply attack, DOS, smart card loss attack, password guessing attack, etc. | An improved three-factor authentication approach is proposed specifically for the monitoring of patients remotely using WSNs. AVISPA Tool is utilized to perform formal security analysis | Communication cost is a bit high, but still, extensive evaluation has been performed. |
[92] | Hash and XOR functions, lightweight key management | Malicious user attack, replay attack, password guessing attack, insider attack, hidden server attack, spoofing attack | A lightweight user authentication scheme is proposed to validate legitimate users using Hash and XOR functions while minimizing the number of cryptographic computations. | The scheme is lightweight due to the use of computationally constrained functions; however, it lacks security against some attacks such as shoulder surfing, eavesdropping, etc. An extensive security evaluation of various platforms is not provided. |
Study | Technique Used | Attacks Overcome | Main Contributions | Limitations |
---|---|---|---|---|
[95] | ECG-based cryptographic keys and certificate-based datagram transport layer security | EavesdroppingDoSSpoofing | The study explores an efficient end-to-end user authentication scheme assisted by DTLS certificate handshaking. It also stated to provide a session resumption feature with mobility as it builds smart gateways within the network. | Proper computational and communication analysis is performed, whereas formal or informal analysis of the scheme is missing. |
[103] | Fog-based security and access-control determination algorithm | SpoofingMan-in-the-middle | This work proposes a fine-grained security, access control mechanism in specific. Reported suitable for various services like data storage, directories, and file management, while providing customized security features | Quantity of tasks is found out to be directly proportional to time complexity. Hence, in a scenario where tasks increase, time complexity will affect. |
[104] | A core IoT platform, ‘Spark’ | Insider attack | Primarily a framework is proposed comprising of layers to increase the efficiency of data transfer and throughput while providing an additional layer of security and authentication. | Through network simulations transfer of health care data such as ECG is examined. No information regarding security or privacy preservation analysis is provided. |
[105] | Dynamic framed slotted aloha and RFID | Tag-tracking attack, replay attack | An RFID batch authentication technique is presented to minimize tag costs and increase tag recognition efficiency. Furthermore, a linear homogeneous equation is utilized, and the scheme has a registration and authentication phase. | Tag anonymity and mutual authentication are provided yet lack formal evaluation of the security. Impersonation attack should have been dealt with. |
Study | Technique Used | Attacks Overcome | Main Contributions | Limitations |
---|---|---|---|---|
[109] | Dynamic adaptability to changing in security needs through access control models | Device masquerade attack, spoofing, denial of service, Reflection attack, Eavesdropping | Service-oriented structure is proposed with the support to dynamic elements of security. These elements continuously change based on medical service providing remote points and are secured by assisted roles and situation-based access controls. | Preliminary comparison and security analysis is performed with no hint of evaluation details. Formal and informal security comparison needs to be performed. |
[110] | Body sensor network-based architecture along with use of local processing unit (LPU) | Forgery attack, eavesdropping, False signal attack, Replay attack | Body sensor networks were used to propose an IoT-based healthcare system assisted by OCB to fulfill five security requirements, i.e., mutual authentication, enforcing anonymity of actors, secured localization, resistance to security attacks and data security. | Extensive computational analysis is performed compared to two BSN-based models; however, only security features are listed. The scheme may be prone to threats such as impersonation, lost key, and shoulder surfing attacks. |
[111] | Legendre approximation of ECG and multilayer perception neural model | Eavesdropping, replay, and man-in-the-middle attacks | The method of Legendre polynomial extraction is used to propose an ECG authentication technique. Multi-layer perception neural network is also utilized for learning, identification, and authentication by using ECG signals. | The possible errors in the acquisition of ECG signals are not discussed. Security analysis, other than machine learning, should be performed. |
[112] | Lightweight hash-chain-based and forward security enabled scheme for WBAN | impersonation attack, guessing attack, user/gateway forgery attack, insider attack, and DOS attack | A two-factor authentication scheme for both users and devices is proposed. ROR model is utilized for formal analysis, whereas, ProVerif is used with OPNET utilized for real-time simulation-based evaluation. | Even though a thorough analysis is performed, it seems like the cost of storage and communication is high for the proposed scheme. |
[113] | Machine learning (SVM), pseudo-random binary sequence, trust management | Impersonation attack, denial of service attack, man-in-the-middle attack | Machine learning-enabled IoMT network to provide security, trust management and to achieve efficient authentication. Key agreements and trust values are based on securing the IoT healthcare system | There is no use of cryptographic functions; moreover, the formal and informal security analysis is needed. |
Study | Title | Year | Description | Publisher |
---|---|---|---|---|
[26] | A Review of Security and Privacy in Internet of Medical Things (IoMT) | 2019 | Classification of Security aspects and protection mechanisms, (Device, Connectivity & Cloud Security), Categorization of Privacy aspects and protection mechanisms, (Private Data, Protection Mechanism, Identification & Anonymity, Data Destruction) | IEEE |
[49] | Towards Secure and Intelligent Internet of Health Things: A Survey of Enabling Technologies and Applications | 2022 | Requirements, Security Challenges, Attacks in IoT based Healthcare Systems, Enabling Technologies for Secured IoHT (Convergence of Blockchain, Machine Learning and IoT), Future Paths and limitations of Existing Solutions | MDPI |
[118] | A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions | 2022 | Classification of IoT Security parameters and objectives, Categorization of Authentication Scheme in IoTs (WSN based, IIOT based, IoMT based, VANET based, RFID based),Future directions | Elsevier |
[119] | Security and privacy for the IoMT-enabled healthcare systems: A Survey | 2019 | Systems, networks, and design challenges for IOMT, security and privacy requirements, existing security schemes, discussion and future directions | IEEE |
[120] | A systematic review of IoT in healthcare: Applications, techniques, and trends | 2021 | A systematic review leading into Comprehensive taxonomy for IoT-based healthcare systems (Sensors, Resource, Communication, Application & Security), Comparison of Analysis techniques and research objectives, Open Issues and Future directions | Elsevier |
[121] | IoT Security in Healthcare using AI - A Survey | 2021 | Security for IoT and its types (Physical and Information), Classification of Security in IoT-Healthcare (IoT Security in Healthcare, AI Security in Healthcare, IoT Security in Healthcare using AI) | IEEE |
[122] | Review of security challenges in healthcare internet of things | 2021 | Discussion about Security Issues in IoMT, Identification of Primary security risks, Risk Analysis and Impact Detection of Primary Security Threats | Springer |
[123] | Secure Remote User Authentication Scheme on Health Care, IoT and Cloud Applications | 2021 | Systematic Review resulting into categorization of Remote User Authentication, Tele-medicine Application, IoT Applications, Cloud and multi-server Applications, Possible Security Requirements and Attacks | Acta Polytechnica Hungarica |
[124] | A Survey on Security Threats and Countermeasures in Internet of Medical Things (IoMT) | 2022 | Architecture of IoMT Edge Network and its Security Objectives (Data Confidentiality, User Integrity, Non-repudiation, Authentication, Authorization, Availability), Categorization of Threats and Attacks, Countermeasures for all such security risks | Wiley |
[125] | Systematic Review of Authentication and Authorization Advancement for IoT | 2022 | Taxonomy of Authentication and Authorization Techniques for Iot (Years-based, Goals-based, Automation-based), Dominant Topologies, Communication types and Perspectives in Authorization and Authentication, Applicability of identified solutions | MDPI |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Khan, M.A.; Din, I.U.; Majali, T.; Kim, B.-S. A Survey of Authentication in Internet of Things-Enabled Healthcare Systems. Sensors 2022, 22, 9089. https://doi.org/10.3390/s22239089
Khan MA, Din IU, Majali T, Kim B-S. A Survey of Authentication in Internet of Things-Enabled Healthcare Systems. Sensors. 2022; 22(23):9089. https://doi.org/10.3390/s22239089
Chicago/Turabian StyleKhan, Mudassar Ali, Ikram Ud Din, Tha’er Majali, and Byung-Seo Kim. 2022. "A Survey of Authentication in Internet of Things-Enabled Healthcare Systems" Sensors 22, no. 23: 9089. https://doi.org/10.3390/s22239089
APA StyleKhan, M. A., Din, I. U., Majali, T., & Kim, B. -S. (2022). A Survey of Authentication in Internet of Things-Enabled Healthcare Systems. Sensors, 22(23), 9089. https://doi.org/10.3390/s22239089