Skip to main content

A review: a new authentication protocol for real-time healthcare monitoring system

Abstract

Internet of Things is a fast growing technology and a network of devices in which everything (smart objects or smart devices) are associated to the internet for effective exchange of information between these connected objects. Internet of Things (IoT) serves as a method for healthcare and acts as an essential part in broad range of real-time healthcare monitoring applications. Previous work shows networked sensor devices, either equipped on the body or embedded inside living being or a camera, make possible in gathering real-time information to evaluate physical and mental health state of the patient by collecting body temperature, blood pressure, patient’s image, etc. Communicating this collected real-time data to the doctor, making accurate assessment on the data gathered and notifying the patient is challenging task in the IoT. The architechture of Internet of Things comprises of three layers, and it is the network of devices embedded with sensor, software, and electronics, enabling this device to communicate with each other and exchange data over a computer network. The IoT-based real-time healthcare systems are highly vulnerable to cyber-attacks as the numbers of sensors are deployed in an unprotected network. These may even introduce the attacks, which cannot be monitored and controlled. This paper attempts to review the previous work done and a new scheme has been proposed, the new lightweight authentication protocol for smart real-time healthcare. The proposed scheme requires implementation with the authentication protocol. It is important to satisfy the major parameters of security: confidentiality, integrity, authentication, and access control. In this paper our focus is on the authentication of devices.

This is a preview of subscription content, access via your institution.

Fig. 1
Fig. 2
Fig. 3

References

  1. Varadharajan V, Tupakula, U, Karmakar K. (2018) Lightweight authentication mechanism and OAuth protocol for IoT devices, Draft, Technical Report TR2: ISIF ASIA Funded Project.

  2. Durairaj M, Muthuramalingam K (2018) A new authentication scheme with elliptical curve cryptography for Internet of Things (IoT) environments. Int J Eng Technol 7:119–124

    Article  Google Scholar 

  3. Zhou L, Li X, Yeh KH, Su C, Chiu W (2019) Lightweight IoT-based authentication scheme in cloud computing circumstance. Future Gen Comput Syst 91:244–251

    Article  Google Scholar 

  4. Wu ZQ, Zhou YW, Ma JF (2011) A security transmission model for Internet of Things. Chin J Comput 34:1351–1364

    Article  Google Scholar 

  5. Schmitt, C.; Noack, M.; Stiller, B. Tiny TO (2016) Two-way authentication for constrained devices in the Internet of Things. In Internet of Things; Elsevier: Amsterdam, pp. 239–258.

  6. Porambage, P.; Schmitt, C.; Kumar, P.; Gurtov, A.; Ylianttila, M. (2014) Two-phase authentication protocol for wireless sensor networks in distributed IoT applications. In Proceedings of the 2014 IEEE Wireless Communications and Networking Conference (WCNC), Istanbul, Turkey, 6–9 April 2014.

  7. Lai C, Li H, Lu R, Shen XS (2013) SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks. Comput Netw 57:3492–3510

    Article  Google Scholar 

  8. Lai C, Lu R, Zheng D, Li H, Shen XS (2016) GLARM: Group-based lightweight authentication scheme for resource-constrained machine to machine communications. Comput Netw 99:66–81

    Article  Google Scholar 

  9. Sun X, Men S, Zhao C, Zhou Z (2012) A security authentication scheme in machine-to-machine home network service. Secur Commun Netw 8:2678–2686

    Article  Google Scholar 

  10. Li Q, Cao G (2011) Multicast authentication in the smart grid with one-time signature. IEEE Trans Smart Grid 2:686–696

    Article  Google Scholar 

  11. Cespedes S, Taha S, Shen X (2013) A Multihop-Authenticated Proxy Mobile IP Scheme for Asymmetric VANETs. IEEE Trans Veh Technol 62:3271–3286

    Article  Google Scholar 

  12. Chung Y, Choi S, Lee Y, Park N, Won D (1653) An Enhanced Lightweight Anonymous Authentication Scheme for a Scalable Localization Roaming Service in Wireless Sensor Networks. Sensors 2016:16

    Google Scholar 

  13. Jan MA, Khan F, Alam M, Usman M (2019) A payload-based mutual authentication scheme for Internet of Things. Future Gen Comput Syst 92:1028–1039

    Article  Google Scholar 

  14. Kothmayr T, Schmitt C, Hu W, Brünig M, Carle G (2013) DTLS based security and two-way authentication for the Internet of Things. Ad Hoc Netw 11:2710–2723

    Article  Google Scholar 

  15. Gope P, Hwang T (2016) A realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks. IEEE Trans Ind Electron 63:7124–7132

    Article  Google Scholar 

  16. Kumar P, Lee SG, Lee HJ (1625–1647) E-SAP: Efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks. Sensors 2012:12

    Google Scholar 

  17. Das ML (2009) Two-factor user authentication in wireless sensor networks. IEEE Trans Wirel Commun 8:1086–1090

    Article  Google Scholar 

  18. Hamidi H (2019) An approach to develop the smart health using Internet of Things and authentication based on biometric technology. Future Gen Comput Syst 91:434–449

    Article  Google Scholar 

  19. Alotaibi M (2018) An enhanced symmetric cryptosystem and biometric-based anonymous user authentication and session key establishment scheme for WSN. IEEE Access 6:70072–70087

    Article  Google Scholar 

  20. Hammi MT, Hammi B, Bellot P, Serhrouchni A (2018) Bubbles of trust: a decentralized blockchain-based authentication system for IoT. Comput Secur 78:126–142

    Article  Google Scholar 

  21. Karthikeyan S, Patan R, Balamurugan B (2019) Enhancement of security in the Internet of Things (IoT) by using X.509 authentication mechanism. In Recent trends in communication, computing, and electronics. Springer, Singapore, pp 217–225

    Google Scholar 

  22. El-hajj M, Fadlallah A, Chamoun M, Serhrouchni A (2019) A survey of Internet of Things (IoT) authentication schemes. Sensors. 19:1141

    Article  Google Scholar 

  23. Almulhim M, Islam N, Zaman N (2019) A Lightweight and secure authentication scheme for IoT based E-Health applications. International Journal of Computer Science and Network Security 19(1):107–120

    Google Scholar 

  24. Martínez-Peláez R, Toral-Cruz H, Parra-Michel JR, García V, Mena LJ, Félix VG, Ochoa-Brust A (2019) An enhanced lightweight IoT-based authentication scheme in cloud computing circumstances. Sensors 19:2098

    Article  Google Scholar 

Download references

Author information

Affiliations

Authors

Corresponding author

Correspondence to Kiran Dewangan.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Author Kiran Dewangan declares that the study was approved by the Chhattisgarh Swami Vivekananda University, Bhilai (CG), and Bhilai Institute of Technology, Durg (CG), for the degree of Doctor of Philosophy in the year 2018.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Dewangan, K., Mishra, M. & Dewangan, N.K. A review: a new authentication protocol for real-time healthcare monitoring system. Ir J Med Sci 190, 927–932 (2021). https://doi.org/10.1007/s11845-020-02425-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11845-020-02425-x

Keywords

  • Authentication
  • Domain Name Server (DNS)
  • Elliptic Curve Cryptography (ECC)
  • Internet of Things (IoT)
  • Secure Hash Algorithm (SHA)