Anonymous Authentication Protocols for IoT based- Healthcare Systems: A survey
Nowadays, with the increase in chronic diseases and the aging population in all countries, it has become a huge burden on hospitals to accommodate all patients and monitor them. Applying wireless sensors network for the IoT based medical systems enabled medical doctors and families to monitor patien...
Gespeichert in:
Veröffentlicht in: | International journal of communication networks and information security 2020-12, Vol.12 (3), p.302-315 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 315 |
---|---|
container_issue | 3 |
container_start_page | 302 |
container_title | International journal of communication networks and information security |
container_volume | 12 |
creator | Asassfeh, Mahmoud Rajallah Obeid, Nadim Almobaideen, Wesam |
description | Nowadays, with the increase in chronic diseases and the aging population in all countries, it has become a huge burden on hospitals to accommodate all patients and monitor them. Applying wireless sensors network for the IoT based medical systems enabled medical doctors and families to monitor patients' conditions all the time through the collected data from sensors connected to the patients. These sensitive data should be transmitted through secure channels to hospitals or medical centers. Many proposals in the literature have suggested solutions to IoT supported medical systems security issues. In this paper we present a review of the most relevant techniques that address the security in general and Anonymous Authentication particularly in the context of healthcare systems. Furthermore, we compare between these approaches in term of types of security attacks, security measures, the approaches that were used to solve some of the security issues, and the network technology used such as WSN and RFID. We found that every approach has some drawbacks regarding security attacks and security measures. Security attacks such as denial of service and modification attacks should be given more attention in future research. The same goes for security measures like non-traceability, and backward and forward secrecy. Moreover, 80%of authentication schemes use certificateless authentication. This type of authentication has low computation cost and saves energy which is convenient to the constrained devices. AVISPA and Ban logic are the most common tools used for validation in the surveyed approaches. A comparison between these techniques according to different features is illustrated which may help the researchers to easily identify the gaps in the surveyed approaches so as to propose solutions for these issues. |
format | Article |
fullrecord | <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_journals_2483980836</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2483980836</sourcerecordid><originalsourceid>FETCH-LOGICAL-p98t-4c41afe235faad20bad1f87c2e3bd963f20fbe95728cf6c8415032871b9b5553</originalsourceid><addsrcrecordid>eNotjUFLwzAYQIMoOKf_IeA58DVp0sRbGeoGQ4Xt4G0k6Re20TUzSYX-e0V3eu_03hWZcWgUAyPg-s8FU9B83pK7nI8ASgGYGXlrhzhMpzhm2o5lj0M5eFsOcaAfKZboY59piImu4pY6m7FjdIm2L3tvE9LNlAue8hNtaR7TN0735CbYPuPDhXOyeXneLpZs_f66WrRrdja6sNrXlQ3IhQzWdhyc7aqgG89RuM4oETgEh0Y2XPugvK4rCYLrpnLGSSnFnDz-V88pfo2Yy-4YxzT8Dne81sJo0EKJH1Y_Syw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2483980836</pqid></control><display><type>article</type><title>Anonymous Authentication Protocols for IoT based- Healthcare Systems: A survey</title><source>EZB-FREE-00999 freely available EZB journals</source><creator>Asassfeh, Mahmoud Rajallah ; Obeid, Nadim ; Almobaideen, Wesam</creator><creatorcontrib>Asassfeh, Mahmoud Rajallah ; Obeid, Nadim ; Almobaideen, Wesam</creatorcontrib><description>Nowadays, with the increase in chronic diseases and the aging population in all countries, it has become a huge burden on hospitals to accommodate all patients and monitor them. Applying wireless sensors network for the IoT based medical systems enabled medical doctors and families to monitor patients' conditions all the time through the collected data from sensors connected to the patients. These sensitive data should be transmitted through secure channels to hospitals or medical centers. Many proposals in the literature have suggested solutions to IoT supported medical systems security issues. In this paper we present a review of the most relevant techniques that address the security in general and Anonymous Authentication particularly in the context of healthcare systems. Furthermore, we compare between these approaches in term of types of security attacks, security measures, the approaches that were used to solve some of the security issues, and the network technology used such as WSN and RFID. We found that every approach has some drawbacks regarding security attacks and security measures. Security attacks such as denial of service and modification attacks should be given more attention in future research. The same goes for security measures like non-traceability, and backward and forward secrecy. Moreover, 80%of authentication schemes use certificateless authentication. This type of authentication has low computation cost and saves energy which is convenient to the constrained devices. AVISPA and Ban logic are the most common tools used for validation in the surveyed approaches. A comparison between these techniques according to different features is illustrated which may help the researchers to easily identify the gaps in the surveyed approaches so as to propose solutions for these issues.</description><identifier>ISSN: 2073-607X</identifier><identifier>EISSN: 2076-0930</identifier><language>eng</language><publisher>Kohat: Kohat University of Science and Technology (KUST)</publisher><subject>Data collection ; Denial of service attacks ; Health care ; Health care facilities ; Hospitals ; Internet ; Internet of Things ; Patients ; Physicians ; Polls & surveys ; Protocol (computers) ; Secrecy aspects ; Security ; Security management ; Sensors ; Taxonomy ; Wireless networks ; Wireless sensor networks</subject><ispartof>International journal of communication networks and information security, 2020-12, Vol.12 (3), p.302-315</ispartof><rights>Copyright Kohat University of Science and Technology (KUST) Dec 2020</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784</link.rule.ids></links><search><creatorcontrib>Asassfeh, Mahmoud Rajallah</creatorcontrib><creatorcontrib>Obeid, Nadim</creatorcontrib><creatorcontrib>Almobaideen, Wesam</creatorcontrib><title>Anonymous Authentication Protocols for IoT based- Healthcare Systems: A survey</title><title>International journal of communication networks and information security</title><description>Nowadays, with the increase in chronic diseases and the aging population in all countries, it has become a huge burden on hospitals to accommodate all patients and monitor them. Applying wireless sensors network for the IoT based medical systems enabled medical doctors and families to monitor patients' conditions all the time through the collected data from sensors connected to the patients. These sensitive data should be transmitted through secure channels to hospitals or medical centers. Many proposals in the literature have suggested solutions to IoT supported medical systems security issues. In this paper we present a review of the most relevant techniques that address the security in general and Anonymous Authentication particularly in the context of healthcare systems. Furthermore, we compare between these approaches in term of types of security attacks, security measures, the approaches that were used to solve some of the security issues, and the network technology used such as WSN and RFID. We found that every approach has some drawbacks regarding security attacks and security measures. Security attacks such as denial of service and modification attacks should be given more attention in future research. The same goes for security measures like non-traceability, and backward and forward secrecy. Moreover, 80%of authentication schemes use certificateless authentication. This type of authentication has low computation cost and saves energy which is convenient to the constrained devices. AVISPA and Ban logic are the most common tools used for validation in the surveyed approaches. A comparison between these techniques according to different features is illustrated which may help the researchers to easily identify the gaps in the surveyed approaches so as to propose solutions for these issues.</description><subject>Data collection</subject><subject>Denial of service attacks</subject><subject>Health care</subject><subject>Health care facilities</subject><subject>Hospitals</subject><subject>Internet</subject><subject>Internet of Things</subject><subject>Patients</subject><subject>Physicians</subject><subject>Polls & surveys</subject><subject>Protocol (computers)</subject><subject>Secrecy aspects</subject><subject>Security</subject><subject>Security management</subject><subject>Sensors</subject><subject>Taxonomy</subject><subject>Wireless networks</subject><subject>Wireless sensor networks</subject><issn>2073-607X</issn><issn>2076-0930</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNotjUFLwzAYQIMoOKf_IeA58DVp0sRbGeoGQ4Xt4G0k6Re20TUzSYX-e0V3eu_03hWZcWgUAyPg-s8FU9B83pK7nI8ASgGYGXlrhzhMpzhm2o5lj0M5eFsOcaAfKZboY59piImu4pY6m7FjdIm2L3tvE9LNlAue8hNtaR7TN0735CbYPuPDhXOyeXneLpZs_f66WrRrdja6sNrXlQ3IhQzWdhyc7aqgG89RuM4oETgEh0Y2XPugvK4rCYLrpnLGSSnFnDz-V88pfo2Yy-4YxzT8Dne81sJo0EKJH1Y_Syw</recordid><startdate>20201201</startdate><enddate>20201201</enddate><creator>Asassfeh, Mahmoud Rajallah</creator><creator>Obeid, Nadim</creator><creator>Almobaideen, Wesam</creator><general>Kohat University of Science and Technology (KUST)</general><scope>3V.</scope><scope>4T-</scope><scope>4U-</scope><scope>7RQ</scope><scope>7XB</scope><scope>88F</scope><scope>88I</scope><scope>88K</scope><scope>8AL</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>M0N</scope><scope>M1Q</scope><scope>M2P</scope><scope>M2T</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope><scope>U9A</scope></search><sort><creationdate>20201201</creationdate><title>Anonymous Authentication Protocols for IoT based- Healthcare Systems: A survey</title><author>Asassfeh, Mahmoud Rajallah ; Obeid, Nadim ; Almobaideen, Wesam</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p98t-4c41afe235faad20bad1f87c2e3bd963f20fbe95728cf6c8415032871b9b5553</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Data collection</topic><topic>Denial of service attacks</topic><topic>Health care</topic><topic>Health care facilities</topic><topic>Hospitals</topic><topic>Internet</topic><topic>Internet of Things</topic><topic>Patients</topic><topic>Physicians</topic><topic>Polls & surveys</topic><topic>Protocol (computers)</topic><topic>Secrecy aspects</topic><topic>Security</topic><topic>Security management</topic><topic>Sensors</topic><topic>Taxonomy</topic><topic>Wireless networks</topic><topic>Wireless sensor networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Asassfeh, Mahmoud Rajallah</creatorcontrib><creatorcontrib>Obeid, Nadim</creatorcontrib><creatorcontrib>Almobaideen, Wesam</creatorcontrib><collection>ProQuest Central (Corporate)</collection><collection>Docstoc</collection><collection>University Readers</collection><collection>Career & Technical Education Database</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Military Database (Alumni Edition)</collection><collection>Science Database (Alumni Edition)</collection><collection>Telecommunications (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Computing Database</collection><collection>Military Database</collection><collection>Science Database</collection><collection>Telecommunications Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>International journal of communication networks and information security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Asassfeh, Mahmoud Rajallah</au><au>Obeid, Nadim</au><au>Almobaideen, Wesam</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Anonymous Authentication Protocols for IoT based- Healthcare Systems: A survey</atitle><jtitle>International journal of communication networks and information security</jtitle><date>2020-12-01</date><risdate>2020</risdate><volume>12</volume><issue>3</issue><spage>302</spage><epage>315</epage><pages>302-315</pages><issn>2073-607X</issn><eissn>2076-0930</eissn><abstract>Nowadays, with the increase in chronic diseases and the aging population in all countries, it has become a huge burden on hospitals to accommodate all patients and monitor them. Applying wireless sensors network for the IoT based medical systems enabled medical doctors and families to monitor patients' conditions all the time through the collected data from sensors connected to the patients. These sensitive data should be transmitted through secure channels to hospitals or medical centers. Many proposals in the literature have suggested solutions to IoT supported medical systems security issues. In this paper we present a review of the most relevant techniques that address the security in general and Anonymous Authentication particularly in the context of healthcare systems. Furthermore, we compare between these approaches in term of types of security attacks, security measures, the approaches that were used to solve some of the security issues, and the network technology used such as WSN and RFID. We found that every approach has some drawbacks regarding security attacks and security measures. Security attacks such as denial of service and modification attacks should be given more attention in future research. The same goes for security measures like non-traceability, and backward and forward secrecy. Moreover, 80%of authentication schemes use certificateless authentication. This type of authentication has low computation cost and saves energy which is convenient to the constrained devices. AVISPA and Ban logic are the most common tools used for validation in the surveyed approaches. A comparison between these techniques according to different features is illustrated which may help the researchers to easily identify the gaps in the surveyed approaches so as to propose solutions for these issues.</abstract><cop>Kohat</cop><pub>Kohat University of Science and Technology (KUST)</pub><tpages>14</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2073-607X |
ispartof | International journal of communication networks and information security, 2020-12, Vol.12 (3), p.302-315 |
issn | 2073-607X 2076-0930 |
language | eng |
recordid | cdi_proquest_journals_2483980836 |
source | EZB-FREE-00999 freely available EZB journals |
subjects | Data collection Denial of service attacks Health care Health care facilities Hospitals Internet Internet of Things Patients Physicians Polls & surveys Protocol (computers) Secrecy aspects Security Security management Sensors Taxonomy Wireless networks Wireless sensor networks |
title | Anonymous Authentication Protocols for IoT based- Healthcare Systems: A survey |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-19T12%3A58%3A06IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Anonymous%20Authentication%20Protocols%20for%20IoT%20based-%20Healthcare%20Systems:%20A%20survey&rft.jtitle=International%20journal%20of%20communication%20networks%20and%20information%20security&rft.au=Asassfeh,%20Mahmoud%20Rajallah&rft.date=2020-12-01&rft.volume=12&rft.issue=3&rft.spage=302&rft.epage=315&rft.pages=302-315&rft.issn=2073-607X&rft.eissn=2076-0930&rft_id=info:doi/&rft_dat=%3Cproquest%3E2483980836%3C/proquest%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2483980836&rft_id=info:pmid/&rfr_iscdi=true |