Anonymous Authentication Protocols for IoT based- Healthcare Systems: A survey

Nowadays, with the increase in chronic diseases and the aging population in all countries, it has become a huge burden on hospitals to accommodate all patients and monitor them. Applying wireless sensors network for the IoT based medical systems enabled medical doctors and families to monitor patien...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International journal of communication networks and information security 2020-12, Vol.12 (3), p.302-315
Hauptverfasser: Asassfeh, Mahmoud Rajallah, Obeid, Nadim, Almobaideen, Wesam
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 315
container_issue 3
container_start_page 302
container_title International journal of communication networks and information security
container_volume 12
creator Asassfeh, Mahmoud Rajallah
Obeid, Nadim
Almobaideen, Wesam
description Nowadays, with the increase in chronic diseases and the aging population in all countries, it has become a huge burden on hospitals to accommodate all patients and monitor them. Applying wireless sensors network for the IoT based medical systems enabled medical doctors and families to monitor patients' conditions all the time through the collected data from sensors connected to the patients. These sensitive data should be transmitted through secure channels to hospitals or medical centers. Many proposals in the literature have suggested solutions to IoT supported medical systems security issues. In this paper we present a review of the most relevant techniques that address the security in general and Anonymous Authentication particularly in the context of healthcare systems. Furthermore, we compare between these approaches in term of types of security attacks, security measures, the approaches that were used to solve some of the security issues, and the network technology used such as WSN and RFID. We found that every approach has some drawbacks regarding security attacks and security measures. Security attacks such as denial of service and modification attacks should be given more attention in future research. The same goes for security measures like non-traceability, and backward and forward secrecy. Moreover, 80%of authentication schemes use certificateless authentication. This type of authentication has low computation cost and saves energy which is convenient to the constrained devices. AVISPA and Ban logic are the most common tools used for validation in the surveyed approaches. A comparison between these techniques according to different features is illustrated which may help the researchers to easily identify the gaps in the surveyed approaches so as to propose solutions for these issues.
format Article
fullrecord <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_journals_2483980836</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2483980836</sourcerecordid><originalsourceid>FETCH-LOGICAL-p98t-4c41afe235faad20bad1f87c2e3bd963f20fbe95728cf6c8415032871b9b5553</originalsourceid><addsrcrecordid>eNotjUFLwzAYQIMoOKf_IeA58DVp0sRbGeoGQ4Xt4G0k6Re20TUzSYX-e0V3eu_03hWZcWgUAyPg-s8FU9B83pK7nI8ASgGYGXlrhzhMpzhm2o5lj0M5eFsOcaAfKZboY59piImu4pY6m7FjdIm2L3tvE9LNlAue8hNtaR7TN0735CbYPuPDhXOyeXneLpZs_f66WrRrdja6sNrXlQ3IhQzWdhyc7aqgG89RuM4oETgEh0Y2XPugvK4rCYLrpnLGSSnFnDz-V88pfo2Yy-4YxzT8Dne81sJo0EKJH1Y_Syw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2483980836</pqid></control><display><type>article</type><title>Anonymous Authentication Protocols for IoT based- Healthcare Systems: A survey</title><source>EZB-FREE-00999 freely available EZB journals</source><creator>Asassfeh, Mahmoud Rajallah ; Obeid, Nadim ; Almobaideen, Wesam</creator><creatorcontrib>Asassfeh, Mahmoud Rajallah ; Obeid, Nadim ; Almobaideen, Wesam</creatorcontrib><description>Nowadays, with the increase in chronic diseases and the aging population in all countries, it has become a huge burden on hospitals to accommodate all patients and monitor them. Applying wireless sensors network for the IoT based medical systems enabled medical doctors and families to monitor patients' conditions all the time through the collected data from sensors connected to the patients. These sensitive data should be transmitted through secure channels to hospitals or medical centers. Many proposals in the literature have suggested solutions to IoT supported medical systems security issues. In this paper we present a review of the most relevant techniques that address the security in general and Anonymous Authentication particularly in the context of healthcare systems. Furthermore, we compare between these approaches in term of types of security attacks, security measures, the approaches that were used to solve some of the security issues, and the network technology used such as WSN and RFID. We found that every approach has some drawbacks regarding security attacks and security measures. Security attacks such as denial of service and modification attacks should be given more attention in future research. The same goes for security measures like non-traceability, and backward and forward secrecy. Moreover, 80%of authentication schemes use certificateless authentication. This type of authentication has low computation cost and saves energy which is convenient to the constrained devices. AVISPA and Ban logic are the most common tools used for validation in the surveyed approaches. A comparison between these techniques according to different features is illustrated which may help the researchers to easily identify the gaps in the surveyed approaches so as to propose solutions for these issues.</description><identifier>ISSN: 2073-607X</identifier><identifier>EISSN: 2076-0930</identifier><language>eng</language><publisher>Kohat: Kohat University of Science and Technology (KUST)</publisher><subject>Data collection ; Denial of service attacks ; Health care ; Health care facilities ; Hospitals ; Internet ; Internet of Things ; Patients ; Physicians ; Polls &amp; surveys ; Protocol (computers) ; Secrecy aspects ; Security ; Security management ; Sensors ; Taxonomy ; Wireless networks ; Wireless sensor networks</subject><ispartof>International journal of communication networks and information security, 2020-12, Vol.12 (3), p.302-315</ispartof><rights>Copyright Kohat University of Science and Technology (KUST) Dec 2020</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784</link.rule.ids></links><search><creatorcontrib>Asassfeh, Mahmoud Rajallah</creatorcontrib><creatorcontrib>Obeid, Nadim</creatorcontrib><creatorcontrib>Almobaideen, Wesam</creatorcontrib><title>Anonymous Authentication Protocols for IoT based- Healthcare Systems: A survey</title><title>International journal of communication networks and information security</title><description>Nowadays, with the increase in chronic diseases and the aging population in all countries, it has become a huge burden on hospitals to accommodate all patients and monitor them. Applying wireless sensors network for the IoT based medical systems enabled medical doctors and families to monitor patients' conditions all the time through the collected data from sensors connected to the patients. These sensitive data should be transmitted through secure channels to hospitals or medical centers. Many proposals in the literature have suggested solutions to IoT supported medical systems security issues. In this paper we present a review of the most relevant techniques that address the security in general and Anonymous Authentication particularly in the context of healthcare systems. Furthermore, we compare between these approaches in term of types of security attacks, security measures, the approaches that were used to solve some of the security issues, and the network technology used such as WSN and RFID. We found that every approach has some drawbacks regarding security attacks and security measures. Security attacks such as denial of service and modification attacks should be given more attention in future research. The same goes for security measures like non-traceability, and backward and forward secrecy. Moreover, 80%of authentication schemes use certificateless authentication. This type of authentication has low computation cost and saves energy which is convenient to the constrained devices. AVISPA and Ban logic are the most common tools used for validation in the surveyed approaches. A comparison between these techniques according to different features is illustrated which may help the researchers to easily identify the gaps in the surveyed approaches so as to propose solutions for these issues.</description><subject>Data collection</subject><subject>Denial of service attacks</subject><subject>Health care</subject><subject>Health care facilities</subject><subject>Hospitals</subject><subject>Internet</subject><subject>Internet of Things</subject><subject>Patients</subject><subject>Physicians</subject><subject>Polls &amp; surveys</subject><subject>Protocol (computers)</subject><subject>Secrecy aspects</subject><subject>Security</subject><subject>Security management</subject><subject>Sensors</subject><subject>Taxonomy</subject><subject>Wireless networks</subject><subject>Wireless sensor networks</subject><issn>2073-607X</issn><issn>2076-0930</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNotjUFLwzAYQIMoOKf_IeA58DVp0sRbGeoGQ4Xt4G0k6Re20TUzSYX-e0V3eu_03hWZcWgUAyPg-s8FU9B83pK7nI8ASgGYGXlrhzhMpzhm2o5lj0M5eFsOcaAfKZboY59piImu4pY6m7FjdIm2L3tvE9LNlAue8hNtaR7TN0735CbYPuPDhXOyeXneLpZs_f66WrRrdja6sNrXlQ3IhQzWdhyc7aqgG89RuM4oETgEh0Y2XPugvK4rCYLrpnLGSSnFnDz-V88pfo2Yy-4YxzT8Dne81sJo0EKJH1Y_Syw</recordid><startdate>20201201</startdate><enddate>20201201</enddate><creator>Asassfeh, Mahmoud Rajallah</creator><creator>Obeid, Nadim</creator><creator>Almobaideen, Wesam</creator><general>Kohat University of Science and Technology (KUST)</general><scope>3V.</scope><scope>4T-</scope><scope>4U-</scope><scope>7RQ</scope><scope>7XB</scope><scope>88F</scope><scope>88I</scope><scope>88K</scope><scope>8AL</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>M0N</scope><scope>M1Q</scope><scope>M2P</scope><scope>M2T</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope><scope>U9A</scope></search><sort><creationdate>20201201</creationdate><title>Anonymous Authentication Protocols for IoT based- Healthcare Systems: A survey</title><author>Asassfeh, Mahmoud Rajallah ; Obeid, Nadim ; Almobaideen, Wesam</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p98t-4c41afe235faad20bad1f87c2e3bd963f20fbe95728cf6c8415032871b9b5553</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Data collection</topic><topic>Denial of service attacks</topic><topic>Health care</topic><topic>Health care facilities</topic><topic>Hospitals</topic><topic>Internet</topic><topic>Internet of Things</topic><topic>Patients</topic><topic>Physicians</topic><topic>Polls &amp; surveys</topic><topic>Protocol (computers)</topic><topic>Secrecy aspects</topic><topic>Security</topic><topic>Security management</topic><topic>Sensors</topic><topic>Taxonomy</topic><topic>Wireless networks</topic><topic>Wireless sensor networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Asassfeh, Mahmoud Rajallah</creatorcontrib><creatorcontrib>Obeid, Nadim</creatorcontrib><creatorcontrib>Almobaideen, Wesam</creatorcontrib><collection>ProQuest Central (Corporate)</collection><collection>Docstoc</collection><collection>University Readers</collection><collection>Career &amp; Technical Education Database</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Military Database (Alumni Edition)</collection><collection>Science Database (Alumni Edition)</collection><collection>Telecommunications (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Computing Database</collection><collection>Military Database</collection><collection>Science Database</collection><collection>Telecommunications Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>International journal of communication networks and information security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Asassfeh, Mahmoud Rajallah</au><au>Obeid, Nadim</au><au>Almobaideen, Wesam</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Anonymous Authentication Protocols for IoT based- Healthcare Systems: A survey</atitle><jtitle>International journal of communication networks and information security</jtitle><date>2020-12-01</date><risdate>2020</risdate><volume>12</volume><issue>3</issue><spage>302</spage><epage>315</epage><pages>302-315</pages><issn>2073-607X</issn><eissn>2076-0930</eissn><abstract>Nowadays, with the increase in chronic diseases and the aging population in all countries, it has become a huge burden on hospitals to accommodate all patients and monitor them. Applying wireless sensors network for the IoT based medical systems enabled medical doctors and families to monitor patients' conditions all the time through the collected data from sensors connected to the patients. These sensitive data should be transmitted through secure channels to hospitals or medical centers. Many proposals in the literature have suggested solutions to IoT supported medical systems security issues. In this paper we present a review of the most relevant techniques that address the security in general and Anonymous Authentication particularly in the context of healthcare systems. Furthermore, we compare between these approaches in term of types of security attacks, security measures, the approaches that were used to solve some of the security issues, and the network technology used such as WSN and RFID. We found that every approach has some drawbacks regarding security attacks and security measures. Security attacks such as denial of service and modification attacks should be given more attention in future research. The same goes for security measures like non-traceability, and backward and forward secrecy. Moreover, 80%of authentication schemes use certificateless authentication. This type of authentication has low computation cost and saves energy which is convenient to the constrained devices. AVISPA and Ban logic are the most common tools used for validation in the surveyed approaches. A comparison between these techniques according to different features is illustrated which may help the researchers to easily identify the gaps in the surveyed approaches so as to propose solutions for these issues.</abstract><cop>Kohat</cop><pub>Kohat University of Science and Technology (KUST)</pub><tpages>14</tpages></addata></record>
fulltext fulltext
identifier ISSN: 2073-607X
ispartof International journal of communication networks and information security, 2020-12, Vol.12 (3), p.302-315
issn 2073-607X
2076-0930
language eng
recordid cdi_proquest_journals_2483980836
source EZB-FREE-00999 freely available EZB journals
subjects Data collection
Denial of service attacks
Health care
Health care facilities
Hospitals
Internet
Internet of Things
Patients
Physicians
Polls & surveys
Protocol (computers)
Secrecy aspects
Security
Security management
Sensors
Taxonomy
Wireless networks
Wireless sensor networks
title Anonymous Authentication Protocols for IoT based- Healthcare Systems: A survey
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-19T12%3A58%3A06IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Anonymous%20Authentication%20Protocols%20for%20IoT%20based-%20Healthcare%20Systems:%20A%20survey&rft.jtitle=International%20journal%20of%20communication%20networks%20and%20information%20security&rft.au=Asassfeh,%20Mahmoud%20Rajallah&rft.date=2020-12-01&rft.volume=12&rft.issue=3&rft.spage=302&rft.epage=315&rft.pages=302-315&rft.issn=2073-607X&rft.eissn=2076-0930&rft_id=info:doi/&rft_dat=%3Cproquest%3E2483980836%3C/proquest%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2483980836&rft_id=info:pmid/&rfr_iscdi=true