2023
DOI: 10.1109/jiot.2023.3283347
|View full text |Cite
|
Sign up to set email alerts
|

Securing IoT-Based Smart Healthcare Systems by Using Advanced Lightweight Privacy-Preserving Authentication Scheme

Sangjukta Das,
Suyel Namasudra,
Suman Deb
et al.
Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
2
0

Year Published

2024
2024
2025
2025

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 15 publications
(4 citation statements)
references
References 39 publications
0
2
0
Order By: Relevance
“…To prevent medical information from being disclosed to unauthorized entities, healthcare users and IoMT devices must be authenticated in SHSs [139]. Smart healthcare systems employ authentication procedures combining ownership, knowledge, and biometric factors to strengthen authentication [99] and implement authentication-based techniques such as usernames and passwords, biometric authentication, two-factor and multifactor authentication, smart cards and tokens, digital certificates, one-time passwords, risk-based authentication, certificate-based authentication, behavioral authentication, client-based user authentication, contextual-based access control, RFID authentication, location-based authentication, blockchain-based authentication, role-based access control, and advanced lightweight privacy-preserving authentication schemes to allow patients and healthcare providers to efficiently establish secure communications to healthcare systems and IoMT devices and ensure robust security [47][138][161] [162]. Batista et al [99] reported that wearables may authenticate the identities of healthcare users by collecting user-centric data such as heart rate, body temperature, electrocardiogram signals, and body motions.…”
Section: Authentication-based Techniquesmentioning
confidence: 99%
“…To prevent medical information from being disclosed to unauthorized entities, healthcare users and IoMT devices must be authenticated in SHSs [139]. Smart healthcare systems employ authentication procedures combining ownership, knowledge, and biometric factors to strengthen authentication [99] and implement authentication-based techniques such as usernames and passwords, biometric authentication, two-factor and multifactor authentication, smart cards and tokens, digital certificates, one-time passwords, risk-based authentication, certificate-based authentication, behavioral authentication, client-based user authentication, contextual-based access control, RFID authentication, location-based authentication, blockchain-based authentication, role-based access control, and advanced lightweight privacy-preserving authentication schemes to allow patients and healthcare providers to efficiently establish secure communications to healthcare systems and IoMT devices and ensure robust security [47][138][161] [162]. Batista et al [99] reported that wearables may authenticate the identities of healthcare users by collecting user-centric data such as heart rate, body temperature, electrocardiogram signals, and body motions.…”
Section: Authentication-based Techniquesmentioning
confidence: 99%
“…This efficiency can result in faster performance, reduced hardware costs, and lower energy consumption. For instance, in a recent work [44], authors have proposed a lightweight authentication system for IoT devices. The proposed system consumes fewer resources, like memory and CPU.…”
Section: Hybrid Model (Cnn With Lstm)mentioning
confidence: 99%
“…Despite all the benefits of cloud computing, there are some major concerns like security [2], energy consumption, and resource optimization that could affect the efficiency and reliability of this cutting-edge technology [3,4]. Some researchers attempted to resolve these concerns by using virtual machine (VM) migration [5,6]. A VM migration service is defined as the process of migrating a virtual machine (VM) from one host computer to another in order to improve resource utilization, enhance load balancing, and reduce power consumption [7,8].…”
Section: Introductionmentioning
confidence: 99%