2019
DOI: 10.1007/s10916-018-1149-5
|View full text |Cite
|
Sign up to set email alerts
|

Sensor-Based mHealth Authentication for Real-Time Remote Healthcare Monitoring System: A Multilayer Systematic Review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

2
26
0
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 64 publications
(29 citation statements)
references
References 139 publications
2
26
0
1
Order By: Relevance
“…Both of these approaches are resistant to replay and forgery attacks, but the former can provide secure authentication functionality and the latter can provide data security. Recently, a few more interesting authentication protocols such as [11]- [15], [30] have been proposed for ensuring security in IoT-based healthcare systems. Among them, only [12] has considered the data security (both privacy and integrity) features.…”
Section: B Problem Statement and Motivationmentioning
confidence: 99%
“…Both of these approaches are resistant to replay and forgery attacks, but the former can provide secure authentication functionality and the latter can provide data security. Recently, a few more interesting authentication protocols such as [11]- [15], [30] have been proposed for ensuring security in IoT-based healthcare systems. Among them, only [12] has considered the data security (both privacy and integrity) features.…”
Section: B Problem Statement and Motivationmentioning
confidence: 99%
“…Considering telemedicine as an essential component of eHealth systems, some systematic reviews have focused security controls for such systems [4]. A typical example of this is multi-layer systematic reviews for user authentication in telemedicine and mHealth systems, using body sensor information and finger vein biometric verification [21] and sensor-based smart phones [22]. In such reviews, the prime focus of the investigation is authentication and key exchange protocols for secure telemedicine.…”
Section: B Security In Telemedicine and Mhealth Systemsmentioning
confidence: 99%
“…However, the existing reviews tend to limit the scope to mHealth systems (using smartphones, tablets and wearable sensors), but they do not explicitly include more pervasive and context-sensitive uHealth systems. Moreover, the existing reviews have focused on very specific security controls used in m/uHealth systems, such as biometrics, authentication, and key exchange schemes [21], [22]. Hence, the existing survey-based studies (detailed in a dedicated section) lack a broader view on the topic, i.e., explicitly comprising both mHealth and uHealth together with security and privacy aspects.…”
Section: Introductionmentioning
confidence: 99%
“…A prioritisation process is often conducted to ensure that care is given in a suitable and timely manner [28,29]. The early identification of critically ill patients and their stratification into priority levels upon acceptance to the emergency department (ED) are necessary for the quality and integrity of emergency medicine [30][31][32][33][34]. Hence, patient prioritisation aims to identify patients who can safely wait and those who cannot [35].…”
Section: Introductionmentioning
confidence: 99%