{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T19:00:01Z","timestamp":1775070001784,"version":"3.50.1"},"reference-count":125,"publisher":"MDPI AG","issue":"23","license":[{"start":{"date-parts":[[2022,11,23]],"date-time":"2022-11-23T00:00:00Z","timestamp":1669161600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Research Foundation (NRF), Republic of Korea","award":["F21YY8102068"],"award-info":[{"award-number":["F21YY8102068"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>The Internet of medical things (IoMT) provides an ecosystem in which to connect humans, devices, sensors, and systems and improve healthcare services through modern technologies. The IoMT has been around for quite some time, and many architectures\/systems have been proposed to exploit its true potential. Healthcare through the Internet of things (IoT) is envisioned to be efficient, accessible, and secure in all possible ways. Even though the personalized health service through IoT is not limited to time or location, many associated challenges have emerged at an exponential pace. With the rapid shift toward IoT-enabled healthcare systems, there is an extensive need to examine possible threats and propose countermeasures. Authentication is one of the key processes in a system\u2019s security, where an individual, device, or another system is validated for its identity. This survey explores authentication techniques proposed for IoT-enabled healthcare systems. The exploration of the literature is categorized with respect to the technology deployment region, as in cloud, fog, and edge. A taxonomy of attacks, comprehensive analysis, and comparison of existing authentication techniques opens up possible future directions and paves the road ahead.<\/jats:p>","DOI":"10.3390\/s22239089","type":"journal-article","created":{"date-parts":[[2022,11,24]],"date-time":"2022-11-24T03:58:16Z","timestamp":1669262296000},"page":"9089","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":40,"title":["A Survey of Authentication in Internet of Things-Enabled Healthcare Systems"],"prefix":"10.3390","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1615-4605","authenticated-orcid":false,"given":"Mudassar Ali","family":"Khan","sequence":"first","affiliation":[{"name":"Department of Information Technology, The University of Haripur, Haripur 22620, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8896-547X","authenticated-orcid":false,"given":"Ikram Ud","family":"Din","sequence":"additional","affiliation":[{"name":"Department of Information Technology, The University of Haripur, Haripur 22620, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6295-4457","authenticated-orcid":false,"given":"Tha\u2019er","family":"Majali","sequence":"additional","affiliation":[{"name":"Department of Management Information Systems, Applied Science Private University, Shafa Badran, Amman 11937, Jordan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9824-1950","authenticated-orcid":false,"given":"Byung-Seo","family":"Kim","sequence":"additional","affiliation":[{"name":"Department of Software and Communications Engineering, Hongik University, Sejong 30016, Republic of Korea"}]}],"member":"1968","published-online":{"date-parts":[[2022,11,23]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Roy, M., Chowdhury, C., and Aslam, N. (2018). Designing transmission strategies for enhancing communications in medical IoT using Markov decision process. Sensors, 18.","DOI":"10.3390\/s18124450"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Vishnu, S., Ramson, S.J., and Jegan, R. (2020, January 5\u20136). Internet of medical things (IoMT)-An overview. Proceedings of the 2020 5th International Conference on Devices, Circuits and Systems (ICDCS), Coimbatore, India.","DOI":"10.1109\/ICDCS48716.2020.243558"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Qureshi, F., and Krishnan, S. (2018). Wearable hardware design for the internet of medical things (IoMT). Sensors, 18.","DOI":"10.3390\/s18113812"},{"key":"ref_4","first-page":"414","article-title":"A review of internet of medical things (IoMT)-based remote health monitoring through wearable sensors: A case study for diabetic patients","volume":"20","author":"AlShorman","year":"2020","journal-title":"Indones. J. Electr. Eng. Comput. Sci."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"e20135","DOI":"10.2196\/20135","article-title":"The Internet of Things: Impact and implications for health care delivery","volume":"22","author":"Kelly","year":"2020","journal-title":"J. Med. Internet Res."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Rayan, R.A., Tsagkaris, C., Papazoglou, A.S., and Moysidis, D.V. (2022). The Internet of Medical Things for Monitoring Health. Internet of Things, CRC Press.","DOI":"10.1201\/9781003219620-11"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/MPULS.2020.3022143","article-title":"IoMT (Internet of Medical Things): Reducing cost while improving patient care","volume":"11","author":"Arora","year":"2020","journal-title":"IEEE Pulse"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"837","DOI":"10.1007\/s10209-018-0618-4","article-title":"The application of Internet of things in healthcare: A systematic literature review and classification","volume":"18","author":"Ahmadi","year":"2019","journal-title":"Univers. Access Inf. Soc."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"855","DOI":"10.1007\/s40520-020-01545-9","article-title":"Internet of things (IoT) applications for elderly care: A reflective review","volume":"33","author":"Tun","year":"2021","journal-title":"Aging Clin. Exp. Res."},{"key":"ref_10","unstructured":"Kinsella, K., and He, W. (2009). An Aging World: 2008, International Population Reports, U.S. Department of Health and Human Services & U.S. Department of Commerce."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1016\/j.jnca.2019.06.016","article-title":"A comprehensive review of wireless body area network","volume":"143","author":"Hasan","year":"2019","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"413","DOI":"10.1142\/S2424862220300069","article-title":"A review of the role of smart wireless medical sensor network in COVID-19","volume":"5","author":"Ali","year":"2020","journal-title":"J. Ind. Integr. Manag."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Khan, R.A., and Pathan, A.S.K. (2018). The state-of-the-art wireless body area sensor networks: A survey. Int. J. Distrib. Sens. Netw., 14.","DOI":"10.1177\/1550147718768994"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"14","DOI":"10.3390\/asi3010014","article-title":"Applications of wireless sensor networks: An up-to-date survey","volume":"3","author":"Kris","year":"2020","journal-title":"Appl. Syst. Innov."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Sinha, A., and Singh, S. (2021). Detailed Analysis of Medical IoT Using Wireless Body Sensor Network and Application of IoT in Healthcare. Human Communication Technology: Internet of Robotic Things and Ubiquitous Computing, Wiley.","DOI":"10.1002\/9781119752165.ch15"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1016\/j.comcom.2020.05.029","article-title":"Sensors for internet of medical things: State-of-the-art, security and privacy issues, challenges and future directions","volume":"160","author":"Ray","year":"2020","journal-title":"Comput. Commun."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"1614","DOI":"10.1016\/j.matpr.2020.08.420","article-title":"Overcome the challenges in bio-medical instruments using IOT\u2014A review","volume":"45","author":"Karthick","year":"2021","journal-title":"Mater. Today Proc."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1016\/j.comcom.2019.12.030","article-title":"Intelligence in the Internet of Medical Things era: A systematic review of current and future trends","volume":"150","author":"Nawaz","year":"2020","journal-title":"Comput. Commun."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1002\/hbe2.133","article-title":"Internet of Things: A primer","volume":"1","author":"Paul","year":"2019","journal-title":"Hum. Behav. Emerg. Technol."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"54958","DOI":"10.1109\/ACCESS.2019.2912956","article-title":"Remote monitoring of human vital signs using mm-wave FMCW radar","volume":"7","author":"Alizadeh","year":"2019","journal-title":"IEEE Access"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Kebe, M., Gadhafi, R., Mohammad, B., Sanduleanu, M., Saleh, H., and Al-Qutayri, M. (2020). Human vital signs detection methods and potential using radars: A review. Sensors, 20.","DOI":"10.3390\/s20051454"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"55","DOI":"10.3390\/s120100055","article-title":"Security issues in healthcare applications using wireless medical sensor networks: A survey","volume":"12","author":"Kumar","year":"2012","journal-title":"Sensors"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1016\/j.iot.2018.11.003","article-title":"Securing the Internet of Things: Challenges, threats and solutions","volume":"5","author":"Grammatikis","year":"2019","journal-title":"Internet Things"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"122877","DOI":"10.1016\/j.jclepro.2020.122877","article-title":"Internet of Things (IoT): Opportunities, issues and challenges towards a smart and sustainable future","volume":"274","author":"Patrono","year":"2020","journal-title":"J. Clean. Prod."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"879","DOI":"10.1007\/s00779-018-1178-6","article-title":"Emerging trends, issues, and challenges in Internet of Medical Things and wireless networks","volume":"22","author":"Manogaran","year":"2018","journal-title":"Pers. Ubiquitous Comput."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Hatzivasilis, G., Soultatos, O., Ioannidis, S., Verikoukis, C., Demetriou, G., and Tsatsoulis, C. (2019, January 29\u201331). Review of security and privacy for the Internet of Medical Things (IoMT). Proceedings of the 2019 15th International Conference on Distributed Computing in Sensor Systems (DCOSS), Santorini, Greece.","DOI":"10.1109\/DCOSS.2019.00091"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"2233","DOI":"10.1109\/TII.2014.2300753","article-title":"Internet of things in industries: A survey","volume":"10","author":"He","year":"2014","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"5455","DOI":"10.1109\/ACCESS.2019.2961511","article-title":"Amazon, Google and Microsoft solutions for IoT: Architectures and a performance comparison","volume":"8","author":"Pierleoni","year":"2019","journal-title":"IEEE Access"},{"key":"ref_29","unstructured":"Ucuz, D. (2020, January 1\u20132). Comparison of the IoT platform vendors, microsoft Azure, Amazon web services, and Google cloud, from users\u2019 perspectives. Proceedings of the 2020 8th International Symposium on Digital Forensics and Security (ISDFS), Beirut, Lebanon."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Bakhshi, Z., Balador, A., and Mustafa, J. (2018, January 15\u201318). Industrial IoT security threats and concerns by considering Cisco and Microsoft IoT reference models. Proceedings of the 2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW), Barcelona, Spain.","DOI":"10.1109\/WCNCW.2018.8368997"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Dohr, A., Modre-Opsrian, R., Drobics, M., Hayn, D., and Schreier, G. (2010, January 12\u201314). The internet of things for ambient assisted living. Proceedings of the 2010 Seventh International Conference on Information Technology: New Generations, Las Vegas, NV, USA.","DOI":"10.1109\/ITNG.2010.104"},{"key":"ref_32","first-page":"97","article-title":"That \u2018internet of things\u2019 thing","volume":"22","author":"Ashton","year":"2009","journal-title":"RFID J."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Kumar, S., Tiwari, P., and Zymbler, M. (2019). Internet of Things is a revolutionary approach for future technology enhancement: A review. J. Big Data, 6.","DOI":"10.1186\/s40537-019-0268-2"},{"key":"ref_34","first-page":"154","article-title":"A review on the different types of Internet of Things (IoT)","volume":"11","author":"Srinivasan","year":"2019","journal-title":"J. Adv. Res. Dyn. Control Syst."},{"key":"ref_35","unstructured":"Cisco Systems Inc. (2022, November 22). Internet of Things at a Glance. Available online: https:\/\/emarsonindia.com\/wp-content\/uploads\/2020\/02\/Internet-of-Things.pdf."},{"key":"ref_36","unstructured":"IDC Corporate USA (2022, November 22). Worldwide Internet of Things Spending Guide. Available online: https:\/\/www.idc.com\/getdoc.jsp?containerId=IDC_P29475."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"1454","DOI":"10.1016\/j.jclepro.2016.10.006","article-title":"A review of Internet of Things for smart home: Challenges and solutions","volume":"140","author":"Stojkoska","year":"2017","journal-title":"J. Clean. Prod."},{"key":"ref_38","first-page":"33","article-title":"Internet of Things for smart homes and buildings: Opportunities and Challenges","volume":"3","author":"Ghayvat","year":"2015","journal-title":"J. Telecommun. Digit. Econ."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1109\/JIOT.2014.2306328","article-title":"Internet of things for smart cities","volume":"1","author":"Zanella","year":"2014","journal-title":"IEEE Internet Things J."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"589","DOI":"10.1016\/j.measurement.2018.07.067","article-title":"Internet of Things-enabled smart cities: State-of-the-art and future trends","volume":"129","author":"Alavi","year":"2018","journal-title":"Measurement"},{"key":"ref_41","first-page":"52","article-title":"Development of smart cities with fog computing and internet of things","volume":"3","author":"Lai","year":"2021","journal-title":"J. Ubiquitous Comput. Commun. Technol. (UCCT)"},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1016\/j.comcom.2020.11.016","article-title":"Industrial Internet of Things and its applications in industry 4.0: State of the art","volume":"166","author":"Malik","year":"2021","journal-title":"Comput. Commun."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"4724","DOI":"10.1109\/TII.2018.2852491","article-title":"Industrial internet of things: Challenges, opportunities, and directions","volume":"14","author":"Sisinni","year":"2018","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"106522","DOI":"10.1016\/j.compeleceng.2019.106522","article-title":"Industrial internet of things: Recent advances, enabling technologies and open challenges","volume":"81","author":"Khan","year":"2020","journal-title":"Comput. Electr. Eng."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1007\/s42853-020-00078-3","article-title":"A review of the applications of the internet of things (IoT) for agricultural automation","volume":"45","author":"Kim","year":"2020","journal-title":"J. Biosyst. Eng."},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Salam, A. (2020). Internet of things in agricultural innovation and security. Internet of Things for Sustainable Community Development, Springer.","DOI":"10.1007\/978-3-030-35291-2"},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"10973","DOI":"10.1109\/JIOT.2021.3051418","article-title":"Internet of things for agricultural applications: The state of the art","volume":"8","author":"Ojha","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"e2335","DOI":"10.1002\/smr.2335","article-title":"Security and provenance for Internet of Health Things: A systematic literature review","volume":"33","author":"Bai","year":"2021","journal-title":"J. Software Evol. Process."},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Zaman, U., Mehmood, F., Iqbal, N., Kim, J., and Ibrahim, M. (2022). Towards Secure and Intelligent Internet of Health Things: A Survey of Enabling Technologies and Applications. Electronics, 11.","DOI":"10.3390\/electronics11121893"},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Fantin Irudaya Raj, E., and Appadurai, M. (2022). Internet of Things-Based Smart Transportation System for Smart Cities. Intelligent Systems for Social Good, Springer.","DOI":"10.1007\/978-981-19-0770-8_4"},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Sharma, A., and Battula, R.B. (2022). The Internet of Things Solutions for Transportation. AI and IoT for Sustainable Development in Emerging Countries, Springer.","DOI":"10.1007\/978-3-030-90618-4_15"},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1109\/MWC.2019.1800512","article-title":"Designing a smart transportation system: An internet of things and big data approach","volume":"26","author":"Jan","year":"2019","journal-title":"IEEE Wirel. Commun."},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"925","DOI":"10.1016\/j.cie.2018.11.030","article-title":"A review of Internet of Things (IoT) embedded sustainable supply chain for industry 4.0 requirements","volume":"127","author":"Manavalan","year":"2019","journal-title":"Comput. Ind. Eng."},{"key":"ref_54","doi-asserted-by":"crossref","unstructured":"Ghasempour, A. (2019). Internet of things in smart grid: Architecture, applications, services, key technologies, and challenges. Inventions, 4.","DOI":"10.3390\/inventions4010022"},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1016\/j.bushor.2018.08.002","article-title":"The Internet of Things (IoT) in retail: Bridging supply and demand","volume":"62","author":"Caro","year":"2019","journal-title":"Bus. Horizons"},{"key":"ref_56","first-page":"98","article-title":"A survey on internet of vehicles: Applications, technologies, challenges and opportunities","volume":"12","author":"Priyan","year":"2019","journal-title":"Int. J. Adv. Intell. Paradig."},{"key":"ref_57","unstructured":"Gbadamosi, A.Q., Oyedele, L., Mahamadu, A.M., Kusimo, H., and Olawale, O. (2019, January 17\u201321). The role of internet of things in delivering smart construction. Proceedings of the CIB World Building Congress 2019, Hong Kong, China."},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"163","DOI":"10.20867\/tosee.05.42","article-title":"Internet of things (iot) in tourism and hospitality: Opportunities and challenges","volume":"5","author":"Car","year":"2019","journal-title":"Tour. South East Eur."},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"4","DOI":"10.5582\/bst.2022.01074","article-title":"Increasing demand for point-of-care testing and the potential to incorporate the Internet of medical things in an integrated health management system","volume":"16","author":"Karako","year":"2022","journal-title":"BioScience Trends"},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"411","DOI":"10.32604\/csse.2020.35.411","article-title":"Internet of Things in Healthcare: Architecture, Applications, Challenges, and Solutions","volume":"35","author":"Naresh","year":"2020","journal-title":"Comput. Syst. Sci. Eng."},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"81","DOI":"10.22381\/ajmr8120218","article-title":"Medical internet of Things-based Healthcare Systems, wearable biometric sensors, and personalized clinical care in remotely monitoring and caring for confirmed or suspected COVID-19 patients","volume":"8","author":"Morgan","year":"2021","journal-title":"Am. J. Med Res."},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"011104","DOI":"10.1115\/1.4045933","article-title":"Internet-of-things-enabled dual-channel iontophoretic drug delivery system for elderly patient medication management","volume":"14","author":"Reddy","year":"2020","journal-title":"J. Med. Devices"},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"2375","DOI":"10.1007\/s11276-019-02165-6","article-title":"I-CARES: Advancing health diagnosis and medication through IoT","volume":"26","author":"Latif","year":"2020","journal-title":"Wirel. Netw."},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"S76","DOI":"10.5213\/inj.1836144.072","article-title":"Recent patient health monitoring platforms incorporating internet of things-enabled smart devices","volume":"22","author":"Kang","year":"2018","journal-title":"Int. Neurourol. J."},{"key":"ref_65","doi-asserted-by":"crossref","first-page":"5081","DOI":"10.1016\/j.matpr.2021.01.583","article-title":"Automation and manufacturing of smart materials in Additive Manufacturing technologies using Internet of Things towards the adoption of Industry 4.0","volume":"45","author":"Ashima","year":"2021","journal-title":"Mater. Today Proc."},{"key":"ref_66","doi-asserted-by":"crossref","first-page":"e17508","DOI":"10.2196\/17508","article-title":"Requirements of health data management systems for biomedical care and research: Scoping review","volume":"22","author":"Ismail","year":"2020","journal-title":"J. Med. Internet Res."},{"key":"ref_67","doi-asserted-by":"crossref","unstructured":"Setiawan, R., Budiman, F., and Basori, W.I. (2019, January 28\u201329). Stress diagnostic system and digital medical record based on Internet of Things. Proceedings of the 2019 International Seminar on Intelligent Technology and Its Applications (ISITIA), Surabaya, Indonesia.","DOI":"10.1109\/ISITIA.2019.8937273"},{"key":"ref_68","doi-asserted-by":"crossref","first-page":"5570500","DOI":"10.1155\/2021\/5570500","article-title":"Optimization of remote public medical emergency management system with low delay based on internet of things","volume":"2021","author":"Feng","year":"2021","journal-title":"J. Healthc. Eng."},{"key":"ref_69","doi-asserted-by":"crossref","unstructured":"Rathore, M.M., Ahmad, A., and Paul, A. (2015, January 1\u20134). The Internet of Things based medical emergency management using Hadoop ecosystem. Proceedings of the 2015 IEEE SENSORS, Busan, Republic of Korea.","DOI":"10.1109\/ICSENS.2015.7370183"},{"key":"ref_70","first-page":"1","article-title":"Smart warehouse with internet of things supported inventory management system","volume":"118","author":"Yerpude","year":"2018","journal-title":"Int. J. Pure Appl. Math."},{"key":"ref_71","doi-asserted-by":"crossref","first-page":"3091","DOI":"10.3233\/JIFS-169252","article-title":"On the use of the Internet of Things and Web 2.0 in inventory management","volume":"32","author":"Mathaba","year":"2017","journal-title":"J. Intell. Fuzzy Syst."},{"key":"ref_72","doi-asserted-by":"crossref","unstructured":"Velasco, J., Alberto, L., Ambatali, H.D., Canilang, M., Daria, V., Liwanag, J.B., and Madrigal, G.A. (2019). Internet of things-based (IoT) inventory monitoring refrigerator using arduino sensor network. arXiv.","DOI":"10.11591\/ijeecs.v18.i1.pp508-515"},{"key":"ref_73","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1109\/TMC.2017.2702670","article-title":"EABS: An event-aware backpressure scheduling scheme for emergency Internet of Things","volume":"17","author":"Qiu","year":"2017","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_74","doi-asserted-by":"crossref","first-page":"581","DOI":"10.1016\/j.future.2019.12.028","article-title":"Securing internet of medical things systems: Limitations, issues and recommendations","volume":"105","author":"Yaacoub","year":"2020","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_75","doi-asserted-by":"crossref","unstructured":"Abbas, A., Alroobaea, R., Krichen, M., Rubaiee, S., Vimal, S., and Almansour, F.M. (2021). Blockchain-assisted secured data management framework for health information analysis based on Internet of Medical Things. Pers. Ubiquitous Comput., 1\u201314.","DOI":"10.1007\/s00779-021-01583-8"},{"key":"ref_76","doi-asserted-by":"crossref","unstructured":"Marwah, K., and Hajati, F. (2021, January 1\u20133). A Survey on Internet of Things in Telehealth. Proceedings of the Conference on Complex, Intelligent, and Software Intensive Systems, Asan, Republic of Korea.","DOI":"10.1007\/978-3-030-79725-6_23"},{"key":"ref_77","doi-asserted-by":"crossref","unstructured":"Mendes, D., Jorge, D., Pires, G., Panda, R., Ant\u00f3nio, R., Dias, P., and Oliveira, L. (2019, January 15\u201318). VITASENIOR-MT: A distributed and scalable cloud-based telehealth solution. Proceedings of the 2019 IEEE 5th World Forum on Internet of Things (WF-IoT), Limerick, Ireland.","DOI":"10.1109\/WF-IoT.2019.8767184"},{"key":"ref_78","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1109\/MPRV.2021.3068183","article-title":"Smart multimodal telehealth-IoT system for COVID-19 patients","volume":"20","author":"Emokpae","year":"2021","journal-title":"IEEE Pervasive Comput."},{"key":"ref_79","doi-asserted-by":"crossref","first-page":"102873","DOI":"10.1016\/j.jnca.2020.102873","article-title":"IoT-based telemedicine for disease prevention and health promotion: State-of-the-Art","volume":"173","author":"Albahri","year":"2021","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_80","doi-asserted-by":"crossref","unstructured":"Bayo-Monton, J.L., Martinez-Millana, A., Han, W., Fernandez-Llatas, C., Sun, Y., and Traver, V. (2018). Wearable sensors integrated with Internet of Things for advancing eHealth care. Sensors, 18.","DOI":"10.3390\/s18061851"},{"key":"ref_81","doi-asserted-by":"crossref","unstructured":"Amira, A., Agoulmine, N., Bensaali, F., Bermak, A., and Dimitrakopoulos, G. (2019). Empowering eHealth with smart internet of things (IoT) medical devices. J. Sens. Actuator Netw., 8.","DOI":"10.3390\/jsan8020033"},{"key":"ref_82","doi-asserted-by":"crossref","first-page":"1667","DOI":"10.1007\/s11277-020-07649-9","article-title":"Security and privacy in IOT: A survey","volume":"115","author":"Chanal","year":"2020","journal-title":"Wirel. Pers. Commun."},{"key":"ref_83","doi-asserted-by":"crossref","first-page":"82721","DOI":"10.1109\/ACCESS.2019.2924045","article-title":"A survey on IoT security: Application areas, security threats, and solution architectures","volume":"7","author":"Hassija","year":"2019","journal-title":"IEEE Access"},{"key":"ref_84","doi-asserted-by":"crossref","first-page":"219709","DOI":"10.1109\/ACCESS.2020.3037359","article-title":"A Survey of Security Challenges, Attacks Taxonomy and Advanced Countermeasures in the Internet of Things","volume":"8","author":"Khanam","year":"2020","journal-title":"IEEE Access"},{"key":"ref_85","doi-asserted-by":"crossref","unstructured":"Abosata, N., Al-Rubaye, S., Inalhan, G., and Emmanouilidis, C. (2021). Internet of things for system integrity: A comprehensive survey on security, attacks and countermeasures for industrial applications. Sensors, 21.","DOI":"10.3390\/s21113654"},{"key":"ref_86","doi-asserted-by":"crossref","first-page":"8707","DOI":"10.1109\/JIOT.2020.3045653","article-title":"Recent advances in the internet-of-medical-things (IoMT) systems security","volume":"8","author":"Ghubaish","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_87","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1080\/10798587.2014.888243","article-title":"Designing a healthcare authorization model based on cloud authentication","volume":"20","author":"Chen","year":"2014","journal-title":"Intell. Autom. Soft Comput."},{"key":"ref_88","unstructured":"Moghaddam, F.F., Moghaddam, S.G., Rouzbeh, S., Araghi, S.K., Alibeigi, N.M., and Varnosfaderani, S.D. (2014, January 14\u201316). A scalable and efficient user authentication scheme for cloud computing environments. Proceedings of the 2014 IEEE Region 10 Symposium, Kuala Lumpur, Malaysia."},{"key":"ref_89","doi-asserted-by":"crossref","unstructured":"Shrestha, N.M., Alsadoon, A., Prasad, P.W., Hourany, L., and Elchouemi, A. (2016, January 21\u201323). Enhanced e-health framework for security and privacy in healthcare system. Proceedings of the 2016 Sixth International Conference on Digital Information Processing and Communications (ICDIPC), Beirut, Lebanon.","DOI":"10.1109\/ICDIPC.2016.7470795"},{"key":"ref_90","doi-asserted-by":"crossref","first-page":"107838","DOI":"10.1109\/ACCESS.2020.3001152","article-title":"CSEF: Cloud-Based Secure and Efficient Framework for Smart Medical System Using ECC","volume":"8","author":"Kumari","year":"2020","journal-title":"IEEE Access"},{"key":"ref_91","doi-asserted-by":"crossref","first-page":"105054","DOI":"10.1016\/j.cmpb.2019.105054","article-title":"An Improved Three-Factor Authentication Scheme for Patient Monitoring using WSN in Remote Health-care System","volume":"182","author":"Soni","year":"2019","journal-title":"Comput. Methods Programs Biomed."},{"key":"ref_92","doi-asserted-by":"crossref","first-page":"619","DOI":"10.1007\/s40998-018-0146-5","article-title":"A Lightweight User Authentication Scheme for Cloud-IoT Based Healthcare Services","volume":"43","author":"Sharma","year":"2019","journal-title":"Iran J. Sci. Technol. Trans. Electr. Eng."},{"key":"ref_93","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1016\/j.ijinfomgt.2013.12.011","article-title":"Making use of cloud computing for healthcare provision: Opportunities and challenges","volume":"34","author":"Sultan","year":"2014","journal-title":"Int. J. Inf. Manag."},{"key":"ref_94","doi-asserted-by":"crossref","unstructured":"Allouzi, M.A., and Khan, J.I. (2019, January 10\u201312). Soter: Trust Discovery Framework for Internet of Medical Things (IoMT). Proceedings of the 2019 IEEE 20th International Symposium on \u201cA World of Wireless, Mobile and Multimedia Networks\u201d (WoWMoM), Washington, DC, USA.","DOI":"10.1109\/WoWMoM.2019.8792971"},{"key":"ref_95","doi-asserted-by":"crossref","first-page":"432","DOI":"10.1016\/j.procs.2018.04.064","article-title":"Performance analysis of end-to-end security schemes in healthcare IoT","volume":"130","author":"Moosavi","year":"2018","journal-title":"Procedia Comput. Sci."},{"key":"ref_96","doi-asserted-by":"crossref","first-page":"534","DOI":"10.1016\/j.compeleceng.2017.08.003","article-title":"An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks","volume":"69","author":"Challa","year":"2017","journal-title":"Comput. Electr. Eng."},{"key":"ref_97","doi-asserted-by":"crossref","first-page":"4485","DOI":"10.1109\/JIOT.2020.3027440","article-title":"FTM-IoMT: Fuzzy-based Trust Management for Preventing Sybil Attacks in Internet of Medical Things","volume":"8","author":"Almogren","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_98","doi-asserted-by":"crossref","first-page":"7916","DOI":"10.1007\/s11227-020-03570-x","article-title":"Towards design and implementation of security and privacy framework for Internet of Medical Things (IoMT) by leveraging blockchain and IPFS technology","volume":"77","author":"Kumar","year":"2021","journal-title":"J. Supercomput."},{"key":"ref_99","doi-asserted-by":"crossref","first-page":"647","DOI":"10.1177\/1932296817717007","article-title":"Fog computing and edge computing architectures for processing data from diabetes devices connected to the medical Internet of things","volume":"11","author":"Klonoff","year":"2017","journal-title":"J. Diabetes Sci. Technol."},{"key":"ref_100","doi-asserted-by":"crossref","unstructured":"Borthakur, D., Dubey, H., Constant, N., Mahler, L., and Mankodiya, K. (2017, January 14\u201316). Smart fog: Fog computing framework for unsupervised clustering analytics in wearable Internet of things. Proceedings of the 2017 IEEE Global Conference on Signal and Information Processing (GlobalSIP), Montreal, QC, Canada.","DOI":"10.1109\/GlobalSIP.2017.8308687"},{"key":"ref_101","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1109\/MC.2016.245","article-title":"Fog computing: Helping the Internet of Things realize its potential","volume":"49","author":"Dastjerdi","year":"2016","journal-title":"Computer"},{"key":"ref_102","doi-asserted-by":"crossref","unstructured":"Engineer, M., Tusha, R., Shah, A., and Adhvaryu, K. (2019, January 7\u20138). Insight into the Importance of Fog Computing in Internet of Medical Things (IoMT). Proceedings of the 2019 International Conference on Recent Advances in Energy-efficient Computing and Communication (ICRAECC), Nagercoil, India.","DOI":"10.1109\/ICRAECC43874.2019.8994985"},{"key":"ref_103","doi-asserted-by":"crossref","first-page":"47657","DOI":"10.1109\/ACCESS.2018.2856896","article-title":"Privacy-aware efficient fine-grained data access control in Internet of medical things based fog computing","volume":"6","author":"Wang","year":"2018","journal-title":"IEEE Access"},{"key":"ref_104","doi-asserted-by":"crossref","unstructured":"Akrivopoulos, O., Chatzigiannakis, I., Tselios, C., and Antoniou, A. (2017, January 4\u20138). On the deployment of healthcare applications over fog computing infrastructure. Proceedings of the 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC), Turin, Italy.","DOI":"10.1109\/COMPSAC.2017.178"},{"key":"ref_105","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1016\/j.comcom.2020.12.004","article-title":"An ultra-lightweight and secure RFID batch authentication scheme for IoMT","volume":"167","author":"Kang","year":"2021","journal-title":"Comput. Commun."},{"key":"ref_106","unstructured":"Cha, J.R., and Kim, J.H. (2006, January 8\u201310). Dynamic framed slotted ALOHA algorithms using fast tag estimation method for RFID system. Proceedings of the CCNC 2006, 2006 3rd IEEE Consumer Communications and Networking Conference, Las Vegas, NV, USA."},{"key":"ref_107","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1016\/j.comnet.2019.04.021","article-title":"A novel cluster head selection technique for edge-computing based IoMT systems","volume":"158","author":"Han","year":"2019","journal-title":"Comput. Netw."},{"key":"ref_108","doi-asserted-by":"crossref","first-page":"4926","DOI":"10.1109\/JIOT.2018.2876133","article-title":"Remote authentication schemes for wireless body area networks based on the Internet of Things","volume":"5","author":"Saeed","year":"2018","journal-title":"IEEE Internet Things J."},{"key":"ref_109","doi-asserted-by":"crossref","first-page":"271","DOI":"10.4258\/hir.2015.21.4.271","article-title":"Service-oriented security framework for remote medical services in the Internet of Things environment","volume":"21","author":"Lee","year":"2015","journal-title":"Healthc. Inform. Res."},{"key":"ref_110","doi-asserted-by":"crossref","first-page":"1368","DOI":"10.1109\/JSEN.2015.2502401","article-title":"BSN-Care: A secure IoT-based modern healthcare system using body sensor network","volume":"16","author":"Gope","year":"2015","journal-title":"IEEE Sens. J."},{"key":"ref_111","doi-asserted-by":"crossref","first-page":"4347","DOI":"10.1007\/s00521-018-3819-0","article-title":"Multi-layer security scheme for implantable medical devices","volume":"32","author":"Rathore","year":"2018","journal-title":"Neural Comput. Appl."},{"key":"ref_112","doi-asserted-by":"crossref","first-page":"107333","DOI":"10.1016\/j.comnet.2020.107333","article-title":"A lightweight and secure two-factor authentication scheme for wireless body area networks in healthcare IoT","volume":"177","author":"Fotouhi","year":"2020","journal-title":"Comput. Netw."},{"key":"ref_113","unstructured":"Mawgoud, A.A., Karadawy, A.I., and Tawfik, B.S. (2020). A Secure Authentication Technique in Internet of Medical Things through Machine Learning. J. Contrib."},{"key":"ref_114","doi-asserted-by":"crossref","unstructured":"Yanambaka, V., Mohanty, S., Kougianos, E., Puthal, D., and Rachakonda, L. (2019, January 16\u201318). PMsec: PUF-Based Energy-Efficient Authentication of Devices in the Internet of Medical Things (IoMT). Proceedings of the 2019 IEEE International Symposium on Smart Electronic Systems (iSES) (Formerly iNiS), Rourkela, India.","DOI":"10.1109\/iSES47678.2019.00079"},{"key":"ref_115","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1016\/S1005-8885(13)60218-6","article-title":"Enhanced mutual authentication model of IoT","volume":"20","author":"Yang","year":"2013","journal-title":"J. China Univ. Posts Telecommun."},{"key":"ref_116","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1016\/j.cose.2019.03.002","article-title":"Efficient Privacy-Preserving Device Authentication in WBANs for Industrial e-Health Applications","volume":"83","author":"Odelu","year":"2019","journal-title":"Comput. Secur."},{"key":"ref_117","doi-asserted-by":"crossref","first-page":"107803","DOI":"10.1016\/j.compeleceng.2022.107803","article-title":"Slight: A lightweight authentication scheme for smart healthcare services","volume":"99","author":"Amintoosi","year":"2022","journal-title":"Comput. Electr. Eng."},{"key":"ref_118","doi-asserted-by":"crossref","first-page":"103414","DOI":"10.1016\/j.jnca.2022.103414","article-title":"A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions","volume":"204","author":"Kumar","year":"2022","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_119","doi-asserted-by":"crossref","first-page":"183339","DOI":"10.1109\/ACCESS.2019.2960617","article-title":"Security and privacy for the Internet of medical things enabled healthcare systems: A survey","volume":"7","author":"Sun","year":"2019","journal-title":"IEEE Access"},{"key":"ref_120","doi-asserted-by":"crossref","first-page":"103164","DOI":"10.1016\/j.jnca.2021.103164","article-title":"A systematic review of IoT in healthcare: Applications, techniques, and trends","volume":"192","author":"Kashani","year":"2021","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_121","doi-asserted-by":"crossref","unstructured":"Gopalan, S.S., Raza, A., and Almobaideen, W. (2021, January 16\u201318). IoT security in healthcare using AI: A survey. Proceedings of the 2020 International Conference on Communications, Signal Processing, and Their Applications (ICCSPA), Sharjah, United Arab Emirates.","DOI":"10.1109\/ICCSPA49915.2021.9385711"},{"key":"ref_122","doi-asserted-by":"crossref","first-page":"5503","DOI":"10.1007\/s11276-020-02340-0","article-title":"Review of security challenges in healthcare internet of things","volume":"27","author":"Somasundaram","year":"2021","journal-title":"Wirel. Netw."},{"key":"ref_123","doi-asserted-by":"crossref","first-page":"87","DOI":"10.12700\/APH.18.3.2021.3.5","article-title":"Secure remote user authentication scheme on health care, IoT and cloud applications: A Multilayer Systematic Survey","volume":"18","author":"Rajasekar","year":"2021","journal-title":"Acta Polytech. Hung."},{"key":"ref_124","doi-asserted-by":"crossref","first-page":"e4049","DOI":"10.1002\/ett.4049","article-title":"A survey on security threats and countermeasures in Internet of medical things (IoMT)","volume":"33","author":"Papaioannou","year":"2022","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"ref_125","doi-asserted-by":"crossref","unstructured":"Trnka, M., Abdelfattah, A.S., Shrestha, A., Coffey, M., and Cerny, T. (2022). Systematic Review of Authentication and Authorization Advancements for the Internet of Things. Sensors, 22.","DOI":"10.3390\/s22041361"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/23\/9089\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T01:25:18Z","timestamp":1760145918000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/23\/9089"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,23]]},"references-count":125,"journal-issue":{"issue":"23","published-online":{"date-parts":[[2022,12]]}},"alternative-id":["s22239089"],"URL":"https:\/\/doi.org\/10.3390\/s22239089","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,11,23]]}}}