Authentication in the Internet of Medical Things: Taxonomy, Review, and Open Issues

The Internet of Medical Things (IoMT) has revolutionized the world of healthcare by remotely connecting patients to healthcare providers through medical devices connected over the Internet. IoMT devices collect patients’ medical data and share them with healthcare providers, who analyze it for early...

Full description

Bibliographic Details
Main Authors: Norah Alsaeed, Farrukh Nadeem
Format: Article
Language:English
Published: MDPI AG 2022-07-01
Series:Applied Sciences
Subjects:
Online Access:https://www.mdpi.com/2076-3417/12/15/7487
_version_ 1797414720056066048
author Norah Alsaeed
Farrukh Nadeem
author_facet Norah Alsaeed
Farrukh Nadeem
author_sort Norah Alsaeed
collection DOAJ
description The Internet of Medical Things (IoMT) has revolutionized the world of healthcare by remotely connecting patients to healthcare providers through medical devices connected over the Internet. IoMT devices collect patients’ medical data and share them with healthcare providers, who analyze it for early control of diseases. The security of patients’ data is of prime importance in IoMT. Authentication of users and devices is the first layer of security in IoMT. However, because of diverse and resource-constrained devices, authentication in IoMT is a challenging task. Several authentication schemes for IoMT have been proposed in the literature. However, each of them has its own pros and cons. To identify, evaluate and summarize the current literature on authentication in IoMT, we conducted a systematic review of 118 articles published between 2016 and 2021. We also established a taxonomy of authentication schemes in IoMT from seven different perspectives. We observed that most of the authentication schemes use a distributed architecture and public key infrastructure. It was also observed that hybrid cryptography approaches have become popular to overcome the shortcomings of single cryptographic approaches. Authentication schemes in IoMT need to support end-to-end, cross-layer, and cross-domain authentication. Finally, we discuss some open issues and future directions.
first_indexed 2024-03-09T05:37:39Z
format Article
id doaj.art-56d563b2a76842b1af9ec2ec25310857
institution Directory Open Access Journal
issn 2076-3417
language English
last_indexed 2024-03-09T05:37:39Z
publishDate 2022-07-01
publisher MDPI AG
record_format Article
series Applied Sciences
spelling doaj.art-56d563b2a76842b1af9ec2ec253108572023-12-03T12:27:34ZengMDPI AGApplied Sciences2076-34172022-07-011215748710.3390/app12157487Authentication in the Internet of Medical Things: Taxonomy, Review, and Open IssuesNorah Alsaeed0Farrukh Nadeem1Department of Information Systems, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 21589, Saudi ArabiaDepartment of Information Systems, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 21589, Saudi ArabiaThe Internet of Medical Things (IoMT) has revolutionized the world of healthcare by remotely connecting patients to healthcare providers through medical devices connected over the Internet. IoMT devices collect patients’ medical data and share them with healthcare providers, who analyze it for early control of diseases. The security of patients’ data is of prime importance in IoMT. Authentication of users and devices is the first layer of security in IoMT. However, because of diverse and resource-constrained devices, authentication in IoMT is a challenging task. Several authentication schemes for IoMT have been proposed in the literature. However, each of them has its own pros and cons. To identify, evaluate and summarize the current literature on authentication in IoMT, we conducted a systematic review of 118 articles published between 2016 and 2021. We also established a taxonomy of authentication schemes in IoMT from seven different perspectives. We observed that most of the authentication schemes use a distributed architecture and public key infrastructure. It was also observed that hybrid cryptography approaches have become popular to overcome the shortcomings of single cryptographic approaches. Authentication schemes in IoMT need to support end-to-end, cross-layer, and cross-domain authentication. Finally, we discuss some open issues and future directions.https://www.mdpi.com/2076-3417/12/15/7487Internet of Medical Thingssecurity requirementsIoMT authentication schemeIoMT authentication attacks
spellingShingle Norah Alsaeed
Farrukh Nadeem
Authentication in the Internet of Medical Things: Taxonomy, Review, and Open Issues
Applied Sciences
Internet of Medical Things
security requirements
IoMT authentication scheme
IoMT authentication attacks
title Authentication in the Internet of Medical Things: Taxonomy, Review, and Open Issues
title_full Authentication in the Internet of Medical Things: Taxonomy, Review, and Open Issues
title_fullStr Authentication in the Internet of Medical Things: Taxonomy, Review, and Open Issues
title_full_unstemmed Authentication in the Internet of Medical Things: Taxonomy, Review, and Open Issues
title_short Authentication in the Internet of Medical Things: Taxonomy, Review, and Open Issues
title_sort authentication in the internet of medical things taxonomy review and open issues
topic Internet of Medical Things
security requirements
IoMT authentication scheme
IoMT authentication attacks
url https://www.mdpi.com/2076-3417/12/15/7487
work_keys_str_mv AT norahalsaeed authenticationintheinternetofmedicalthingstaxonomyreviewandopenissues
AT farrukhnadeem authenticationintheinternetofmedicalthingstaxonomyreviewandopenissues