Main Article Content

Mahmoud Rajallah Asassfeh
Nadim Obeid
Wesam Almobaideen


Abstract - Nowadays, with the increase in chronic diseases and the aging population in all countries, it has become a huge burden on hospitals to accommodate all patients and monitor them. Applying wireless sensors network for the IoT based medical system enabled medical doctors and families to monitor patients' conditions all the time through the collected data from sensors connected to the patients. These sensitive data should be transmitted through secure channels to hospitals or medical centers. Many approaches proposed to present solutions to the security challenges of the IoT based medical systems. In this paper we review the most prominent approaches that tackle the security and Anonymous Authentication (AA)in healthcare systems. Furthermore, we compare between these approaches in term of types of security attacks, security measures, the approaches that were used to solve some of the security issues, and the network technology used such as WSN and RFID. We found that every approach has some drawbacks regarding security attacks and security measures. We believe that some of security attacks like denial of service and modification attacks need to be considered in future research. The same goes for security measures like non-traceability, and backward and forward secrecy. Moreover, 80%of authentication schemes use certificateless authentication. This type of authentication has low computation cost and saves energy which is convenient to the constrained devices. AVISPA and Ban logic are the most common tools used for validation in the surveyed approaches. A comparison between these techniques according to different features is illustrated which may help the researchers to easily identify the gaps in the surveyed approaches so as to propose solutions for these issues

Article Details

How to Cite
Asassfeh, M. R., Obeid, N., & Almobaideen, W. (2022). ANONYMOUS AUTHENTICATION PROTOCOLS FOR IOT BASED HEALTHCARE: A SURVEY. International Journal of Communication Networks and Information Security (IJCNIS), 12(3). (Original work published December 21, 2020)
Surveys/ Reviews