TY - JOUR
T1 - Authentication and Identity Management of IoHT Devices
T2 - Achievements, Challenges, and Future Directions
AU - Mamdouh, Moustafa
AU - Awad, Ali Ismail
AU - Khalaf, Ashraf A.M.
AU - Hamed, Hesham F.A.
N1 - Publisher Copyright:
© 2021 The Author(s)
PY - 2021/12
Y1 - 2021/12
N2 - The Internet of Things (IoT) paradigm serves as an enabler technology in several domains. Healthcare is one of the domains in which the IoT plays a vital role in increasing quality of life. On the one hand, the Internet of Healthcare Things (IoHT) creates smart environments and increases the efficiency and intelligence of the provided services. On the other hand, unfortunately, it suffers from security vulnerabilities inside and outside. There are various techniques used to identify, access, and securely manage IoT devices. Additionally, sensors, monitoring, key confidentiality management, integrity, and sensitive data accessibility are required. This study focuses on the IoT perception layer and offers a comprehensive review of the IoHT or the Internet of Medical Things (IoMT). The paper covers the current trends and open challenges in IoHT device authentication mechanisms, such as the physically unclonable function (PUF) and blockchain-based techniques. In addition, IoT simulators and verification tools are included. Finally, a future vision regarding the evolution of IoHT device authentication in terms of the utilization of different technologies, such as artificial intelligence, cloud computing, and 5G, is provided at end of this review.
AB - The Internet of Things (IoT) paradigm serves as an enabler technology in several domains. Healthcare is one of the domains in which the IoT plays a vital role in increasing quality of life. On the one hand, the Internet of Healthcare Things (IoHT) creates smart environments and increases the efficiency and intelligence of the provided services. On the other hand, unfortunately, it suffers from security vulnerabilities inside and outside. There are various techniques used to identify, access, and securely manage IoT devices. Additionally, sensors, monitoring, key confidentiality management, integrity, and sensitive data accessibility are required. This study focuses on the IoT perception layer and offers a comprehensive review of the IoHT or the Internet of Medical Things (IoMT). The paper covers the current trends and open challenges in IoHT device authentication mechanisms, such as the physically unclonable function (PUF) and blockchain-based techniques. In addition, IoT simulators and verification tools are included. Finally, a future vision regarding the evolution of IoHT device authentication in terms of the utilization of different technologies, such as artificial intelligence, cloud computing, and 5G, is provided at end of this review.
KW - Attacks
KW - Healthcare
KW - IoHT
KW - IoHT device authentication
KW - IoHT device identification
KW - IoT
KW - Security
KW - Threats
KW - Vulnerabilities
UR - http://www.scopus.com/inward/record.url?scp=85116905591&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85116905591&partnerID=8YFLogxK
U2 - 10.1016/j.cose.2021.102491
DO - 10.1016/j.cose.2021.102491
M3 - Review article
AN - SCOPUS:85116905591
SN - 0167-4048
VL - 111
JO - Computers and Security
JF - Computers and Security
M1 - 102491
ER -