Research Article

Secure Patient Authentication Framework in the Healthcare System Using Wireless Medical Sensor Networks

Table 1

Comprehensive literature review.

Referenceā€‰Technique usedMain contributionLimitation

[24]KlonoffCertificate-based datagram transport layer security (DTLS)The proposed scheme consists of a secure and efficient end-user authentication and authorization architecture based on the certificate based DTLS handshake, secure end-to-end communication based on session resumption, and full mobility based on interconnected gatewaysThe authentication is performed in several steps, due to which multiple round trips can degrade the performance of the process. Also, the securities of the said architecture can easily be breached by an attacker

[25]Borthakur et al.Access-control determination (ACD) algorithmThis work proposes a fine-grained access control mechanism suitable for various implementation scenarios, including data storage, directories, and file managementThe execution time length is associated with the number of the input task. Therefore the performance will be degraded by increasing the number of input tasks

[26]Dastjerdi and BuyyaBLE bonding processThis paper addressed some of the fundamental problems. In designing, implementing, and deploying an end-to-end healthcare application that leverages the advantages of the fog computing approachIf the number of corresponding ECG devices increases, more storage will be required, and throughput will be reduced

[27]Engineer et al.Contextual-based access control (CBAC) technique and role-based access control (RBAC)The paper suggested service-oriented security architecture in the IoT environment for remote medical services. The proposed framework accommodates dynamic security elements and requirements regarding different kinds of usersThe proposed framework reduces sensitive information exposure by applying a security channel and encryption during the transmission of sensitive information between network parts

[9]Sanaz et al.Lightweight anonymous authentication protocolA secure IoT-based healthcare system was proposed using BSN, called BSN-Care, which can efficiently accomplish various security requirements of the BSN-based healthcareThe proposed work can have stolen verifier attack, replay attack, and anonymity issue

[20]Wang et al.Machine learning/deep learningThis paper introduces a novel ECG-based biometric authentication approach that utilizes legendre polynomial extraction and MLP classifier for identification and authorizationLack of standardization, not accommodate changes to the biometric overtime, sample collection phase is influenced by environmental and mental conditions

[28]Akrivopoulos et al.Physical unclonable functions (PUFs)This paper presents a PUF based device authentication protocol capable of authenticating devices without demanding high CPU power from the end devicesNo information about the end device is directly stored on the server, requiring an extra layer of security