Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Exploring Authentication Protocols for Secure and Efficient Internet of Medical Things Systems

Full metadata record
DC Field Value Language
dc.contributor.authorLee, Seungbin-
dc.contributor.authorKang, Kyeong A.-
dc.contributor.authorLee, Soowang-
dc.contributor.authorKim, Jiyoon-
dc.date.accessioned2025-11-27T05:30:20Z-
dc.date.available2025-11-27T05:30:20Z-
dc.date.issued2025-10-
dc.identifier.issn2079-9292-
dc.identifier.issn2079-9292-
dc.identifier.urihttps://scholarworks.gnu.ac.kr/handle/sw.gnu/81019-
dc.description.abstractThe Internet of Medical Things (IoMT) comprises the application of traditional Internet of Things (IoT) technologies in the healthcare domain. IoMT ensures seamless data-sharing among hospitals, patients, and healthcare service providers, thereby transforming the medical environment. The adoption of IoMT technology has made it possible to provide various medical services such as chronic disease care, emergency response, and preventive treatment. However, the sensitivity of medical data and the resource limitations of IoMT devices present persistent challenges in designing authentication protocols. Our study reviews the overall architecture of the IoMT and recent studies on IoMT protocols in terms of security requirements and computational costs. In addition, this study evaluates security using formal verification tools with Scyther and SVO Logic. The security requirements include authentication, mutual authentication, confidentiality, integrity, untraceability, privacy preservation, anonymity, multi-factor authentication, session key security, forward and backward secrecy, and lightweight operation. The analysis shows that protocols satisfying a multiple security requirements tend to have higher computational costs, whereas protocols with lower computational costs often provide weaker security. This demonstrates the trade-off relationship between robust security and lightweight operation. These indicators assist in selecting protocols by balancing the allocated resources and required security for each scenario. Based on the comparative analysis and a security evaluation of the IoMT, this paper provides security guidelines for future research. Moreover, it summarizes the minimum security requirements and offers insights that practitioners can utilize in real-world settings.-
dc.language영어-
dc.language.isoENG-
dc.publisherMDPI AG-
dc.titleExploring Authentication Protocols for Secure and Efficient Internet of Medical Things Systems-
dc.typeArticle-
dc.publisher.location스위스-
dc.identifier.doi10.3390/electronics14214164-
dc.identifier.scopusid2-s2.0-105021401475-
dc.identifier.wosid001612511400001-
dc.identifier.bibliographicCitationElectronics (Basel), v.14, no.21-
dc.citation.titleElectronics (Basel)-
dc.citation.volume14-
dc.citation.number21-
dc.type.docTypeReview-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalResearchAreaPhysics-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.relation.journalWebOfScienceCategoryPhysics, Applied-
dc.subject.keywordPlusDESIGN-
dc.subject.keywordAuthorInternet of Medical Things-
dc.subject.keywordAuthorauthentication protocol-
dc.subject.keywordAuthorformal verification-
Files in This Item
There are no files associated with this item.
Appears in
Collections
ETC > Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Kim, Ji Yoon photo

Kim, Ji Yoon
IT공과대학 (컴퓨터공학부)
Read more

Altmetrics

Total Views & Downloads

BROWSE