Cited 0 time in
Exploring Authentication Protocols for Secure and Efficient Internet of Medical Things Systems
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Lee, Seungbin | - |
| dc.contributor.author | Kang, Kyeong A. | - |
| dc.contributor.author | Lee, Soowang | - |
| dc.contributor.author | Kim, Jiyoon | - |
| dc.date.accessioned | 2025-11-27T05:30:20Z | - |
| dc.date.available | 2025-11-27T05:30:20Z | - |
| dc.date.issued | 2025-10 | - |
| dc.identifier.issn | 2079-9292 | - |
| dc.identifier.issn | 2079-9292 | - |
| dc.identifier.uri | https://scholarworks.gnu.ac.kr/handle/sw.gnu/81019 | - |
| dc.description.abstract | The Internet of Medical Things (IoMT) comprises the application of traditional Internet of Things (IoT) technologies in the healthcare domain. IoMT ensures seamless data-sharing among hospitals, patients, and healthcare service providers, thereby transforming the medical environment. The adoption of IoMT technology has made it possible to provide various medical services such as chronic disease care, emergency response, and preventive treatment. However, the sensitivity of medical data and the resource limitations of IoMT devices present persistent challenges in designing authentication protocols. Our study reviews the overall architecture of the IoMT and recent studies on IoMT protocols in terms of security requirements and computational costs. In addition, this study evaluates security using formal verification tools with Scyther and SVO Logic. The security requirements include authentication, mutual authentication, confidentiality, integrity, untraceability, privacy preservation, anonymity, multi-factor authentication, session key security, forward and backward secrecy, and lightweight operation. The analysis shows that protocols satisfying a multiple security requirements tend to have higher computational costs, whereas protocols with lower computational costs often provide weaker security. This demonstrates the trade-off relationship between robust security and lightweight operation. These indicators assist in selecting protocols by balancing the allocated resources and required security for each scenario. Based on the comparative analysis and a security evaluation of the IoMT, this paper provides security guidelines for future research. Moreover, it summarizes the minimum security requirements and offers insights that practitioners can utilize in real-world settings. | - |
| dc.language | 영어 | - |
| dc.language.iso | ENG | - |
| dc.publisher | MDPI AG | - |
| dc.title | Exploring Authentication Protocols for Secure and Efficient Internet of Medical Things Systems | - |
| dc.type | Article | - |
| dc.publisher.location | 스위스 | - |
| dc.identifier.doi | 10.3390/electronics14214164 | - |
| dc.identifier.scopusid | 2-s2.0-105021401475 | - |
| dc.identifier.wosid | 001612511400001 | - |
| dc.identifier.bibliographicCitation | Electronics (Basel), v.14, no.21 | - |
| dc.citation.title | Electronics (Basel) | - |
| dc.citation.volume | 14 | - |
| dc.citation.number | 21 | - |
| dc.type.docType | Review | - |
| dc.description.isOpenAccess | N | - |
| dc.description.journalRegisteredClass | scie | - |
| dc.description.journalRegisteredClass | scopus | - |
| dc.relation.journalResearchArea | Computer Science | - |
| dc.relation.journalResearchArea | Engineering | - |
| dc.relation.journalResearchArea | Physics | - |
| dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
| dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
| dc.relation.journalWebOfScienceCategory | Physics, Applied | - |
| dc.subject.keywordPlus | DESIGN | - |
| dc.subject.keywordAuthor | Internet of Medical Things | - |
| dc.subject.keywordAuthor | authentication protocol | - |
| dc.subject.keywordAuthor | formal verification | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
Gyeongsang National University Central Library, 501, Jinju-daero, Jinju-si, Gyeongsangnam-do, 52828, Republic of Korea+82-55-772-0532
COPYRIGHT 2022 GYEONGSANG NATIONAL UNIVERSITY LIBRARY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.
