Exploring Authentication Protocols for Secure and Efficient Internet of Medical Things Systems
- Authors
- Lee, Seungbin; Kang, Kyeong A.; Lee, Soowang; Kim, Jiyoon
- Issue Date
- Oct-2025
- Publisher
- MDPI AG
- Keywords
- Internet of Medical Things; authentication protocol; formal verification
- Citation
- Electronics (Basel), v.14, no.21
- Indexed
- SCIE
SCOPUS
- Journal Title
- Electronics (Basel)
- Volume
- 14
- Number
- 21
- URI
- https://scholarworks.gnu.ac.kr/handle/sw.gnu/81019
- DOI
- 10.3390/electronics14214164
- ISSN
- 2079-9292
2079-9292
- Abstract
- The Internet of Medical Things (IoMT) comprises the application of traditional Internet of Things (IoT) technologies in the healthcare domain. IoMT ensures seamless data-sharing among hospitals, patients, and healthcare service providers, thereby transforming the medical environment. The adoption of IoMT technology has made it possible to provide various medical services such as chronic disease care, emergency response, and preventive treatment. However, the sensitivity of medical data and the resource limitations of IoMT devices present persistent challenges in designing authentication protocols. Our study reviews the overall architecture of the IoMT and recent studies on IoMT protocols in terms of security requirements and computational costs. In addition, this study evaluates security using formal verification tools with Scyther and SVO Logic. The security requirements include authentication, mutual authentication, confidentiality, integrity, untraceability, privacy preservation, anonymity, multi-factor authentication, session key security, forward and backward secrecy, and lightweight operation. The analysis shows that protocols satisfying a multiple security requirements tend to have higher computational costs, whereas protocols with lower computational costs often provide weaker security. This demonstrates the trade-off relationship between robust security and lightweight operation. These indicators assist in selecting protocols by balancing the allocated resources and required security for each scenario. Based on the comparative analysis and a security evaluation of the IoMT, this paper provides security guidelines for future research. Moreover, it summarizes the minimum security requirements and offers insights that practitioners can utilize in real-world settings.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - ETC > Journal Articles

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.