SwePub
Sök i LIBRIS databas

  Extended search

WFRF:(Hamed Hesham F. A.)
 

Search: WFRF:(Hamed Hesham F. A.) > (2021) > Authentication and ...

  • 1 of 1
  • Previous record
  • Next record
  •    To hitlist
  • Mamdouh, MoustafaElectronics and Communications Department, Faculty of Engineering, Minia University, Minia, Egypt (author)

Authentication and Identity Management of IoHT Devices : Achievements, Challenges, and Future Directions

  • Article/chapterEnglish2021

Publisher, publication year, extent ...

  • Elsevier,2021
  • printrdacarrier

Numbers

  • LIBRIS-ID:oai:DiVA.org:ltu-87304
  • https://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-87304URI
  • https://doi.org/10.1016/j.cose.2021.102491DOI

Supplementary language notes

  • Language:English
  • Summary in:English

Part of subdatabase

Classification

  • Subject category:ref swepub-contenttype
  • Subject category:for swepub-publicationtype

Notes

  • Validerad;2021;Nivå 2;2021-10-14 (beamah)
  • The Internet of Things (IoT) paradigm serves as an enabler technology in several domains. Healthcare is one of the domains in which the IoT plays a vital role in increasing quality of life. On the one hand, the Internet of Healthcare Things (IoHT) creates smart environments and increases the efficiency and intelligence of the provided services. On the other hand, unfortunately, it suffers from security vulnerabilities inside and outside. There are various techniques used to identify, access, and securely manage IoT devices. Additionally, sensors, monitoring, key confidentiality management, integrity, and sensitive data accessibility are required. This study focuses on the IoT perception layer and offers a comprehensive review of the IoHT or the Internet of Medical Things (IoMT). The paper covers the current trends and open challenges in IoHT device authentication mechanisms, such as the physically unclonable function (PUF) and blockchain-based techniques. In addition, IoT simulators and verification tools are included. Finally, a future vision regarding the evolution of IoHT device authentication in terms of the utilization of different technologies, such as artificial intelligence, cloud computing, and 5G, is provided at end of this review.

Subject headings and genre

Added entries (persons, corporate bodies, meetings, titles ...)

  • Awad, Ali IsmailLuleå tekniska universitet,Digitala tjänster och system,College of Information Technology, United Arab Emirates University, Al Ain P.O. Box 17551, United Arab Emirates; Faculty of Engineering, Al-Azhar University, Qena P.O. Box 83513, Egypt; Centre for Security, Communications and Network Research, University of Plymouth, Plymouth PL4 8AA, U.K(Swepub:ltu)ismawa (author)
  • Khalaf, Ashraf A.M.Electronics and Communications Department, Faculty of Engineering, Minia University, Minia, Egypt (author)
  • Hamed, Hesham F.A.Electronics and Communications Department, Faculty of Engineering, Minia University, Minia, Egypt; Department of Telecommunications Engineering, Egyptian Russian University, Cairo, Egypt (author)
  • Electronics and Communications Department, Faculty of Engineering, Minia University, Minia, EgyptDigitala tjänster och system (creator_code:org_t)

Related titles

  • In:Computers & security (Print): Elsevier1110167-40481872-6208

Internet link

Find in a library

To the university's database

  • 1 of 1
  • Previous record
  • Next record
  •    To hitlist

Search outside SwePub

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Close

Copy and save the link in order to return to this view