Affiliations Information Technology, St. John College of Engineering and Management, Mumbai University, India
In today's world, security is the most significant concern. We produce tons of data that must be unbroken secure. Be it our data or data associated with a transnational company. The data can be protected with the usage of authentication and authorization. Authentication and authorization help to verify and validate a user's identification. Applications in today's society are swaying towards IoT concepts as this delivers them agility, competency, conventionality, and future-proof. However, this winds up into a higher security risk. The projected system proposes a multi-factor authentication methodology or, in simple terms, presents a 3-way authentication. This constitutes the well-known authentication levels that are the password and OTP but mainly focuses on the third step signifying the most protected method of authentication that's the challenge-response pair mechanism. The generated challenge is exclusive to each user, and therefore, the gadget.
Anita Chaudhari, Janice Rodrigues, Aparna Vattamparambil, Revati Warang, Vidya More."Secure Authentication Mechanism in IoT Based Healthcare System". International Journal of Computer Engineering In Research Trends (IJCERT) , ISSN:2349-7084, Vol.7, Issue 05,pp.13-18, May - 2020, URL:https://ijcert.org/ems/ijcert_papers/V7I503.pdf,
Keywords : Secure Authentication Mechanism in IoT Based Healthcare System
1. Two Factor Authentication Using Mobile Phones" by Fadi Aloul, Syed Zahidi, Wassim El-Hajj, IEEE, 2016.
2. "A Security-Enhanced Authentication and Key Distribution Protocol for Wireless Networks" by Chao Lv, Maode Ma, Hui Li, and Jianfeng Ma, IEEE, 2010.
3. "Token Based Authentication using Mobile Phone" by Parekh Tanvi, Gawshinde Sonal, Sharma Mayank Kumar, IEEE, 2011.
4. "A survey on Biometric Based Authentication in cloud computing" by P. Padma and Dr. S. Srinivasan, IEEE, 2016.
5. "Password Security system with 2-way authentication" by Subhradeep Biswas and Sudipa Biswas, IEEE, 2017.
6. "Secure Authentication with Dynamic Password" by Zubayr Khalid, Pritam Paul, Soummyo Priyo Chattopadhyay, Anik Naha Biswas, IEEE, 2016.
7. "Overview of PUF - Based Hardware Security Solutions for Internet of Things" by Basel Halak, Mark Zwolinski and M. Syafiq Mispan, IEEE, 2016.
8. "Performance Evaluation of Cryptographic Ciphers on IoT Devices" by Kedar Deshpande and Praneet Singh.
9. “Secure Medical Data Transmission Model for IoT-based Healthcare Systems” by Mohamed Elhoseny, Gustavo Ramírez-González, Osama M. Abu-Elnasr, Shihab A. Shawkat, Arunkumar N, Ahmed Farouk, IEEE, 2018.
10. "A PHY-Aided Secure IoT Healthcare System With Collaboration of Social Networks" by Peng Hao and Xianbin Wang, IEEE, 2017.
11. "Device Authentication Mechanism for IoT Enabled Healthcare System" by Shantha Mary Joshitta. R and Arockiam L.
12. "Design of a secure medical data sharing system via an authorized mechanism" by Chin-Ling Chen, Jin-Xin Hu, Chun-Long Fan and Kun-hao Wang, IEEE, 2016.
13. "A Comprehensive Survey of Security Mechanisms in Healthcare Applications" by Mr. D. Stalin David and Dr. A. Jeyachandran.
14. "A Robust Physical Unclonable Function with Enhanced Challenge-Response Set" by Abhranil Maiti, Inyoung Kim, and Patrick Schaumont, IEEE, 2012.
15. "Authenticating IoT Devices with Physically Unclonable Functions Models" by Mario Barbareschi, Pierpaolo Bagnasco, Antonino Mazzeo, IEEE, 2015.
16. "Lightweight PUF-Based Authentication Protocol for IoT Devices" by Yildiran Yilmaz, Steve R. Gunn, Basel Halak, IEEE, 2018.
17. "E-Healthcare: Remote Monitoring, Privacy, and Security" by Olga Boric-Lubecke, Xiaomeng Gao, Ehsan Yavari, Mehran Baboli, Aditya Singh, and Victor M Lubecke, IEEE, 2014.
18. "System Level Design of a Secure Healthcare Smart Card System" by Merve Oksar and Berna Ors and Gokay Saldamli, IEEE, 2011.
19. "Monitoring Patients Via A Secure And Mobile Healthcare System" By Yonglin Ren, Richard Werner Nelem Pazzi, And Azzedine Boukerche, Ieee, 2010.
20. "Security and Privacy for the Internet of Medical Things Enabled Healthcare Systems: A Survey" by YINGNAN SUN , FRANK P.-W. LO , AND BENNY LO, IEEE, 2019
Authors are not required to pay any article-processing charges (APC) for their article to be published open access in Journal IJCERT. No charge is involved in any stage of the publication process, from administrating peer review to copy editing and hosting the final article on dedicated servers. This is free for all authors.
News & Events
Latest issue :Volume 10 Issue 1 Articles In press
☞ INVITING SUBMISSIONS FOR THE NEXT ISSUE :
☞ LAST DATE OF SUBMISSION : 31st March 2023
☞ SUBMISSION TO FIRST DECISION : In 7 Days
☞ FINAL DECISION : IN 3 WEEKS FROM THE DAY OF SUBMISSION
All the authors, conference coordinators, conveners, and guest editors kindly check their articles' originality before submitting them to IJCERT. If any material is found to be duplicate submission or sent to other journals when the content is in the process with IJCERT, fabricated data, cut and paste (plagiarized), at any stage of processing of material, IJCERT is bound to take the following actions.
1. Rejection of the article.
2. The author will be blocked for future communication with IJCERT if duplicate articles are submitted.
3. A letter regarding this will be posted to the Principal/Director of the Institution where the study was conducted.
4. A List of blacklisted authors will be shared among the Chief Editors of other prestigious Journals
We have been screening articles for plagiarism with a world-renowned tool: Turnitin However, it is only rejected if found plagiarized. This more stern action is being taken because of the illegal behavior of a handful of authors who have been involved in ethical misconduct. The Screening and making a decision on such articles costs colossal time and resources for the journal. It directly delays the process of genuine materials.