An Adaptive Authentication Schemes based on the user Mobility in Medical-IoT
P. Jyotheeswari1, N. Jeyanthi2
1P. Jyotheeswari, Research Scholar, SCOPE, Vellore Institute of Technology, Vellore, Tamilnadu, India.
2N. Jeyanthi, Associate Professor, SITE, Vellore Institute of Technology, Vellore, Tamilnadu, India.
Manuscript received on November 22, 2019. | Revised Manuscript received on December 15, 2019. | Manuscript published on December 30, 2019. | PP: 2708-2713 | Volume-9 Issue-2, December, 2019. | Retrieval Number: B3051129219/2019©BEIESP | DOI: 10.35940/ijeat.B3051.129219
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: The utilization of wireless communication in the medical The utilization of wireless communication in the medical filed led to the quality life of patients. The patients who are residing in the remote areas can consult and communicate with the doctors through the health care authority. However, providing the security at the time of communication is a difficult task in medical-IoT. The researchers developed many schemes for data authentication, but every scheme has their own drawback and they are majorly concentrated on the static communication. This paper developed the different authentication mechanisms between the patient and doctor who are available in different regions. The proposed mechanism provides the authentication, anonymity, data integrity and mutual authentication. It also uses the symmetric encryption techniques to preserve the security in Medical–IoT. The performance of the authentication mechanism is tested with real time environment. The results proved that the proposed algorithm is efficient in resisting the replay attacks and preserves the anonymity, data integrity and authentication.
Keywords: Medical-IoT, Authentication, Integrity, Confidentiality, Encryption.