Research Article
Privacy Preserving Authentication of IoMT in Cloud Computing
@ARTICLE{10.4108/eetiot.6235, author={Garima Misra and B. Hazela and B.K. Chaurasia}, title={Privacy Preserving Authentication of IoMT in Cloud Computing}, journal={EAI Endorsed Transactions on Internet of Things}, volume={10}, number={1}, publisher={EAI}, journal_a={IOT}, year={2024}, month={12}, keywords={FIDO2 (Fast IDentity Online), WebAuthn (Web Authentication), IoMT (Internet of Medical Things), ECDAA (ECC based DAA algorithm)}, doi={10.4108/eetiot.6235} }
- Garima Misra
B. Hazela
B.K. Chaurasia
Year: 2024
Privacy Preserving Authentication of IoMT in Cloud Computing
IOT
EAI
DOI: 10.4108/eetiot.6235
Abstract
INTRODUCTION: The Internet of Medical Things (IoMT) blends the healthcare industry with the IoT ecosystem and enables the creation, collection, transmission, and analysis of medical data through IoT networking. IoT networks consist of various healthcare IT systems, healthcare sensors, and healthcare management software. OBJECTIVES: The IoMT breathes new life into the healthcare system by building a network that is intelligent, accessible, integrated, and effective. Privacy-preserving authentication in IoMT is difficult due to the distributed communication environment of heterogeneous IoMT devices. Although there has been numerous research on potential IoMT device authentication methods, there is still more to be done in terms of user authentication to deliver long-term IoMT solutions. However, password handling is one of the big challenges of IoMT. METHODS: In this paper, we present an IoMT-related online password-less authentication technique that is quick, effective, and safe. In order to offer cross-platform functionality, the article includes a simulation of FIDO2/WebAuthn, one of the most recent standards for a password-less authentication mechanism. RESULTS: This makes it easier to secure user credentials and improve them while preserving anonymity. The IoMT device authentication process and registration process delays are also assessed. CONCLUSION: Results and simulations show that the efficacy of the proposed mechanism with quick authentication on cloud servers may be accomplished with the fewest registration and authentication procedures, regardless of device setup.
Copyright © 2024 G. Misra et al., licensed to EAI. This is an open access article distributed under the terms of the CC BY-NC-SA 4.0, which permits copying, redistributing, remixing, transformation, and building upon the material in any medium so long as the original work is properly cited.