Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3454127.3457624acmotherconferencesArticle/Chapter ViewAbstractPublication PagesnissConference Proceedingsconference-collections
research-article

Secure user authentication scheme for the Virtual Doctor System enabled H-IoT through 5G Network: A comparison study

Published: 26 November 2021 Publication History

Abstract

In recent times, health-IoT and fifth generation technologies provide special health services for the patient including continuous and remote monitoring, besides other services. The combination of those previous concepts with virtual doctor system technology can offer several benefits such as remote and reliable diagnosis and treatment in real-time. Unfortunately, during the monitoring and diagnosis dialogue, illegitimate users can get unauthorized access to the VDS and disclose a valuable diagnosis, due to the lack of security and privacy of patients. To overcome this issue, some authentication schemes used in e-health applications over 5G networks will be presented.
The aim of this paper is to choose a suitable authentication method for gaining access to remote VDS connected with the internet of medical things via the 5G network. So, the comparison between existing mechanisms will be done and the result will be announced after.

References

[1]
Noemi Scarpato, Alessandra Pieroni, Luca Di Nunzio and Francesa Fallucchi. 2017. E-health-IoT universe: A review. International Journal on Advanced Science Engineering Information Technology
[2]
Dhanvijay, Mrinai M, and Shailaja C, Patil. 2019. Internet of Things: A survey of enabling technologies in healthcare and its applications. Computer Networks. 113-131. https://doi.org/10.1016/j.comnet.2019.03.006
[3]
Mudaliar Vivek, P. Savaridaasan, and Sachin Garg. 2019. Disease Prediction and Drug Recommendation Android Application using Data Mining (Virtual Doctor). International Journal of Recent Technology and Engineering (IJRTE).
[4]
MALLIOS Stavros et BOURBAKIS Nikolaos. 2015. A dialogue monitoring scheme for a virtual doctor. In: 2015 National Aerospace and Electronics Conference (NAECON). IEEE, 249-253.
[5]
Furht, Borko, and Ankur Agarwal, eds. 2013. Handbook of medical and healthcare technologies. Springer. New York. https://doi.org/10.1007/978- 1- 4614-8495-0
[6]
Fujita Hamido, Jun Hakura, and Masaki Kurematsu. 2010. Virtual doctor system (VDS): medical decision reasoning based on physical and mental ontologies. International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems. Springer, Berlin, Heidelberg, 419-428. https://doi.org/10.1007/978-3-642-13033-5_43.
[7]
Naim Arshi, Mohammad Faiz Khan, Mohammad Rashid Hussain, Nawsher Khan. 2019. “Virtual Doctor” Management Technique in the Diagnosis of ENT Diseases. International Journal of Online and Biomedical Engineering (iJOE). 134-140. https://doi.org/10.3991/ijoe.v15i09.10665.
[8]
Fujita Hamido, Jun Hakura, and Masaki Kurematsu. 2010. VIRTUAL MEDICAL DOCTOR SYSTEMS-Status Progress Report on Virtual Medical Doctor System (VDS) Interaction Interface. International Conference on Health Informatics. SCITEPRESS. Valencia, Spain, 38-45. doi= {10.5220/0002712000380045}.
[9]
Karthik, Menaka, Siddharth Kulkarni and Rahul Deshpande. 2014. Virtual doctor: an artificial medical diagnostic system based on hard and soft inputs. International Journal of Biomedical Engineering and Technology. 329-342. https://doi.org/10.1504/IJBET.2014.066226.
[10]
Barakah, Deena M, and Muhammad Ammad-uddin. 2012. A survey of challenges and applications of wsireless body area network (WBAN) and role of a virtual doctor server in existing architecture. 2012 Third International Conference on Intelligent Systems Modelling and Simulation. IEEE, 214- 219.
[11]
Venkataramanaiah B, Kamala J. 2020. ECG signal processing and KNN classifier-based abnormality detection by VH-doctor for remote cardiac healthcare monitoring. Soft Computing. 17457-17466. https://doi.org/10.1007/s00500-020-05191-1.
[12]
Shancang Li, Li Da Xu, Shanshan Zhao. 2018. 5G Internet of Things: A survey. Journal of Industrial Information Integration. 1-9. https://doi.org/10.1016/j.jii.2018.01.005.
[13]
WEST, Darrell M. 2016. How 5G technology enables the health internet of things. Brookings Center for Technology Innovation, 1-20.
[14]
Mallios, Stavros, and Nikolaos Bourbakis. 2014. A virtual doctor prototype for quick diagnosis and secure health information exchange. In: IISA 2014, The 5th International Conference on Information, Intelligence, Systems and Applications. IEEE, 260-265.
[15]
Kannavara Raghudeep et Bourbakis Nikolaos. 2009. Iris biometric authentication based on local global graphs: An FPGA implementation. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications. IEEE, 1-7.
[16]
Alice May-Kuen Wong, Chien-Lung Hsu, Tuan-Vinh Le, Mei-Chen Hsieh and Tzu-Wei Lin. 2020. Three-Factor Fast Authentication Scheme with Time Bound and User Anonymity for Multi-Server E-Health Systems in 5G-Based Wireless Sensor Networks. Sensors. 1-27. https://doi.org/10.3390/s20092511.
[17]
Minahil, Muhammad Faizan Ayub, Khalid Mahmood, Saru Kumari, Arun Kumar Sangaiah. 2020. Lightweight authentication protocol for e-health clouds in iot based applications through 5G technology. Digital Communications and Networks. https://doi.org/10.1016/j.dcan.2020.06.003.
[18]
Sathian Dananjayan, Gerard Marshall Raj. 2020. 5G in healthcare: how fast will be the transformation? Irish Journal of Medical Science. 1-5. https://doi.org/10.1007/s11845-020-02329-w.
[19]
] Hina Magsi, Ali Hassan Sodhro, Faheem Akhtar Chachar, Saeed A. Khan Abro, Gul Hassan Sodhro, Sandeep Pirbhulal. 2018. Evolution of 5G in Internet of medical things. In: international conference on computing, mathematics and engineering technologies (iCoMET). IEEE, 1-7.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
NISS '21: Proceedings of the 4th International Conference on Networking, Information Systems & Security
April 2021
410 pages
ISBN:9781450388719
DOI:10.1145/3454127
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 26 November 2021

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

NISS2021

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 67
    Total Downloads
  • Downloads (Last 12 months)14
  • Downloads (Last 6 weeks)1
Reflects downloads up to 09 Nov 2024

Other Metrics

Citations

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media