نوع مقاله : مقاله مروری
نویسندگان
1 دانشیار، مهندسی برق و کامپیوتر، دانشکدهی مهندسی برق و کامپیوتر، دانشگاه صنعتی اصفهان، اصفهان، ایران
2 دانشیار، مهندسی کامپیوتر، دانشکدهی مهندسی کامپیوتر، دانشگاه تربیت دبیر شهید رجائی تهران، تهران، ایران
3 دکترا، مهندسی برق و کامپیوتر، دانشکدهی مهندسی برق و کامپیوتر، دانشگاه صنعتی اصفهان، اصفهان، ایران
4 استادیار، مهندسی برق و کامپیوتر، دانشکدهی مهندسی برق و کامپیوتر، دانشگاه صنعتی اصفهان، اصفهان، ایران
چکیده
تازه های تحقیق
سید محمد دخیل علیان: Google Scholar
معصومه صفخانی: Google Scholar
بهزاد نظری: Google Scholar
کلیدواژهها
موضوعات
عنوان مقاله [English]
نویسندگان [English]
Background: Technological advancements based on the Internet of Things have revolutionized human life, and remote monitoring of patient health is no exception. Telecare medicine information systems are systems between home healthcare organizations and patients at home that allow doctors and patients to view medical data electronically. The development of a wireless body network plays a key role in health monitoring. The body's wireless network includes medical sensors that can be embedded in the patient's body, measure the patient vital signs, and send them to medical servers through a wireless channel. Therefore, security in telemedicine has always been a challenge. As cyber-attacks proliferate, we should expect users to take strict measures to protect their information. Thus, the design of lightweight authentication security protocols with the lowest cost has become a major challenge. In this article, we have limited our focus to reviewing the types of authentication protocols presented recently.
Conclusion: In this article, the concepts of TMIS were first examined, and the necessity of creating these systems is introduced. Also, the recently presented authentication schemes were introduced. It was observed that the performance of each authentication scheme depends on the resistance against existing attacks, security features, computing costs, etc. Today, we see the presentation of many protocols in the field of TMIS. However, in addition to the rapid development and progress of these protocols, it should be taken into account that security threats and new attacks are not separated from this speed of technology. As a result, researchers in network security should investigate security protocols to ensure that there is no security threat to them in the worst case.
کلیدواژهها [English]