{"title":"健康监测认证方案综述:网络物理系统的一个子集","authors":"Z. Rehman, S. Altaf, Saleem Iqbal","doi":"10.1109/IBCAST.2019.8667166","DOIUrl":null,"url":null,"abstract":"Cyber Physical System (CPS) is an emerging field and further considerable research topic in multiple domains. Health monitoring is one of sub-fields in Cyber Physical System and relies heavily on wireless environment for connectivity. Due to prevailing interest in this field, security of the data is key concern when it is accessed from remote location. As it is being utilized by medical practitioner to make health related decisions risk of intrusion is always present. Any breach can cause adverse effects to patient’s health. Therefore, importance of data authenticity, freshness and encumbrance free access becomes vital in this perspective. The multiple security solutions have been found in literature. However, security solutions depend severely on authentication schemes. An adequate authentication scheme can ensure protection against cyber adversaries. The main objective of this paper is to present state-of-the-art review on security challenges, security requirements and current authentication schemes available in literature pertaining to health monitoring. These authentication schemes are analyzed on predefined parameter/features in order to testify efficacy of schemes.","PeriodicalId":335329,"journal":{"name":"2019 16th International Bhurban Conference on Applied Sciences and Technology (IBCAST)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Survey of Authentication Schemes for Health Monitoring: A Subset of Cyber Physical System\",\"authors\":\"Z. Rehman, S. Altaf, Saleem Iqbal\",\"doi\":\"10.1109/IBCAST.2019.8667166\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cyber Physical System (CPS) is an emerging field and further considerable research topic in multiple domains. Health monitoring is one of sub-fields in Cyber Physical System and relies heavily on wireless environment for connectivity. Due to prevailing interest in this field, security of the data is key concern when it is accessed from remote location. As it is being utilized by medical practitioner to make health related decisions risk of intrusion is always present. Any breach can cause adverse effects to patient’s health. Therefore, importance of data authenticity, freshness and encumbrance free access becomes vital in this perspective. The multiple security solutions have been found in literature. However, security solutions depend severely on authentication schemes. An adequate authentication scheme can ensure protection against cyber adversaries. The main objective of this paper is to present state-of-the-art review on security challenges, security requirements and current authentication schemes available in literature pertaining to health monitoring. These authentication schemes are analyzed on predefined parameter/features in order to testify efficacy of schemes.\",\"PeriodicalId\":335329,\"journal\":{\"name\":\"2019 16th International Bhurban Conference on Applied Sciences and Technology (IBCAST)\",\"volume\":\"28 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 16th International Bhurban Conference on Applied Sciences and Technology (IBCAST)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IBCAST.2019.8667166\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 16th International Bhurban Conference on Applied Sciences and Technology (IBCAST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IBCAST.2019.8667166","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Survey of Authentication Schemes for Health Monitoring: A Subset of Cyber Physical System
Cyber Physical System (CPS) is an emerging field and further considerable research topic in multiple domains. Health monitoring is one of sub-fields in Cyber Physical System and relies heavily on wireless environment for connectivity. Due to prevailing interest in this field, security of the data is key concern when it is accessed from remote location. As it is being utilized by medical practitioner to make health related decisions risk of intrusion is always present. Any breach can cause adverse effects to patient’s health. Therefore, importance of data authenticity, freshness and encumbrance free access becomes vital in this perspective. The multiple security solutions have been found in literature. However, security solutions depend severely on authentication schemes. An adequate authentication scheme can ensure protection against cyber adversaries. The main objective of this paper is to present state-of-the-art review on security challenges, security requirements and current authentication schemes available in literature pertaining to health monitoring. These authentication schemes are analyzed on predefined parameter/features in order to testify efficacy of schemes.