Impact Factor:6.549
 Scopus Suggested Journal: UNDER REVIEW for TITLE INCLUSSION

International Journal
of Computer Engineering in Research Trends (IJCERT)

Scholarly, Peer-Reviewed, Open Access and Multidisciplinary

Welcome to IJCERT

International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed,Open Access and Multidisciplinary

ISSN(Online):2349-7084                 Submit Paper    Check Paper Status    Conference Proposal

Back to Current Issues

Secure Authentication Mechanism in IoT Based Healthcare System

Anita Chaudhari, Janice Rodrigues , Aparna Vattamparambil , Revati Warang, Vidya More
Information Technology, St. John College of Engineering and Management, Mumbai University, India

In today's world, security is the most significant concern. We produce tons of data that must be unbroken secure. Be it our data or data associated with a transnational company. The data can be protected with the usage of authentication and authorization. Authentication and authorization help to verify and validate a user's identification. Applications in today's society are swaying towards IoT concepts as this delivers them agility, competency, conventionality, and future-proof. However, this winds up into a higher security risk. The projected system proposes a multi-factor authentication methodology or, in simple terms, presents a 3-way authentication. This constitutes the well-known authentication levels that are the password and OTP but mainly focuses on the third step signifying the most protected method of authentication that's the challenge-response pair mechanism. The generated challenge is exclusive to each user, and therefore, the gadget.

Anita Chaudhari, Janice Rodrigues, Aparna Vattamparambil, Revati Warang, Vidya More."Secure Authentication Mechanism in IoT Based Healthcare System". International Journal of Computer Engineering In Research Trends (IJCERT) , ISSN:2349-7084, Vol.7, Issue 05,pp.13-18, May - 2020, URL:,

Keywords : Secure Authentication Mechanism in IoT Based Healthcare System

1.	Two Factor Authentication Using Mobile Phones" by Fadi Aloul, Syed Zahidi, Wassim El-Hajj, IEEE, 2016.
2.	"A Security-Enhanced Authentication and Key Distribution Protocol for Wireless Networks" by Chao Lv, Maode Ma, Hui Li, and Jianfeng Ma, IEEE, 2010. 
3.	"Token Based Authentication using Mobile Phone" by Parekh Tanvi, Gawshinde Sonal, Sharma Mayank Kumar, IEEE, 2011.
4.	"A survey on Biometric Based Authentication in cloud computing" by  P. Padma and Dr. S. Srinivasan, IEEE, 2016. 
5.	"Password Security system with 2-way authentication" by Subhradeep Biswas and Sudipa Biswas, IEEE, 2017. 
6.	"Secure Authentication with Dynamic Password" by Zubayr Khalid, Pritam Paul, Soummyo Priyo Chattopadhyay, Anik Naha Biswas, IEEE, 2016. 
7.	"Overview of PUF - Based Hardware Security Solutions for Internet of Things" by Basel Halak, Mark Zwolinski and M. Syafiq Mispan, IEEE, 2016. 
8.	"Performance Evaluation of Cryptographic Ciphers on IoT Devices" by Kedar Deshpande and Praneet Singh.
9.	“Secure Medical Data Transmission Model for IoT-based Healthcare Systems” by Mohamed Elhoseny, Gustavo Ramírez-González, Osama M. Abu-Elnasr, Shihab A. Shawkat, Arunkumar N, Ahmed Farouk, IEEE, 2018. 
10.	"A PHY-Aided Secure IoT Healthcare System With Collaboration of Social Networks" by Peng Hao and Xianbin Wang, IEEE, 2017.
11.	"Device Authentication Mechanism for IoT Enabled Healthcare System" by Shantha Mary Joshitta. R and Arockiam L. 
12.	"Design of a secure medical data sharing system via an authorized mechanism" by Chin-Ling Chen, Jin-Xin Hu, Chun-Long Fan and Kun-hao Wang, IEEE, 2016. 
13.	"A Comprehensive Survey of Security Mechanisms in Healthcare Applications" by Mr. D. Stalin David and Dr. A. Jeyachandran. 
14.	"A Robust Physical Unclonable Function with Enhanced Challenge-Response Set" by Abhranil Maiti, Inyoung Kim, and Patrick Schaumont, IEEE, 2012. 
15.	"Authenticating IoT Devices with Physically Unclonable Functions Models" by Mario Barbareschi, Pierpaolo Bagnasco, Antonino Mazzeo, IEEE, 2015. 
16.	"Lightweight PUF-Based Authentication Protocol for IoT Devices" by Yildiran Yilmaz, Steve R. Gunn, Basel Halak, IEEE, 2018. 
17.	"E-Healthcare: Remote Monitoring, Privacy, and Security" by Olga Boric-Lubecke, Xiaomeng Gao, Ehsan Yavari, Mehran Baboli, Aditya Singh, and Victor M Lubecke, IEEE, 2014. 
18.	"System Level Design of a Secure Healthcare Smart Card System" by Merve Oksar and Berna Ors and Gokay Saldamli, IEEE, 2011.
19.	"Monitoring Patients Via A Secure And Mobile Healthcare System" By Yonglin Ren, Richard Werner Nelem Pazzi, And Azzedine Boukerche, Ieee, 2010. 
20.	"Security and Privacy for the Internet of Medical Things Enabled Healthcare Systems: A Survey" by YINGNAN SUN , FRANK P.-W. LO , AND BENNY LO, IEEE, 2019

DOI Link :

Download :

Refbacks : Currently there are no Refbacks


Authors are not required to pay any article-processing charges (APC) for their article to be published open access in Journal IJCERT. No charge is involved in any stage of the publication process, from administrating peer review to copy editing and hosting the final article on dedicated servers. This is free for all authors. 

News & Events

Latest issue :Volume 10 Issue 1 Articles In press

A plagiarism check will be implemented for all the articles using world-renowned software. Turnitin.

Digital Object Identifier will be assigned for all the articles being published in the Journal from September 2016 issue, i.e. Volume 3, Issue 9, 2016.

IJCERT is a member of the prestigious.Each of the IJCERT articles has its unique DOI reference.
DOI Prefix : 10.22362/ijcert

IJCERT is member of The Publishers International Linking Association, Inc. (“PILA”)

Emerging Sources Citation Index (in process)

IJCERT title is under evaluation by Scopus.

Key Dates

☞   LAST DATE OF SUBMISSION : 31st March 2023
In 7 Days

Important Announcements

All the authors, conference coordinators, conveners, and guest editors kindly check their articles' originality before submitting them to IJCERT. If any material is found to be duplicate submission or sent to other journals when the content is in the process with IJCERT, fabricated data, cut and paste (plagiarized), at any stage of processing of material, IJCERT is bound to take the following actions.
1. Rejection of the article.
2. The author will be blocked for future communication with IJCERT if duplicate articles are submitted.
3. A letter regarding this will be posted to the Principal/Director of the Institution where the study was conducted.
4. A List of blacklisted authors will be shared among the Chief Editors of other prestigious Journals
We have been screening articles for plagiarism with a world-renowned tool: Turnitin However, it is only rejected if found plagiarized. This more stern action is being taken because of the illegal behavior of a handful of authors who have been involved in ethical misconduct. The Screening and making a decision on such articles costs colossal time and resources for the journal. It directly delays the process of genuine materials.

Citation Index

Citations Indices All
Citations 1026
h-index 14
i10-index 20
Source: Google Scholar

Acceptance Rate (By Year)

Acceptance Rate (By Year)
Year Rate
2021 10.8%
2020 13.6%
2019 15.9%
2018 14.5%
2017 16.6%
2016 15.8%
2015 18.2%
2014 20.6%

Important Links

Conference Proposal