Article Preview
Top1. Introduction
Authentication Remote patient monitoring provides an efficient and convenient connection between patient at home and doctor at the clinic center. The doctor can get the status of the patient any place and any moment and the patient receives a proper treatment from the doctor over an insecure channel. If anyone acquires the patient’s information illegally then the privacy of patient will be disclosed. User authentication is one of the most important security mechanism to protect the real time data from the unauthorized users; it provides both session key agreement and mutual authentication securely between participant entities (Wu, Xu, Kumari, & Li, 2017; Ibrahim, Kumari, Das, Wazid, & Odelu, 2016; Chandrakar & Om, 2015; Chandrakar & Om, 2016; Chandrakar & Om, 2017; Chandrakar & Om, 2017; Ali & Pal, 2017; Ali & Pal, 2017). In recent time only very few number of remote user authentication schemes developed by researchers for healthcare monitoring (Ali & Pal, 2017; Kumar, Lee, & Lee, 2012; Khan & Kumari, 2014; Wu, Xu, Kumari, & Li, 2015; He et al., 2015; Wu et al., 2017; Lu, Li, Peng, & Yang, 2016).