Mutual authentication is often found in schemes employed in the
Internet of Things (IoT), where physical objects are incorporated into the Internet and can communicate via IP address.
Radio frequency identification (RFID) tags are commonly used for object detection, which many manufacturers are implementing into their warehouse systems for automation. This allows for a faster way to keep up with inventory and track objects. However, keeping track of items in a system with RFID tags that transmit data to a
cloud server increases the chances of security risks, as there are now more digital elements to keep track of. Instead of considering all tag readers as one entity, only certain readers can read specific tags. With this method, if a reader is breached, it will not affect the whole system. Individual readers will communicate with specific tags during mutual authentication, which runs in constant time as readers use the same private key for the authentication process. Many e-Healthcare systems that remotely monitor patient health data use wireless
body area networks (WBAN) that transmit data through radio frequencies.
Fog-cloud computing is a networking system that can handle large amounts of data, but still has limitations regarding computational and memory cost.
Mobile edge computing (MEC) is considered to be an improved, more lightweight fog-cloud computing networking system, and can be used for medical technology that also revolves around location-based data. Due to the large physical range required of locational tracking,
5G networks can send data to the edge of the cloud to store data. An application like
smart watches that track patient health data can be used to call the nearest hospital if the patient shows a negative change in vitals. Fog node networks can be implemented in
car automation, keeping data about the car and its surrounding states secure. By authenticating the fog nodes and the vehicle, vehicular handoff becomes a safe process and the car’s system is safe from hackers.
Machine to machine verification Many systems that do not require a human user as part of the system also have protocols that mutually authenticate between parties. In
unmanned aerial vehicle (UAV) systems, a platform authentication occurs rather than user authentication. Mutual authentication during vehicle communication prevents one vehicle's system from being breached, which can then affect the whole system negatively. For example, a system of drones can be employed for agriculture work and cargo delivery, but if one drone were to be breached, the whole system has the potential to collapse. == External links ==