**2. Methods**

#### **2.1 Authentication systems**

Authentication has become increasingly important in the world, with individuals, corporations, and businesses making use of it to control access to data and information [4]. In Smart Healthcare Systems, Authentication has great significance for your implication in patient safety and the growing introduction of digital monitoring patients systems in General Health Systems.

Other authentication mechanisms, such as biometric authentication (inherent factors) and token-based authentication (possession factors), are increasingly becoming popular and used transversely in services. Basic authentication methods, such as username and password, are widely used across platforms and services [4].

Alphanumeric and special character usernames and passwords are used in knowledge-based authentication systems. These are widely used across platforms and services and are regarded as conventional. Because they are simple to remember and can be processed quickly, they are popular. Due to their widespread use, passwordbased authentication systems are vulnerable to a variety of attacks, including dictionary, shoulder surfing, brute force, and dictionary attacks. Additionally, password length, character count, and password strength are limitations. Some weaknesses in text-based passwords have been fixed by introducing graphical passwords. This technique is resistant to attacks, for example, word reference attacks on account of its huge secret key space [4].

It has long been known that biometric authentication is superior to passwordbased authentication, thereby reducing some of these vulnerabilities. Typically, it is divided into physiological (fingerprints, DNA, face) and behavioral (voice, signature, etc.) characteristics. On smartphones, laptops, and other smart devices, face recognition and fingerprints have largely been used to control user access and authenticate on social media, banking apps, and services. Additionally, biometric authentication comes with drawbacks and dangers. This is large because biometric data cannot be changed and are managed in a centralized database or module. The reuse of stolen biometric data, among other security risks, may result from the discovery of these biometric data [4]. Although these methods are popular, they are not widely used as the traditional username and password.
