This article discusses various authentication and authorization protocols proposed for IoT devices in the healthcare sector. It covers topics such as certificate-based authentication, threshold cryptography-based authentication, and lightweight mutual authentication schema. The paper also explores the challenges faced by IoT technology regarding their authentication and the need for robust defense solutions to protect the system from attacks.