This assignment presents a literature review focused on authentication methods for IoT devices in healthcare. It examines various algorithms and protocols proposed for securing IoT environments, including enhanced mutual authentication models, two-phased authentication protocols for wireless sensor networks, and secure authentication schemes based on Elliptic Curve Cryptography (ECC). The review covers threshold cryptography-based authentication schemas, secure and efficient authentication architectures using smart gateways, and lightweight mutual authentication schemas utilizing Constrained Application Protocol (CoAP). The annotated bibliography provides summaries of key papers discussing CoAP applications, RFID tags and public-key cryptography, threshold cryptography-based group authentication, and robust authentication schemes for observing resources in IoT environments, highlighting the challenges and potential solutions for IoT security in healthcare.