Towards a Secure and Sustainable Internet of Medical Things (IoMT): Requirements, Design Challenges, Security Techniques, and Future Trends
Abstract
:1. Introduction
- This work presents the background of the IoMT and the motives for its wide acceptance to build the foundation for an understanding of the heterogeneous features of the IoMT.
- This work presents the various parameters that make the IoMT vulnerable to cyber-attacks.
- This work scrutinizes various security and privacy requirements in IoMT-based systems.
- This work discusses the major design challenges in an IoMT environment, and outlines various techniques used for resolving such security issues.
- This work presents a state-of-the-art solution using various methods to make the IoMT safer for application with humans.
- Finally, this work outlines several open research challenges that can help future researchers working in this emerging research area.
2. Background of the IoMT
2.1. Defining the IoMT
2.2. Motives for IoMT Acceptance
- The use of the IoMT enhances the quality of the clinic. The Memorial Hermann Health System, located in Texas, in the United States, has adopted the IoMT for various activities, such as sending messages, scanning barcodes, and transmitting images.
- The perception of the generally functional and efficient automation of the IoMT helps in empowering efficient connectivity. One example could be the use of smart pills that can send messages, as well as alert signals, to the doctors who are associated with patient monitoring.
- Practical implementations of the IoMT can also be found in remote monitoring, which is performed via gathering data and transferring it to the relevant analyst, which could assist them in managing the patient’s illness before it becomes more complicated. A practical example could be seen in the form of UCLA Health and Children’s Health, located in Dallas.
- The IoMT also helps in conserving bodily health by accumulating and sending a person’s health data to their healthcare practitioner. Practical implementation of this could be seen in the Apple Watch 6, which provides the user with alerts regarding the presence of oxygen in their blood.
2.3. IoMT Types
- IMD refers to those devices which could be used to replace, support, or enhance the biological structure. One practical implementation could be seen in controlling the abnormal rhythm of the human heart using a pacemaker. The pacemaker supports the body by maintaining a consistent heartbeat in the case of an increase or decrease in heart rate from the normal human range [30]. A pacemaker will last longer if its power consumption is less; typically, they tend to last from 5 to 15 years, approximately [31].
- An example of the IoWD is typically worn by individuals to monitor their biometric data, such as heart rate, which could help to enhance their overall health. Devices such as blood pressure monitors (BPM), electrocardiogram monitors (ECG), smartwatches, etc., are examples of the IoWD [32]. Nutrition has become one of the major concerns for humans, and noncritical patients are widely monitored using fall detection and ECG readers [33,34].
2.4. Sensors for the IoMT
2.5. State-Of-The-Art Strategy for Telesurgery or Remote Surgery
2.5.1. Teleoperation
2.5.2. Endoscopic Telesurgery
2.5.3. Neurosurgical Telesurgery
2.5.4. Orthopedic Telesurgery
3. Security Requirements and Design Challenges
3.1. Security Requirements
- Confidentiality/Privacy: Confidentiality, or privacy, is the top priority, as a huge amount of sensitive and personal data is processed and stored across IoMT devices. These data should be accessible to the authorized user via a proper authentication mechanism; furthermore, the stored data should be encrypted to avoid ease of access by an adversary. The encryption adopted must be secure enough to safeguard from attackers [46].
- Integrity: The integrity of data in the IoMT is essential, as these inputs are used for the treatment of the patients. Integrity ensures that the data has not been modified, either during transmission or during the storage process. The modification of data may consist of deleting it, adding false values, etc. It is important to safeguard the sensitive data of the IoMT to stop unauthorized access.
- Authentication: The validation of authorized users for communication is key to performing identity authentication. To authenticate an identity, both communicating parties must mutually verify themselves. The transfer of data and information occurs after mutual authentication. The IoMT consists of various services, including the cloud, that need adequate authentication. The authentication mechanism may vary according to the various IoMT-based applications [47].
- Non-Repudiation: This is particularly crucial because an illegal entity could not deny the validity of the messages. To validate the messages, the proof of origin is mentioned along with the integrity of the data. The denying of the message becomes extremely tough when the source or origin is mentioned. The concept of a digital signature is widely used for implementing non-repudiation.
- Availability: This feature ensures that the information and services are accessible to authorized users only. The availability feature is exploited by the adversary or attacker by executing a denial-of-service (DoS) attack. This attack is generally launched when confidentiality and integrity of the system remain intact and the attacker is unable to compromise these two features [48].
- Backward and Forward Secrecy: The backward and forward features are an integral part of the IoMT-based system since it consists of hardware devices in large numbers. Forward secrecy suggests that, if any device leaves the IoMT system, then it should be discontinued, so that it could not access any communication within the existing system. Moreover, in case of backward secrecy, newly installed devices in IoMT systems should not have any access to previously transmitted messages.
3.2. Design Challenges in the IoMT
- Postural body movement: The sensors which are used in on-body medical devices, as well as other sensors, are usually placed in a group. The movement of the patients using these devices and sensors is not consistent, as they are highly mobile. The transmission used to monitor postural body movement could be optimized by a quality change associated with the movement of the patient [49].
- Temperature rise: A temperature rise is generally observed in any hardware-based system. In the case of the IoMT, two main factors raise the temperature of the system. Radiation through the antenna is the first cause, while the consumption of power is the other major cause [50].
- Energy efficiency: Energy efficiency is preserved in IoMT-based systems by designing them in such a way as to make optimal use of energy on local devices or sensor nodes, and also optimize the energy consumption of the overall network across its lifetime. This implementation is especially important in the case of surgical devices in IoMT-based systems, where the battery is the main source of energy [51].
- Transmission range: The transmission, when it occurs across a very short range along with movement of the body, sometimes leads to disconnection, as well as re-partitioning in the sensor present in the IoMT. There is a need to minimize the total number of sensors on the patient’s body to reduce disconnection. IBS is one of the methods whereby transmission is made more optimal [52].
- Heterogeneous environment: IoMT-based systems are generally comprised of various devices and sensors, which are manufactured by different manufacturing companies. These devices use different architectures for their operation. Thus, the system becomes highly heterogeneous. Therefore, the network must be capable enough to tackle these heterogeneities to route the data and information properly in the IoMT-based system.
3.3. Concerns in the IoMT
3.4. Prevalent Attacks in the IoMT
3.5. Existing Security Framework for IoMT-Based Applications
3.6. Risk Analysis and Threat Mapping
4. Security Techniques in IoMT
4.1. Symmetric Key Cryptography
4.1.1. Hierarchical Access
4.1.2. Biometric Systems
4.1.3. Gait-Based Scheme
4.1.4. Cryptographic Hash Function (CHF)
4.2. Asymmetric Key Cryptography
4.2.1. Homomorphic Encryption (HE)
4.2.2. CHF with ECC
4.2.3. Digital Signatures
4.3. Keyless Algorithm
4.3.1. Blockchain Technology
4.3.2. Proxy-Based Systems
4.3.3. Biometrics
5. Taxonomy of Security Protocols in IoMT
5.1. Key Management
5.2. User Device Authentication
5.3. Access Control
5.4. Intrusion Detection
6. Future Research Directions
6.1. Scalability of Malware Detection
6.2. Cross-Platform Malware Detection
6.3. Security Assessment
6.4. Paradigm Shift in IoMT Sensors
6.5. Security and Privacy
6.6. Blockchain for Healthcare Data Sharing
6.7. Heterogeneity in an IoMT Communication Environment
7. Research Challenges and Lessons Learned
- The research on the network is very important for the IoMT. The backbone of the IoMT is the network through which each device communicates with others to yield the desired task. Therefore, if the device has to operate in a real-time scenario, as in the case of tele-surgery, the delay in transmission could result in the loss of human life. Hence, latency is one of the main concerns in such a scenario, where the healthcare worker is performing surgery through a haptic arm. Moreover, channel-based attacks are very deadly, as they could compromise the data on transit, and, hence, the integrity of the original data could be compromised. Therefore, it is crucial to deal with zero-day-based attacks over the communicating medium in the IoMT.
- The next area of concern for the future is the devices that are a part of the IoMT system. As we know that there is no standard architecture to be followed by everyone implementing IoT applications, so the same goes for the IoMT. There are devices, such as CCTV cameras and filed sensors, that do not have the capacity to update their software, and therefore become obsolete in terms of security after a particular time. Consequently, it is necessary to replace them with more advanced and newer versions. Hence, there could be future research on updating these devices while connected to the IoMT, rather than replacing them, in order to reduce the cost of implementing visual surveillance within the IoMT.
- The next area of research, which plays an important role in the function of the IoMT, is the application software and system software, which work, either as intermediates between the hardware and software or on top of them, for various medical processes. Some of the most widely used software in medical environments are electronic health records (EHR), hospital management systems (HMS), telemedicine software, etc. It is important to identify, on a regular basis, any vulnerabilities in the codes of these software, and there is therefore a need for a proper standardized framework to define the security check in this software. Moreover, there is a need to inspect the operating system code involved in the devices which are involved in the IoMT, in order to identify the existence of any zero-day attacks.
- The use of secure communicating channels, identification of vulnerabilities in the system at the right time, and the use of appropriate software and hardware to protect the IoMT application would not be possible without having effective governance, risk, and compliance (GRC) processes. These policies play a crucial role in the efficient working of the organization. Since, in the case of the IoMT, various more personal and sensitive data are involved, both locally and also remotely, it become very important to understand which of the patient’s data require explicit permission from the patient for access, so that his/her fundamental rights are not violated. Furthermore, the policy should clearly identify the authorization domain for each employee, in order to safeguard against data breaches that may occur due to weak policy. Therefore, the use of efficient policy specifically for the IoMT is needed in future.
8. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Vishnu, S.; Ramson, S.R.J.; Jegan, R. Internet of medical things (IOMT)—An overview. In Proceedings of the 2020 5th International Conference on Devices, Circuits and Systems (ICDCS), Coimbatore, India, 5–6 March 2020. [Google Scholar] [CrossRef]
- Ghubaish, A.; Salman, T.; Zolanvari, M.; Unal, D.; Al-Ali, A.; Jain, R. Recent advances in the internet-of-medical-things (IOMT) systems security. IEEE Internet Things J. 2021, 8, 8707–8718. [Google Scholar] [CrossRef]
- Dilibal, C. Development of edge-IOMT computing architecture for smart healthcare monitoring platform. In Proceedings of the 2020 4th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT), Istanbul, Turkey, 22–24 October 2020. [Google Scholar] [CrossRef]
- Joshi, S.; Joshi, S. A sensor based secured health monitoring and alert technique using IOMT. In Proceedings of the 2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT), Jaipur, India, 28–29 September 2019. [Google Scholar] [CrossRef]
- Rizk, D.; Rizk, R.; Hsu, S. Applied layered-security model to IOMT. In Proceedings of the 2019 IEEE International Conference on Intelligence and Security Informatics (ISI), Shenzhen, China, 1–3 July 2019. [Google Scholar] [CrossRef]
- Hatzivasilis, G.; Soultatos, O.; Ioannidis, S.; Verikoukis, C.; Demetriou, G.; Tsatsoulis, C. Review of Security and privacy for the internet of medical things (IOMT). In Proceedings of the 2019 15th International Conference on Distributed Computing in Sensor Systems (DCOSS), Santorini, Greece, 29–31 May 2019. [Google Scholar] [CrossRef]
- Wazid, M.; Das, A.K.; Rodrigues, J.J.; Shetty, S.; Park, Y. IOMT malware detection approaches: Analysis and research challenges. IEEE Access 2019, 7, 182459–182476. [Google Scholar] [CrossRef]
- Karmakar, K.K.; Varadharajan, V.; Tupakula, U.; Nepal, S.; Thapa, C. Towards a security enhanced virtualised network infrastructure for internet of medical things (IOMT). In Proceedings of the 2020 6th IEEE Conference on Network Softwarization (NetSoft), Ghent, Belgium, 29 June–3 July 2020. [Google Scholar] [CrossRef]
- Sittampalam, G.; Ratnarajah, N. Enhanced symmetric cryptography for IOT using novel Random secret key approach. In Proceedings of the 2020 2nd International Conference on Advancements in Computing (ICAC), Malabe, Sri Lanka, 10–11 December 2020. [Google Scholar] [CrossRef]
- Sowjanya, K.; Dasgupta, M. Survey of symmetric and asymmetric key management schemes in the context of IOT based healthcare system. In Proceedings of the 2020 First International Conference on Power, Control and Computing Technologies (ICPC2T), Raipur, India, 3–5 January 2020. [Google Scholar] [CrossRef]
- Mursi, K.T.; Zhuang, Y.; Alkatheiri, M.S.; Aseeri, A.O. Extensive examination of XOR arbiter pufs as security primitives for resource-constrained IOT devices. In Proceedings of the 2019 17th International Conference on Privacy, Security and Trust (PST), Fredericton, NB, Canada, 26–28 August 2019. [Google Scholar] [CrossRef]
- Ray, I.; Kar, D.M.; Peterson, J.; Goeringer, S. Device identity and trust in IOT-sphere forsaking cryptography. In Proceedings of the 2019 IEEE 5th International Conference on Collaboration and Internet Computing (CIC), Los Angeles, CA, USA, 12–14 December 2019. [Google Scholar] [CrossRef]
- Bao, Q.; Li, B.; Hu, T.; Sun, X. A survey of Blockchain Consensus Safety and Security: State-of-the-art, Challenges, and future work. J. Syst. Softw. 2023, 196, 111555. [Google Scholar] [CrossRef]
- Khanday, A.M.U.D.; Rabani, S.T.; Khan, Q.R.; Rouf, N.; Din, M.M.U. Machine learning based approaches for detecting COVID-19 using clinical text data. Int. J. Inf. Tecnol. 2020, 12, 731–739. [Google Scholar] [CrossRef]
- Roukounaki, A.; Efremidis, S.; Soldatos, J.; Neises, J.; Walloschke, T.; Kefalakis, N. Scalable and configurable end-to-end collection and analysis of IOT security data: Towards end-to-end security in IOT Systems. In Proceedings of the 2019 Global IoT Summit (GIoTS), Aarhus, Denmark, 17–21 June 2019. [Google Scholar] [CrossRef]
- Yadav, A.K.; Singh, K.; Amin, A.H.; Almutairi, L.; Alsenani, T.R.; Ahmadian, A. A comparative study on consensus mechanism with security threats and future scopes: Blockchain. Comput. Commun. 2023, 201, 102–115. [Google Scholar] [CrossRef]
- Limaye, A.; Adegbija, T. HERMIT: A Benchmark Suite for the Internet of Medical Things. IEEE Internet Things J. 2018, 5, 4212–4222. [Google Scholar] [CrossRef]
- Ray, P.P.; Dash, D.; Kumar, N. Sensors for internet of medical things: State-of-the-art, security and privacy issues, challenges and future directions. Comput. Commun. 2020, 160, 111–131. [Google Scholar] [CrossRef]
- Al-Turjman, F.; Nawaz, M.H.; Ulusar, U.D. Intelligence in the Internet of Medical Things era: A systematic review of current and future trends. Comput. Commun. 2020, 150, 644–660. [Google Scholar] [CrossRef]
- Sun, L.; Jiang, X.; Ren, H.; Guo, Y. Edge-cloud computing and artificial intelligence in internet of medical things: Architecture, technology and application. IEEE Access 2020, 8, 101079–101092. [Google Scholar] [CrossRef]
- Wu, G.; Wang, S.; Ning, Z. Blockchain-enabled privacy-preserving access control for data publishing and sharing in the internet of medical things. IEEE Internet Things J. 2021, 9, 8091–8104. [Google Scholar] [CrossRef]
- Ashfaq, Z.; Rafay, A.; Mumtaz, R.; Zaidi, S.M.H.; Saleem, H.; Zaidi, S.A.R.; Haque, A. A review of enabling technologies for Internet of Medical Things (IoMT) Ecosystem. Ain Shams Eng. J. 2022, 13, 101660. [Google Scholar] [CrossRef]
- Awad, A.; Fouda, M.M.; Khashaba, M.M.; Mohamed, E.R.; Hosny, K.M. Utilization of mobile edge computing on the Internet of Medical Things: A survey. ICT Express 2022. [Google Scholar] [CrossRef]
- Almogren, A.; Mohiuddin, I.; Din, I.U.; Almajed, H.; Guizani, N. Ftm-iomt: Fuzzy-based trust management for preventing sybil attacks in internet of medical things. IEEE Internet Things J. 2020, 8, 4485–4497. [Google Scholar] [CrossRef]
- Khosravi, M.R.; Samadi, S. Mobile multimedia computing in cyber-physical surveillance services through UAV-borne Video-SAR: A taxonomy of intelligent data processing for IoMT-enabled radar sensor networks. Tsinghua Sci. Technol. 2022, 27, 288–302. [Google Scholar] [CrossRef]
- Yeh, K.-H. A secure IOT-based healthcare system with Body Sensor Networks. IEEE Access 2016, 4, 10288–10299. [Google Scholar] [CrossRef]
- Yang, G. Body Sensor Networks; Springer: London, UK, 2006. [Google Scholar] [CrossRef]
- Gope, P.; Hwang, T. BSN-care: A secure IOT-based modern healthcare system using Body Sensor Network. IEEE Sens. J. 2016, 16, 1368–1376. [Google Scholar] [CrossRef]
- Gus Vlahos. 5 Reasons IoMT Devices Make Sense for Health Care Organizations. Available online: https://healthtechmagazine.net/article/2020/04/5-reasons-iomt-devicesmake-sense-HealthCare-organizations (accessed on 29 September 2020).
- Deloitte. Medtech and the Internet of Medical Things: How Connected Medical Devices are Transforming Health Care. 2018. Available online: https://www.medigy.com/news/2020/04/08/healthtechmagazine-5-reasons-iomt-devices-make-sense-for-healthcare-organizations/ (accessed on 20 October 2020).
- Dilawar, N.; Rizwan, M.; Ahmad, F.; Akram, S. Blockchain: Securing internet of medical things (IOMT). Int. J. Adv. Comput. Sci. Appl. 2019, 10, 82–89. [Google Scholar] [CrossRef] [Green Version]
- Dubovitskaya, A.; Xu, Z.; Ryu, S.; Schumacher, M.; Wang, F. How blockchain could empower eHealth: An application for radiation oncology. In Data Management and Analytics for Medicine and Healthcare; Springer: Cham, Switzerland, 2017; pp. 3–6. [Google Scholar] [CrossRef]
- Ben Sasson, E.; Chiesa, A.; Garman, C.; Green, M.; Miers, I.; Tromer, E.; Virza, M. Zerocash: Decentralized anonymous payments from Bitcoin. In Proceedings of the 2014 IEEE Symposium on Security and Privacy, Berkeley, CA, USA, 18–21 May 2014. [Google Scholar] [CrossRef] [Green Version]
- Medical Device Radiocommunications Service (MedRadio), Federal Commun. Commission (FCC), Washington, DC, USA. Available online: https://www.fcc.gov/medical-deviceradiocommunications-service-medrad (accessed on 18 November 2020).
- Thiyagarajan, K.; Rajini, G.K.; Maji, D. Cost-effective, disposable, flexible and printable MWCNT-based wearable sensor for human body temperature monitoring. IEEE Sens. J. 2021, 22, 16756–16763. [Google Scholar] [CrossRef]
- Wu, F.; Wu, T.; Yuce, M.R. Design and implementation of a wearable sensor network system for IOT-connected safety and health applications. In Proceedings of the 2019 IEEE 5th World Forum on Internet of Things (WF-IoT), Limerick, Ireland, 15–18 April 2019. [Google Scholar] [CrossRef]
- Gupta, R.; Tanwar, S.; Tyagi, S.; Kumar, N. Tactile-Internet-Based Telesurgery System for Healthcare 4.0: An Architecture, Research Challenges, and Future Directions. IEEE Netw. 2019, 33, 22–29. [Google Scholar] [CrossRef]
- Satava, R.M. Emerging technologies for surgery in the 21st century. Arch. Surg. 1999, 134, 1197–1202. [Google Scholar] [CrossRef] [Green Version]
- Oboe, R.; Slama, T.; Trevisani, A. Telerobotics through Internet: Problems, Approaches and Applications. An. Univ. Din. Craiova. Mec. Electroteh 2007, 4, 81–90. [Google Scholar]
- Lum, M.J.H.; Friedman, D.C.W.; Sankaranarayanan, G.; King, H.; Fodero, K.; Leuschke, R.; Hannaford, B.; Rosen, J.; Sinanan, M.N.; King, H.-S.H. The RAVEN: Design and validation of a telesurgery system. Int. J. Robot. Res. 2009, 28, 1183–1197. [Google Scholar] [CrossRef]
- Choi, J.; Park, J.W.; Kim, D.J.; Shin, J.; Park, C.Y.; Lee, J.C.; Jo, Y.H. Lapabot: A compact telesurgical robot system for minimally invasive surgery: Part I. System description. Minim. Invasive Ther. Allied Technol. 2012, 21, 188–194. [Google Scholar] [CrossRef] [PubMed]
- Mendez, I.; Hill, R.; Clarke, D.; Kolyvas, G.; Walling, S. Robotic long-distance telementoring in neurosurgery. Neurosurgery 2005, 56, 434–440. [Google Scholar] [CrossRef] [PubMed]
- Nanah, A.; Bayoumi, A.B. The pros and cons of digital health communication tools in neurosurgery: A systematic review of literature. Neurosurg. Rev. 2020, 43, 835–846. [Google Scholar] [CrossRef]
- Memos, V.A.; Minopoulos, G.; Psannis, K. The Impact of IoT and 5G Technology in Telesurgery: Benefits & Limitations; IEEE: New York, NY, USA, 2019. [Google Scholar]
- Iqbal, W.; Abbas, H.; Daneshmand, M.; Rauf, B.; Bangash, Y.A. An in-depth analysis of IOT security requirements, challenges, and their countermeasures via software-defined security. IEEE Internet Things J. 2020, 7, 10250–10276. [Google Scholar] [CrossRef]
- Chanal, P.M.; Kakkasageri, M.S. Hybrid algorithm for data confidentiality in internet of things. In Proceedings of the 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT), Kanpur, India, 6–8 July 2019. [Google Scholar] [CrossRef]
- Cherupally, S.R.; Boga, S.; Podili, P.; Kataoka, K. Lightweight and scalable DAG based distributed ledger for verifying IOT Data Integrity. In Proceedings of the 2021 International Conference on Information Networking (ICOIN), Jeju Island, Republic of Korea, 13–16 January 2021. [Google Scholar] [CrossRef]
- Shah, T.; Venkatesan, S. Authentication of IOT device and IOT server using secure vaults. In Proceedings of the 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE), New York, NY, USA, 1–3 August 2018. [Google Scholar] [CrossRef]
- Chen, C.-M.; Liu, S.; Li, X.; Islam, S.K.H.; Das, A.K. A provably-secure authenticated key agreement protocol for remote patient monitoring iomt. J. Syst. Archit. 2023, 136, 102831. [Google Scholar] [CrossRef]
- Karar, M.E.; Khan, Z.F.; Alshahrani, H.; Reyad, O. Smart IOMT-based segmentation of coronavirus infections using lung CT scans. Alex. Eng. J. 2023, 69, 571–583. [Google Scholar] [CrossRef]
- Das, A.K.; Zeadally, S. Data Security in the Smart Grid Environment. In Pathways to a Smarter Power System; Taşcıkaraoğlu, A., Erdinç, O., Eds.; Elsevier: Amsterdam, The Netherlands, 2019; pp. 371–395. [Google Scholar] [CrossRef]
- Zang, W.; Li, Y. Gait-cycle-driven transmission power control scheme for a Wireless Body Area Network. IEEE J. Biomed. Health Inform. 2018, 22, 697–706. [Google Scholar] [CrossRef]
- Nisarga, B.L.; Manishankar, S.; Sinha, S.; Shekar, S. Hybrid IOT based Hazard Detection System for buildings. In Proceedings of the 2020 International Conference on Electronics and Sustainable Communication Systems (ICESC), Coimbatore, India, 2–4 July 2020. [Google Scholar] [CrossRef]
- Mutescu, P.-M.; Petrariu, A.I.; Lavric, A. Wireless Communications for IOT: Energy efficiency survey. In Proceedings of the 2021 12th International Symposium on Advanced Topics in Electrical Engineering (ATEE), Bucharest, Romania, 25–27 March 2021. [Google Scholar] [CrossRef]
- Pullmann, J.; Macko, D. Increasing energy efficiency by minimizing collisions in long-range IOT networks. In Proceedings of the 2019 42nd International Conference on Telecommunications and Signal Processing (TSP), Budapest, Hungary, 1–3 July 2019. [Google Scholar] [CrossRef]
- Rahman, A.; Hossain, M.S.; Alrajeh, N.A.; Alsolami, F. Adversarial examples—Security threats to covid-19 deep learning systems in medical IOT devices. IEEE Internet Things J. 2021, 8, 9603–9610. [Google Scholar] [CrossRef]
- Yaacoub, J.-P.A.; Noura, M.; Noura, H.N.; Salman, O. Securing internet of medical things systems: Limitations, issues and recommendations. Future Gener. Comput. Syst. 2020, 105, 581–606. [Google Scholar] [CrossRef]
- Zachos, G.; Essop, I.; Mantas, G.; Porfyrakis, K. An anomaly-based intrusion detection system for internet of medical things networks. Electronics 2021, 10, 2562. [Google Scholar] [CrossRef]
- Wang, Z.; Zhu, H.; Sun, L. Social Engineering in Cybersecurity: Effect Mechanisms, Human Vulnerabilities and Attack Methods. IEEE Access 2021, 9, 11895–11910. [Google Scholar] [CrossRef]
- Jalwana, M.A.A.K.; Akhtar, N.; Bennamoun, M.; Mian, A. Orthogonal Deep Models as Defense Against Black-Box Attacks. IEEE Access 2020, 8, 119744–119757. [Google Scholar] [CrossRef]
- Centers for Disease Control and Prevention. Health Insurance Portability and Accountability Act of 1996 (HIPAA). Centers for Disease Control and Prevention. 2022. Available online: https://www.cdc.gov/phlp/publications/topic/hipaa.html#:~:text=The%20Health%20Insurance%20Portability%20and,the%20patient’s%20consent%20or%20knowledge (accessed on 20 February 2023).
- Official Legal Text. General Data Protection Regulation (GDPR). 2022. Available online: https://gdpr-info.eu/ (accessed on 20 February 2023).
- Rauscher, J.; Bauer, B. Safety and Security Architecture Analyses Framework for the Internet of Things of Medical Devices. In Proceedings of the 2018 IEEE 20th International Conference on e-Health Networking, Applications and Services (Healthcom), Ostrava, Czech Republic, 17–20 September 2018; pp. 1–3. [Google Scholar] [CrossRef] [Green Version]
- Wortman, P.A.; Tehranipoor, F.; Karimian, N.; Chandy, J.A. Proposing a modeling framework for minimizing security vulnerabilities in IoT systems in the healthcare domain. In Proceedings of the 2017 IEEE EMBS International Conference on Biomedical & Health Informatics (BHI), Orlando, FL, USA, 16–19 February 2017. [Google Scholar]
- Rahmadika, S.; Astillo, P.V.; Choudhary, G.; Duguma, D.G.; Sharma, V.; You, I. Blockchain-Based Privacy Preservation Scheme for Misbehavior Detection in Lightweight IoMT Devices. IEEE J. Biomed. Health Inform. 2023, 27, 710–721. [Google Scholar] [CrossRef]
- Choudhary, G.; Astillo, P.V.; You, I.; Yim, K.; Chen, I.R.; Cho, J.H. Lightweight Misbehavior Detection Management of Embedded IoT Devices in Medical Cyber Physical Systems. IEEE Trans. Netw. Serv. Manag. 2020, 17, 2496–2510. [Google Scholar] [CrossRef]
- Astillo, P.V.; Choudhary, G.; Duguma, D.G.; Kim, J.; You, I. TrMAps: Trust Management in Specification-Based Misbehavior Detection System for IMD-Enabled Artificial Pancreas System. IEEE J. Biomed. Health Inform. 2021, 25, 3763–3775. [Google Scholar] [CrossRef]
- Gao, W.; Sun, Y.; Fu, Q.; Wu, Z.; Ma, X.; Zheng, K.; Huang, X. ARP Poisoning Prevention in Internet of Things. In Proceedings of the 2018 9th International Conference on Information Technology in Medicine and Education (ITME), Hangzhou, China, 19–21 October 2018; pp. 733–736. [Google Scholar] [CrossRef]
- Gopal, S.B.; Poongodi, C.; Nanthiya, D.; Kirubakaran, T.; Logeshwar, D.; Saravanan, B.K. Autoencoder based Architecture for Mitigating phishing URL attack in the Internet of Things (IoT) using Deep Neural Networks. In Proceedings of the 2022 6th International Conference on Devices, Circuits and Systems (ICDCS), Coimbatore, India, 21–22 April 2022; pp. 427–431. [Google Scholar] [CrossRef]
- Adil, M.; Jan, M.A.; Mastorakis, S.; Song, H.; Jadoon, M.M.; Abbas, S.; Farouk, A. Hash-MAC-DSDV: Mutual Authentication for Intelligent IoT-Based Cyber–Physical Systems. IEEE Internet Things J. 2022, 9, 22173–22183. [Google Scholar] [CrossRef]
- Gowtham, M.; Pramod, H.B. Semantic Query-Featured Ensemble Learning Model for SQL-Injection Attack Detection in IoT-Ecosystems. IEEE Trans. Reliab. 2022, 71, 1057–1074. [Google Scholar] [CrossRef]
- Elmahi, E.; Salekzamankhani, S.; Sharma, M. In-Depth Analysis of Signal Jammers’ and Anti-Jamming Effect on 5G Signal. In Proceedings of the 2019 7th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW), Istanbul, Turkey, 26–28 August 2019; pp. 1–6. [Google Scholar] [CrossRef]
- Liu, W.; Zheng, J.; Shen, W.; Lu, Y.; Liang, R.; Li, J.; Hu, Y.; Ni, D. Research on application layer security communication protocol based on lightweight NTRU public key cryptography. In Proceedings of the 2019 International Conference on Intelligent Computing, Automation and Systems (ICICAS), Chongqing, China, 6–8 December 2019. [Google Scholar] [CrossRef]
- Belkhouja, T.; Sorour, S.; Hefeida, M.S. Role-based hierarchical medical data encryption for implantable medical devices. In Proceedings of the 2019 IEEE Global Communications Conference (GLOBECOM), Waikoloa, HI, USA, 9–13 December 2019; pp. 1–6. [Google Scholar]
- Chinese Remainder Theorem, Wikipedia. Available online: https://en.wikipedia.org/wiki/Chinese_remainder_theorem (accessed on 18 November 2020).
- Tutari, V.H.; Das, B.; Chowdhury, D.R. A continuous role-based authentication scheme and data transmission protocol for implantable medical devices. In Proceedings of the 2019 Second International Conference on Advanced Computational and Communication Paradigms (ICACCP), Gangtok, India, 25–28 February 2019; pp. 1–6. [Google Scholar]
- Belkhouja, T.; Du, X.; Mohamed, A.; Al-Ali, A.K.; Guizani, M. Biometric-based authentication scheme for implantable medical devices during emergency situations. Future Gener. Comput. Syst. 2019, 98, 109–119. [Google Scholar] [CrossRef]
- Sun, Y.; Lo, B. An artificial neural network framework for gait-based biometrics. IEEE J. Biomed. Health Inform. 2019, 23, 987–998. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Cryptographic Hash Function, Wikipedia. Available online: https://en.wikipedia.org/wiki/Cryptographic_hash_function (accessed on 18 November 2020).
- XOR Gate, Wikipedia. Available online: https://en.wikipedia.org/wiki/XOR_gate (accessed on 18 November 2020).
- Xu, Z.; Xu, C.; Liang, W.; Xu, J.; Chen, H. A Lightweight Mutual Authentication and key agreement scheme for Medical Internet of Things. IEEE Access 2019, 7, 53922–53931. [Google Scholar] [CrossRef]
- Alzahrani, B.A.; Irshad, A.; Albeshri, A.; Alsubhi, K. A provably secure and Lightweight Patient-healthcare authentication protocol in Wireless Body Area Networks. Wirel. Pers. Commun. 2020, 117, 47–69. [Google Scholar] [CrossRef]
- Homomorphic Encryption, Wikipedia. Available online: https://en.wikipedia.org/wiki/Homomorphic_encryption (accessed on 18 November 2020).
- Sun, X.; Zhang, P.; Sookhak, M.; Yu, J.; Xie, W. Utilizing fully homomorphic encryption to implement secure medical computation in Smart Cities. Pers. Ubiquitous Comput. 2017, 21, 831–839. [Google Scholar] [CrossRef]
- Jiang, L.; Chen, L.; Giannetsos, T.; Luo, B.; Liang, K.; Han, J. Toward practical privacy-preserving processing over encrypted data in IOT: An assistive healthcare use case. IEEE Internet Things J. 2019, 6, 10177–10190. [Google Scholar] [CrossRef] [Green Version]
- Farooqui, M.; Gull, H.; Ilyas, M.; Iqbal, S.Z.; Khan, M.A.; Krishna, G.; Ahmed, M.S. Improving mental healthcare using a human centered internet of things model and embedding homomorphic encryption scheme for cloud security. J. Comput. Theor. Nanosci. 2019, 16, 1806–1812. [Google Scholar] [CrossRef]
- Guo, X.; Lin, H.; Wu, Y.; Peng, M. A new data clustering strategy for enhancing mutual privacy in healthcare IOT Systems. Future Gener. Comput. Syst. 2020, 113, 407–417. [Google Scholar] [CrossRef]
- Kara, M.; Laouid, A.; Yagoub, M.A.; Euler, R.; Medileh, S.; Hammoudeh, M.; Eleyan, A.; Bounceur, A. A fully homomorphic encryption based on magic number fragmentation and el-gamal encryption: Smart healthcare use case. Expert Syst. 2021, 39, e12767. [Google Scholar] [CrossRef]
- Kasyoka, P.; Kimwele, M.; Angolo, S.M. Certificateless pairing-free authentication scheme for wireless body area network in healthcare management system. J. Med. Eng. Technol. 2020, 44, 12–19. [Google Scholar] [CrossRef]
- Bhatia, T.; Verma, A.K.; Sharma, G. Towards a secure incremental proxy re-encryption for e-healthcare data sharing in mobile cloud computing. Concurr. Comput. Pract. Exp. 2020, 32, e5520. [Google Scholar] [CrossRef]
- Cano, M.-D.; Cañavate-Sanchez, A. Preserving Data Privacy in the Internet of Medical Things Using Dual Signature ECDSA. Secur. Commun. Netw. 2020, 2020, 4960964. [Google Scholar] [CrossRef]
- Zheng, L.; Wang, Z.; Tian, S. Comparative study on electrocardiogram encryption using elliptic curves cryptography and data encryption standard for applications in internet of medical things. Concurr. Comput. Pract. Exp. 2020, 34, e5776. [Google Scholar] [CrossRef]
- Ogundokun, R.O.; Awotunde, J.B.; Adeniyi, E.A.; Ayo, F.E. Crypto-stegno based model for securing medical information on IOMT platform. Multimed. Tools Appl. 2021, 80, 31705–31727. [Google Scholar] [CrossRef]
- Sowjanya, K.; Dasgupta, M.; Ray, S. Elliptic curve cryptography based authentication scheme for internet of medical things. J. Inf. Secur. Appl. 2021, 58, 102761. [Google Scholar] [CrossRef]
- Digital Signature, Wikipedia. Available online: https://en.wikipedia.org/wiki/Digital_signature (accessed on 18 November 2020).
- Easttom, C.; Mei, N. Mitigating implanted medical device cybersecurity risks. In Proceedings of the 2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), New York, NY, USA, 10–12 October 2019; pp. 0145–0148. [Google Scholar]
- Farahat, I.S.; Tolba, A.S.; Elhoseny, M.; Eladrosy, W. A secure real-time internet of medical smart things (IOMST). Comput. Electr. Eng. 2018, 72, 455–467. [Google Scholar] [CrossRef]
- Kumar, M.; Chand, S. A Secure and Efficient Cloud-Centric Internet-of-Medical-Things-Enabled Smart Healthcare System with Public Verifiability. IEEE Internet Things J. 2020, 7, 10650–10659. [Google Scholar] [CrossRef]
- Bhushan, B.; Sinha, P.; Sagayam, K.M.; Andrew, J. Untangling blockchain technology: A survey on state of the art, security threats, privacy services, applications and future research directions. Comput. Electr. Eng. 2021, 90, 106897. [Google Scholar] [CrossRef]
- Nguyen, D.C.; Pathirana, P.N.; Ding, M.; Seneviratne, A. Blockchain for Secure EHRs Sharing of Mobile Cloud Based E-Health Systems. IEEE Access 2019, 7, 66792–66806. [Google Scholar] [CrossRef]
- Garg, N.; Wazid, M.; Das, A.K.; Singh, D.P.; Rodrigues, J.J.P.C.; Park, Y. BAKMP-IoMT: Design of Blockchain Enabled Authenticated Key Management Protocol for Internet of Medical Things Deployment. IEEE Access 2020, 8, 95956–95977. [Google Scholar] [CrossRef]
- Meng, W.; Li, W.; Zhu, L. Enhancing Medical Smartphone Networks via Blockchain-Based Trust Management Against Insider Attacks. IEEE Trans. Eng. Manag. 2020, 67, 1377–1386. [Google Scholar] [CrossRef]
- Gao, Y.; Lin, H.; Chen, Y.; Liu, Y. Blockchain and SGX-Enabled Edge-Computing-Empowered Secure IoMT Data Analysis. IEEE Internet Things J. 2021, 8, 15785–15795. [Google Scholar] [CrossRef]
- Egala, B.S.; Pradhan, A.K.; Badarla, V.; Mohanty, S.P. Fortified-Chain: A Blockchain-Based Framework for Security and Privacy-Assured Internet of Medical Things with Effective Access Control. IEEE Internet Things J. 2021, 8, 11717–11731. [Google Scholar] [CrossRef]
- Jin, H.; Dai, X.; Xiao, J.; Li, B.; Li, H.; Zhang, Y. Cross-Cluster Federated Learning and Blockchain for Internet of Medical Things. IEEE Internet Things J. 2021, 8, 15776–15784. [Google Scholar] [CrossRef]
- Abdellatif, A.A.; Samara, L.; Mohamed, A.; Erbad, A.; Chiasserini, C.F.; Guizani, M.; O’Connor, M.D.; Laughton, J. MEdge-Chain: Leveraging Edge Computing and Blockchain for Efficient Medical Data Exchange. IEEE Internet Things J. 2021, 8, 15762–15775. [Google Scholar] [CrossRef]
- Kulaç, S. Security belt for wireless implantable medical devices. J. Med. Syst. 2017, 41, 172. [Google Scholar] [CrossRef]
- Verma, G.K.; Singh, B.B.; Singh, H. Provably secure message recovery proxy signature scheme for wireless sensor networks in e-healthcare. Wirel. Pers. Commun. 2017, 99, 539–554. [Google Scholar] [CrossRef]
- Bhatia, T.; Verma, A.K.; Sharma, G. Secure sharing of mobile personal healthcare records using certificateless proxy re-encryption in cloud. Trans. Emerg. Telecommun. Technol. 2018, 29, e3309. [Google Scholar] [CrossRef]
- Kulac, S. A new externally worn proxy-based Protector for Non-Secure wireless implantable medical devices: Security jacket. IEEE Access 2019, 7, 55358–55366. [Google Scholar] [CrossRef]
- Li, W.; Jin, C.; Kumari, S.; Xiong, H.; Kumar, S. Proxy re-encryption with Equality Test for secure data sharing in internet of things-based Healthcare Systems. Trans. Emerg. Telecommun. Technol. 2020, 33, e3986. [Google Scholar] [CrossRef]
- Zheng, G.; Yang, W.; Valli, C.; Qiao, L.; Shankaran, R.; Orgun, M.A.; Mukhopadhyay, S.C. Finger-to-heart (F2H): Authentication for wireless implantable medical devices. IEEE J. Biomed. Health Inform. 2019, 23, 1546–1557. [Google Scholar] [CrossRef]
- Zheng, G.; Yang, W.; Johnstone, M.; Shankaran, R.; Valli, C. Securing the elderly in cyberspace with fingerprints. In Assistive Technology for the Elderly; Suryadevara, N.K., Mukhopadhyay, S.C., Eds.; Elsevier: Amsterdam, The Netherlands, 2020; pp. 59–79. [Google Scholar] [CrossRef]
- Shakil, K.A.; Zareen, F.J.; Alam, M.; Jabin, S. BAMHealthCloud: A biometric authentication and data management system for healthcare data in cloud. J. King Saud Univ.—Comput. Inf. Sci. 2020, 32, 57–64. [Google Scholar] [CrossRef]
- Li, J.; Chen, X.; Li, M.; Li, J.; Lee PP, C.; Lou, W. Secure deduplication with efficient and reliable convergent key management. IEEE Trans. Parallel Distrib. Syst. 2014, 25, 1615–1625. [Google Scholar] [CrossRef]
- He, D.; Kumar, N.; Khan, M.K.; Wang, L.; Shen, J. Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services. IEEE Syst. J. 2018, 12, 1621–1631. [Google Scholar] [CrossRef]
- Wazid, M.; Das, A.K. A secure group-based blackhole node detection scheme for hierarchical wireless sensor networks. Wirel. Pers. Commun. 2016, 94, 1165–1191. [Google Scholar] [CrossRef]
- Das, A.K.; Wazid, M.; Yannam, A.R.; Rodrigues, J.J.; Park, Y. Provably secure ECC-based device access control and key agreement protocol for IOT environment. IEEE Access 2019, 7, 55382–55397. [Google Scholar] [CrossRef]
- Ding, S.; Cao, J.; Li, C.; Fan, K.; Li, H. A novel attribute-based access control scheme using blockchain for IOT. IEEE Access 2019, 7, 38431–38441. [Google Scholar] [CrossRef]
- Riad, K.; Hamza, R.; Yan, H. Sensitive and energetic IOT access control for Managing Cloud Electronic Health Records. IEEE Access 2019, 7, 86384–86393. [Google Scholar] [CrossRef]
- Sahu, N.K.; Mukherjee, I. Machine learning based Anomaly Detection for IOT network: (anomaly detection in IOT network). In Proceedings of the 2020 4th International Conference on Trends in Electronics and Informatics (ICOEI) (48184), Tirunelveli, India, 15–17 June 2020. [Google Scholar] [CrossRef]
- Bovenzi, G.; Aceto, G.; Ciuonzo, D.; Persico, V.; Pescape, A. A hierarchical hybrid intrusion detection approach in IOT scenarios. In Proceedings of the GLOBECOM 2020–2020 IEEE Global Communications Conference, Taipei, Taiwan, 7–11 December 2020. [Google Scholar] [CrossRef]
- Sharma, V.; You, I.; Yim, K.; Chen, I.-R.; Cho, J.-H. Briot: Behavior rule specification-based misbehavior detection for IOT-embedded cyber-physical systems. IEEE Access 2019, 7, 118556–118580. [Google Scholar] [CrossRef]
S. No | Product | Type of Sensor | Reference | Support Priority | Disease/Monitoring | Cost | Data Usability | Energy Consumption |
---|---|---|---|---|---|---|---|---|
1 | Proteus Digital Monitor | Clinical biometric | https://www.proteus.com/, accessed on 10 January 2023 | Yes | Hypertension, diabetes | Very high | Average | Very high |
2 | Obaa | Clinical | https://www.obaawoman.com/, accessed on 10 January 2023 | Yes | Patient waiting time reduction | Low | High | Average |
3 | OMsignal | Brain and fitness | http://omsignal.com/, accessed on 10 January 2023 | Yes | Wellness care | High | Average | High |
4 | Thalmic Labs | Home monitoring | https://www.bynorth.com/, accessed on 10 January 2023 | Yes | Virtual reality of health status | High | High | High |
5 | BabyBe | Sleep, infant and woman care | http://www.babybemedical.com/, accessed on 10 January 2023 | Yes | Bio signal between mother and premature infant | High | Average | Low |
6 | AdhereTech | Clinical | https://www.adheretech.com/, accessed on 10 January 2023 | Yes | Regular medication | Low | Average | Average |
7 | Pacifier | Sleep, infant and woman care | https://bluemaestro.com/, accessed on 10 January 2023 | Yes | Body temperature | High | High | High |
8 | CYCORE | Clinical biometric | http://cycore.ucsd.edu/, accessed on 10 January 2023 | Yes | Cancer | Average | High | Very high |
9 | Zeeq | Sleep, infant and woman care | https://sleeptrackers.io/zeeq-smart-pillow/, accessed on 10 January 2023 | Yes | Sleep | Average | Low | Average |
10 | Halo Neuroscience | Brain and fitness | https://www.haloneuro.com/, accessed on 10 January 2023 | Yes | Cognitive task management | Average | Low | Average |
11 | Voluntis | Clinical | https://www.voluntis.com/, accessed on 10 January 2023 | Yes | Cancer self management | Very high | Average | Very high |
12 | TuringSense | Home monitoring | https://www.turingsense.com/, accessed on 10 January 2023 | Yes | Rehabilitation, posture correction, virtual reality | Average | Low | High |
13 | Quantus | Clinical biometric | https://quanttus.com/, accessed on 10 January 2023 | Yes | Sleep, diabetes, blood pressure | Low | Low | Low |
14 | Triggerish | Brain and fitness | https://www.sensimed.ch/sensimedtriggerfish/, accessed on 10 January 2023 | Yes | Irregular fitness tracking | Low | Average | Average |
15 | Teletracking | Clinical | https://www.teletracking.com/, accessed on 10 January 2023 | Yes | Patient– doctor communication | Average | High | High |
16 | Cue Health | Home monitoring | https://www.cuehealth.com/, accessed on 10 January 2023 | Yes | Inflammation, influenza, fertility, testosterone | Low | High | Low |
17 | Biostrap | Brain and fitness | https://biostrap.com/, accessed on 10 January 2023 | Yes | Sleep recovery and performance management | Low | High | Low |
18 | Sotera Wireless | Clinical biometric | http://storeawireless.com/, accessed on 10 January 2023 | Yes | Blood pressure, fall detection | Average | Very high | Low |
19 | Beddit | Sleep, infant and woman care | https://www.beddit.com/, accessed on 10 January 2023 | Yes | Sleep and wellness | Average | High | Low |
20 | BioSerenity | Home monitoring | https://www.bioserenity.com/, accessed on 10 January 2023 | Yes | Epilepsy monitoring | Very high | Average | Average |
21 | MC10 | Clinical biometric | http://mc10inc.com/, accessed on 10 January 2023 | Yes | Sleep, posture, heart rate | Low | Low | Low |
22 | Ovia | Sleep, infant and woman care | https://www.oviahealth.com/, accessed on 10 January 2023 | Yes | Ovulation | Low | High | Average |
23 | Breezhaler | Home monitoring | https://www.medicines.org.uk/emc/product/3496/smpc, accessed on 10 January 2023 | Yes | Asthma | Average | Low | Average |
24 | NeuroSky | Brain and fitness | http://neurosky.com/, accessed on 10 January 2023 | Yes | Mental and physical integration | Low | Average | Low |
25 | Evermind | Clinical | http://evermind.us/, accessed on 10 January 2023 | Yes | Daily activity | High | Low | High |
Category | Attacks | Possible in IoMT |
---|---|---|
Data confidentiality attacks [2,56] | Man-in-the-middle (MitM) Packet sniffing | Yes |
Social engineering attacks [24] | Pretexting Baiting attack | Yes |
Privacy attacks [57] | Black-box attack White-box attack | Yes |
Availability attacks [58] | Distributed DoS (DDoS) Flooding attacks | Yes |
User or device authentication attacks [59] | Brute forcing, masquerading, replay attacks, session hijacking, rainbow attacks, dictionary | Yes |
Malware attacks [60] | Spyware, Trojan, rootkit | Yes |
IoMT Assets | Possible Threat Entry | References | Risk | Severity |
---|---|---|---|---|
Gateway | Attack from WAN | Gao et al. [68] | The ARP table could be poisoned that is exiting in Gateway router | High: as it may reveal important IP of internal switches and routers |
Helpdesk Workstation | LAN and WAN | Gopal et al. [69] | Virus could be inserted or phishing mail could be sent to reception. | Low: as generally this workstation does not consists of any permanent data, only appointment times and patient names |
Web Server | WAN | Shah et al. [70] | Consist of the web application on which IoMT website and application would be running | High: this may lead to complete failure hospital management system and bring the organization back to pen and paper mode |
MD | LAN and WAN | G. M et al. [71] | Consist of admin and other users’ passwords | High: as it can compromise the complete digital infrastructure. |
Filed Sensors | Hardware means | Elmahi et al. [72] | Jammer could be used to create noise | Moderate: this can reduce the efficiency of reporting of data to the centralized server performed by Filed Sensors |
SIEM | WAN and LAN | - | If the monitoring framework itself becomes compromised then, then all internal and external attacks would not be visible | High: this will create problems in the monitoring of logs, networks and other vulnerable areas where attacks could take place. |
Security Techniques in IoMT | References | Year | Major Contribution |
---|---|---|---|
Symmetric key cryptography | Liu et al. [73] | 2019 | Lightweight NTRU public key cryptography-based security protocol |
Belkhouja et al. [74] | 2019 | Role-based encryption standard to Overcome the computational shortcomings of IMDs | |
Tutari et al. [76] | 2019 | Role-based authentication for IMDs | |
Belkhouja et al. [77] | 2019 | Secure access to implanted devices and protects the wireless key exchange. | |
Sun et al. [78] | 2019 | Biometric cryptosystems that use ANN and gait signal energy variations | |
Xu et al. [81] proposed a | 2019 | Lightweight authentication technique to guarantee forward secrecy in WBANs | |
Alzahrani et al. [82] | 2020 | Provably secure and reliable key agreement-based health monitoring protocol | |
Asymmetric key cryptography | Sun et al. [84] | 2017 | Fully homomorphic encryption in healthcare networks |
Jiang et al. [85] | 2019 | Privacy-preserving in IoT | |
Farooqui et al. [86] | 2019 | Human-centered model to identify and treat mental healthcare patients | |
Guo et al. [87] | 2020 | Homomorphic encryption to prevent leakage of patients’ data | |
Kara et al. [88] | 2021 | Magic number fragmentation and twin key encryption | |
Kasyoka et al. [89] | 2020 | Pairing-free authentication protocol for WBANs | |
Bhatia et al. [90] | 2020 | Healthcare data sharing using incremental proxy re-encryption | |
Maria et al. [91] | 2020 | Secure and privacy-preserving solutions for IoMT communications | |
Zheng et al. [92] | 2020 | Preserves data integrity in healthcare monitoring systems | |
Ogundokun et al. [93] | 2021 | Preserves data confidentiality using crypto-stegno model. | |
Sowjanya et al. [94] | 2021 | ECC-based authentication protocol for securing medical data in WBANs. | |
Easttom et al. [96] | 2019 | Cyberthreats in implantable medical devices | |
Farahat et al. [97] | 2018 | Secure authentication using digital signatures and key rotation schemes. | |
Kumar et al. [98] | 2020 | Identity-based cloud-centric IoMT system | |
Keyless algorithm | Nguyen et al. [100] | 2019 | Smart contract-based access control mechanism for securely sharing EHRs |
Garg et al. [101] | 2020 | Blockchain-enabled key agreement scheme | |
Meng et al. [102] | 2020 | Blockchain-based trust management in medical smartphone networks | |
Gao et al. [103] | 2021 | Blockchain technology and edge computing to maintain confidentiality in IoMT systems. | |
Egala et al. [104] | 2021 | Automated access control technique for IoMT systems | |
Jin et al. [105] | 2021 | Blockchain-based cross-cluster federated learning solutions for secure data sharing in IoMT systems | |
Awad et al. [106] | 2021 | Optimize computational cost and latency of medical record sharing | |
Kulac et al. [107] | 2017 | Protective security belt to provide full duplex secure transmissions | |
Verma et al. [108] | 2017 | Proxy signature scheme for e-healthcare systems | |
Bhatia et al. [109] | 2018 | Lightweight re-encryption scheme for securely sharing the EHRs | |
Kulac et al. [110] | 2019 | Protector jacket to protect IMDs from adversaries | |
Li et al. [111] | 2020 | Public key encryption and proxy re-encryption for securely searching healthcare records | |
Zheng et al. [112] | 2019 | Use the patient’s fingerprint for granting access to the IMD | |
Zheng et al. [113] | 2020 | Fingerprint information to safeguard elderly people suffering from memory loss | |
Shakil et al. [114] | 2020 | Behavioral biometric signature to secure health data |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Bhushan, B.; Kumar, A.; Agarwal, A.K.; Kumar, A.; Bhattacharya, P.; Kumar, A. Towards a Secure and Sustainable Internet of Medical Things (IoMT): Requirements, Design Challenges, Security Techniques, and Future Trends. Sustainability 2023, 15, 6177. https://doi.org/10.3390/su15076177
Bhushan B, Kumar A, Agarwal AK, Kumar A, Bhattacharya P, Kumar A. Towards a Secure and Sustainable Internet of Medical Things (IoMT): Requirements, Design Challenges, Security Techniques, and Future Trends. Sustainability. 2023; 15(7):6177. https://doi.org/10.3390/su15076177
Chicago/Turabian StyleBhushan, Bharat, Avinash Kumar, Ambuj Kumar Agarwal, Amit Kumar, Pronaya Bhattacharya, and Arun Kumar. 2023. "Towards a Secure and Sustainable Internet of Medical Things (IoMT): Requirements, Design Challenges, Security Techniques, and Future Trends" Sustainability 15, no. 7: 6177. https://doi.org/10.3390/su15076177
APA StyleBhushan, B., Kumar, A., Agarwal, A. K., Kumar, A., Bhattacharya, P., & Kumar, A. (2023). Towards a Secure and Sustainable Internet of Medical Things (IoMT): Requirements, Design Challenges, Security Techniques, and Future Trends. Sustainability, 15(7), 6177. https://doi.org/10.3390/su15076177