Security and Privacy Management in Internet of Medical Things (IoMT): A Synthesis

The Internet of Medical Things (IoMT) has become a strategic priority for future e-healthcare because of its ability to improve patient care and its scope of providing more reliable clinical data, increasing efficiency, and reducing costs. It is no wonder that many healthcare institutions nowadays like to harness the benefits offered by the IoMT. In fact, it is an infrastructure with connected medical devices, software applications, and care systems and services. However, the accelerated adoption of connected devices also has a serious side effect: it obscures the broader need to meet the requirements of standard security for modern converged environments (even beyond connected medical devices). Adding up different types and numbers of devices risks creating significant security vulnerabilities. In this paper, we have undertaken a study of various security techniques dedicated to this environment during recent years. This study enables us to classify these techniques and to characterize them in order to benefit from their positive aspects.

[1]  Raouf Boutaba,et al.  Man-in-the-Middle Attack Mitigation in Internet of Medical Things , 2022, IEEE Transactions on Industrial Informatics.

[2]  A. J. A. Dhiyya Architecture of IoMT in Healthcare , 2022, The Internet of Medical Things (IoMT).

[3]  H. F. Ahmad,et al.  Security and privacy of internet of medical things: A contemporary review in the age of surveillance, botnets, and adversarial ML , 2022, J. Netw. Comput. Appl..

[4]  Praveen Kumar Reddy Maddikunta,et al.  A Review on Security and Privacy of Internet of Medical Things , 2020, Internet of Things.

[5]  Jonathan Rodriguez,et al.  A Survey on Security Threats and Countermeasures in Internet of Medical Things (IoMT) , 2020, Trans. Emerg. Telecommun. Technol..

[6]  Rakesh Kumar Mahendran,et al.  Security and Privacy Issues in Medical Internet of Things: Overview, Countermeasures, Challenges and Future Directions , 2021, Sustainability.

[7]  Christos Emmanouilidis,et al.  Internet of Things for System Integrity: A Comprehensive Survey on Security, Attacks and Countermeasures for Industrial Applications , 2021, Sensors.

[8]  Liza Abdul Latiff,et al.  A systematic review of security and privacy issues in the internet of medical things; the role of machine learning approaches , 2021, PeerJ Comput. Sci..

[9]  Fadi Al-Turjman,et al.  Smart Mutual Authentication Protocol for Cloud Based Medical Healthcare Systems Using Internet of Medical Things , 2021, IEEE Journal on Selected Areas in Communications.

[10]  Derar Eleyan,et al.  Survey of DoS/DDoS attacks in IoT , 2021, Sustainable Engineering and Innovation.

[11]  Rakesh Tripathi,et al.  Towards design and implementation of security and privacy framework for Internet of Medical Things (IoMT) by leveraging blockchain and IPFS technology , 2021, The Journal of Supercomputing.

[12]  Raj Jain,et al.  Recent Advances in the Internet-of-Medical-Things (IoMT) Systems Security , 2020, IEEE Internet of Things Journal.

[13]  Al-Sakib Khan Pathan,et al.  A formally verified authentication protocol in secure framework for mobile healthcare during COVID-19-like pandemic , 2020, Connect. Sci..

[14]  Bhavna Arora,et al.  Detection and Prevention of DoS and DDoS in IoT , 2021 .

[15]  Nico Surantha,et al.  A Review of Wearable Internet-of-Things Device for Healthcare , 2021 .

[16]  Adel Binbusayyis,et al.  Security, Privacy and Trust in IoMT Enabled Smart Healthcare System: A Systematic Review of Current and Future Trends , 2021 .

[17]  Mahmood Al-khassaweneh,et al.  A review of internet of medical things (IoMT) - based remote health monitoring through wearable sensors: a case study for diabetic patients , 2020 .

[18]  Khan Muhammad,et al.  Reversible data hiding exploiting Huffman encoding with dual images for IoMT based healthcare , 2020, Comput. Commun..

[19]  Justice Owusu Agyemang,et al.  Lightweight rogue access point detection algorithm for WiFi-enabled Internet of Things(IoT) devices , 2020, Internet Things.

[20]  Muhammad Tahir,et al.  A Lightweight Authentication and Authorization Framework for Blockchain-Enabled IoT Network in Health-Informatics , 2020, Sustainability.

[21]  Christos Douligeris,et al.  Security in IoMT Communications: A Survey , 2020, Sensors.

[22]  Abhishek Kumar,et al.  Securing communication by attribute-based authentication in HetNet used for medical applications , 2020, EURASIP J. Wirel. Commun. Netw..

[23]  Praveen Kumar Reddy Maddikunta,et al.  An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architecture , 2020, Comput. Commun..

[24]  Maria-Dolores Cano,et al.  Preserving Data Privacy in the Internet of Medical Things Using Dual Signature ECDSA , 2020, Secur. Commun. Networks.

[25]  Devesh Pratap Singh,et al.  BAKMP-IoMT: Design of Blockchain Enabled Authenticated Key Management Protocol for Internet of Medical Things Deployment , 2020, IEEE Access.

[26]  Rui Yang,et al.  Merging RFID and Blockchain Technologies to Accelerate Big Data Medical Research Based on Physiological Signals , 2020, Journal of healthcare engineering.

[27]  S. Manimurugan,et al.  Effective Attack Detection in Internet of Medical Things Smart Environment Using a Deep Belief Neural Network , 2020, IEEE Access.

[28]  Elias Yaacoub,et al.  Securing internet of medical things systems: Limitations, issues and recommendations , 2020, Future Gener. Comput. Syst..

[29]  Samuel H. Fuller,et al.  A Low-Power Dual-Factor Authentication Unit for Secure Implantable Devices , 2020, 2020 IEEE Custom Integrated Circuits Conference (CICC).

[30]  Yaghoub Farjami,et al.  MedSBA: a novel and secure scheme to share medical data based on blockchain technology and attribute-based encryption , 2020, Journal of Ambient Intelligence and Humanized Computing.

[31]  Michael Kimwele,et al.  Certificateless pairing-free authentication scheme for wireless body area network in healthcare management system , 2020, Journal of medical engineering & technology.

[32]  Mohamed Jmaiel,et al.  AUDIT: AnomaloUs data Detection and Isolation approach for mobile healThcare systems , 2019, Expert Syst. J. Knowl. Eng..

[33]  Xiaojiang Du,et al.  Secure medical treatment with deep learning on embedded board , 2020 .

[34]  Shilpa Chaudhari,et al.  An efficient approach for enhancing security in Internet of Things using the optimum authentication key , 2020, International Journal of Computers and Applications.

[35]  Yingnan Sun,et al.  Security and Privacy for the Internet of Medical Things Enabled Healthcare Systems: A Survey , 2019, IEEE Access.

[36]  Vaidehi Vijayakumar,et al.  Cyber Attacks on Healthcare Devices Using Unmanned Aerial Vehicles , 2019, Journal of Medical Systems.

[37]  Sameh Sorour,et al.  Role-Based Hierarchical Medical Data Encryption for Implantable Medical Devices , 2019, 2019 IEEE Global Communications Conference (GLOBECOM).

[38]  Afsaneh Dehnad,et al.  Security Requirements of Internet of Things-Based Healthcare System: a Survey Study , 2019, Acta informatica medica : AIM : journal of the Society for Medical Informatics of Bosnia & Herzegovina : casopis Drustva za medicinsku informatiku BiH.

[39]  Zhiwei Wang,et al.  Blind Batch Encryption-Based Protocol for Secure and Privacy-Preserving Medical Services in Smart Connected Health , 2019, IEEE Internet of Things Journal.

[40]  Malka N. Halgamuge,et al.  Security and Privacy of Internet of Medical Things (IoMT) Based Healthcare Applications: A Review , 2019 .

[41]  Sabrina Sicari,et al.  How to evaluate an Internet of Things system: Models, case studies, and real developments , 2019, Softw. Pract. Exp..

[42]  Yuguang Fang,et al.  Practical Privacy-Preserving ECG-Based Authentication for IoT-Based Healthcare , 2019, IEEE Internet of Things Journal.

[43]  Hamid Jahankhani,et al.  Digital Forensic Investigation For The Internet Of Medical Things (IoMT) , 2019, Journal of Forensic, Legal & Investigative Sciences.

[44]  Deepak Puthal,et al.  PMsec: Physical Unclonable Function-Based Robust and Lightweight Authentication in the Internet of Medical Things , 2019, IEEE Transactions on Consumer Electronics.

[45]  Nenghai Yu,et al.  Healthchain: A Blockchain-Based Privacy Preserving Scheme for Large-Scale Health Data , 2019, IEEE Internet of Things Journal.

[46]  Denis Rosário,et al.  Heart of IoT: ECG as biometric sign for authentication and identification , 2019, 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC).

[47]  Veljko M. Milutinovic,et al.  Challenges in wireless communication for connected sensors and wearable devices used in sport biofeedback applications , 2019, Future Gener. Comput. Syst..

[48]  Xiaojiang Du,et al.  A Novel Deep Learning Strategy for Classifying Different Attack Patterns for Deep Brain Implants , 2019, IEEE Access.

[49]  Dong-Wook Seo,et al.  Development of ECG Monitoring System and Implantable Device with Wireless Charging , 2019, Micromachines.

[50]  Suparna Biswas,et al.  Intelligent, Secure Big Health Data Management Using Deep Learning and Blockchain Technology: An Overview , 2019 .

[51]  R. Indrakumari,et al.  IoT Sensing Capabilities: Sensor Deployment and Node Discovery, Wearable Sensors, Wireless Body Area Network (WBAN), Data Acquisition , 2019, Intelligent Systems Reference Library.

[52]  Byung-Seo Kim,et al.  The Internet of Things: A Review of Enabled Technologies and Future Challenges , 2019, IEEE Access.

[53]  Mojtaba Alizadeh,et al.  The application of internet of things in healthcare: a systematic literature review and classification , 2018, Universal Access in the Information Society.

[54]  V. Navya,et al.  Threshold-based energy-efficient routing for transmission of critical physiological parameters in a wireless body area network under emergency scenarios , 2018, International Journal of Computers and Applications.

[55]  Khelifa Benahmed,et al.  Security Mechanisms for 6LoWPAN Network in Context of Internet of Things: A Survey , 2018, Renewable Energy for Smart and Sustainable Cities.

[56]  Ingrid Moerman,et al.  A Survey of LoRaWAN for IoT: From Technology to Application , 2018, Sensors.

[57]  Byung-Seo Kim,et al.  IoT Elements, Layered Architectures and Security Issues: A Comprehensive Survey , 2018, Sensors.

[58]  Fernando A. Kuipers,et al.  Security Vulnerabilities in LoRaWAN , 2018, 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI).

[59]  Rahat Ali Khan,et al.  The state-of-the-art wireless body area sensor networks: A survey , 2018, Int. J. Distributed Sens. Networks.

[60]  Chunhua Wang,et al.  Multimodal Feature-Level Fusion for Biometrics Identification System on IoMT Platform , 2018, IEEE Access.

[61]  Alessandra Pieroni,et al.  E-health-IoT Universe: A Review , 2017 .

[62]  Yuval Elovici,et al.  Opening Pandora's Box: E ective Techniques for Reverse Engineering IoT Devices , 2017 .

[63]  Sajjan G. Shiva,et al.  Security and Privacy in the Internet of Medical Things: Taxonomy and Risk Assessment , 2017, 2017 IEEE 42nd Conference on Local Computer Networks Workshops (LCN Workshops).

[64]  Rafael Medina Carnicer,et al.  Deep multi-task learning for gait-based biometrics , 2017, 2017 IEEE International Conference on Image Processing (ICIP).

[65]  Tosiron Adegbija,et al.  A Workload Characterization for the Internet of Medical Things (IoMT) , 2017, 2017 IEEE Computer Society Annual Symposium on VLSI (ISVLSI).

[66]  Arwa Alrawais,et al.  Fog Computing for the Internet of Things: Security and Privacy Issues , 2017, IEEE Internet Computing.

[67]  Suresh Neethirajan,et al.  Recent advances in wearable sensors for animal health management , 2017 .

[68]  M. Haghi,et al.  Wearable Devices in Medical Internet of Things: Scientific Research and Commercially Available Devices , 2017, Healthcare informatics research.

[69]  Gaurav Choudhary,et al.  Internet of Things: A survey on architecture, technologies, protocols and challenges , 2016, 2016 International Conference on Recent Advances and Innovations in Engineering (ICRAIE).

[70]  Amr M. Youssef,et al.  Security Tradeoffs in Cyber Physical Systems: A Case Study Survey on Implantable Medical Devices , 2016, IEEE Access.

[71]  Anastasios A. Economides,et al.  Detecting Sybil attacks in wireless sensor networks using UWB ranging-based information , 2015, Expert Syst. Appl..

[72]  Yi Zhang,et al.  Enabling Safe Interoperation by Medical Device Virtual Integration , 2015, IEEE Design & Test.

[73]  George C. Hadjichristofi,et al.  Internet of Things: Security vulnerabilities and challenges , 2015, 2015 IEEE Symposium on Computers and Communication (ISCC).

[74]  Kyung-Sup Kwak,et al.  The Internet of Things for Health Care: A Comprehensive Survey , 2015, IEEE Access.

[75]  Wanlei Zhou,et al.  RFID in Healthcare – Current Trends and the Future , 2015, Mobile Health.

[76]  Jinisha Y. Bhanushali,et al.  Internet of Things: Machine to Machine communication with emphasis on role of RFID and NFC , 2015 .

[77]  Al-Sakib Khan Pathan,et al.  Lethality of SQL injection against current and future internet technologies , 2014, Int. J. Comput. Sci. Eng..

[78]  Manos M. Tentzeris,et al.  Integrating tiny RFID- and NFC-based sensors with the Internet , 2014 .

[79]  Farid Touati,et al.  A comparative analysis of BLE and 6LoWPAN for U-HealthCare applications , 2013, 2013 7th IEEE GCC Conference and Exhibition (GCC).

[80]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[81]  Gérard Lachapelle,et al.  GPS Vulnerability to Spoofing Threats and a Review of Antispoofing Techniques , 2012 .

[82]  Lucia Lo Bello,et al.  Comparative assessments of IEEE 802.15.4/ZigBee and 6LoWPAN for low-power industrial WSNs in realistic scenarios , 2012, 2012 9th IEEE International Workshop on Factory Communication Systems.

[83]  Haishen Peng,et al.  WIFI network information security analysis research , 2012, 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet).

[84]  John E Ferguson,et al.  Wireless communication with implanted medical devices using the conductive properties of the body , 2011, Expert review of medical devices.

[85]  Panagiotis Papadimitratos,et al.  Effectiveness of distance-decreasing attacks against impulse radio ranging , 2010, WiSec '10.

[86]  Choong Seon Hong,et al.  Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.