| Literature DB >> 34173428 |
Azana Hafizah Mohd Aman1, Wan Haslina Hassan2, Shilan Sameen2,3, Zainab Senan Attarbashi4, Mojtaba Alizadeh5, Liza Abdul Latiff6.
Abstract
In many countries, the Internet of Medical Things (IoMT) has been deployed in tandem with other strategies to curb the spread of COVID-19, improve the safety of front-line personnel, increase efficacy by lessening the severity of the disease on human lives, and decrease mortality rates. Significant inroads have been achieved in terms of applications and technology, as well as security which have also been magnified through the rapid and widespread adoption of IoMT across the globe. A number of on-going researches show the adoption of secure IoMT applications is possible by incorporating security measures with the technology. Furthermore, the development of new IoMT technologies merge with Artificial Intelligence, Big Data and Blockchain offers more viable solutions. Hence, this paper highlights the IoMT architecture, applications, technologies, and security developments that have been made with respect to IoMT in combating COVID-19. Additionally, this paper provides useful insights into specific IoMT architecture models, emerging IoMT applications, IoMT security measurements, and technology direction that apply to many IoMT systems within the medical environment to combat COVID-19.Entities:
Keywords: COVID-19 pandemic mitigation; IoMT application; IoMT architecture; IoMT security; IoMT technology
Year: 2020 PMID: 34173428 PMCID: PMC7605812 DOI: 10.1016/j.jnca.2020.102886
Source DB: PubMed Journal: J Netw Comput Appl ISSN: 1084-8045 Impact factor: 6.281
Fig. 1Taxonomy IoMT pandemic mitigation.
Fig. 2Paper content flow.
Fig. 3Traditional versus IoMT-based medical ecosystem.
Fig. 4IoMT communication and technology.
Fig. 5IoMT framework guidance.
Fig. 6IoMT pandemic specific architecture.
Summary of architecture layer analysis.
| Architecture layer | 5 layers | 4 layers | 3 layers | Ratio |
|---|---|---|---|---|
| 19% | ||||
| 6% | ||||
| 3% | ||||
| 3% | ||||
| 3% | ||||
| 3% | ||||
| 3% | ||||
| 3% | ||||
| 3% | ||||
| 16% | ||||
| 3% | ||||
| 3% | ||||
| 6% | ||||
| 9% | ||||
| 13% | ||||
| 3% |
Fig. 7Architecture layer analysis percentage.
Fig. 8Pandemic and its applications percentage.
Pandemic technology and application.
| Pandemic | Application | Device | Objective |
|---|---|---|---|
| Online camera | Camera | ||
| Electronic wrist tag | Tag | ||
| Geographic information system | Mobile phone | ||
| Surveillance systems | Mobile phone, PDA | ||
| Geographic information system | Smartphone | ||
| Mobile-based digital management | Mobile phone | ||
| Tracking application | Cell phone | Virus predictive trend Risk of mortality prediction Drugs candidate finder Genomes systematic classification Priority prediction | |
| Temperature alert application | Wearable device, mobile phone | ||
| 2-in-1 smart detector system | Infrared scan, camera | ||
| Self-diagnosis application | Smartphone | ||
| Digital tracing application | Smartphone | ||
| Telemedicine service | Smartphone | ||
| Smartwatch application | Smartwatch | ||
| Rapid diagnostic device | Disease detector | ||
| Passenger locator | Locator card |
IoMT artificial intelligence and big data.
| Reference | Scope | Predictive Model | Data Mining & Analytics | Decision Making | Systematic Classification |
|---|---|---|---|---|---|
| Healthcare domain | Yes | Yes | |||
| Disease domain | Yes | Yes | |||
| Healthcare domain | Yes | Yes | |||
| COVID-19 disease domain | Yes | Yes | |||
| COVID-19 disease domain | Yes | ||||
| COVID-19 disease domain | Yes | ||||
| COVID-19 disease domain | Yes | ||||
| Coronavirus and COVID-19 disease domain | Yes | Yes | |||
| COVID-19 disease domain | Yes | ||||
| Healthcare domain | Yes | ||||
| COVID-19 disease domain | Yes | ||||
| COVID-19 disease domain | Yes | ||||
| 35% | 35% | 24% | 6% | ||
Fig. 9Artificial intelligence and big data number statistic.
Fig. 10Artificial intelligence and big data analysis percentage.
Fig. 11IoMT, big data and artificial intelligence for COVID-19 mitigation.
Fig. 12IoMT Security methods percentage.
IoMT security requirements and methods.
| Security | Confidentiality | Integrity | Availability | Authenticity |
|---|---|---|---|---|
| Hoa (2011); | ||||
| 17% | 29% | 6% | 48% |
IoMT most common cyber attacks.
| Attack | Attack vector | Reference |
|---|---|---|
| Cloud Services, Databases | ||
| Databases | ||
| Messages, Network | ||
| Hardware, Middleware |
Fig. 13IoMT security methods and the security requirements.
IoMT privacy methods.
| Focus Area | Security Requirements | Reference | Privacy Method |
|---|---|---|---|
| Data | Confidentiality | Two party secure computation protocol | |
| SW-SSS | |||
| Biometric based authentication scheme | |||
| Using Public and Private keys | |||
| Proof of Authority, Public Key | |||
| Sensor | Resilience to internal attacks | MediBchain Nodes Registration | |
| Biometric based authentication scheme | |||
| Cloud | Trust | Medical blockchain (MediBchain) | |
| Network | Resistance to man-in-the-middle attack | MediBchain | |
| Privacy preserving strategies of blockchain-based IoT system | |||
| End User | Device Authentication | MediBchain Nodes Registration | |
| User Authentication | MediBchain-Based Privacy-Preserving Mutual Authentication (MBPA) | ||
| Biometric based authentication scheme | |||
| Using Public Key and Lightweight Digital Signature | |||
| Patient Anonymity | Removal of Personally Identifiable Information before data publishing | ||
| Lightweight Ring Signature | |||
| Anonymized graph of interpersonal interactions | |||
| Administration | Access Control | Biometric based authentication scheme | |
| MBPA | |||
| Using Public Key and Lightweight Digital Signature | |||
| Key Management | Public-key cryptosystem | ||
| Trust Management | MBPA |
Fig. 14Timeline for IoMT disease mitigation technology.
Fig. 15Secure COVID-19 mitigation ecosystem of IoMT applications and technologies.