| Literature DB >> 35898021 |
Pintu Kumar Sadhu1, Venkata P Yanambaka1, Ahmed Abdelgawad1, Kumar Yelamarthi2.
Abstract
With the widespread and increasing use of Internet-of-Things (IoT) devices in all aspects of daily life, a hopeful future for people, data, and processes is emerging. Extensive spans allow for an integrated life cycle to be created from home to enterprise. The Internet of Medical things (IoMT) forms a flourishing surface that incorporates the sensitive information of human life being sent to doctors or hospitals. These open an enormous space for hackers to utilize flaws of the IoMT network to make a profit. This creates a demand for standardizing regulations and a secure system. Though many authorities are making standards, there are some lacking in the system which makes the product vulnerable. Although many established mechanisms are present for the IoT network, there are a number of obstacles preventing its general implementation in the IoMT network. One of the adoption challenges is the IoMT devices itself, because many IoMT networks consist of battery-powered devices with constrained processing capability. A general overview of the different security integrations with IoT applications has been presented in several papers. Therefore, this paper aims to provide an overview of the IoMT ecosystem, regulations, challenges of standards, security mechanisms using cryptographic solutions, physical unclonable functions (PUF)-based solutions, blockchain, and named data networking (NDN) as well, with pros and cons.Entities:
Keywords: Internet of Medical Things; blockchain; encryption; named data networking; physical unclonable function; security and privacy
Mesh:
Year: 2022 PMID: 35898021 PMCID: PMC9371024 DOI: 10.3390/s22155517
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.847
Figure 1Security threats to an IoMT environment.
Figure 2Paper organization.
Comparative analysis of related works.
| Survey | Citation | Year | Objective |
|---|---|---|---|
| A Comprehensive Survey on Attacks, Security Issues and Blockchain Solutions for IoT and IIoT | Sengupta et al. [ | 2019 | Develop blockchain-based application-specific solutions for IoT and IIoT, and classify IoT attacks and responses. |
| From Pre-Quantum to Post-Quantum IoT Security: A Survey on Quantum-Resistant Cryptosystems for the Internet of Things | Fernández-Caramés et al. [ | 2020 | Impacts and vulnerabilities of conventional and quantum security. |
| A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security | Al-Garadi et al. [ | 2020 | Hazards to IoT security and related solutions utilizing deep learning and machine learning. |
| A Survey on Physical Unclonable Function (PUF)-based Security Solutions for Internet of Things | Shamsoshoara et al. [ | 2020 | PUF-based security mechanisms for IoT technology. |
| A Survey on the Integration of Blockchain With IoT to Enhance Performance and Eliminate Challenges | Sawadi et al. [ | 2021 | Using blockchain technology, threats and risks are repelled. |
| A Survey on Security and Privacy Issues in Edge- Computing-Assisted Internet of Things | Alwarafy et al. [ | 2021 | Utilizing edge computing to enhance data processing and intrusion resistance. |
| Public Blockchains for Resource-Constrained IoT Devices—A State-of-the-Art Survey | Khor et al. [ | 2021 | Describe the benefits of blockchain technology and how resource-constrained devices could use it. |
| Machine Learning-Based Security Solutions for Healthcare: An Overview | Arora et al. [ | 2022 | Healthcare security solutions using machine learning. |
| Utilization of mobile edge computing on the Internet of Medical Things: A survey | Awad et al. [ | 2022 | Analyze the way to enhance quality and performance of IoMT using edge computing. |
| Machine Learning and Deep Learning Methods for Intrusion Detection Systems in IoMT: A survey | Rbah et al. [ | 2022 | To make a defense system in IoMT using machine learning. |
| A survey on COVID-19 impact in the healthcare domain: worldwide market implementation, applications, security and privacy issues, challenges and future prospects | Shakeel et al. [ | 2022 | Focused on healthcare systems, devices and different communication protocol rather than security systems. |
|
| - | - | Ecosystem of healthcare, importance of IoMT in healthcare, EU and FDA regulations for healthcare with security issues, established security mechanisms and detailed discussion of different proposed security protocols. |
Figure 3Global Internet of Medical Things(IoMT) market, 2016–2026, USD Mn [28].
Figure 4Global Internet of Medical Things (IoMT) growth prediction.
Figure 5Benefits of IoMT systems.
Figure 6Irdeto 2019 survey results.
Figure 7Evolution of medical device cybersecurity regulations.
Figure 8Risk-management process of ISO 14971.
Figure 9Quality management system of ISO 13485.
Figure 10Security mechanisms.
Figure 11Data fetching in NDN network.
Figure 12Data-forwarding process in NDN router.
Comparative analysis of IoMT security schemes (centralized methods).
| Author | Year | Objective | Technique Used | Type of Data | Framework | Pros | Cons |
|---|---|---|---|---|---|---|---|
| Deebak et al. [ | 2020 | Data security and anonymity | PKI | Medical records | SSA | Solves Chiou et al.’s work [ | Computational cost is high |
| Park et al. [ | 2020 | To solve issues of MAKA scheme | PKI | Medical IoT data | LAKS-NVT | Does not require a server verification table | Traceable |
| Kumar et al. [ | 2020 | Secure and efficient cloud-centric IoMT-enabled smart healthcare system | PKI | PHI file | EF-IDASC | Low energy consumption | DoS, reply attack |
| Limaye et al. [ | 2018 | Facilitate research into new microarchitectures and optimizations | PKI | Healthcare data | HERMIT | Efficient processors for IoMT applications | Basic security |
| Lu et al. [ | 2020 | TPM deployed in non-TPM protected embedded device via network | PKI | Sensor data | xTSeH | Does not discard request due to increased traffic | Security improvement required |
| Hsu et al. [ | 2020 | Remove storing credentials and secure communication | PKI | eHealth data | UCSSO | No storage and central authority | Service could be interrupted |
| Chen et al. [ | 2021 | Reduce energy consumption, achieve privacy and security | PKI & Chaotic map | Health data | - | Group authentication | Server impersonation |
| Li et al. [ | 2021 | Reduce complexity and secure communication | PKI | Medical data | PSL-MAAKA | Lightweight scheme | Much time and storage required |
| Zhang et al. [ | 2020 | Protect personal health records | ABE | PHR file | PHR sharing framework | Support offline and online | MITM, DoS, etc., security |
| Liu et al. [ | 2018 | Enhance privacy preserving and efficient data structure | CP-ABE | Biomedical data | - | Server impersonation attack | Lot of storage and computation |
| Hwang et al. [ | 2020 | Improve CP-ABE based scheme | CP-ABE | PHI file | - | Resolves key abuse problem | PHI leakage |
| Huang et al. [ | 2019 | Protection from unauthorized entity | ECG | PHR file | - | Remove noise, light algorithm | No anonymous identity |
| Xu et al. [ | 2019 | Secure data sharing | MAC | PHI file | - | Multi-keyword search | Device to gateway security |
| Siddiqi et al. [ | 2020 | Security protocol for IMD ecosystem | MAC | Medical data | IMDfence | 7% energy consumption | No user anonymity |
| Hahn et al. [ | 2020 | Attack MAC-based scheme and countermeasure | Commitment (MAC) | Medical data | - | Low verification time | DoS, server impersonation |
| Li et al. [ | 2019 | Enhance security of previous work | ECC | Medical data | 3FUAP | Vulnerability and countermeasure | Computational cost |
| Almog-
ren et al. [ | 2020 | Fake node detection and deactivation | ECC | eHealth data | FTM | Double filter | Mainly focused on Sybil attack |
| Ying et al. [ | 2021 | Secure communication | ECC | Medical data | - | Low computational time | High communication overhead |
| Liu et al. [ | 2021 | Achieve data SNP preservation | ECC | EHR file | - | Major decryption on server side | Complex |
| Wang et al. [ | 2020 | Ensure data privacy | Machine learning | Medical data | EPoSVM | Efficiency | Significant time required |
| Awan et al. [ | 2020 | Maintains a robust network by predicting and eliminating malicious nodes | Supervised learning and ECC | Health data | NeuroTrust | Lightweight encryption | Needs focus on attacks |
| Ding et al. [ | 2020 | To preserve the privacy or security of the patient | Deep learning | DeepEDN | Image | Fast | Needs robustness and server verification |
| Yanambaka et al. [ | 2019 | Secure communication | PUF | Medical data | Pmsec | Lightweight | ML attack |
| Gope et al. [ | 2020 | Secure and efficient authentication | PUF | Healthcare monitoring | - | Less computation at server | Two CRPs per transaction |
| Alladi et al. [ | 2020 | To achieve physical security | PUF | Health data | HARCI | Low time in computation | Unstable CRP can cause failure |
Comparative analysis of decentralized IoMT security schemes (blockchain method).
| Author | Year | Objective | Technique Used | Type of Data | Framework | Pros | Cons |
|---|---|---|---|---|---|---|---|
| Abdellatif et al. [ | 2021 | Process large amounts of medical data | Blockchain | Medical data | MEdge-Chain | Remote monitoring, different actions for different data | Security is not focused |
| Xu et al. [ | 2019 | Fine-grained access control | Blockchain (PoW) | Health data | Healthchain | User can update key if suspicious | Not suitable for high adversary |
| Liu et al. [ | 2019 | Data sharing and privacy preservation | Blockchain (DPoS) | EHR file | - | Symptom matching communication | High overhead |
| Lin et al. [ | 2021 | Task offloading and data processing to resist malicious attacks | Blockchain & MAC | VR video and feedback | - | Common view of similar patients | High computing capacity required |
| Garg et al. [ | 2020 | Secure exchange of health-related confidential and private information | Blockchain & ECC | Health data | BAKMP | Dynamic node addition | Expensive computation |
| Egala et al. [ | 2021 | Efficient secure exchange for decentralized network | Blockchain & ECC | EHR file | Fortified-Chain | Low energy, fast response | Ring tamper resistance instead of device |