2020
DOI: 10.1002/ett.4049
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Security Threats and Countermeasures in Internet of Medical Things (IoMT)

Abstract: Internet of medical things (IoMT) is an emerging technology aiming to improve the patient's quality of life by enabling personalized e-health services without limitations on time and location. Nevertheless, IoMT devices (eg, medical sensors) that constitute the key underlying elements of the IoMT edge network are vulnerable to various types of security threats and thus, they pose a significant risk to patient's privacy and safety. Based on that and the fact that the security is a critical factor for the succes… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
71
0
2

Year Published

2020
2020
2022
2022

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 125 publications
(88 citation statements)
references
References 74 publications
0
71
0
2
Order By: Relevance
“…The scheme is specified under two back-ends of AVISPA using Security Protocol Animator (SPAN) 70,73 namely OFMC and CL-AtSe which are broadly used in various security schemes. 41,46,56,57,68,70,74 As mentioned above, the specified code in HLPSL is converted into IF to generate the final report. The Output Format (OF) of the generated report is structured as stated below.…”
Section: Simulation Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The scheme is specified under two back-ends of AVISPA using Security Protocol Animator (SPAN) 70,73 namely OFMC and CL-AtSe which are broadly used in various security schemes. 41,46,56,57,68,70,74 As mentioned above, the specified code in HLPSL is converted into IF to generate the final report. The Output Format (OF) of the generated report is structured as stated below.…”
Section: Simulation Resultsmentioning
confidence: 99%
“…This property is known as confidentiality. 36,57 • Integrity: The messages being transmitted into the open channel could be morphed easily. Hence, the messages must be protected against any type of unwanted modification to preserve the integrity of the messages.…”
Section: Design Goalsmentioning
confidence: 99%
“… Signal splitting attacks: It refers to breaking of the communication and getting rid of the signal in a network so that attacks like eavesdropping could happen where an intruder can get access or listen to a conversation secretly or signal can degrade. Spoofing attack: In the existing network, an intruder can intrude with the help of a copy of each packet that affects confidentiality and privacy, which is a must in a healthcare system [ 44 ]. In a sensor spoofing attack, the physical environment is altered in a way that means the medical system cannot work properly [ 45 ].…”
Section: Security Issues In Healthcarementioning
confidence: 99%
“…In remote monitoring of patient health, data aggregation is a primary research topic for efficient data transmission. In this scenario, security is becoming a primary concern for continuous observation of patient health conditions in IoMT [17]. Mostly, sensor nodes are placed in a hostile environment along with unsafe communication mediums lead to several security attacks.…”
Section: Introductionmentioning
confidence: 99%