2022
DOI: 10.1109/access.2022.3225038
|View full text |Cite
|
Sign up to set email alerts
|

A Survey: To Govern, Protect, and Detect Security Principles on Internet of Medical Things (IoMT)

Abstract: The integration of medical equipment into the Internet of Things (IoT) led to the introduction of Internet of Medical Things (IoMT). Variation of IoT devices have been equipped in medical facilities. These devices provided convenience to healthcare provider since they can continuously monitor their patients in real-time, while allowing them to have greater physical flexibility and mobility. However, users of healthcare services (such as patients and medical staff) often are less concerned about security issues… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 95 publications
0
3
0
Order By: Relevance
“…Intrusion detection systems are deployed to safeguard healthcare solutions, IoMT devices, servers, and healthcare users and to secure sensitive patient medical information [139]. Alhaj et al [166] and Zubair et al [93] defined an intrusion detection system as a security mechanism or control (i.e., hardware or software product) that monitors and analyzes network/system traffic and activities within a healthcare environment to detect and respond to potential anomalies, unauthorized access attempts, or suspicious activities. Intrusion detection systems have three components: information sources, analyses, and responses.…”
Section: Intrusion Detection Systemsmentioning
confidence: 99%
“…Intrusion detection systems are deployed to safeguard healthcare solutions, IoMT devices, servers, and healthcare users and to secure sensitive patient medical information [139]. Alhaj et al [166] and Zubair et al [93] defined an intrusion detection system as a security mechanism or control (i.e., hardware or software product) that monitors and analyzes network/system traffic and activities within a healthcare environment to detect and respond to potential anomalies, unauthorized access attempts, or suspicious activities. Intrusion detection systems have three components: information sources, analyses, and responses.…”
Section: Intrusion Detection Systemsmentioning
confidence: 99%
“…These continually proposed IoMT solutions has shown that blockchain technology and the IPFS are effective and trending for enhancing data security and privacy in IoMT. The usage of blockchain in IoMT has been reviewed by Hölbl et al (2018); Bigini et al (2020); Gupta et al (2022); Alhaj et al (2022). Interestingly, it can be seen through these surveys that the IPFS was often used with blockchain in IoMT solutions, as an outsourced decentralized data storage.…”
Section: Related Workmentioning
confidence: 99%
“…The scalability and interoperability of security mechanisms across diverse IoMT and IoT devices also pose challenges for ensemble-based IDSs, as they must ensure seamless integration and communication while maintaining robust security protocols [ 20 , 21 ]. Furthermore, the rapid proliferation of connected devices and the increasing complexity of IoMT and IoT ecosystems introduce challenges in managing and securing a vast network of interconnected devices, requiring ensemble-based IDSs to adapt to the scale and diversity of these environments to effectively mitigate security risks [ 2 , 22 ].…”
Section: Introductionmentioning
confidence: 99%