2021
DOI: 10.3390/su132111645
|View full text |Cite
|
Sign up to set email alerts
|

Security and Privacy Issues in Medical Internet of Things: Overview, Countermeasures, Challenges and Future Directions

Abstract: The rapid development and the expansion of Internet of Things (IoT)-powered technologies have strengthened the way we live and the quality of our lives in many ways by combining Internet and communication technologies through its ubiquitous nature. As a novel technological paradigm, this IoT is being served in many application domains including healthcare, surveillance, manufacturing, industrial automation, smart homes, the military, etc. Medical Internet of Things (MIoT), or the use of IoT in healthcare, is b… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
30
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 59 publications
(30 citation statements)
references
References 66 publications
(362 reference statements)
0
30
0
Order By: Relevance
“…As we all know, the training and prediction of neural network need the support of data. However, data always inevitably contains sensitive and confidential information [25]. Therefore, while neural network brings convenience to our life, it also brings hidden dangers of privacy disclosure.…”
Section: Research On Privacy Protection Based On Aimentioning
confidence: 99%
“…As we all know, the training and prediction of neural network need the support of data. However, data always inevitably contains sensitive and confidential information [25]. Therefore, while neural network brings convenience to our life, it also brings hidden dangers of privacy disclosure.…”
Section: Research On Privacy Protection Based On Aimentioning
confidence: 99%
“…Theme/sub-theme Authors Emerging technology trends that contribute to cybersecurity vulnerability in the healthcare sector Medical Internet of Things (MIoT) (Jagadeeswari et al, 2018;Sadek et al, 2022;Sun et al, 2018) Big data (Abouelmehdi et al, 2018 (Jalali, Razak, Gordon, Perakslis, & Madnick, 2019;Meisner, 2018) Inadequate investments in cybersecurity measures (Abouzakhar, Jones, & Angelopoulou, 2017;Meisner, 2018) Cybersecurity countermeasures and mitigation strategies Blockchain technology for security (Attaran, 2020;El-Gazzar & Stendal, 2020;Jennath, Anoop, & Asharaf, 2020;Nagasubramanian et al, 2020;Shah & Khan, 2020;Shi et al, 2020;Siyal et (Bhuyan et al, 2020;Elhoseny et al, 2021;Habib et al, 2019;Shah & Khan, 2020) 3.1 Emerging Technology Trends that Contribute to Cybersecurity Vulnerability in the Healthcare Sector…”
Section: Table 2: Summaries Of Research Findingsmentioning
confidence: 99%
“…Using encryption-decryption algorithms, encryption facilitates secure data communication (Zriqat & Altamimi, 2017). The encryption of health data ensures that in the event of unauthorized access, the data cannot be read without the decryption code (Elhoseny et al, 2021;Zriqat & Altamimi, 2017).…”
Section: Cybersecurity Countermeasures and Mitigation Strategiesmentioning
confidence: 99%
See 2 more Smart Citations