2020
DOI: 10.3390/s20174828
|View full text |Cite
|
Sign up to set email alerts
|

Security in IoMT Communications: A Survey

Abstract: The Internet of Medical Things (IoMT) couples IoT technologies with healthcare services in order to support real-time, remote patient monitoring and treatment. However, the interconnectivity of critical medical devices with other systems in various network layers creates new opportunities for remote adversaries. Since most of the communication protocols have not been specifically designed for the needs of connected medical devices, there is a need to classify the available IoT communication technologies in ter… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
54
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 106 publications
(54 citation statements)
references
References 167 publications
0
54
0
Order By: Relevance
“…However, these technical challenges are being overcome due to the emergence of wearable, cheap, and technically sophisticated sensing technology for health monitoring [ 41 , 42 , 43 ]. Breakthroughs, tested in the smart health domain, have occurred in wireless technology for data-intensive applications [ 44 ], power harvesting [ 45 ], security [ 46 ], analytics [ 47 ], rapid prototyping and manufacturing [ 48 ], and materials [ 49 ]. The likelihood that easily deployed, cheap, and reliable pressure sensors systems for clinical use will emerge has thus drastically increased during the last few years, even if several challenges remain.…”
Section: Introductionmentioning
confidence: 99%
“…However, these technical challenges are being overcome due to the emergence of wearable, cheap, and technically sophisticated sensing technology for health monitoring [ 41 , 42 , 43 ]. Breakthroughs, tested in the smart health domain, have occurred in wireless technology for data-intensive applications [ 44 ], power harvesting [ 45 ], security [ 46 ], analytics [ 47 ], rapid prototyping and manufacturing [ 48 ], and materials [ 49 ]. The likelihood that easily deployed, cheap, and reliable pressure sensors systems for clinical use will emerge has thus drastically increased during the last few years, even if several challenges remain.…”
Section: Introductionmentioning
confidence: 99%
“…We hope that this survey will provide a comprehensive understanding of this important research topic and its key aspects and help researchers to develop new or improve current IoMT risk assessment methodologies. [2], [10] Physical and electronic access to the IoMT, both devices, their data and the underlying network, must be strictly controlled. The security controls listed below were gathered by major vendor publications [79], relevant standards [100] [45] [14] and research papers in the area [34].…”
Section: Discussionmentioning
confidence: 99%
“…Some of them focus on device functionality or contain typical non-connected medical devices, like GMDN's classification [9]. In [10], the authors present a classification, which includes only interconnected medical devices placing them into four main categories:…”
Section: Introductionmentioning
confidence: 99%
“…The first review paper [ 1 ] focuses on the security issues in the Internet of Medical Things (IoMT) communications. The IoMT is an interconnected infrastructure of medical systems, sensors, and services that enables wireless and remote medical devices to securely communicate over the Internet, in order to allow medical data analysis and to support real-time, remote patient monitoring and treatment.…”
mentioning
confidence: 99%
“…In addition, data integrity and the confidentiality and availability of the medical data should be ensured. The authors of [ 1 ] present a taxonomy of IoMT-specific communication protocols as well as their inherent security characteristics, weaknesses, and relevant attacks. In addition, real case attack scenarios against medical devices are discussed and, based on these use case scenarios, a suitability assessment of the aforementioned communication protocols is provided.…”
mentioning
confidence: 99%