2021
DOI: 10.1109/access.2021.3064682
|View full text |Cite
|
Sign up to set email alerts
|

Risk Assessment Methodologies for the Internet of Medical Things: A Survey and Comparative Appraisal

Abstract: The Internet of Medical Things (IoMT) has revolutionized health care services by providing significant benefits in terms of patient well being and relevant costs. Traditional risk assessment methodologies, however, cannot be effectively applied in the IoMT context since IoMT devices form part of a distributed and trustless environment and naturally support functionalities that favor reliability and usability instead of security. In this work we present a survey of risk assessment and mitigation methodologies f… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
24
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 33 publications
(24 citation statements)
references
References 56 publications
0
24
0
Order By: Relevance
“…Our proposed system calculates the resilience metrics of all configurations satisfying predefined requirements. However, the decision on which configuration to apply is left to the stakeholders, who may consider arbitrary additional criteria, such as user comfort or economic losses given by the reconfiguration, which are influenced by the field of application 6 . Nevertheless, the recommendation considers the cybersecurity perspective comprehensively, even for non‐technical decision‐makers.…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…Our proposed system calculates the resilience metrics of all configurations satisfying predefined requirements. However, the decision on which configuration to apply is left to the stakeholders, who may consider arbitrary additional criteria, such as user comfort or economic losses given by the reconfiguration, which are influenced by the field of application 6 . Nevertheless, the recommendation considers the cybersecurity perspective comprehensively, even for non‐technical decision‐makers.…”
Section: Discussionmentioning
confidence: 99%
“…However, the decision on which configuration to apply is left to the stakeholders, who may consider arbitrary additional criteria, such as user comfort or economic losses given by the reconfiguration, which are influenced by the field of application. 6 Nevertheless, the recommendation considers the cybersecurity perspective comprehensively, even for non-technical decision-makers. The proposed decision support system uses a mission decomposition model to map enterprise missions to hosts and services in the network and sets its functional and security requirements.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…Malamas et al analyzed and compared current IoMT risk assessment methodologies to identify common theme and implementation gaps. Based on their analysis, they provided security controls that can be used to mitigate those risks[58]. Koutras et al surveyed and classified IoT communication protocols based on their applicability to IoMT domain while examining security characteristics and limitation of these protocols.…”
mentioning
confidence: 99%