2022
DOI: 10.1002/spy2.235
|View full text |Cite
|
Sign up to set email alerts
|

Security in IoMT‐driven smart healthcare: A comprehensive review and open challenges

Abstract: The Internet of Medical Things (IoMT) is a kind of communication environment, which deals with communication that occurs through the Internet of Things (IoT)-enabled smart medical (healthcare) devices. The potential security threats of IoMT affect the confidentiality, integrity, authenticity and availability of its data and the associated resources. In this review article, we explain various architectures of IoMT communication along with their applications.We highlight the security requirements of IoMT communi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 21 publications
(10 citation statements)
references
References 56 publications
0
10
0
Order By: Relevance
“…An overview of the current major solutions in the field of security and privacy is also described in the review, 9 highlighting circular economy issues in IoMT. After describing security threats, a comprehensive review 10 presents a comparative analysis of existing security protocols in IoMT environments. These are the authentication, access control, intrusion detection, and key management protocols.…”
Section: Identification Of Security Issues and Risks Associated With ...mentioning
confidence: 99%
“…An overview of the current major solutions in the field of security and privacy is also described in the review, 9 highlighting circular economy issues in IoMT. After describing security threats, a comprehensive review 10 presents a comparative analysis of existing security protocols in IoMT environments. These are the authentication, access control, intrusion detection, and key management protocols.…”
Section: Identification Of Security Issues and Risks Associated With ...mentioning
confidence: 99%
“…A stolen physical smart device attack is a security threat where adversaries can steal or compromise the physical smart devices used in SHS. Smart devices are implanted and worn by patients or attached to healthcare equipment to collect healthcare data [97]. These devices can be lost or stolen by attackers who may decide to re-program and redeploy them to access the smart healthcare network and extract sensitive patient data undetected [92][97] [98].…”
Section: Stolen Physical Smart Device Attackmentioning
confidence: 99%
“…Healthcare 5.0 suffers from different issues and challenges i.e., "managing huge data volumes, absence of standards, data security threats, regulatory difficulties", etc [9]. Different information security related attacks, i.e., "replay, manin-the-middle (MiTM), impersonation, malware injection, Denial-of-Service (DoS)", etc., are possible in healthcare 5.0 [10].…”
Section: B Security Challenges In Healthcare 50mentioning
confidence: 99%
“…In order to increase life expectancy and to enjoy a meaningful life, timely and precise disease detection, assessment, and medication are crucial. illnesses [9], [13]. However, such features were missing in the earlier versions of the healthcare system.…”
Section: Treatment and Detection Of Diseasesmentioning
confidence: 99%
See 1 more Smart Citation