Internet of Medical Things Privacy and Security: Challenges, Solutions, and Future Trends from a New Perspective
Abstract
:1. Introduction
- (1)
- Classification of studies conducted in improving security in IoT and IoMT according to different application fields.
- (2)
- After classifying studies according to different application fields, we compare and evaluate the collected studies from different aspects, including the fields of application, year of publication, publisher, and so on, in schematic form.
- (3)
- The classification of studies based on the most important approach used in improving security according to their main application contexts.
- (4)
- Identifying approaches to maintain and improve security in IoT.
- (5)
- Blockchain technology is also investigated in this study, especially in the medical field.
Research Questions
- (1)
- What is the classification and comparison of the most important areas of security work in IoT?
- (2)
- What is the most important approach used to enhance security in IoMT?
- (3)
- What are the application areas of the blockchain approach and its classification?
- (4)
- What are the application areas of the blockchain approach in the health field?
2. IoT Architecture and Applications
2.1. Research Process
- Step 1: Collect articles by keywords
(“IoT” and “Transportation”), | (“IoT” and “Medical”) |
(“IoT” and “Business”) | (“IoT” and “Military”) |
(“IoT” and “Education”) | (“IoT” and “Manufacturing” or “Industry”) |
(“IoT” and “Smart Cities”) | (“IoT” and “Smart Grids”) |
(“IoT” and “Agriculture”) | (“IoT” and “Smart Home”) |
(“IoT” and “Supply Chain”) | (“IoT” and “Banking System”) |
- Step 2: Add more keywords
(“IoT” and “Security” and “Transportation”) | (“IoT” and “Security” and “Medical”) |
(“IoT” and “Security” and “Business”) | (“IoT” and “Security” and “Military”) |
(“IoT” and “Security” and “Education”) | (“IoT” and “Security” and “Manufacturing” or “Industry”) |
(“IoT” and “Security” and “Smart Cities”) | (“IoT” and “Security” and “Smart Grids”) |
(“IoT” and “Security” and “Agriculture”) | (“IoT” and “Security” and “SmartHome”), |
(“IoT” and “Security” and “Supply Chain”) | (“IoT” and “Security” and “Banking Systems”) |
- Step 3: Remove irrelevant articles and articles published on unreliable sites
- Step 4: Define the criteria for the collected articles:
- Criterion 1—Articles that include security applications in IoT (generalized point of view), especially in the medical field.
- Criterion 2—Articles published in invalid databases.
- Step 5: Finalize and sort the collected articles
2.1.1. Research on IoT from Different Perspectives
2.1.2. Analysis Based on the Year of Publication of Articles
2.1.3. IoT Publication Analysis
2.2. Analysis of IoT Security in Different Domains
- (1)
- The IoT is a multifunctional paradigm with many applications and requirements. This nature illustrates the enormous complexity of such systems through broad IoT implementations.
- (2)
- IoT systems are immensely varied in protocols, platforms, and devices available globally, mainly comprising restricted resources, lossy connectivity, and lack of standardization.
- (3)
- IoT devices are mostly configured to self-adapt to their environment. An effective IoT security solution that secures each device separately and provides an end-to-end security solution must be presented.
2.2.1. Articles Collected for Each Application
2.2.2. Leveraged Approaches in IoT Security Applications
3. Internet of Medical Things
- (1)
- Limited time;
- (2)
- Adherence monitoring;
- (3)
- Aging population;
- (4)
- Urbanization;
- (5)
- Health care workforce shortage [145].
3.1. How IoMT Works
- External portable devices; for example, devices that monitor blood pressure, glucose, temperature, etc.
- Implanted devices; for example, pacemakers, infusion pumps, drug delivery devices, glucose monitors, etc.
- Stationary medical devices; X-ray and magnetic resonance devices, patient monitoring [147].
3.2. Selected Current Studies on IoMT
3.3. IoMT Privacy and Security Solutions
4. Blockchain and Its Application
5. Conclusions and Future Work
- (1)
- Presenting a comprehensive study of previous research related to IoT and security and their applications, including E-health, education, the supply chain, etc.
- (2)
- Comparison of the research works collected regarding various criteria, such as year of publication, scientific journals, and the approach adopted in multiple tables and graphs. Considering the charts, the upward trend in privacy in cyberspace uses the IoMT.
- (3)
- Determining an approach has attracted researchers’ attention more than other approaches to creating privacy.
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Tang, Y.; Elhoseny, M. Computer network security evaluation simulation model based on neural network. J. Intell. Fuzzy Syst. 2019, 37, 3197–3204. [Google Scholar] [CrossRef]
- Mostefa, B.; Abdelkader, G. A Survey of Wireless Sensor Network Security in the Context of Internet of Things. In Proceedings of the 2017 4th International Conference on Information and Communication Technologies for Disaster Management, Münster, Germany, 11–13 December 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 1–8. [Google Scholar]
- Hassija, V.; Chamola, V.; Saxena, V.; Jain, D.; Goyal, P.; Sikdar, B. A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures. IEEE Access 2019, 7, 82721–82743. [Google Scholar] [CrossRef]
- Alfandi, O.; Khanji, S.; Ahmad, L.; Khattak, A. A survey on boosting IoT security and privacy through Blockchain: Exploration, requirements, and open issues. Clust. Comput. 2021, 24, 37–55. [Google Scholar] [CrossRef]
- Ashourian, M. An Improved Node Scheduling Scheme for Resilient Packet Ring Network. Majlesi J. Electr. Eng. 2015, 9, 43. [Google Scholar]
- Atlam, H.F.; Wills, G.B. IoT Security, Privacy, Safety and Ethics. In Internet of Things; Springer International Publishing: Berlin/Heidelberg, Germany, 2020; pp. 123–149. [Google Scholar] [CrossRef]
- Aversano, L.; Bernardi, M.L.; Cimitile, M.; Pecori, R. A systematic review on Deep Learning approaches for IoT security. Comput. Sci. Rev. 2021, 40, 100389. [Google Scholar] [CrossRef]
- Gheisari, M. A Survey on Clustering Algorithms in Wireless Sensor Networks: Challenges, Research, and Trends; International Computer Symposium (ICS): Tainan, Taiwan, 2020; pp. 294–299. [Google Scholar] [CrossRef]
- Raza, A. A Novel Forwarding and Caching Scheme for Information-Centric Software-Defined Networks. In Proceedings of the 2021 International Symposium on Networks, Computers and Communications (ISNCC), Dubai, United Arab Emirates, 31 October–2 November 2021; pp. 1–8. [Google Scholar] [CrossRef]
- Ahmad, R.; Alsmadi, I. Machine learning approaches to IoT security: A systematic literature review. Internet Things 2021, 14, 100365. [Google Scholar] [CrossRef]
- Xu, L.D.; He, W.; Li, S. Internet of things in industries: A survey. IEEE Trans. Ind. Inform. 2014, 10, 2233–2243. [Google Scholar] [CrossRef]
- Fatehi, N.; Shahhoseini, H. A Hybrid Algorithm for Evaluating Trust in Online Social Networks. In Proceedings of the 2020 10th International Conference on Computer and Knowledge Engineering (ICCKE), Mashhad, Iran, 29–30 October 2020; pp. 158–162. [Google Scholar]
- Rezaeiye, P.P. Agent programming with object oriented (C++). In Proceedings of the Electrical, Computer and Communication Technologies (ICECCT), 2017 Second International Conference, Tamil Nadu, India, 22–24 February 2017. [Google Scholar]
- Chaabouni, N.; Mosbah, M.; Zemmari, A.; Sauvignac, C.; Faruki, P. Network Intrusion Detection for IoT Security Based on Learning Techniques. IEEE Commun. Surv. Tutor. 2019, 21, 2671–2701. [Google Scholar] [CrossRef]
- Kou, Z. A Study on k-Hyperideals in Ordered Semihyperrings. Symmetry 2023, 15, 240. [Google Scholar] [CrossRef]
- Al-Garadi, M.A.; Mohamed, A.; Al-Ali, A.K.; Du, X.; Ali, I.; Guizani, M. A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security. IEEE Commun. Surv. Tutor. 2020, 22, 1646–1685. [Google Scholar] [CrossRef]
- Noor, F.; Sajid, A.; Shah, S.B.H.; Zaman, M.; Gheisari, M.; Mariappan, V. Bayesian estimation and prediction for Burr-Rayleigh mixture model using censored data. Int. J. Commun. Syst. 2019, 32, e4094. [Google Scholar] [CrossRef]
- Khan, M.A.; Salah, K. IoT security: Review, blockchain solutions, and open challenges. Futur. Gener. Comput. Syst. 2018, 82, 395–411. [Google Scholar] [CrossRef]
- Hussain, F.; Hussain, R.; Hassan, S.A.; Hossain, E. Machine Learning in IoT Security: Current Solutions and Future Challenges. IEEE Commun. Surv. Tutorials 2020, 22, 1686–1721. [Google Scholar] [CrossRef]
- Pacheco, J.; Satam, S.; Hariri, S. IoT Security Development Framework for Building Trustworthy Smart Car Services. In Proceedings of the 2016 IEEE Conference on Intelligence and Security Informatics (ISI), Tucson, AZ, USA, 28–30 September 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 237–242. [Google Scholar]
- Wang, S.; Hou, Y.; Gao, F.; Ji, X. A Novel IoT Access Architecture for Vehicle Monitoring System. In Proceedings of the 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), Reston, VA, USA, 12–14 December 2016; pp. 639–642. [Google Scholar]
- Mukhopadhyay, D.; Gupta, M.; Attar, T.; Chavan, P.; Patel, V. An Attempt to Develop an Iot Based Vehicle Security System. In Proceedings of the 2018 IEEE International Symposium on Smart Electronic Systems (iSES) (Formerly iNiS), Hyderabad, India, 17–19 December 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 195–198. [Google Scholar]
- Girish, B.G.; Gowda, A.D.; Amreen, H.; Singh, K.A. IOT based security system for smart vehicle. Int. Res. J. Eng. Technol. 2018, 5, 2869–2874. [Google Scholar]
- García-magariño, I.; Sendra, S.; Lacuesta, R.; Member, S. Security in vehicles with IoT by prioritization rules, vehicle certificates and trust management. IEEE Internet Things J. 2019, 6, 5927–5934. [Google Scholar] [CrossRef]
- Sfar, A.R.; Challal, Y.; Moyal, P.; Natalizio, E. A Game Theoretic Approach for Privacy Preserving Model in IoT-Based Transportation. In IEEE Transactions on Intelligent Transportation Systems; IEEE: Piscataway, NJ, USA, 2020. [Google Scholar]
- Hussain, M.M.; Alam, M.S.; Beg, M.S.; Ali, R. Searching for IoT Resources in Intelligent Transportation Cyberspace (T-CPS)—Requirements, Use-Cases and Security Aspects. In Cybersecurity and Privacy in Cyber Physical Systems; CRC Press: Boca Raton, FL, USA, 2019. [Google Scholar]
- Lei, A.; Cao, Y.; Bao, S.; Asuquom, P.; Cruickshank, H.; Sun, Z. Blockchain-Based Dynamic Key Management for IoT-Transportation Security Protection. In Blockchain for Distributed Systems Security; Wiley: Hoboken, NJ, USA, 2019. [Google Scholar] [CrossRef]
- Vinayaga-Sureshkanth, N. Security and Privacy Challenges in Upcoming Intelligent Urban Micromobility Transportation Systems. In Proceedings of the Second ACM Workshop on Automotive and Aerial Vehicle Security; Association for Computing Machinery: New York, NY, USA, 2020; pp. 31–35. [Google Scholar]
- Zhang, J.; Wang, Y.; Li, S.; Shi, S. An Architecture for IoT-Enabled Smart Transportation Security System: A Geospatial Approach. IEEE Internet Things J. 2020, 8, 6205–6213. [Google Scholar] [CrossRef]
- Priharti, W.; Sumaryo, S.; Saraswati, T.; Nurfadilah, M.R. IoT Based Logistics Vehicle Security Monitoring System. IOP Conf. Ser. Mater. Sci. Eng. IOP Publ. 2020, 771, 012012. [Google Scholar] [CrossRef]
- Hammoudeh, M.; Epiphaniou, G.; Belguith, S.; Unal, D.; Adebisi, B.; Baker, T. A Service-Oriented Approach for Sensing in the Internet of Things: Intelligent Transportation Systems and Privacy Use Cases. IEEE Sens. J. 2020, 21, 15753–15761. [Google Scholar] [CrossRef]
- Abbas, K.; Tawalbeh, L.A.A.; Rafiq, A.; Muthanna, A.; Elgendy, I.A.; El-Latif, A.; Ahmed, A. Convergence of Blockchain and IoT for Secure Transportation Systems in Smart Cities. Secur. Commun. Netw. 2021, 2021, 5597679. [Google Scholar] [CrossRef]
- Masood, A.; Gupta, A. Enhanced Logistics Security Techniques Using IoT and 5G. In Proceedings of the 2020 International Conference on Wireless Communications Signal Processing and Networking (WiSPNET), Chennai, India, 4–6 August 2020; IEEE: New York, NY, USA, 2020; pp. 7–14. [Google Scholar]
- Sergi, I.; Montanaro, T.; Benvenuto, F.L.; Patrono, L. A smart and secure logistics system based on IoT and cloud technologies. Sensors 2021, 21, 2231. [Google Scholar] [CrossRef]
- Valera, A.J.J.; Zamora, M.A.; Skarmeta, A.F. An Architecture Based on Internet of Things to Support Mobility and Security in Medical Environments. In Proceedings of the 2010 7th IEEE Consumer Communications and Networking Conference, Las Vegas, NV, USA, 9–12 January 2010. [Google Scholar]
- Tarouco, L.M.R.; Bertholdo, L.M.; Granville, L.Z.; Arbiza, L.M.R.; Carbone, F.; Marotta, M.; de Santanna, J.J.C. Internet of Things in Healthcare: Interoperatibility and Security Issues. In Proceedings of the 2012 IEEE International Conference on Communications (ICC), Ottawa, ON, Canada, 10–15 June 2012; pp. 6121–6125. [Google Scholar]
- Liu, Y. CFDMA: A Novel Click Fraud Detection Method in Mobile Advertising. In Proceedings of the 2022 4th International Conference on Data Intelligence and Security (ICDIS), Shenzhen, China, 24–26 August 2022; pp. 394–401. [Google Scholar]
- Kim, J.T. Privacy and security issues for healthcare system with embedded rfid system on Internet of things. Adv. Sci. Technol. Lett. 2014, 72, 109–112. [Google Scholar]
- Woo, S.H. Medical Information Security and Standard Technology on IoT Environment. J. Korean Inst. Inf. Commun. Eng. 2015, 19, 2683–2688. [Google Scholar]
- Gong, T.; Huang, H.; Li, P.; Jiang, H. A Medical Healthcare System for Privacy Protection Based on IoT. In Proceedings of the 2015 Seventh International Symposium on Parallel Architectures, Algorithms and Programming (PAAP), Nanjing, China, 12–14 December 2015; pp. 217–222. [Google Scholar]
- Alkeem, E.A.L.; Yeun, C.Y.; Zemerly, M.J. Security and Privacy Framework for Ubiquitous Healthcare IoT Devices. In Proceedings of the 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), London, UK, 14–16 December 2015; pp. 70–75. [Google Scholar]
- Yaraziz, S.; Ahmad, J.; Mehdi, G.; Yang, L. Recent Trends towards Privacy-Preservation in Internet of Things, Its Challenges and Future Directions. IET Circuits Devices Syst. 2022. [Google Scholar] [CrossRef]
- Williams, P.A.H.; Mccauley, V. Always Connected: The Security Challenges of the Healthcare Internet of Things. In Proceedings of the 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), Reston, VA, USA, 12–14 December 2016; pp. 30–35. [Google Scholar]
- Bae, K.H.W. Proposing and verifying a security-enhanced protocol for IoT-based communication for medical devices. Cluster Comput. 2016, 19, 2335–2341. [Google Scholar]
- Abouzakhar, N.S.; Jones, A.; Angelopoulou, O. Internet of Things Security: A Review of Risks and Threats to Healthcare Sector. In Proceedings of the 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Exeter, UK, 21–23 June 2017. [Google Scholar]
- Wortman, P.A.; Tehranipoor, F.; Karimian, N.; Chandy, J.A. Proposing a Modeling Framework for Minimizing Security Vulnerabilities in IoT Systems in the Healthcare Domain. In Proceedings of the 2017 IEEE EMBS International Conference on Biomedical & Health Informatics (BHI), Orlando, FL, USA, 16–19 February 2017; pp. 185–188. [Google Scholar]
- Acm, I.; Minoli, D. IoT Security (IoTSec) Mechanisms For e-Health and Ambient Assisted Living Applications. In Proceedings of the 2017 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE), Philadelphia, PA, USA, 17–19 July 2017. [Google Scholar]
- Amir, J.; Mehdi, G.; Zhang, W.; Liu, Y.; Arun, K.S. An intelligent sustainable efficient transmission internet protocol to switch between User Datagram Protocol and Transmission Control Protocol in IoT computing. Expert Syst. 2022, e13129. [Google Scholar] [CrossRef]
- Alromaihi, S.; Elmedany, W. Cyber Security Challenges of Deploying IoT in Smart Cities for Healthcare Applications. In Proceedings of the 2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW), Barcelona, Spain, 6–8 August 2018. [Google Scholar]
- Winnie, Y. Enhancing Data Security in Iot Healthcare Services Using Fog Computing. In Proceedings of the 2018 International Conference on Recent Trends in Advance Computing (ICRTAC), Chennai, India, 10–11 September 2018; pp. 200–205. [Google Scholar]
- Alagar, V.; Alsaig, A.; Ormandjieva, O. Context-Based Security and Privacy for Healthcare IoT. In Proceedings of the 2018 IEEE International Conference on Smart Internet of Things (SmartIoT), Xi’an, China, 17–19 August 2018. [Google Scholar]
- Fan, K.; Jiang, W.; Li, H.; Yang, Y. Lightweight RFID Protocol for Medical Privacy Protection in IoT. IEEE Trans. Ind. Inform. 2018, 14, 1656–1665. [Google Scholar] [CrossRef]
- Sun, W.; Cai, Z.; Li, Y.; Liu, F.; Fang, S.; Wang, G. Security and Privacy in the Medical Internet of Things: A Review. Secur. Commun. Netw. 2018, 2018, 5978636. [Google Scholar] [CrossRef]
- Hayakawa, T. Proposal and Application of Security/Safety Evaluation Method for Medical Device System that Includes IoT. In Proceedings of the 2018 VII International Conference on Network, Communication and Computing, Taipei City, Taiwan, 14–16 December 2018; pp. 157–164. [Google Scholar]
- Martinez, J.B. Medical Device Security in the IoT Age. In Proceedings of the 2018 9th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference, New York, NY, USA, 8–10 November 2018; pp. 128–134. [Google Scholar]
- Yeole, A.; Kalbande, D.R.; Sharma, A. ScienceDirect ScienceDirect Security of 6LoWPAN IoT Networks in Hospitals for Medical Data Security of 6LoWPAN IoT Networks in Hospitals for Medical Data Exchange Exchange. Procedia Comput. Sci. 2019, 152, 212–221. [Google Scholar] [CrossRef]
- Bradley, C.; El-tawab, S.; Heydari, M.H. Security Analysis of an IoT System Used for Indoor Localization in Healthcare Facilities. In Proceedings of the 2018 Systems and Information Engineering Design Symposium (SIEDS), Charlottesville, VA, USA, 27 April 2018; pp. 147–152. [Google Scholar]
- Pirbhulal, S.; Pombo, N.; Felizardo, V.; Garcia, N.; Sodhro, A.H.; Mukhopadhyay, S.C. Towards Machine Learning Enabled Security Framework for IoT-Based Healthcare. In Proceedings of the 2019 13th International Conference on Sensing Technology (ICST), Sydney, Australia, 2–4 December 2019; pp. 13–18. [Google Scholar]
- Yu, C.; Gheisari, M.; Liu, Y. A Lightweight Advertisement Ecosystem Simulation Platform for Security Analysis. In Proceedings of the 2022 6th International Conference on Cryptography, Security and Privacy (CSP), Tianjin, China, 14–16 January 2022; pp. 41–45. [Google Scholar] [CrossRef]
- Fazeldehkordi, E.; Owe, O.; Noll, J. Security and Privacy in IoT Systems: A Case Study of Healthcare Products. In Proceedings of the 2019 13th International Symposium on Medical Information and Communication Technology (ISMICT), Oslo, Norway, 8–10 May 2019; pp. 1–8. [Google Scholar]
- Yin, X.C.; Liu, Z.G.; Ndibanje, B.; Nkenyereye, L. An IoT-Based Anonymous Function for Security and Privacy in Healthcare Sensor Networks. Sensors 2019, 19, 3146. [Google Scholar] [CrossRef]
- Salih, F.I.; Azaliah, N.; Bakar, A.; Hassan, N.H.; Yahya, F.; Kama, N. IOT Security Risk Management Model for Healthcare Industry. Malays. J. Comput. Sci. 2019, 131–144. [Google Scholar] [CrossRef]
- Verikoukis, C. Review of Security and Privacy for the Internet of Medical Things (IoMT) Resolving the protection concerns for the novel circular economy bioinformatics. In Proceedings of the 2019 15th International Conference on Distributed Computing in Sensor Systems (DCOSS), Santorini, Greece, 29–31 May 2019; pp. 457–464. [Google Scholar]
- Kamalov, F. Deep learning for Covid-19 forecasting: State-of-the-art review. Neurocomputing 2022, 511, 142–154. [Google Scholar] [CrossRef] [PubMed]
- Alhat, S.; Bangal, N. Gaikwad, A. Khairnar, S. Enhancing Data Security in IoT Healthcare Services using Fog Computing. Int. Res. J. Eng. Technol. 2019, 6. [Google Scholar] [CrossRef]
- Thirugnanam, R.S.M. Review of security challenges in healthcare internet of things. Wirel. Netw. 2020, 27, 5503–5509. [Google Scholar] [CrossRef]
- Rahman, A.; Member, S.; Hossain, M.S.; Member, S.; Nabil, A. Adversarial Examples—Security Threats to COVID-19 Deep Learning Systems in Medical IoT Devices. IEEE Internet Things J. 2020, 8, 9603–9610. [Google Scholar] [CrossRef]
- Wazid, M.; Bera, B.; Mitra, A.; Das, A.; Ali, R. Private Blockchain-Envisioned Security Framework for AI-Enabled by Private Blockchain-Envisioned Security Framework for AI-Enabled IoT-Based Drone-Aided Healthcare Services. In Proceedings of the 2nd ACM MobiCom Workshop on Drone Assisted Wireless Communications for 5G and Beyond, London, UK, 25 September 2020; pp. 1–6. [Google Scholar]
- Amoon, M.; Altameem, T.; Altameem, A. Internet of things Sensor Assisted Security and Quality Analysis for Health Care Data Sets Using Artificial Intelligent Based Heuristic Health Management System. Measurement 2020, 161, 107861. [Google Scholar] [CrossRef]
- Nomikos, K.; Papadimitriou, A.; Stergiopoulos, G.; Koutras, D. On a Security-oriented Design Framework for Medical IoT. In Proceedings of the 2020 23rd Euromicro Conference on Digital System Design (DSD), Kranj, Slovenia, 26–28 August 2020; pp. 301–308. [Google Scholar]
- Gopalan, S.S.; Raza, A.; Almobaideen, W. IoT Security in Healthcare using AI: A Survey. In Proceedings of the 2020 International Conference on Communications, Signal Processing, and their Applications (ICCSPA), Sharjah, United Arab Emirates, 16–18 March 2021. [Google Scholar]
- Kumar, P.; Chouhan, L. A privacy and session key based authentication scheme for medical IoT networks. Comput. Commun. 2020, 166, 154–164. [Google Scholar] [CrossRef]
- Ghazal, T.M. Internet of Things with Artificial Intelligence for Health Care Security. Arab. J. Sci. Eng. 2021, 0123456789. [Google Scholar] [CrossRef]
- Oniani, S.; Marques, G.; Barnovi, S.; Pires, I.M.; Bhoi, A.K. Artificial Intelligence for Internet of Things and Enhanced Medical Systems; Springer: Singapore, 2021. [Google Scholar] [CrossRef]
- Gheisari, M.; Javadpour, A.; Gao, J.; Abbasi, A.A.; Pham, Q.V.; Liu, Y. PPDMIT: A lightweight architecture for privacy-preserving data aggregation in the Internet of Things. J. Ambient. Intell. Humaniz. Comput. 2022, 1–13. [Google Scholar] [CrossRef]
- Kharchenko, V.; Bardis, N. Reliability and Security Issues for IoT-Based Smart Business Center: Architecture and Markov Model. In Proceedings of the 2016 Third International Conference on Mathematics and Computers in Sciences and in Industry (MCSI), Chania, Greece, 27–29 August 2016; pp. 313–318. [Google Scholar]
- Kamalov, F.; Zgheib, R.; Leung, H.; Al-Gindy, A.; Moussa, S. Autoencoder-based Intrusion Detection System. In Proceedings of the 2021 International Conference on Engineering and Emerging Technologies (ICEET), Istanbul, Turkey, 27–28 October 2021; pp. 1–5. [Google Scholar] [CrossRef]
- Chandrashekhar, K.G.; Karimi-Alaghehband, F.; Özgün, D. IoT Security Adoption into Business Processes: A Socio-Technical View. In Proceedings of the Americas Conference on Information Systems (AMCIS), Boston, MA, USA, 10–12 August 2017. [Google Scholar]
- Bujari, A.; Furini, M.; Mandreoli, F.; Martoglia, R.; Montangero, M.; Ronzani, D. Standards, Security and Business Models: Key Challenges for the IoT Scenario. Mob. Netw. Appl. 2017, 23, 147–154. [Google Scholar] [CrossRef]
- Yılmaz, H.E.; Sirel, A.; Esen, M.F. The Impact of Internet of Things Self-Security on Daily Business and Business Continuity. In Handbook of Research on Cloud Computing and Big Data Applications in IoT; IGI: Antwerp, Belgium, 2019; pp. 481–498. [Google Scholar] [CrossRef]
- Rita, Z. Towards an ML-Based Semantic IoT for Pandemic Management: A Survey of Enabling Technologies for COVID-19. Neurocomputing 2023, 528, 160–177. [Google Scholar]
- Moshayedi, A.J.; Roy, A.S.; Liao, L.; Lan, H.; Gheisari, M.; Abbasi, A.; Bamakan, S.M. Automation Attendance Systems Approaches: A Practical Review. BOHR Int. J. Internet Things Artif. Intell. Mach. Learn. 2021, 1, 23–31. [Google Scholar] [CrossRef]
- Wrona, K. Securing the Internet of Things A Military Perspective. In Proceedings of the 2015 IEEE 2nd World Forum Internet Things (WF-IoT), Milan, Italy, 14–16 December 2015; IEEE: Piscataway, NJ, USA, 2015; pp. 502–507. [Google Scholar]
- Furtak, J.; Chudzikiewicz, J. Security Techniques for the WSN Link Layer within Military IoT. In Proceedings of the 2016 IEEE 3rd World Forum Internet Things (WF-IoT), Reston, VA, USA, 12–14 December 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 233–238. [Google Scholar]
- Rao, Y.; Kosari, S.; Gheisari, M. New Results in Vague Incidence Graphs with Application. J. Funct. Spaces 2022, 2022, 3475536. [Google Scholar] [CrossRef]
- Arafath, M.S.; Khan, K.; Sunitha, K.V.N. Incorporating privacy and security in military application based on opportunistic sensor network. Int. J. Internet Technol. Secur. Trans. 2017, 7, 295–316. [Google Scholar] [CrossRef]
- Sfar, A.R.; Chtourou, Z.; Challal, Y. A Systemic and Cognitive Vision for IoT Security: A Case Study of Military Live Simulation and Security Challenges. In Proceedings of the 2017 International Conference on Smart, Monitored and Controlled Cities, Sfax, Tunisia, 17–19 February 2017; pp. 17–19. [Google Scholar]
- Cha, S.; Baek, S.; Kang, S.; Kim, S. Security evaluation framework for military IoT devices. Secur. Commun. Netw. 2018, 2018, 6135845. [Google Scholar] [CrossRef]
- Katalin, B. Possibilities and Security Challenges of Using Iot for Military Purposes. Hadmérnök 2018, 13, 378–390. [Google Scholar]
- Pradhan, M.; Noll, J. Security, Privacy, and Dependability Evaluation in Verification and Validation Life Cycles for Military IoT Systems. IEEE Commun. Mag. 2020, 58, 14–20. [Google Scholar] [CrossRef]
- Reidenberg, J.R.; Schaub, F. Achieving big data privacy in education. Theory Res. Educ. 2018, 16, 263–279. [Google Scholar] [CrossRef]
- Toapanta, S.M.T.; López, J.M.V.; Soledispa, R.S.T.; Gallegos, L.E.M. Definition of a Security Prototype for IoT Applied to Higher Education. In Proceedings of the 2019 Third World Conf Smart Trends Syst Secur Sustain (WorldS4), London, UK, 30–31 July 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 115–120. [Google Scholar]
- Badshah, A.; Ghani, A.; Qureshi, M.A. Smart Security Framework for Educational Institutions Using Internet of Things (IoT). Comput. Mater. Contin. 2019, 61, 81–101. [Google Scholar] [CrossRef]
- Jones, K.M.; Asher, A.; Goben, A.; Perry, M.R.; Salo, D.; Briney, K.A.; Robertshaw, M.B. We’re being tracked at all times”: Student perspectives of their privacy in relation to learning analytics in higher education. J. Assoc. Inf. Sci. Technol. 2020, 71, 1044–1059. [Google Scholar] [CrossRef]
- ALEXEI, A. Analysis of IoT security issues used in Higher Education Institutions. Int. J. Math. Comput. Res. 2021, 26, 2277–2286. [Google Scholar]
- Canbaz, M.A.; OHearon, K.; McKee, M.; Hossain, M.N. IoT Privacy and Security in Teaching Institutions: Inside the Classroom and Beyond. In Proceedings of the 2021 ASEE ASEE Virtual Annual Conference Content Access, Virtual Conference, 26 July 2021. [Google Scholar]
- Yanambaka, V.P.; Mohanty, S.P. Making use of semiconductor manufacturing process variations: FinFET-based physical unclonable functions for efficient security integration in the IoT. Analog Integr. Circuits Signal Process. 2017, 93, 429–441. [Google Scholar] [CrossRef]
- Toma, C.; Popa, M. IoT Security Approaches in Oil & Gas Solution Industry 4.0. Inform. Econ. 2018, 22, 46–61. [Google Scholar]
- Shahbazi, Z.; Byun, Y.C. Integration of Blockchain, IoT and machine learning for multistage quality control and enhancing security in smart manufacturing. Sensors 2021, 21, 1467. [Google Scholar] [CrossRef] [PubMed]
- Bohli, J.M.; Skarmeta, A.; Moreno, M.V.; García, D.; Langendörfer, P. SMARTIE Project: Secure loT Data Management for Smart Cities. In Proceedings of the 2015 International Conference on Recent Advances in Internet of Things (RIoT 2015), Singapore, 7–9 April 2015; pp. 7–9. [Google Scholar]
- Burange, A.W.; Misalkar, H.D. Review of Internet of Things in Development of Smart Cities with Data Management & Privacy. In Proceedings of the 2015 International Conference on Advances in Computer Engineering and Applications, Ghaziabad, India, 19–20 March 2015; pp. 189–195. [Google Scholar]
- Li, W.; Song, H.; Member, S.; Zeng, F. Policy-based Secure and Trustworthy Sensing for Internet of Things in Smart Cities. IEEE Internet Things J. 2017, 5, 716–723. [Google Scholar] [CrossRef]
- Latif, S.; Zafar, N.A. A Survey of Security and Privacy Issues in IoT for Smart Cities. In Proceedings of the 2017 Fifth International Conference on Aerospace Science & Engineering (ICASE), Islamabad, Pakistan, 14–16 November 2017; pp. 1–5. [Google Scholar]
- Magaia, N.; Fonseca, R.; Muhammad, K.; Segundo, A.H.F.N.; Aloisio, V.; Neto, L.; de Albuquerque, V.H.C. Industrial Internet of Things Security enhanced with Deep Learning Approaches for Smart Cities. IEEE Internet Things J. 2020, 8, 6393–6405. [Google Scholar] [CrossRef]
- Toma, C.; Alexandru, A.; Popa, M.; Zamfiroiu, A. IoT Solution for Smart Cities’ Pollution Monitoring and the Security Challenges. Sensors 2019, 19, 3401. [Google Scholar] [CrossRef]
- Shen, M.; Tang, X.; Zhu, L. Privacy-Preserving Support Vector Machine Training over Blockchain-Based Encrypted IoT Data in Smart Cities. IEEE Internet Things J. 2019, 6, 7702–7712. [Google Scholar] [CrossRef]
- Al-Turjman, F.; Poncha, J. Intelligence, security, and vehicular sensor networks in Internet of things (IoT)-enabled smart-cities: An overview. Comput. Electr. Eng. 2020, 87, 106776. [Google Scholar] [CrossRef]
- Chakrabarty, S. Secure Smart Cities Framework Using IoT and AI. In Proceedings of the 2020 IEEE Global Conference on Artificial Intelligence and Internet of Things (GCAIoT), Dubai, United Arab Emirates, 12–16 December 2020. [Google Scholar]
- Gheisari, M.; Mehdi, E. Data Storages in Wireless Sensor Networks to Deal with Disaster Management. In Emergency and Disaster Management: Concepts, Methodologies, Tools, and Applications; IGI Global: Hershey, PA, USA, 2019; pp. 655–682. [Google Scholar]
- Kamalov, F.; Moussa, S.; Zgheib, R.; Mashaal, O. Feature Selection for Intrusion Detection Systems. In Proceedings of the 2020 13th International Symposium on Computational Intelligence and Design (ISCID), Hangzhou, China, 12–13 December 2020; pp. 265–269. [Google Scholar] [CrossRef]
- Janeera, D.A.; Gnanamalar, S.; Ramya, K.C.; Kumar, A.G. Internet of Things and Artificial Intelligence-Enabled Secure Autonomous Vehicles for Smart Cities. Automot. Embed. Syst. 2021, 201–218. [Google Scholar] [CrossRef]
- Lam, K.Y.; Mitra, S.; Gondesen, F.; Yi, X. Ant-centric iot security reference architecture–security-by-design for satellite-enabled smart cities. IEEE Internet Things J. 2022, 9, 5895–5908. [Google Scholar] [CrossRef]
- Wang, Y.F.; Lin, W.M.; Zhang, T.; Ma, Y.Y. Research on Application and Security Protection of Internet of Things in Smart Grid. In Proceedings of the IET International Conference on Information Science and Control Engineering 2012 (ICISCE 2012), Shenzhen, China, 7–9 December 2012. [Google Scholar]
- Sherburne, M.; Marchany, R.; Tront, J.; Tech, V. Implementing Moving Target IPv6 Defense to Secure 6LoWPAN in the Internet of Things and Smart Grid. In Proceedings of the 9th Annual Cyber and Information Security Research Conference, Oak Ridge, TN, USA, 8–10 April 2014; pp. 37–40. [Google Scholar]
- Bekara, C. Security Issues and Challenges for the IoT-based Smart Grid. Procedia—Procedia Comput. Sci. 2020, 34, 532–537. [Google Scholar] [CrossRef]
- Chin, W.; Li, W.; Chen, H. Energy Big Data Security Threats in IoT-Based Smart Grid Communications. IEEE Commun. Mag. 2017, 55, 70–75. [Google Scholar] [CrossRef]
- Guan, Z.; Li, J.; Wu, L.; Zhang, Y.; Wu, J.; Du, X. Achieving Efficient and Secure Data Acquisition for Cloud-supported Internet of Things in Smart Grid. IEEE Internet Things J. 2017, 4, 1934–1944. [Google Scholar] [CrossRef]
- Kimani, K.; Oduol, V.; Langat, K. Cyber security challenges for IoT-based smart grid networks. Int. J. Crit. Infrastruct. Prot. 2019, 25, 36–49. [Google Scholar] [CrossRef]
- Sakhnini, J.; Karimipour, H.; Dehghantanha, A.; Parizi, R.M.; Srivastava, G. Security Aspects of Internet of Things aided Smart Grids: A Bibliometric Survey. Internet Things 2019, 14, 100111. [Google Scholar] [CrossRef]
- Borgaonkar, R.; Jaatun, M.G.; Tøndel, I.A.; Degefa, M.Z. Improving smart grid security through 5G enabled IoT and edge computing. Concurr. Comput. Pract. Exp. 2021, 33, e6466. [Google Scholar] [CrossRef]
- Saleem, A.; Khan, A.; Malik, S.U.R.; Pervaiz, H.; Malik, H.; Alam, M.; Jindal, A. FESDA: Fog-Enabled Secure Data Aggregation in Smart Grid IoT Network. IEEE Internet Things J. 2019, 7, 6132–6142. [Google Scholar] [CrossRef]
- Baranwal, T.; Pateriya, P.K. Development of IoT Based Smart Security and Monitoring Devices for Agriculture. In Proceedings of the 2016 6th International Conference, Cloud System and Big Data Engineering (Confluence), Noida, India, 14–15 January 2016; pp. 597–602. [Google Scholar]
- Mehdi, G.; Wang, G.; Chen, S.; Ali, S. A Method for Privacy-preserving in IoT-SDN Integration Environment. In Proceedings of the 16th IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA 2018), Melbourne, Australia, 11–13 December 2018. [Google Scholar]
- Balaji, V.R.; Prakash, N. IOT Based Smart Security and Monitoring Devices for Agriculture. Int. J. Pure Appl. Math. 2017, 116, 121–129. [Google Scholar]
- Shabadi, L.S. Design and Implementation of IOT based Smart Security and Monitoring for Connected Smart Farming. Int. J. Comput. Appl. 2018, 179, 1–4. [Google Scholar]
- Nithin, V.; Mishra, S.; Devarubiny, P.; Muthulakshmi, S. Iot Enabled Farming Assist and Security Using Machine Learning. ARPN J. Eng. Appl. Sci. 2019, 14, 1809–1819. [Google Scholar]
- Gundu, T.; Maronga, V.L. IoT Security and Privacy: Turning on the Human Firewall in Smart Farming. In Proceedings of the 4th International Conference on the Internet, Cyber Security and Information Systems, Johannesburg, South Africa, 31 October–1 November 2019; pp. 95–104. [Google Scholar]
- Demestichas, K.; Peppes, N.; Alexakis, T. Survey on security threats in agricultural IoT and smart farming. Sensors 2020, 20, 6458. [Google Scholar] [CrossRef] [PubMed]
- Ferrag, M.A.; Shu, L.E.I.; Member, S.; Yang, X. Security and Privacy for Green IoT-Based Agriculture: Review, Blockchain Solutions, and Challenges. IEEE Access 2020, 8, 32031–32053. [Google Scholar] [CrossRef]
- Vangala, A.; Das, A.K.; Member, S.; Kumar, N.; Member, S. Smart Secure Sensing for IoT-Based Agriculture: Blockchain Perspective. IEEE Sens J. 2020, 21, 17591–17607. [Google Scholar] [CrossRef]
- Saha, H.N.; Roy, R.; Chakraborty, M. Development of IoT-Based Smart Security and Monitoring Devices for Agriculture. In Agricultural Informatics: Automation Using the IoT and Machine Learning; Wiley: Hoboken, NJ, USA, 2021; pp. 147–169. Available online: https://doi.org/10.1002/9781119769231.ch8 (accessed on 13 November 2022).
- Rosline, G.J.; Rani, P.; Gnana Rajesh, D. Comprehensive Analysis on Security Threats Prevalent in IoT-Based Smart Farming Systems. In Ubiquitous Intelligent Systems; Springer: Berlin/Heidelberg, Germany, 2022; pp. 185–194. [Google Scholar]
- Sharma, S.; Mittal, P. IoT-Based Smart Security System for Agriculture Fields. In Cyber Security and Digital Forensics; Springer: Berlin/Heidelberg, Germany, 2022; pp. 143–151. [Google Scholar] [CrossRef]
- Natarajan, Y.; Srihari, K.; Dhiman, G.; Chandragandhi, S.; Gheisari, M.; Liu, Y.; Alharbi, H.F. An IoT and machine learning-based routing protocol for reconfigurable engineering application. IET Commun. 2021, 16, 464–475. [Google Scholar] [CrossRef]
- Santoso, F.K.; Vun, N.C.H. Securing IoT for Smart Home System. In Proceedings of the 2015 International Symposium on Consumer Electronics (ISCE), Madrid, Spain, 24–26 June 2015; pp. 5–6. [Google Scholar]
- Gupta, P.; Chhabra, J. IoT Based Smart Home Design Using Power and Security Management. In Proceedings of the 2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH), Greater Noida, India, 3–5 February 2016; pp. 6–10. [Google Scholar]
- Lin, H.; Bergmann, N.W. IoT Privacy and Security Challenges for Smart Home Environments. Information 2016, 7, 44. [Google Scholar] [CrossRef]
- Dorri, A.; Kanhere, S.S.; Jurdak, R.; Gauravaram, P. Blockchain for IoT Security and Privacy: The Case Study of a Smart Home. In Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), Kona, HI, USA, 13–17 March 2017; pp. 618–623. [Google Scholar]
- Ali, W.; Dustgeer, G.; Awais, M.; Shah, M.A. IoT based Smart Home: Security Challenges, Security Requirements and Solutions. In Proceedings of the 2017 23rd International Conference on Automation and Computing (ICAC), Huddersfield, UK, 7–8 September 2017; pp. 7–8. [Google Scholar]
- Geneiatakis, D.; Kounelis, I.; Neisse, R.; Nai-fovino, I.; Steri, G.; Baldini, G. Security and Privacy Issues for an IoT based Smart Home. In Proceedings of the 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), Opatija, Croatia, 22–26 May 2017; pp. 1292–1297. [Google Scholar]
- Marksteiner, S.; Exp, J. An Overview of Wireless IoT Protocol Security in the Smart Home Domain. In Proceedings of the 2017 Internet of Things Business Models, Users, and Networks, Copenhagen, Denmark, 23–24 November 2017; pp. 1–8. [Google Scholar]
- Bastos, D.; Shackleton, M. Internet of Things: A Survey of Technologies and Security Risks in Smart Home and City Environments. In Proceedings of the Living in the Internet of Things: Cybersecurity of the IoT–2018, London, UK, 28–29 March 2018. [Google Scholar] [CrossRef]
- Shouran, Z.; Ashari, A. Internet of Things (IoT) of Smart Home: Privacy and Security. Int. J. Comput. Appl. 2019, 182, 3–8. [Google Scholar] [CrossRef]
- Hiromoto, R.E.; Haney, M.; Vakanski, A. A Secure Architecture for IoT with Supply Chain Risk Management. In Proceedings of the 2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), Bucharest, Romania, 21–23 September 2017; pp. 431–435. [Google Scholar]
- Omitola, T.; Wills, G. Towards mapping the security challenges of the Internet of Things (IoT) supply chain. Procedia Comput. Sci. 2018, 126, 441–450. [Google Scholar] [CrossRef]
- Zhou, W.; Piramuthu, S. IoT security perspective of a flexible healthcare supply chain. Inf. Technol. Manag. 2017, 19, 141–153. [Google Scholar] [CrossRef]
- Nandakumar, L. Privacy-Aware State Estimation Based on Obfuscated Transformation and Differential Privacy: With Applications to Smart Grids and Supply Chain Economics. Master’s Thesis, TU Delft, Delft, The Netherlands, 2018. [Google Scholar]
- Farooq, M.J.; Zhu, Q. IoT Supply Chain Security: Overview, Challenges, and the Road Ahead. arXiv 2019, arXiv:1908.07828. [Google Scholar]
- Safkhani, M.; Rostampour, S.; Bendavid, Y.; Bagheri, N. IoT in medical & pharmaceutical: Designing lightweight RFID security protocols for ensuring supply chain integrity. Comput. Netw. 2020, 181, 107558. [Google Scholar] [CrossRef]
- Shahzad, A.; Zhang, K.; Gherbi, A. Intuitive development to examine collaborative iot supply chain system underlying privacy and security levels and perspective powering through proactive Blockchain. Sensors 2020, 20, 3760. [Google Scholar] [CrossRef] [PubMed]
- Khan, M.A. Challenges Facing the Application of IoT in Medicine and Healthcare. Int. J. Comput. Inf. Manuf. 2021, 1. [Google Scholar] [CrossRef]
- Kannan, S.; Dhiman, G.; Natarajan, Y.; Sharma, A.; Mohanty, S.N.; Soni, M.; Easwaran, U.; Ghorbani, H.; Asheralieva, A.; Gheisari, M. Ubiquitous Vehicular Ad-Hoc Network Computing Using Deep Neural Network with IoT-Based Bat Agents for Traffic Management. Electronics 2021, 10, 785. [Google Scholar] [CrossRef]
- Moreno, H.B.R.; Ramírez, M.R.; Hurtado, C.; Lobato, B.Y.M. IoT in Medical Context: Applications, Diagnostics, and Health Care. In Innovation in Medicine and Healthcare Systems, and Multimedia; Springer: Singapore, 2019; pp. 253–259. [Google Scholar]
- Alam, S.; Shuaib, M.; Ahmad, S.; Jayakody, D.N.K.; Muthanna, A.; Bharany, S.; Elgendy, I.A. Blockchain-Based Solutions Supporting Reliable Healthcare for Fog Computing and Internet of Medical Things (IoMT) Integration. Sustainability 2022, 14, 15312. [Google Scholar] [CrossRef]
- Ullah, I.; Khan, M.A.; Alkhalifah, A.; Nordin, R.; Alsharif, M.H.; Alghtani, A.H.; Aly, A.A. A Multi-Message Multi-Receiver Signcryption Scheme with Edge Computing for Secure and Reliable Wireless Internet of Medical Things Communications. Sustainability 2021, 13, 13184. [Google Scholar] [CrossRef]
- Chaganti, R.; Azrour, M.; Vinayakumar, R.; Naga, V.; Dua, A.; Bhushan, B. A Particle Swarm Optimization and Deep Learning Approach for Intrusion Detection System in Internet of Medical Things. Sustainability 2022, 14, 12828. [Google Scholar] [CrossRef]
- Rahmani, A.M.; Mirmahaleh, S.H. Flexible-Clustering Based on Application Priority to Improve IoMT Efficiency and Dependability. Sustainability 2022, 14, 10666. [Google Scholar] [CrossRef]
- Alsubaei, F.; Abuhussein, A.; Shiva, S. Security and Privacy in the Internet of Medical Things: Taxonomy and Risk Assessment. In Proceedings of the 2017 IEEE 42nd Conference on Local Computer Networks Workshops (LCN Workshops), Singapore, 9 October 2017. [Google Scholar]
- Hatzivasilis, G.; Soultatos, O.; Ioannidis, S.; Verikoukis, C.; Demetriou, G.; Tsatsoulis, C. Review of Security and Privacy for the Internet of Medical Things (IoMT). In Proceedings of the 2019 15th International Conference on Distributed Computing in Sensor Systems (DCOSS), Santorini, Greece, 29–31 May 2019. [Google Scholar]
- Gheisari, M.; Wang, G.; Chen, S. An Edge Computing-enhanced Internet of Things Framework for Privacy-preserving in Smart City. Comput. Electr. Eng. 2020, 81, 106504. [Google Scholar] [CrossRef]
- Alzubi, J.A.; Movassagh, A.; Gheisari, M.; Najafabadi, H.E.; Abbasi, A.A.; Liu, Y.; Najafabadi, A.P. A Dynamic SDN-Based Privacy-Preserving Approach for Smart City Using Trust Technique. In Proceedings of the 2022 9th Iranian Joint Congress on Fuzzy and Intelligent Systems (CFIS), Bam, Iran, 2–4 March 2022; pp. 1–5. [Google Scholar] [CrossRef]
- Kumar, Y.; Koul, A.; Sisodia, P.S.; Shafi, J.; Kavita, V.; Gheisari, M.; Davoodi, M.B. Heart Failure Detection Using Quantum-Enhanced Machine Learning and Traditional Machine Learning Techniques for Internet of Artificially Intelligent Medical Things. Wirel. Commun. Mob. Comput. 2021, 2021, 1616725. [Google Scholar] [CrossRef]
- Hameed, S.S.; Hassan, W.H.; Latiff, L.A.; Ghabban, F. A systematic review of security and privacy issues in the Internet of medical things; the role of machine learning approaches. PeerJ Comput. Sci. 2021, 7, e414. [Google Scholar] [CrossRef]
- Awotunde, J.B.; Jimoh, R.G.; Folorunso, S.O.; Adeniyi, E.A.; Abiodun, K.M.; Banjo, O.O. Privacy and Security Concerns in IoT-Based Healthcare Systems in the Fusion of Internet of Things, Artificial Intelligence, and Cloud Computing in Health Care; Springer: Berlin/Heidelberg, Germany, 2021; pp. 105–134. [Google Scholar]
- Hasan, M.K.; Ghazal, T.M.; Saeed, R.A.; Pandey, B.; Gohel, H.; Eshmawi, A.A.; Alkhassawneh, H.M. A review on security threats, vulnerabilities, and counter measures of 5G enabled Internet-of-Medical-Things. IET Commun. 2022, 16, 421–432. [Google Scholar] [CrossRef]
- Sadhu, P.K.; Yanambaka, V.P.; Abdelgawad, A.; Yelamarthi, K. Prospect of Internet of Medical Things: A Review on Security Requirements and Solutions. Sensors 2022, 22, 5517. [Google Scholar] [CrossRef]
- Papaioannou, M. A survey on security threats and countermeasures in Internet of medical things (IoMT). Trans. Emerg. Telecommun. Technol. 2022, 33, e4049. [Google Scholar] [CrossRef]
- Munusamy, A.; Adhikari, M.; Khan, M.A.; Menon, V.G.; Srirama, S.N.; Alex, L.T.; Khosravi, M.R. Edge-Centric Secure Service Provisioning in IoT-Enabled Maritime Transportation Systems. IEEE Trans. Intell. Transp. Syst. 2021, 1–10. [Google Scholar] [CrossRef]
- Liu, P.; Hendalinpour, A.; Hamzehlou, M.; Feylizadeh, M.R.; Razmi, J. No titidentify and rank the challenges of implementing sustainable supply chain blockchain technology using the bayesian best worst methodle. Technol. Econ. Dev. Econ. 2021, 27, 656–680. [Google Scholar] [CrossRef]
- Rathee, G.; Sharma, A.; Saini, H.; Kumar, R.; Iqbal, R. A hybrid framework for multimedia data processing in IoT-healthcare using blockchain technology. Multimed Tools Appl. 2020, 79, 9711–9733. [Google Scholar] [CrossRef]
- Li, L. Research on TCP Performance Model and Transport Agent Architecture in Broadband Wireless Network. Scalable Comput. Pract. Exp. 2021, 22, 193–201. [Google Scholar] [CrossRef]
- Wang, Q.; Zhu, X.; Ni, Y.; Gu, L.; Zhu, H. Blockchain for the IoT and industrial IoT: A review. Internet Things 2020, 10, 100081. [Google Scholar] [CrossRef]
- Gheisari, M. IoT-SDNPP: A Method for Privacy-Preserving in Smart City with Software Defined Networking; Vaidya, J., Li, J., Eds.; Algorithms and Architectures for Parallel Processing. ICA3PP 2018. Lecture Notes in Computer Science; Springer: Cham, Switzerland, 2018; Volume 11337. [Google Scholar]
- Kim, S.K.; Huh, J.H. A study on the improvement of smart grid security performance and blockchain smart grid perspective. Energies 2018, 11, 1973. [Google Scholar] [CrossRef]
- Singh, S.; Ra, I.H.; Meng, W.; Kaur, M.; Cho, G.H. SH-BlockCC: A secure and efficient Internet of things smart home architecture based on cloud computing and blockchain technology. Int. J. Distrib Sens. Netw. 2019, 15. [Google Scholar] [CrossRef]
- Devi, M.S.; Suguna, R.; Joshi, A.S.; Bagate, R.A. Design of IoT Blockchain Based Smart Agriculture for Enlightening Safety and Security. In ICETCE 2019: Emerging Technologies in Computer Engineering: Microservices in Big Data Analytics; Springer: Singapore, 2019; pp. 7–19. [Google Scholar]
- Gheisari, M.; Wang, G.; Bhuiyan, M.Z.A.; Zhang, W. MAPP: A Modular Arithmetic Algorithm for Privacy Preserving in IoT. In Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference, Guangzhou, China, 12–15 December 2017. [Google Scholar]
- Liang, X.; Shetty, S.; Tosh, D.K.; Zhao, J.; Li, D.; Liu, J. A reliable data provenance and privacy preservation architecture for business-driven cyber-physical systems using Blockchain. Int. J. Inf. Secur. Priv. 2018, 12, 68–81. [Google Scholar] [CrossRef]
- Wang, H.; Ma, S.; Dai, H.-N.; Imran, M.; Wang, T. Blockchain-based Data Privacy Management with Nudge Theory in Open Banking. Future Gener. Comput. Syst. 2020, 110, 812–823. [Google Scholar] [CrossRef]
- Golosova, J.; Romanovs, A. The Advantages and Disadvantages of the Blockchain Technology. In Proceedings of the 2018 IEEE 6th Workshop on Advances in Information, Electronic and Electrical Engineering (AIEEE), Vilnius, Lithuania, 8–10 November 2018. [Google Scholar]
- Hölbl, M.; Kompara, M.; Kamišalić, A.; Nemec Zlatolas, L. A systematic review of the use of Blockchain in healthcare. Symmetry 2018, 10, 470. [Google Scholar] [CrossRef]
Business | Industry | Medical and Treatment |
---|---|---|
Theft protection | Real-time information about the performance of the machines used | Increasing the quality of patient care |
Send and launch personal offers | Monitor material availability | Improves resource allocation decisions Improves physician–patient relationship |
Support in marketing activities, communication, and transactions | Controls energy consumption | Smart hospitals, smart homes, intelligent automobiles, intelligent dispersed networks, smart manufacturing industries, smart grids, and virtual learning environments are examples of IoT landscapes and devices spread across our society. |
More appropriate product control | Improves production processes |
No | Applications | References |
---|---|---|
1 | IoT security and medical | [10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49] |
2 | IoT security and transportation | [50,51,52,53,54,55,56,57,58,59,60,61,62,63,64,65] |
3 | IoT security and business | [66,67,68,69,70,71] |
4 | IoT security and military | [72,73,74,75,76,77,78,79,80,81] |
5 | IoT security and education | [82,83,84,85,86,87] |
6 | IoT security and industry | [88,89,90] |
7 | IoT security and smart cities | [91,92,93,94,95,96,97,98,99,100,101,102,103] |
8 | IoT security and smart grid | [104,105,106,107,108,109,110,111,112,113] |
9 | IoT security and agriculture | [114,115,116,117,118,119,120,121,122,123,124] |
10 | IoT security and smart home | [125,126,127,128,129,130,131,132,133,134] |
11 | IoT security and supply chain | [135,136,137,138,139,140,141,142] |
12 | IoT security and banking system | [143,144] |
Category | IoT Security and Transportation | IoT Security and Medical | IoT Security and Business | IoT Security and Military | IoT Security and Education | IoT Security and Industry | IoT Security and Smart Cities | IoT Security and Smart Grid | IoT Security and Agriculture | IoT Security and Smart Home | IoT Security and Supply Chain | IoT Security and Banking System | |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Approach | |||||||||||||
Artificial Intelligence | 3 | 5 | 4 | 1 | 1 | ||||||||
Fuzzy | 1 | 1 | |||||||||||
Field programmable gate array | 1 | ||||||||||||
Blockchain technology | 2 | 1 | 1 | 1 | 2 | 1 | 1 | 1 | |||||
Geospatial modelling approach | 1 | ||||||||||||
Intrusion detection System | 1 | ||||||||||||
Game theory approach | 1 | ||||||||||||
Prioritization rules | 1 | ||||||||||||
Global Positioning System (GPS) | 2 | ||||||||||||
Cyber-physical systems | 1 | ||||||||||||
Cloud technologies | 2 | 1 | 1 | ||||||||||
Authentication and anonymity | 6 | ||||||||||||
Symmetric cryptography | 1 | ||||||||||||
Embedded encryption algorithm | 3 | ||||||||||||
Architecture analysis | 1 | ||||||||||||
End-to-end security scheme | 1 | ||||||||||||
The security scheme of 6LoWPAN | 2 | 1 | |||||||||||
Vulnerable software processes | 2 | ||||||||||||
System-theoretic process analysis | 1 | ||||||||||||
Deep learning (DL) algorithms | 2 | 1 | |||||||||||
Risk assessment | 3 | ||||||||||||
Lightweight Protocol | 2 | ||||||||||||
Context-sensitive to access control | 1 | ||||||||||||
Fog computing | 2 | ||||||||||||
Markov model | 1 | ||||||||||||
Information security modelling | 1 | ||||||||||||
Conceptual modeling | 1 | 1 | |||||||||||
Encryption method | 1 | 1 | |||||||||||
Cryptographic access control | 3 | 1 | |||||||||||
Security evaluation with risk management | 1 | ||||||||||||
Security evaluation on multi-metric approach | 1 | ||||||||||||
The systemic and cognitive approach | 1 | ||||||||||||
Wireless sensor network with authentication | 1 | ||||||||||||
Fault tolerance mechanisms | 1 | 1 | |||||||||||
Encryption algorithm | 1 | ||||||||||||
ANTcentric security | 1 | 1 | |||||||||||
Policy-based secure and trustworthy sensing | 1 | ||||||||||||
SMARTIE project approach | 1 | ||||||||||||
AAA-protected network | 1 | ||||||||||||
Trusted secure access control system | 1 | ||||||||||||
5G cellular networks | 1 | ||||||||||||
Monte Carlo simulations | 1 | ||||||||||||
Edge computing | 1 | ||||||||||||
Raspberry Pi board and an array of sensors | 1 | ||||||||||||
New algorithm to control Security | 1 | ||||||||||||
System block diagram | 1 | ||||||||||||
IR sensor and GSM module | 1 | ||||||||||||
AllJoyn framework | 1 | ||||||||||||
Software-defined networking | 1 | ||||||||||||
Z-Wave | 1 | ||||||||||||
Mapping the security | 1 | ||||||||||||
Lightweight improved protocol on authenticated encryption | 1 | ||||||||||||
IoT-based secured decision making management approach | 1 | ||||||||||||
Risk management model | 1 | ||||||||||||
Other methods | 5 | 2 | 2 | 4 | 2 | 3 | 1 | 1 |
NO | Application | Reference | Year |
---|---|---|---|
1 | IoT security, blockchain and medical (IoMT) | [170] | 2020 |
2 | IoT security, blockchain and transportation | [171] | 2021 |
3 | IoT security, blockchain and military | [123] | 2020 |
4 | IoT security, blockchain and industry and manufacturing | [172] | 2020 |
5 | IoT security, blockchain and smart cities | [173] | 2021 |
6 | IoT security, blockchain and smart grids | [174] | 2018 |
7 | IoT security, blockchain and smart home | [175] | 2019 |
8 | IoT security, blockchain and agriculture | [176] | 2019 |
9 | IoT security, blockchain and supply chain | [177] | 2020 |
10 | IoT security, blockchain and education systems | [178] | 2021 |
11 | IoT security, blockchain and business | [179] | 2018 |
12 | IoT security, blockchain and banking systems | [180] | 2020 |
No | Advantages | Disadvantages |
---|---|---|
1 | Decentralized network | High energy consumption |
2 | Transparency | The difficult process of integration |
3 | Trusty chain | The implementation’s high costs |
4 | Unalterable and indestructible technology | The signature verification |
5 | Fast processing | Opportunity to split the chain |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Kamalov, F.; Pourghebleh, B.; Gheisari, M.; Liu, Y.; Moussa, S. Internet of Medical Things Privacy and Security: Challenges, Solutions, and Future Trends from a New Perspective. Sustainability 2023, 15, 3317. https://doi.org/10.3390/su15043317
Kamalov F, Pourghebleh B, Gheisari M, Liu Y, Moussa S. Internet of Medical Things Privacy and Security: Challenges, Solutions, and Future Trends from a New Perspective. Sustainability. 2023; 15(4):3317. https://doi.org/10.3390/su15043317
Chicago/Turabian StyleKamalov, Firuz, Behrouz Pourghebleh, Mehdi Gheisari, Yang Liu, and Sherif Moussa. 2023. "Internet of Medical Things Privacy and Security: Challenges, Solutions, and Future Trends from a New Perspective" Sustainability 15, no. 4: 3317. https://doi.org/10.3390/su15043317
APA StyleKamalov, F., Pourghebleh, B., Gheisari, M., Liu, Y., & Moussa, S. (2023). Internet of Medical Things Privacy and Security: Challenges, Solutions, and Future Trends from a New Perspective. Sustainability, 15(4), 3317. https://doi.org/10.3390/su15043317