Security and Privacy Management in Internet of Medical Things (IoMT): A Synthesis
Abstract
:1. Introduction
2. Architecture of IoMT
3. Communication Protocols in IoMT
3.1. Perception Layer
3.2. Network Layer
3.3. Application Layer
3.4. Protocol Range and Data Transmission Rate in IoMT
- Short-Range protocols: ZigBee provides a mesh network structure. When it comes to setting and planning device energy use, ZigBee is easier than 6LowPAN. ZigBee also outperforms alternative protocols such as Z-Wave in terms of device hopping and energy usage [23]. In contrast to ZigBee networks, 6LoWPAN networks appear to have lower latency and packet loss rates, which make them suitable for medical services. When comparing 6LowPAN implementations in medical contexts to BLE implementations, a relevant research work [24] reveals that 6LowPAN is more efficient when employing IP-based applications, albeit there are connection concerns when barriers are present. When it comes to network communication, 6LoWPAN devices interact directly with one another, whereas LoRaWAN data is sent through gateways and routers. On the other hand, Z-Wave has a longer optimal range than ZigBee and 6LowPAN due to its sub-1 GHz band—this communication band also allows Z-Wave to have less interference. The disadvantage is its lower data-transmission rates.
- Long-Range protocols: For long-range protocols with low power consumption such as LoRaWAN and LTE-M (Long Term Evolution Machine Type Communication) networks, the main LPWAN (Low Power Wide Area Networks) technologies can also provide long-range connectivity of 10 km distances using subgigahertz (GHz) radio frequencies, even on a global scale as LTE-M networks provide a robust infrastructure and built-in security mechanism that can support most applications [25]. These technologies offer the manufacturers of connected objects to communicate data over long distances with low power consumption. Despite the need for specific hardware, LTE-M offers the best compromise between throughput and autonomy, which makes it ideal for multiple domains, including healthcare.
Layer | Communication Protocols | Range Type | References |
---|---|---|---|
Perception Layer | RFID, NFC, Bluetooth/BLE, Z-Wave, UWB | Short-Range | [26,27] |
Network Layer | IPV4, IPV6 protocols (for network addressing) For routing RPL, CARP, and CORPL protocols (for network routing) TCP, UDP, 6LoWPAN, WIA-PA | N/A | [28,29] |
NFC, RFID, IEEE 802.11 (Wi-Fi), IEEE 802.15.1 (Bluetooth), IEEE 802.15.4 (ZigBee), | Short-Range | ||
LPWAN (LoRaWAN and LTE-M) | Long-Range | ||
Application Layer | HL7, CoAP, DSS, MQTT, HTTP, HTTPS, TLS | N/A | [30,31] |
4. IoMT-Related Technologies
4.1. Wireless Sensor Networks (WSN)
4.2. RFID Technology
5. IoMT Security Requirements
- Confidentiality: In the context of the IoMT, confidentiality is about protecting the medical information that the patient shares with the personal physician or medical staff [19,38]. Such data must be protected from intrusion, eavesdropping, or from rogue entities that may harm the patient or use the medical information against him. While the standards give some general guidelines, the presence of network access control and data encryption is essential for guaranteeing the property of confidentiality for IoMT [9].
- Privacy: It ensures that patients’ private data are protected against disclosure and attempts to exploit them illegally [15]. Currently, there are certain enacted rules in many countries for the collection and storage of patient’s health data for privacy regulations. For instance, General Data Protection Regulation (GDPR) and Health Insurance Portability and Accountability Act (HIPAA) [2,39]. The IoMT system enforces these privacy regulations and allows users to access their private data.
- Integrity: Data integrity is a necessity for IoMT healthcare systems. It protects patient data from being altered or deleted by unauthorized parties; this primarily ensures that the data arrives at its intended destination without being altered during wireless transmission [40] and also remains unaltered via any unauthorized means when at rest. Healthcare organizations are more conscious of the necessity of data integrity than ever before. As data represent diagnoses, treatments, and health statuses, data integrity is critical in healthcare [38]. In this context, this property can also be defined as the capacity to identify unlawful data tampering or distortion that causes permanent damage [41]. To prevent hostile attempts from modifying sent data, proper data integrity safeguards must be included.
- Availability: Availability is the ability of servers and medical equipment to make services and data available to users when they need it [42]. It is an important component in healthcare systems, especially when a patient’s health must be monitored on a continual basis. As a result, in order to assure availability, the system must be updated to offer suspect data storage or transmission channels in the event of DoS/DDoS (Denial-of-Service/Distributed Denial-of-Service) assaults, as well as to strengthen its permanence and capacity to promptly resolve any issues [41].
- Non-Repudiation: This is the ability to hold any authorized user responsible for his activities. Simply expressed, non-repudiation guarantees that no system activity may be rejected [9]. This criterion prevents authorized users from canceling earlier system commitments or activities [38]. This metric measures the system’s capacity to confirm the existence or absence of an action. To simplify even further, an entity cannot deny completing a task after completing it and must take responsibility for any action or its consequence. The easiest approach to achieving this criterion is to use digital signature techniques [9].
- Authentication: When a user logs into the system, the user’s identity should be verified. Message authentication, on the other hand, is the act of confirming that a user is the original source of the provided data from a previous time. Mutual authentication is the most secure type of security; before transferring secure keys or data, the client and server must first authenticate each other. Lightweight authentication algorithms are becoming increasingly common as a result of a shortage of memory capacity in certain IoMT devices or a lack of CPU (Central Processing Unit) strength to conduct the cryptographic operations required by classic authentication protocols [14].
- Authorization: As mentioned before, medical data must be protected from unauthorized access due to the sensitivity of such data [43]. Hence, in our context, only trusted parties (with the required skill or expertise) should be given permission to complete certain actions, such as giving commands to medical IoMT devices or updating the software or installing security patches on medical IoMT devices.
- Anonymity: When unauthorized users engage with the system, this requirement guarantees that the identity of the patient or physician stays concealed, i.e., both the patient and the physician should remain anonymous. When a patient and a physician are communicating, their identities should not be revealed [35]. Passive attacks are only able to observe what a person does, not who a person is.
6. Classification of Attacks in IoMT
7. IoMT Devices and Potential Attacks
- Implantable Medical Devices (IMDs): These are devices that are implanted to replace or sustain a biological structure that is absent or damaged. Furthermore, an IMD can be utilized to improve a biological structure that already exists. The primary function of such implanted devices is to monitor and transmit signals from the patient’s body to other medical systems [63]. They are primarily composed of small wireless modules and health sensors that capture information such as temperature, mobility, blood glucose, and blood pressure. The pacemaker, for example, can be particularly beneficial for managing aberrant cardiac rhythms [64], and infusion pumps, such as enteral, PCA, and insulin infusion pumps, can be utilized in a range of therapies [32,65]. Infusion pumps have been linked to a number of patient-safety issues. As a result, authentication procedures need to be developed [66]. Although a wireless connection may enhance the security risks associated with these electronic devices, it is nevertheless the most preferred communication method for their installation [11].
- Internet of Wearable Devices (IoWDs): These devices are worn by people to track their biometrics, which may help them improve their overall health. This category includes a variety of IoMT systems. Examples could include EEG (electroencephalography) and ECG (electrocardiography) [67,68]. As we know, EEG can be used to monitor and record brain activities while an ECG can monitor the condition of the heart’s rhythm and electrical activity. Other examples could include, for instance, smart watches that are quite popular nowadays for monitoring biometrics such as heart rate and movement; fitness trackers; activity, accelerating, and respiratory rate sensors [32,69]; and so on. However, due to battery-life limitations and sensor accuracy, these devices are unlikely to be used to replace IMDs in critical situations [12].
- Ambient Devices: Although ambient devices are not used for patient treatment and monitoring, they sense the patient’s environment to monitor patterns of activity and manage environmental conditions near the patient. They include [70] patient identification devices, motion detection devices, monitoring devices, implantable device chargers, and alarm devices.
- Stationary Devices: Devices that are not generally carried by the patient are classified as stationary devices. Although such devices were previously unconnected, they may now be managed remotely to enable telemedicine treatments [71]. Examples of stationary devices include imaging devices (such as, magnetic resonance imaging (MRI), computerized tomography (CT) scanners, and X-rays) and surgical devices [72].
8. IoMT Security Model
8.1. Blockchain Models
8.2. Authentication Model
8.3. Privacy Model
8.4. Machine Learning Model
9. Classification and Comparison
10. Conclusions and Future Directions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Khan, R.A.; Pathan, A.-S.K. The state of the art wireless body area sensor networks: A survey. Int. J. Distrib. Sens. Netw. 2018, 14, 1–23. [Google Scholar] [CrossRef]
- Ahamad, S.S.; Pathan, A.-S.K. A formally verified authentication protocol in secure framework for mobile healthcare during COVID-19 like pandemic. Connect. Sci. 2021, 33, 532–554. [Google Scholar] [CrossRef]
- Vaiyapuri, T.; Binbusayyis, A.; Varadarajan, V. Security, privacy and trust in IoMT enabled smart healthcare system: A systematic review of current and future trends. Int. J. Adv. Comput. Sci. Appl. 2021, 12, 731–737. [Google Scholar] [CrossRef]
- Rasool, R.U.; Ahmad, H.F.; Rafique, W.; Qayyumd, A.; Qadir, J. Security and privacy of internet of medical things: A contemporary review in the age of surveillance, botnets, and adversarial. J. Netw. Comput. Appl. 2022, 201, 103332. [Google Scholar] [CrossRef]
- Gubbi, J.; Buyya, R.; Marusic, S.; Palaniswami, M. Internet of things (IoT): A vision, architectural elements, and future directions. Future Gener. Comput. Syst. 2013, 29, 1645–1660. [Google Scholar] [CrossRef]
- Jahankhani, H.; Ibarra, J. Digital forensic investigation for the Internet of medical things (IoMT). Forensic Leg. Investig. Sci. 2019, 5, 1–6. [Google Scholar] [CrossRef]
- Al Shorman, O.; Al Shorman, B.; Al-khassaweneh, M.; Alkahtani, F. A review of internet of medical things (IoMT)—Based remote health monitoring through wearable sensors: A case study for diabetic patients. Indones. J. Electr. Eng. Comput. Sci. 2020, 20, 414–422. [Google Scholar]
- Dhiyya, A.J.A. Architecture of IoMT in healthcare. In The Internet of Medical Things (IoMT): Healthcare Transformation; Hemalatha, R.J., Akila, D., Balaganesh, D., Paul, A., Eds.; Wiley: Hoboken, NJ, USA, 2022; pp. 161–172. [Google Scholar]
- Ghubaish, A.; Salman, T.; Zolanvari, M.; Unal, D.; Al-Ali, A.; Jain, R. Recent advances in the internet of medical things (IoMT) systems security. IEEE Internet Things J. 2020, 8, 8707–8718. [Google Scholar] [CrossRef]
- Din, I.U.; Guizani, M.; Hassan, S.; Kim, B.-S.; Khan, M.K.; Atiquzzaman, M.; Ahmed, S.H. The Internet of things: A review of enabled technologies and future challenges. IEEE Access 2018, 7, 7606–7640. [Google Scholar] [CrossRef]
- Ferguson, J.E.; Redish, A.D. Wireless communication with implanted medical devices using the conductive properties of the body. Expert Rev. Med. Devices 2011, 8, 427–433. [Google Scholar] [CrossRef]
- Kos, A.; Milutinović, V.; Umek, A. Challenges in wireless communication for connected sensors and wearable devices used in sport biofeedback applications. Future Gener. Comput. Syst. 2019, 92, 582–592. [Google Scholar] [CrossRef]
- Lone, T.A.; Rashid, A.; Gupta, S.; Gupta, S.K.; Rao, D.S.; Najim, M.; Srivastava, A.; Kumar, A.; Umrao, L.S.; Singhal, A. Securing communication by attribute-based authentication in hetnet used for medical applications. EURASIP J. Wirel. Commun. Netw. 2020, 146, 146. [Google Scholar] [CrossRef]
- Alrawais, A.; Alhothaily, A.; Hu, C.; Cheng, X. Fog computing for the internet of things: Security and privacy issues. IEEE Internet Comput. 2017, 21, 34–42. [Google Scholar] [CrossRef]
- Hameed, S.S.; Hassan, W.H.; Abdul Latiff, L.; Ghabban, F. A systematic review of security and privacy issues in the internet of medical things; the role of machine learning approaches. Peer. J. Comput. Sci. 2021, 7, e414. [Google Scholar] [CrossRef] [PubMed]
- Kagita, M.K.; Thilakarathne, N.; Gadekallu, T.R.; Maddikunta, P.K.R. A review on security and privacy of internet of medical things. In Intelligent Internet of Things for Healthcare and Industry; Ghosh, U., Chakraborty, C., Garg, L., Srivastava, G., Eds.; Springer: Berlin/Heidelberg, Germany, 2022; pp. 171–187. [Google Scholar]
- Poongodi, T.; Rathee, A.; Indrakumari, R.; Suresh, P. IoT sensing capabilities: Sensor deployment and node discovery, wearable sensors, wireless body area network (WBAN), data acquisition. In Principles of Internet of Things (IoT) Ecosystem: Insight Paradigm; Peng, S.L., Pal, S., Huang, L., Eds.; Springer International Publishing: Cham, Switzerland, 2020; pp. 127–151. [Google Scholar]
- Choudhary, G.; Jain, A.K. Internet of things: A survey on architecture, technologies, protocols and challenges. In Proceedings of the International Conference on Recent Advances and Innovations in Engineering, Jaipur, India, 23–25 December 2016. [Google Scholar]
- Benslimane, Y.; Benahmed, K.; Benslimane, H. Security mechanisms for 6LoWPAN network in context of internet of things: A Survey. In Renewable Energy for Smart and Sustainable Cities; Hatti, M., Ed.; Springer International Publishing: Cham, Switzerland, 2019; pp. 49–69. [Google Scholar]
- Ahmadi, H.; Arji, G.; Shahmoradi, L.; Safdari, R.; Nilashi, M.; Alizadeh, M. The application of internet of things in healthcare: A systematic literature review and classification. Univ. Access Inf. Soc. 2019, 18, 837–869. [Google Scholar] [CrossRef]
- Islam, S.M.; Kwak, D.; Kabir, M.H.; Hossain, M.; Kwak, K.S. The internet of things for health care: A comprehensive survey. IEEE Access 2015, 3, 678–708. [Google Scholar] [CrossRef]
- Elhoseny, M.; Thilakarathne, N.N.; Alghamdi, M.I.; Mahendran, R.K.; Gardezi, A.A.; Weerasinghe, H.; Welhenge, A. Security and privacy issues in medical internet of things: Overview, countermeasures, challenges and future directions. Sustainability 2021, 13, 11645. [Google Scholar] [CrossRef]
- Toscano, E.; Bello, L.L. Comparative assessments of IEEE 802.15. 4/ZigBee and 6LoWPAN for low-power industrial WSNs in realistic scenarios. In Proceedings of the 9th IEEE International Workshop on Factory Communication Systems, Lemgo, Germany, 21–24 May 2012. [Google Scholar]
- Tabish, R.; Mnaouer, A.B.; Touati, F.; Ghaleb, A.M. A comparative analysis of BLE and 6LoWPAN for U-HealthCare applications. In Proceedings of the 7th IEEE GCC Conference and Exhibition, Doha, Qatar, 17–20 November 2013. [Google Scholar]
- Haxhibeqiri, J.; De Poorter, E.; Moerman, I.; Hoebeke, J. A survey of LoRaWAN for IoT: From technology to application. Sensors 2018, 18, 3995. [Google Scholar] [CrossRef]
- Sundaresan, S.; Doss, R.; Zhou, W. RFID in healthcare–current trends and the future. In Springer Series in Bio-/Neuroinformatics; Kasabov, N., Ed.; Springer: Berlin/Heidelberg, Germany, 2015; Volume 5, pp. 839–870. [Google Scholar]
- Sarigiannidis, P.; Karapistoli, E.; Economides, A.A. Detecting sybil attacks in wireless sensor networks using UWB ranging-based information. Expert Syst. Appl. 2015, 42, 7560–7572. [Google Scholar] [CrossRef]
- Peng, H. WIFI network information security analysis research. In Proceedings of the 2nd IEEE International Conference on Consumer Electronics, Communications and Networks, Yichang, China, 21–23 April 2012. [Google Scholar]
- Yang, X.; Karampatzakis, E.; Doerr, C.; Kuipers, F. Security vulnerabilities in LoRaWAN. In Proceedings of the IEEE/ACM 3rd International Conference on Internet-of-Things Design and Implementation, Orlando, FL, USA, 17–20 April 2018. [Google Scholar]
- Duggal, A. HL7 2. x security. In Proceedings of the 8th Annual HITB Security Conference, Amsterdam, The Netherlands, 10–14 April 2017. [Google Scholar]
- Flury, M.; Poturalski, M.; Papadimitratos, P.; Hubaux, J.P.; Le Boudec, J.Y. Effectiveness of distance-decreasing attacks against impulse radio ranging. In Proceedings of the 3rd ACM Conference on Wireless Network Security, Hoboken, NJ, USA, 22–24 March 2010. [Google Scholar]
- Navya, V.; Deepalakshmi, P. Threshold-based energy-efficient routing for transmission of critical physiological parameters in a wireless body area network under emergency scenarios. Int. J. Comput. Appl. 2021, 43, 367–376. [Google Scholar] [CrossRef]
- Nanayakkara, N.; Halgamuge, M.N.; Syed, A. Security and privacy of internet of medical things (IoMT) based healthcare applications: A review. In Proceedings of the 262nd IIER International Conference, Istanbul, Turkey, 6–7 November 2019. [Google Scholar]
- Chen, X.; Zhu, H.; Geng, D.; Liu, W.; Yang, R.; Li, S. Merging RFID and blockchain technologies to accelerate big data medical research based on physiological signals. J. Healthc. Eng. 2020, 2020, 2452683. [Google Scholar] [CrossRef] [PubMed]
- Yaacoub, J.P.A.; Noura, M.; Noura, H.N.; Salman, O.; Yaacoub, E.; Couturier, R.; Chehab, A. Securing internet of medical things systems: Limitations, issues and recommendations. Future Gener. Comput. Syst. 2020, 105, 581–606. [Google Scholar] [CrossRef]
- Kasyoka, P.; Kimwele, M.; Mbandu Angolo, S. Certificateless pairing-free authentication scheme for wireless body area network in healthcare management system. J. Med. Eng. Technol. 2020, 44, 12–19. [Google Scholar] [CrossRef] [PubMed]
- Belkhouja, T.; Sorour, S.; Hefeida, M.S. Role-based hierarchical medical data encryption for implantable medical devices. In Proceedings of the IEEE Global Communications Conference, Waikoloa, HI, USA, 9–13 December 2019. [Google Scholar]
- Hatzivasilis, G.; Soultatos, O.; Ioannidis, S.; Verikoukis, C.; Demetriou, G.; Tsatsoulis, C.I. Review of security and privacy for the internet of medical things. In Proceedings of the International Conference on Distributed Computing in Sensor Systems, Santorini, Greece, 29–31 May 2019. [Google Scholar]
- Hash, J.; Bowen, P.; Johnson, L.; Smith, C.; Steinberg, D. An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule; Special Publication (NIST SP); National Institute of Standards and Technology: Gaithersburg, MD, USA, 2008. [Google Scholar]
- Koutras, D.; Stergiopoulos, G.; Dasaklis, T. Security in IoMT communications: A survey. Sensors 2020, 20, 4828. [Google Scholar] [CrossRef] [PubMed]
- Sun, Y.; Lo, F.P.-W.; Lo, B. Security and privacy for the internet of medical things enabled healthcare systems: A survey. IEEE Access 2019, 7, 183339–183355. [Google Scholar] [CrossRef]
- Papaioannou, M.; Karageorgou, M.; Mantas, G.; Sucasas, V.; Essop, I.; Jonathan, R.; Dimitrios, L. A Survey on Security Threats and Countermeasures in Internet of Medical Things (IoMT). Trans. Emerg. Telecommun. Technol. 2022, 33, e4049. [Google Scholar] [CrossRef]
- Kumar, R.; Tripathi, R. Towards design and implementation of security and privacy framework for internet of medical things (iomt) by leveraging blockchain and ipfs technology. J. Supercomput. 2021, 77, 7916–7955. [Google Scholar] [CrossRef]
- Davis, J. Ransomware Attacks Cost Healthcare Sector at Least $160M Since 2016. Health IT Security. Available online: https://healthitsecurity.com/ (accessed on 23 June 2022).
- Rathore, H.; Al-Ali, A.K.; Mohamed, A.; Du, X.; Guizani, M. A novel deep learning strategy for classifying different attack patterns for deep brain implants. IEEE Access 2019, 7, 24154–24164. [Google Scholar] [CrossRef]
- ‘Lives Are at Stake’: Hacking of US Hospitals Highlights Deadly Risk of Ransomware, The Guardian. Available online: https://www.theguardian.com/technology/2022/jul/14/ransomware-attacks-cybersecurity-targeting-us-hospitals (accessed on 5 August 2022).
- Saif, S.; Biswas, S.; Chattopadhyay, S. Intelligent, secure big health data management using deep learning and blockchain technology: An overview. In Deep Learning Techniques for Biomedical and Health Informatics; Dash, S., Acharya, B., Mittal, M., Abraham, A., Kelemen, A., Eds.; Springer International Publishing: Cham, Switzerland, 2020; Volume 68, pp. 187–209. [Google Scholar]
- Maji, S.; Banerjee, U.; Fuller, S.H.; Abdelhamid, M.R.; Nadeau, P.M.; Yazicigil, R.T.; Chandrakasan, A.P. A low-power dual-Factor authentication unit for secure implantable devices. In Proceedings of the IEEE Custom Integrated Circuits Conference, Newport Beach, CA, USA, 22–25 March 2020. [Google Scholar]
- Andrea, I.; Chrysostomou, C.; Hadjichristofi, G. Internet of things: Security vulnerabilities and challenges. In Proceedings of the IEEE Symposium on Computers and Communication, Larnaca, Cyprus, Greek, 6–9 July 2015. [Google Scholar]
- Abosata, N.; Al-Rubaye, S.; Inalhan, G.; Emmanouilidis, C. Internet of things for system integrity: A comprehensive survey on security, attacks and countermeasures for industrial applications. Sensors 2021, 21, 3654. [Google Scholar] [CrossRef]
- Jafarnia-Jahromi, A.; Broumandan, A.; Nielsen, J.; Lachapelle, G. GPS vulnerability to spoofing threats and a review of antispoofing techniques. Int. J. Navig. Obs. 2012, 2012, 127072. [Google Scholar]
- Kalyani, G.; Chaudhari, S. An efficient approach for enhancing security in Internet of Things using the optimum authentication key. Int. J. Comput. Appl. 2020, 42, 306–314. [Google Scholar] [CrossRef]
- Burhan, M.; Rehman, R.A.; Khan, B.; Kim, B.-S. IoT elements, layered architectures and security issues: A comprehensive survey. Sensors 2018, 18, 2796. [Google Scholar] [CrossRef] [PubMed]
- Salem, O.; Alsubhi, K.; Shaafi, A.; Gheryani, M.; Mehaoua, A.; Boutaba, R. Man-in-the-Middle Attack Mitigation in Internet of Medical Things. IEEE Trans. Ind. Inform. 2022, 18, 2053–2062. [Google Scholar]
- Agyemang, I.O.; Kponyo, J.J.; Klogo, G.S.; Boateng, J.O. Lightweight rogue access point detection algorithm for WiFi-enabled internet of things (IoT) devices. Internet Things 2020, 11, 100200. [Google Scholar] [CrossRef]
- Khader, R.; Eleyan, D. Survey of DoS/DDoS attacks in IoT. Sust. Eng. Innov. 2021, 3, 23–28. [Google Scholar] [CrossRef]
- Sharma, M.; Arora, B. Detection and prevention of DoS and DDoS in IoT. In Lecture Notes in Networks and Systems; Singh, P.K., Wierzchoń, S.T., Tanwar, S., Ganzha, M., Rodrigues, J.J.P.C., Eds.; Springer: Singapore, 2021; Volume 203, pp. 845–855. [Google Scholar]
- Sethuraman, S.C.; Vijayakumar, V.; Walczak, S. Cyber-attacks on healthcare devices using unmanned aerial vehicles. J. Med. Syst. 2020, 44, 29. [Google Scholar] [CrossRef]
- Pathan, A.-S.K.; Lee, H.-W.; Hong, C.S. Security in wireless sensor networks: Issues and challenges. In Proceedings of the 8th International Conference on Advanced Communication Technology (IEEE ICACT 2006), Gangwon, Korea, 20–22 February 2006; Volume II. [Google Scholar]
- Marin-Jiménez, M.J.; Castro, F.M.; Guil, N.; De la Torre, F.; Medina-Carnicer, R. Deep multi-task learning for gait-based biometrics. In Proceedings of the IEEE International Conference on Image Processing, Beijing, China, 17–20 September 2017. [Google Scholar]
- Schwartz, O.; Mathov, Y.; Bohadana, M.; Elovici, Y.; Oren, Y. Opening pandora’s box: Effective techniques for reverse engineering IoT Devices. In Proceedings of the International Conference on Smart Card Research and Advanced Applications, Lugano, Switzerland, 13–15 November 2017. [Google Scholar]
- Pathan, A.-S.K.; Kindy, D.A. Lethality of SQL injection against current and future internet-technologies. Int. J. Comput. Sci. Eng. 2014, 9, 386–394. [Google Scholar] [CrossRef]
- Haghi, M.; Thurow, K.; Habil, A.; Stoll, R.; Habil, M. Wearable devices in medical internet of things: Scientific research and commercially available devices. Healthc. Inform. Res. 2017, 23, 4–15. [Google Scholar] [CrossRef]
- Altawy, R.; Youssef, A.M. Security tradeoffs in cyber physical systems: A case study survey on implantable medical devices. IEEE Access 2016, 4, 959–979. [Google Scholar] [CrossRef]
- Larson, B.R.; Zhang, Y.; Barrett, S.C.; Hatcliff, J.; Jones, P.L. Enabling safe interoperation by medical device virtual integration. IEEE Des. Test 2015, 32, 74–88. [Google Scholar] [CrossRef]
- Sicari, S.; Rizzardi, A.; Coen-Porisini, A. How to evaluate an internet of things system: Models, case studies, and real developments. Software Pract. Exp. 2019, 49, 1663–1685. [Google Scholar] [CrossRef]
- Scarpato, N.; Pieroni, A.; Di Nunzio, L.; Fallucchi, F. E-health-IoT universe: A review. Int. J. Adv. Sci. Eng. Inf. Technol. 2017, 7, 2328–2336. [Google Scholar] [CrossRef]
- Neethirajan, S. Recent advances in wearable sensors for animal health management. Sens. Bio-Sens. Res. 2017, 12, 15–29. [Google Scholar] [CrossRef]
- Suranthaa, N.; Davidc, P.A.; Wicaksono, M. A Review of wearable internet-of-things device for healthcare. Procedia Comput. Sci. 2020, 179, 936–943. [Google Scholar] [CrossRef]
- Lee, J.H.; Seo, D.W. Development of ECG monitoring system and implantable device with wireless charging. Micromachines 2019, 10, 38. [Google Scholar] [CrossRef]
- Limaye, A.; Adegbija, T.A. Workload Characterization for the internet of medical things (IoMT). In Proceedings of the IEEE Computer Society Annual Symposium on VLSI, Bochum, Germany, 3–5 July 2017. [Google Scholar]
- Alsubaei, F.; Shiva, S.; Abuhussein, A. Security and privacy in the internet of medical things: Taxonomy and risk assessment. In Proceedings of the 42nd IEEE Conference on Local Computer Networks Workshops, Singapore, 9 October 2017. [Google Scholar]
- Lakafosis, V.; Vyas, R.; Mariotti, C.; Le, T.; Tentzeris, M.M. Integrating tiny RFID- and NFC-based sensors with the Internet. In Green RFID Systems; Roselli, L., Ed.; Cambridge University Press: Cambridge, UK, 2014; pp. 152–175. [Google Scholar]
- Bhanushali, J.; Dinde, P.; Chakraborty, S. Internet of things: Machine to machine communication with emphasis on role of RFID and NFC. Int. J. Sci. Eng. Res. 2015, 6, 779–785. [Google Scholar]
- Nasiri, S.; Sadoughi, F.; Tadayon, M.H.; Dehnad, A. Security requirements of internet of things-based healthcare system: A survey study. Acta. Inform. Med. 2019, 27, 253–258. [Google Scholar] [CrossRef]
- Pournaghi, S.M.; Bayat, M.; Farjami, Y. MedSBA: A novel and secure scheme to share medical data based on blockchain technology and attribute-based encryption. J. Ambient Intell. Humaniz. Comput. 2020, 11, 4613–4641. [Google Scholar] [CrossRef]
- Garg, N.; Wazid, M.; Das, A.K.; Singh, D.P.; Rodrigues, J.J.; Park, Y. Bakmp-iomt: Design of blockchain enabled authenticated key management protocol for internet of medical things deployment. IEEE Access 2020, 8, 95956–95977. [Google Scholar] [CrossRef]
- Tahir, M.; Sardaraz, M.; Muhammad, S.; Saud Khan, M. A lightweight authentication and authorization framework for blockchain enabled IoT network in health-informatics. Sustainability 2020, 12, 6960. [Google Scholar] [CrossRef]
- Xu, J.; Xue, K.; Li, S.; Tian, H.; Hong, J.; Hong, P.; Yu, N. Healthchain: A blockchain-based privacy preserving scheme for largescale health data. IEEE Internet Things J. 2019, 6, 8770–8781. [Google Scholar] [CrossRef]
- Deebak, B.; Al-Turjman, F. Smart mutual authentication protocol for cloud based medical healthcare systems using internet of medical things. IEEE J. Sel. Areas Commun. 2020, 39, 346–360. [Google Scholar] [CrossRef]
- Yanambaka, V.P.; Mohanty, S.P.; Kougianos, E.; Puthal, D. Pmsec: Physical unclonable function-based robust and lightweight authentication in the internet of medical things. IEEE Trans. Consum. Electron. 2019, 65, 388–397. [Google Scholar] [CrossRef]
- Xin, Y.; Kong, L.; Liu, Z.; Wang, C.; Zhu, H.; Gao, M.; Zhao, C.; Xu, X. Multimodal feature-level fusion for biometrics identification system on iomt platform. IEEE Access 2018, 6, 21418–21426. [Google Scholar] [CrossRef]
- Cano, M.D.; Cañavate-Sanchez, A. Preserving data privacy in the internet of medical things using dual signature ecdsa. Secur. Commun. Netw. 2020, 2020, 4960964. [Google Scholar] [CrossRef]
- Gull, S.; Parah, S.A.; Muhammad, K. Reversible data hiding exploiting huffman encoding with dual images for IoMT based healthcare. Comput. Commun. 2020, 163, 134–149. [Google Scholar] [CrossRef]
- Huang, P.; Guo, L.; Li, M.; Fang, Y. Practical privacy-preserving ECG-based authentication for IoT-based healthcare. IEEE Internet Things J. 2019, 6, 9200–9210. [Google Scholar] [CrossRef]
- Wang, Z. Blind batch encryption-based protocol for secure and privacy-preserving medical services in smart connected health. IEEE Internet Things J. 2019, 6, 9555–9562. [Google Scholar] [CrossRef]
- Abdaoui, A.; Al-Ali, A.; Riahi, A.; Mohamed, A.; Du, X.; Guizani, M. Secure medical treatment with deep learning on embedded board. In Energy Efficiency of Medical Devices and Healthcare Applications; Mohamed, A., Ed.; Elsevier: Amsterdam, The Netherlands, 2020; pp. 131–151. [Google Scholar]
- Ben Amor, L.; Lahyani, I.; Jmaiel, M. AUDIT: Anomalous data detection and Isolation approach for mobile healthcare systems. Expert Syst. 2020, 37, e12390. [Google Scholar] [CrossRef]
- Priya, R.M.S.; Maddikunta, P.K.R.; Parimala, M.; Koppu, S.; Reddy, T.; Chowdhary, C.L.; Alazab, M. An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architecture. Comput. Commun. 2020, 160, 39–149. [Google Scholar]
- Manimurugan, S.; Almutairi, S.; Aborokbah, M.M.; Chilamkurti, N.; Ganesan, S.; Patan, R. Effective attack detection in internet of medical things smart environment using a deep belief neural network. IEEE Access 2020, 8, 77396–77404. [Google Scholar] [CrossRef]
- Barros, A.; Rosário, D.; Resque, P.; Cerqueira, E. Heart of IoT: ECG as biometric sign for authentication and identification. In Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, Piscataway, NJ, USA, 24–28 June 2019. [Google Scholar]
Protocol | ZigBee | Bluetooth | IEEE802.11ac | Z-Wave | LoRaWAN | Sigfox |
---|---|---|---|---|---|---|
Debits | 250 kbps | 2 Mbps | 433–1300 Mbps | 100 kbps | 0.3–50 kbps | 1 Mbps |
Range | 10–100 m | 10–100 m | 35 m (inside) and 300 m (outside) | 30 m (inside) and 100 m outside) | 20 km (rural area) and 8 km (urban area) | 50 km (rural area) and 10 km (urban area) |
Frequency | 2.4 GHz | 2.4 GHz | 5 GHz | 868 MHz (EU) 908 MHz (USA) | 868 MHz (EU) 915 MHz (USA) | 868 MHz (EU) 902 MHz (USA) |
Security | AES 128 bits | AES 128 bits | WEP-WPA (AES 128 bits) | AES 128 bits | AES 128 bits | Partially addressed |
Type Layer | Attack | Brief Description | Effects | References |
---|---|---|---|---|
Perception | Side-channel attack | The information is obtained from the side channels of the encryption device. | Confidentiality, Integrity | [47,48] |
Tampering devices | The IoMT device is physically accessed to modify the data (modification in a device using RFID or communication link). | Confidentiality, Integrity | [49] | |
Tag cloning | An attacker might exploit data obtained through a successful side-channel attack or replicate data from a previously used tag. The cloned tag, for example, might be used to gain access to an unlawful facility or data, such as medical data (Using simple technologies, attackers may clone RFIDs). | Confidentiality, Authorization, Integrity | [50] | |
Sensor tracking | This form of attack invades patients’ privacy. Attackers might obtain access to patients’ whereabouts or fake GPS data by using unsecured equipment. Other sensors, such as those used in fall detection, wheelchair management, and remote monitoring systems, can also be utilized to divulge sensitive data about patients. | Confidentiality, Authorization, Integrity, Privacy | [51] | |
Network | Eavesdropping | An attacker intercepts and tracks the necessary hardware and communication to capture data. Data obtained in this manner (unlawfully) can be utilized in a variety of ways. | Confidentiality, Non-repudiation, Privacy | [50] |
Replay | An attacker can use an authentication message that was previously transmitted between two legitimate users. In this situation, an attacker can intercept a signed packet and send it back to target multiple times. | Authorization | [52,53] | |
Man-in-the-middle | It’s a cyber-attack that targets two IoMT devices’ communication and gains access to their private data. The attacker can listen in on or monitor the communication between the two devices in this attack. The attacker can alter the intercepted data before they are transmitted to their intended destination. | Confidentiality, Authorization | [54] | |
Rogue access | A fake gateway is placed inside the wireless network range in this attack to give genuine users access and intercept traffic. | [55] | ||
DoS/DDoS | Unlike DoS attacks, which are carried out by a single node, a DDoS attack is carried out by several sources, flooding a specified target with messages or connection requests with the purpose of rendering the service inaccessible to legitimate users. | Availability | [56,57] | |
Sinkhole | A malicious node attracts traffic in this attack by offering a better connection quality. Once the attack is successful, other attacks (such as eavesdropping or selective forwarding) can be launched, in which the malicious node isolates specific nodes by discarding packets that pass through them. | [35] | ||
Sniffing | Data transferred between two nodes is passively intercepted by sniffing attacks. Due to the fact that the attacker can observe the data passed between the system’s layers. | Confidentiality | [58] | |
Selective Forwarding | A malicious node may simply change, drop, or selectively forward some messages to other nodes in the network. As a result, the information received by the destination is incomplete. | All | [52,59] | |
Application | Brute Force | The attackers usually use automated tools to create multiple password combinations until they succeed. The dictionary attack is an example of a serious vulnerability for IoMT devices. | Confidentiality, Integrity | [60,61] |
SQL injection | An SQL injection attack involves introducing a faulty SQL statement into the application’s backend database. A successful SQL injection attack can compromise or change sensitive patient data. | All | [58,62] | |
Account hijacking | At the network level, many IoT devices communicate in transparent text or with insecure encryption. Intercepting the packet when an end user is authenticating allows an attacker to undertake account hijacking. | Confidentiality, Integrity | [43] | |
Ransomware | Ransomware encrypts important information and demands a large fee to unlock it. In return for money, attackers can encrypt sensitive data such as health information and keep the decryption key. | Integrity, Availability | [35] |
Device Type | Implantable Medical Devices | Internet of Wearable Devices | Ambient Devices | Stationary Devices | |
---|---|---|---|---|---|
Device Location | In human tissues | On the human body | Close to the human body | Inside treatment rooms and hospitals | |
Examples of Devices | Pacemaker, deep brain implants, insulin pump | EEG and ECG, fall detection band, blood pressure monitors, smart watches, accelerating sensors, respiratory rate sensors, fitness trackers | Motion sensors, pressure sensors, vibration sensors, gyroscope sensors, daylight sensors, and pressure sensors | Imaging devices (such as, MRI, CT scanners, and X-rays) and surgical devices | |
Perception Layer Potential Attacks/Difficulty | Side channel | ✓ | ✓ | N/A | ✓ |
Tag cloning | N/A | ✓ | N/A | N/A | |
Tampering devices | N/A | ✓ | ✓ | ✓ | |
Sensor tracking | ✓ | ✓ | N/A | N/A | |
Network Layer Potential Attacks/Difficulty | Eavesdropping | ✓ | ✓ | ✓ | ✓ |
Replay | ✓ | ✓ | ✓ | ✓ | |
Man-in-the-middle | ✓ | ✓ | ✓ | ✓ | |
Rogue access | ✓ | ✓ | ✓ | N/A | |
DoS | ✓ | ✓ | ✓ | ✓ | |
Sinkhole | ✓ | ✓ | ✓ | N/A | |
Application Layer Potential Attacks/Difficulty | SQL injection | ✓ | ✓ | ✓ | ✓ |
Account hijacking | ✓ | ✓ | ✓ | ✓ | |
Ransomware | ✓ | ✓ | ✓ | ✓ | |
Brute force | ✓ | ✓ | ✓ | ✓ |
Security Model | Ref | Technologies and Techniques Used | Security Requirement | Benefits of the Proposed Scheme | Evaluation of the Proposed Scheme | Challenges in Proposed Scheme |
---|---|---|---|---|---|---|
Blockchain Model | [76] | Attribute-based encryption methods combined(ABE) with private blockchain technology; BAN logic; OPNET software | Privacy, accessibility, authorization, authentication, and integrity. | Securely share and store medical data between patients, hospitals and other stakeholders. | Efficiency in terms of computing complexity and storage. | The complexity of cryptocurrency exchange for data sharing. |
[77] | Blockchain technology, AVISPA automated tool, | Authentication, confidentiality, and privacy | Provides secure key management among different communicating entities for IoMT environment | Efficient in terms of security and functionality, reducing communication and communication costs for the authentication and key management phase. | Does not meet all security requirements | |
[78] | Blockchain technology, AVISPA automated tool, Cooja simulator | Mutual authentication | Lightweight framework for authentication and permission to complement current blockchain-based IoT networks in the healthcare sector | Minimization of transmission costs and computing overhead | Not assessed on hardware in a realistic context, making it less efficient | |
[79] | Blockchain technology, fine-grained access control | Privacy, confidentiality, and integrity | large-scale health data privacy preserving scheme based on blockchain technology | System can meet the expected security requirements and can be applied to mobile health systems | Insider attacks are neglected by the system. | |
Authentication Model | [80] | Cloud Environment (CE), FPGA, Moteiv TMote Sky-Mote | Mutual authenticity | Framework for cross-reviewing the common secret session key of communication entities and establishing mutual authenticity for TMIS system using the cloud environment (CE) | Security and performance efficiency, resistance to security threats, reduces computational cost, and good fit adaptation to the TMIS system | Intended for TMIS systems, and does not meet all security requirements |
[13] | Attribute-based encryption (ABE), HLPSL language, AVISPA automated tool | Authentication, and privacy | A secure communication for medical applications utilizing ABE for authentication in HetNet at the network layer | Better protection of health data against intruders, minimization of transmission costs and computational load | Attribute threshold requirement for authentication, use of a third-party trusted authority (if this third party is hacked, all data is subject to hostile attacks) | |
[81] | Physical unclonable functions (PUFs) | Authentication | A lightweight and robust authentication scheme based on the physical non-clonable function (PUF) for the IoMT, which does not store any data from the IoMT devices in the server memory | The proposed authentication scheme increases the robustness of the design while being lightweight for deployment in various designs and supports scalability | The system failed to verify that the client could authenticate the server’s communications | |
[82] | Biometric techniques, fisher Vector (FV), DCT | Authentication | A multimodal biometric system for person recognition using face, fingerprint, and finger vein images, in the IoMT. | Excellent recognition rate and higher security than a unimodal biometric-based system | Low system accuracy rates | |
[83] | ECDSA Algorithm, ECC cryptography, dual signature method | Privacy, confidentiality, and authentication | Include a double signature in the ECDSA algorithm to enhance security and preserve data privacy in communications between IoMT devices and the cloud via edge computing devices | Calculation requirements and complexity are minimized | Ensuring the integrity and authentication of the origin of the data collected, is linked to ensuring the anonymity of the data source from a cloud perspective | |
[84] | Huffman coding scheme | Privacy, confidentiality, and authentication | A reversible high-capacity dual-frame data hiding technique for IoMT networks based on the Huffman coding scheme | The system offers significant improvement and computational efficiency, which allowed it to be used in the IoMT network | No effective strategy to control overflow and underflow problems | |
[85] | Electrocardiogram (ECG) signal, online datasets | Privacy, confidentiality, and authentication | A practical system that reliably authenticates patients with noisy ECG signals and simultaneously provides differential privacy | Allows an efficient and effective authentication of the patient while guaranteeing the confidentiality of the model | The system was not scalable enough for the attack | |
[86] | Computational Diffie-Hellman (CDH) | Privacy, confidentiality | Suitable for cheap communication protocol and resource-constrained devices | Cost effective solution suitable for devices with limited resources | The mechanism can be costly for devices with constrained storage/memory | |
[2] | AES (Advanced Encryption Standard), ECDSA (Elliptic Curve Digital Signature Algorithm), Transport Layer Security (TLS) | Privacy, confidentiality, authentication, integrity, non-repudiation | Confidentiality, integrity of the message, audit control, effective patient authentication, data availability, access control, transparency, freshness of health data | Allows secure exchange of message maintaining all security requirements. Data freshness is ensured. HIPAA standard maintained | There may be end-to-end delay on some occasions | |
Machine learning Model | [87] | Keras and Tensor flow In Python, Deep Learning | Privacy, confidential-ity, authentication, integrity | An embedded system prototype for predicting distinct attack patterns in deep brain stimulation | Anomaly based false alarm detection; high accuracy; the ability to detect attacks in real time | High computation overhead; high False Positive Rate (FPR) |
[88] | R and Java, Languages, AUDIT module | Privacy, confidentiality, authentication, integrity | Detects inaccurate measurements in real time and distinguishes between defects or errors and health events for smart mobile healthcare | Lightweight, real time, improved accuracy and False Positive Rate (FPR) | Energy and CPU usage is not taken into account, lack of detection of attacks at the server and transmission level | |
[89] | GWO and PCA algorithms, Deep Learning classifier | Privacy, confidentiality, authentication, authorization, integrity, availability | A deep neural network (DNN) is used to develop an effective intrusion detection system (IDS) to classify and predict unexpected cyber-attacks in the IoMT environment | High accuracy (15%) and low training and classification time (32%) | Overhead in terms of memory and CPU, limited to IoMT devices with a single IP address | |
[90] | Deep Belief Network (DBN), CICIDS2017 dataset | Privacy, confidentiality, integrity, availability | A Deep Belief Network (DBN) algorithm model based on deep learning for the intrusion detection system | High accuracy, precision, F1 and recall, positive results for all variables compared to other techniques, extended to the detection of several forms of attacks | High training overhead, False Positive Rate (FPR) and performance overhead ignored | |
[91] | Waikato Environment for Knowledge Analysis (WEKA), Naive-Bayes (NB), Support Vector Machine (SVM), MultiLayer Perceptron Artificial Neural Network (MLP), Random Forest (RF) | Authentication and security | Reduce computational cost by extracting features from the ECG signal and using only the landmarks calculated directly from the signal acquisition | Accuracy of over 98.2%, and reduced complexity using less than 10 features | Accuracy reduction, high training costs, as well as uncalculated performance costs, difficult to put into practice using several sensors |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Hireche, R.; Mansouri, H.; Pathan, A.-S.K. Security and Privacy Management in Internet of Medical Things (IoMT): A Synthesis. J. Cybersecur. Priv. 2022, 2, 640-661. https://doi.org/10.3390/jcp2030033
Hireche R, Mansouri H, Pathan A-SK. Security and Privacy Management in Internet of Medical Things (IoMT): A Synthesis. Journal of Cybersecurity and Privacy. 2022; 2(3):640-661. https://doi.org/10.3390/jcp2030033
Chicago/Turabian StyleHireche, Rachida, Houssem Mansouri, and Al-Sakib Khan Pathan. 2022. "Security and Privacy Management in Internet of Medical Things (IoMT): A Synthesis" Journal of Cybersecurity and Privacy 2, no. 3: 640-661. https://doi.org/10.3390/jcp2030033
APA StyleHireche, R., Mansouri, H., & Pathan, A. -S. K. (2022). Security and Privacy Management in Internet of Medical Things (IoMT): A Synthesis. Journal of Cybersecurity and Privacy, 2(3), 640-661. https://doi.org/10.3390/jcp2030033