Security and privacy challenges, issues, and enhancing techniques for Internet of Medical Things: A systematic review

被引:2
作者
Wani, Rizwan Uz Zaman [1 ]
Thabit, Fursan [2 ,3 ]
Can, Ozgu [3 ]
机构
[1] Ege Univ, Grad Sch Nat & Appl Sci, Dept Comp Engn, Bornova, Izmir, Turkiye
[2] Sanaa Univ, Fac Comp & Informat Technol, Sanaa, Yemen
[3] Ege Univ, Fac Engn, Dept Comp Engn, Bornova, Izmir, Turkiye
关键词
attacks; cryptography; federated learning; homomorphic encryption; Internet of Medical Things (IoMT); machine learning; privacy; security; BIG DATA; HEALTH; FRAMEWORK; ATTACKS; IOT; VULNERABILITIES; RECORDS;
D O I
10.1002/spy2.409
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is a rapidly expanding network of interconnected things that use embedded sensors to gather and share data in real-time. IoT technologies have given rise to many networking applications in our everyday life such as smart homes, smart cities, smart transport, and so forth. Smart healthcare is one such application that has been revolutionized by the IoT, introducing a new branch of IoT known as the Internet of Medical Things (IoMT). IoMT encompasses an entire ecosystem consisting of smart wearable, implantable sensing equipment's or devices, transmitters that are critical for monitoring the patients remotely and continuing the real-time and has opened the door to new innovative smart healthcare approaches while improving patient care outcomes. IoMT wearable and embedded sensing devices are commonly utilized in smart healthcare to capture medical data and transmit the medical data in a communication network stored in the cloud. The large volume of data generated and transmitted by these IoMT devices is rising at an exponential rate, resulting in an increase in security and privacy vulnerabilities of healthcare data. To ensure the Confidentiality and integrity of the IoMT devices and the sensitive medical data, there should be proper security and privacy measures such as access control, passwords, multifactor authentication, and encryption of data generated, transmitted, or processed in the IoMT framework. In this paper, we identified the internet of things and its applications in smart healthcare systems. Additionally, the paper focuses on the architecture of IoMT, and several challenges, including the IoMT security and privacy requirements, and attack taxonomy. Furthermore, the paper thoroughly investigates both cryptographic and non-cryptographic based security and privacy-enhancing techniques for IoMT or healthcare systems with particular emphasis on advancements in key areas such as Homomorphic Encryption, Differential Privacy, and Federated Learning.
引用
收藏
页数:43
相关论文
共 134 条
[21]  
Dadkhah S., 2024, J COMPUT COMMUN, DOI [10.20944/preprints202402.0898.v1, DOI 10.20944/PREPRINTS202402.0898.V1]
[22]   Intelligent Healthcare: Integration of Emerging Technologies and Internet of Things for Humanity [J].
Dang, Van Anh ;
Khanh, Quy Vu ;
Nguyen, Van-Hau ;
Nguyen, Tien ;
Nguyen, Dinh C. C. .
SENSORS, 2023, 23 (09)
[23]   A risk-based framework for biomedical data sharing [J].
Dankar, Fida K. ;
Badji, Radja .
JOURNAL OF BIOMEDICAL INFORMATICS, 2017, 66 :231-240
[24]  
Dharmik RC., 2021, J PHYS C SER, V1913, DOI [DOI 10.1088/1742-6596/1913/1/012145, 10.1088/1742-6596/1913/1/012145]
[25]  
Dimitrov DV, 2016, HEALTHC INFORM RES, V22, P156
[26]  
Dohr A., 2010, Proceedings of the Seventh International Conference on Information Technology: New Generations (ITNG 2010), P804, DOI 10.1109/ITNG.2010.104
[27]  
Dridi A., 2018, SEMANTIC MEDICAL INT, DOI [10.1109/AICCSA.2017.194, DOI 10.1109/AICCSA.2017.194]
[28]   Federated Learning for Vehicular Internet of Things: Recent Advances and Open Issues [J].
Du, Zhaoyang ;
Wu, Celimuge ;
Yoshinaga, Tsutomu ;
Yau, Kok-Lim Alvin ;
Ji, Yusheng ;
Li, Jie .
IEEE OPEN JOURNAL OF THE COMPUTER SOCIETY, 2020, 1 (01) :45-61
[29]  
Dwivedi Ruby, 2022, J Oral Biol Craniofac Res, V12, P302, DOI 10.1016/j.jobcr.2021.11.010
[30]   The Algorithmic Foundations of Differential Privacy [J].
Dwork, Cynthia ;
Roth, Aaron .
FOUNDATIONS AND TRENDS IN THEORETICAL COMPUTER SCIENCE, 2013, 9 (3-4) :211-406