4.3 Article

A Survey on Security Threats and Countermeasures in Internet of Medical Things (IoMT)

Publisher

WILEY
DOI: 10.1002/ett.4049

Keywords

-

Ask authors/readers for more resources

Internet of medical things (IoMT) is an emerging technology that aims to improve patient's quality of life through personalized e-health services. However, the devices used in IoMT are vulnerable to security threats, posing risks to patient's privacy and safety. It is crucial to develop novel security mechanisms to protect the IoMT edge network against threats.
Internet of medical things (IoMT) is an emerging technology aiming to improve the patient's quality of life by enabling personalized e-health services without limitations on time and location. Nevertheless, IoMT devices (eg, medical sensors) that constitute the key underlying elements of the IoMT edge network are vulnerable to various types of security threats and thus, they pose a significant risk to patient's privacy and safety. Based on that and the fact that the security is a critical factor for the successful integration of IoMT technology into pervasive healthcare systems, there is an urgent need for novel security mechanisms to preserve the security of the IoMT edge network. Toward this direction, the first step is the comprehensive understanding of existing and potential threats to the IoMT edge network environment. Thus, in this article, we provide a categorization of security threats to the edge network environment based on the major security objectives that they target. Moreover, we present a categorization of security countermeasures, derived from the literature, against threats to IoMT edge networks. The authors' intent is to provide a foundation for organizing research efforts toward the development of proper security countermeasures for protecting IoMT edge networks against internal and external threats.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.3
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available