Abstract

The advancement in Information and Communications Technology (ICT) has changed the entire paradigm of computing. Because of such advancement, we have new types of computing and communication environments, for example, Internet of Things (IoT) that is a collection of smart IoT devices. The Internet of Medical Things (IoMT) is a specific type of IoT communication environment, which deals with communication through the smart healthcare (medical) devices. Though the IoT communication environment facilitates and supports our day-to-day activities, at the same time it also has certain drawbacks, as it suffers from several security and privacy issues, such as replay, man-in-the-middle, impersonation, privileged-insider, remote hijacking, password guessing, and denial of service (DoS) attacks. These attacks lead to attacks on confidentiality, integrity, authenticity, and availability of the data and other resources of the system. In the presence of such attacks, the sensitive data of IoT communication may be disclosed, altered, or even may not be available to the authorized users. Therefore, it becomes essential to protect the IoT/IoMT environment from such types of attacks. In this chapter, we first study various types of attacks and their symptoms. We also discuss some architectures of the IoT environment, along with their applications. Next, taxonomy of security protocols and blockchain in the IoT environment are explored. We conduct a comparative study on various existing schemes for the attacks and prevention in the IoT environment. Finally, some future research challenges and directions of malware detection in IoT/IoMT environment are highlighted.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call