Abstract
The rapid development and the expansion of Internet of Things (IoT)-powered technologies have strengthened the way we live and the quality of our lives in many ways by combining Internet and communication technologies through its ubiquitous nature. As a novel technological paradigm, this IoT is being served in many application domains including healthcare, surveillance, manufacturing, industrial automation, smart homes, the military, etc. Medical Internet of Things (MIoT), or the use of IoT in healthcare, is becoming a booming trend towards improving the health and wellbeing of billions of people by offering smooth and seamless medical facilities and by enhancing the services provided by medical practitioners, nurses, pharmaceutical companies, and other related government and non-government organizations. In recent times, this MIoT has gained higher attention for its potential to alleviate the massive burden on global healthcare, which has been caused by the rise of chronic diseases, the aging population, and emergency situations such as the recent COVID-19 global pandemic, where many government and non-government medical resources were challenged, owing to the rising demand for medical resources. It is evident that with this recent growing demand for MIoT, the associated technologies and its interconnected, heterogeneous nature adds new concerns as it becomes accessible to confidential patient data, often without patient or the medical staff consciousness, as the security and privacy of MIoT devices and technologies are often overlooked and undermined by relevant stakeholders. Hence, the growing security breaches that target the MIoT in healthcare are making the security and privacy of Medical IoT a crucial topic that is worth scrutinizing. In this study, we examined the current state of security and privacy of the MIoT, which has become of utmost concern among many security experts and researchers due to its rapid demand in recent times. Nevertheless, pertaining to the current state of security and privacy, we also examine and discuss a number of attack use cases, countermeasures and solutions, recent challenges, and anticipated future directions where further attention is required through this study.
Highlights
This article is an open access articleTechnology integration is becoming an integral part of our daily life as a result of the technological advancement of various technologies [1]
There is no question that a greater guarantee for the health and wellbeing of individuals is offered by the use of Medical Internet of Things (MIoT) in healthcare, where it puts a lot of strain on the security and privacy aspects of an MIoT-powered healthcare environment, with the lives of patients being endangered [45,46,47] if no countermeasures are taken
In this second section, we mainly discuss the architecture of the MIoT and the devices employed in each layer in the architecture
Summary
Technology integration is becoming an integral part of our daily life as a result of the technological advancement of various technologies [1]. On the other itself or these in theintegrated cloud, where wireless medium is used to transfer the collected health hand, IoT atechnologies introduce various vulnerabilities, owing to the information to the IoT relevant whichintruders helps them make and decisions aboutto the rapidly evolving threatstakeholders, landscape, where canto exploit gain access the MIoT network to further exploit the entire medical network/environment This leads to situations where the security and privacy of the devices and patients are at risk. Recent trends indicate that with the ever-increasing cyber-attacks that target healthcare, the healthcare IoT security market is expected to undergo rapid growth by the year 2025, with a total revenue of USD 100 billion, which vulnerabilities and may encourage attackers to further exploiting MIoT technologies, endangering the lives of patients in most cases [5,8,10,12]. As a [40,41,42,43,44,45], which further motivated us towards compiling this study
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.