Abstract

The rapid development and the expansion of Internet of Things (IoT)-powered technologies have strengthened the way we live and the quality of our lives in many ways by combining Internet and communication technologies through its ubiquitous nature. As a novel technological paradigm, this IoT is being served in many application domains including healthcare, surveillance, manufacturing, industrial automation, smart homes, the military, etc. Medical Internet of Things (MIoT), or the use of IoT in healthcare, is becoming a booming trend towards improving the health and wellbeing of billions of people by offering smooth and seamless medical facilities and by enhancing the services provided by medical practitioners, nurses, pharmaceutical companies, and other related government and non-government organizations. In recent times, this MIoT has gained higher attention for its potential to alleviate the massive burden on global healthcare, which has been caused by the rise of chronic diseases, the aging population, and emergency situations such as the recent COVID-19 global pandemic, where many government and non-government medical resources were challenged, owing to the rising demand for medical resources. It is evident that with this recent growing demand for MIoT, the associated technologies and its interconnected, heterogeneous nature adds new concerns as it becomes accessible to confidential patient data, often without patient or the medical staff consciousness, as the security and privacy of MIoT devices and technologies are often overlooked and undermined by relevant stakeholders. Hence, the growing security breaches that target the MIoT in healthcare are making the security and privacy of Medical IoT a crucial topic that is worth scrutinizing. In this study, we examined the current state of security and privacy of the MIoT, which has become of utmost concern among many security experts and researchers due to its rapid demand in recent times. Nevertheless, pertaining to the current state of security and privacy, we also examine and discuss a number of attack use cases, countermeasures and solutions, recent challenges, and anticipated future directions where further attention is required through this study.

Highlights

  • This article is an open access articleTechnology integration is becoming an integral part of our daily life as a result of the technological advancement of various technologies [1]

  • There is no question that a greater guarantee for the health and wellbeing of individuals is offered by the use of Medical Internet of Things (MIoT) in healthcare, where it puts a lot of strain on the security and privacy aspects of an MIoT-powered healthcare environment, with the lives of patients being endangered [45,46,47] if no countermeasures are taken

  • In this second section, we mainly discuss the architecture of the MIoT and the devices employed in each layer in the architecture

Read more

Summary

Introduction

Technology integration is becoming an integral part of our daily life as a result of the technological advancement of various technologies [1]. On the other itself or these in theintegrated cloud, where wireless medium is used to transfer the collected health hand, IoT atechnologies introduce various vulnerabilities, owing to the information to the IoT relevant whichintruders helps them make and decisions aboutto the rapidly evolving threatstakeholders, landscape, where canto exploit gain access the MIoT network to further exploit the entire medical network/environment This leads to situations where the security and privacy of the devices and patients are at risk. Recent trends indicate that with the ever-increasing cyber-attacks that target healthcare, the healthcare IoT security market is expected to undergo rapid growth by the year 2025, with a total revenue of USD 100 billion, which vulnerabilities and may encourage attackers to further exploiting MIoT technologies, endangering the lives of patients in most cases [5,8,10,12]. As a [40,41,42,43,44,45], which further motivated us towards compiling this study

Motivation of Study
Research Problems and Contribution
Outline of Study
The Architecture of MIoT
Classification of Devices Based on the Architecture
Devices Employed in the Perception Layer
Devices Employed in the Network Layer
Devices Employed in the Application Layer
Security and Privacy Requirement of MIoT
Attack Classification Based on the Architecture
Attacks on Perception Layer
Attacks on Network Layer
Attacks on Application Layer
Related Work and Contributions
Countermeasures and Solutions
Challenges and Future Directions
Related Work
Findings
Conclusions
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.