Abstract

Over the past decades, healthcare has seen a rapid transition from a traditional specialist approach to a patient-centered approach, especially in the healthcare system, i.e., smart healthcare. This rapid transformation is driven by advances in many technologies. Among these technologies, the Internet of medical things (IoMT) plays an imperative function in developing an intelligent medical system regarding the productivity of electronic devices besides accuracy and reliability. With the rapid development of the IoT, IoMT has a huge influence on the way we live our daily lives. Instead of going to medical centers, a patient’s clinical data are remotely recognized and summoned into a synchronous data system, which are then transferred to the right people for future use, such as the cloud. IoMT is a rapidly evolving data-intensive field, which means we need to protect and secure large amounts of sensitive information without interference. Malicious hackers exploiting weaknesses in these IoMT devices can not only potentially infiltrate hospital networks, but also acquire exposure to private medical data. Assaults against these connected devices can also cause significant physical damage and possibly death to the patient. The lack of proper privacy and security in IoMT would not only put patient privacy at risk, but could also put the patient’s life at risk. We present a categorization of IoMT security and privacy risks in this chapter. We have taken into consideration many threats, assaults, and risks that could affect specific layers of IoMT.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.