Abstract

The Internet of Medical Things (IoMT) couples IoT technologies with healthcare services in order to support real-time, remote patient monitoring and treatment. However, the interconnectivity of critical medical devices with other systems in various network layers creates new opportunities for remote adversaries. Since most of the communication protocols have not been specifically designed for the needs of connected medical devices, there is a need to classify the available IoT communication technologies in terms of security. In this paper we classify IoT communication protocols, with respect to their application in IoMT. Then we describe the main characteristics of IoT communication protocols used at the perception, network and application layer of medical devices. We examine the inherent security characteristics and limitations of IoMT-specific communication protocols. Based on realistic attacks we identify available mitigation controls that may be applied to secure IoMT communications, as well as existing research and implementation gaps.

Highlights

  • The term Internet of Things (IoT) refers to a wide range of interconnected objects and devices that harvest information from the environment through sensors, analyze it and act back on the physical world through actuators [1]

  • We briefly describe the prominent security controls that were taken into consideration during the design and development phase of the most common protocols used in Internet of Medical Things (IoMT)

  • The rapid adoption of IoT in the medical sector suggests that the integration of WSN and sensor networks in medical services will continue to increase both in complexity and size

Read more

Summary

Introduction

The term Internet of Things (IoT) refers to a wide range of interconnected objects and devices that harvest information from the environment through sensors, analyze it and act back on the physical world through actuators [1]. Smart hospitals integrate IoMT to “provide optimised and the automated processes built on an Information and Communication Technologies (ICT) environment of interconnected assets, based on IoT, to improve existing patient care procedures and introduce new capabilities” [4]. Sensors 2020, 20, 4828 the available IoT communication technologies in terms of security, in the context of medical devices. To perform this evaluation we use a classification based on the three layers of the IoT communication protocols [5], the perception, network and application layers as described below. It corresponds to the session and application layer in the OSI model This layer provides application and data control services. The multitude of medical assets used throughout the healthcare ecosystem calls for the integration of different technologies to be used under the same IoMT ecosystem

Research Motivation
Contribution—Paper Structure
Research Methodology
Classification of IoT Protocols Used in Medical Devices
Medical-Specific IoT Communication Protocols
Perception Layer
Network Layer
Application Layer
IoMT Communication Protocols in Medical Devices
Physiologic Monitoring Devices
Medical Treatment Devices
In-Hospital Connected Medical Devices
Ambient Devices
Other ICT Devices
Monitoring and Handling
Coordinators
Security in IoMT Communication Protocols
IoMT Protocol Embedded Security Features
Perception Layer Security Issues
Network Layer Security Issues
Application Layer Security Issues
IoMT Protocols Security Weaknesses and Attacks
Perception Layer Weaknesses and Attacks
Network Layer Weaknesses and Attacks
Application Layer Weaknesses and Attacks
Proposed Mitigations to Common Protocol Weaknesses
Perception Layer Mitigations
Network Layer Mitigations
Application Layer Mitigations
Secure IoMT Communications
IoMT Current Threat Landscape
Network Protocol Comparison in IoMT Use Cases
Short-Range Low-Power Protocols
Long-Range Low-Power Protocols
Use-Case 1
Use-Case 2
Use-Case 3
Challenges and Open Issues
Organisational Challenges
Data Privacy and Technical Issues
Conclusions
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.