Security and privacy of internet of medical things (IoMT) based Healthcare applications: A review

Manjula Nanayakkara, Malka Halgamuge, Ali Syed

Research output: Book chapter/Published conference paperConference paperpeer-review

Abstract

Recent technological advancements have significantly transformed an individual's perception of the traditionalway of carrying out day to day operations. Internet of Things has to be turned out to be a growing trend in various segmentsin the present world, including the healthcare context. However, this rapid revolution towards IoT has also created severaluncertainties and questions over the security of data which is stored in various connected things. With the number of thingssuch as sensors and devices is growing, preserving robust security and privacy of sensitive data becomes more challenging.These security and privacy issues are resulted from deteriorating the effectiveness of Internet of Things (IoT) basedhealthcare services and adversely impact on individual's sensitive health information. Since data in the healthcare field iscritical and sensitive; security and privacy safeguarding of the IoT healthcare paradigm makes matters even moreproblematic. In order to gain a widespread idea about the risks and threats related to IoT healthcare application, this studyreviews a variety of relevant previous publications. The primary goal of this article is to provide insights into multiplesensors devices used in IoT healthcare context and the potential security and privacy issues in different IoT layers. Data arecollected from 30 peer-reviewed publications on IoT based healthcare applications published between 2016 and 2018. Wehave considered numerous threats, attacks, and risks that can affect different layers in IoT based healthcare applications suchas (Perception Layer, Network Layer, Middleware, Application Layer, and Business Layer). We have also considereddifferent types of sensor devices which are used in IoT based healthcare applications. For the analysis, we categorize thesensor devices as wearable, implantable, ambient and stationery. Further, we analyze the proposed solutions stated inprevious articles to obtain out the most recommended solutions that can mitigate threats and risks in IoT based healthcareapplication context. Our results show that the network layer is the most vulnerable layer to numerous security and privacythreats and attacks. And the applications layer is the second most vulnerable layer, and wearable sensors were utilized in themajority of IoT based healthcare applications. In addition, China and the USA have the most significant focus on securityand privacy of IoMT based healthcare applications. This study intends to enhance awareness among application designers,developers and users such as healthcare professionals and patients by allowing them to identify and quantify potential IoThealthcare application-related threats and risks.
Original languageEnglish
Title of host publicationInternational Conference on Advances in Business Management and Information Technology
Pages1-18
Number of pages18
Publication statusPublished - 2019
EventInternational Conference on Advances in Business Management and Information Technology - Istanbul, Turkey
Duration: 06 Nov 201907 Nov 2019

Conference

ConferenceInternational Conference on Advances in Business Management and Information Technology
Country/TerritoryTurkey
CityIstanbul
Period06/11/1907/11/19

Fingerprint

Dive into the research topics of 'Security and privacy of internet of medical things (IoMT) based Healthcare applications: A review'. Together they form a unique fingerprint.

Cite this