Securing internet of medical things systems: Limitations, issues and recommendations
المؤلف | Jean-Paul A., Yaacoub |
المؤلف | Noura, Mohamad |
المؤلف | Noura, Hassan N. |
المؤلف | Salman, Ola |
المؤلف | Yaacoub, Elias |
المؤلف | Couturier, Raphaël |
المؤلف | Chehab, Ali |
تاريخ الإتاحة | 2024-10-09T07:48:48Z |
تاريخ النشر | 2019-12-24 |
اسم المنشور | Future Generation Computer Systems |
المعرّف | http://dx.doi.org/10.1016/j.future.2019.12.028 |
الاقتباس | Yaacoub, J. P. A., Noura, M., Noura, H. N., Salman, O., Yaacoub, E., Couturier, R., & Chehab, A. (2020). Securing internet of medical things systems: Limitations, issues and recommendations. Future Generation Computer Systems, 105, 581-606. |
الرقم المعياري الدولي للكتاب | 0167-739X |
الملخص | Traditional health-care systems suffer from new challenges associated with the constant increase in the number of patients. In order to address this issue, and to increase the accuracy, reliability, efficiency, and effectiveness of the health-care domain, the Internet of Medical Things (IoMT) was proposed. IoMT can be considered as an enhancement and investment to respond more effectively and efficiently to patients’ needs. However, IoMT suffers from different issues and challenges such as the lack of security and privacy measures, in addition to the necessary training and awareness. In this paper, we highlight the importance of implementing the right security measures and the required training skills, in order to enhance the immunity of IoMT against cyber-attacks. Moreover, we review the main IoMT security and privacy issues, and the existing security solutions. These solutions are classified as cryptographic or non-cryptographic. Then, the different solutions are analyzed and compared in terms of computational complexity and required resources. It is important to note that the security measures for IoMT exhibit a trade-off between the security level and the system performance, especially in the rise of digital healthcare v4.0 era. Next, we discuss the appropriate security solutions such as lightweight cryptographic algorithms, and protocols that attempt to reduce the overhead in terms of computations and resources. This leads to the conclusion that there is a need to design an efficient intrusion detection/prevention system that cooperates with dynamic shadow honeypots. Finally, we propose a security solution, which is divided into five different layers to detect and prevent attacks, in addition to reducing/correcting the damage of these known attacks and preserving the patients’ privacy. However, it should be noted that zero-day attacks and exploits are still the main challenging issue that surrounds IoMT. |
راعي المشروع | This work was made possible by NPRP Grant no. 10-1205-160012 from the Qatar National Research Fund , a member of the Qatar Foundation. |
اللغة | en |
الناشر | Elsevier |
الموضوع | Healthcare IoMT Medical cyber physical systems Medical devices |
النوع | Article |
الصفحات | 581-606 |
رقم المجلد | 105 |
تحقق من خيارات الوصول
الملفات في هذه التسجيلة
هذه التسجيلة تظهر في المجموعات التالية
-
علوم وهندسة الحاسب [2402 items ]