Security Considerations in the Internet of Medical Things: COVID-19 IoMT Gadgets

Authors

  • Charaf Eddine AIT ZAOUIAT 1Information Science and Modeling Research Team, Polydisciplinary Faculty of Sidi Bennour, Chouaîb Doukkali University, Morocco
  • Mohamed BASLAM Laboratoire Traitement de l'Information et Aide à la Décision, Sultan Moulay Slimane University, Beni Mellal, Morocco
  • Mohamed EDDABBAH LABTIC. ENSA Tangier Abdelmalek Essaadi University, Tetouan, Morocco
  • Mohamed ABDELBAKI Information Science and Modeling Research Team, National School of Applied Sciences, Cadi Ayyad University, Marrakech, Morocco
  • Mohamed EL GHAZOUANI Information Science and Modeling Research Team, Polydisciplinary Faculty of Sidi Bennour, Chouaîb Doukkali University, Morocco
  • Layla AZIZ Information Science and Modeling Research Team, Polydisciplinary Faculty of Sidi Bennour, Chouaîb Doukkali University, Morocco

Keywords:

IoMT, Vulnerabilities, Security, Covid-19, Countermeasures

Abstract

The COVID-19 pandemic has underscored the significance of the Internet of Medical Things (IoMT) in healthcare. During this crisis, IoMT devices played a crucial role in remotely monitoring patients, tracking virus transmission, and supporting healthcare professionals. However, the increased adoption of IoMT devices has also raised concerns regarding security and privacy vulnerabilities. This paper presents a comprehensive analysis of the vulnerabilities found in IoMT devices designed and rapidly deployed during the pandemic, such as remote patient monitoring devices and telemedicine platforms. The study identifies common hardware, software, and communication vulnerabilities that pose potential threats to patient safety and the integrity and confidentiality of healthcare data. Furthermore, the paper examines proposed security mechanisms, including blockchain-based frameworks and lightweight authentication schemes, all of which aim to address these challenges. By raising awareness of these vulnerabilities and risks, this research aims to encourage the development of more secure and resilient IoMT devices in the future.

Downloads

Download data is not yet available.

References

J. Jeyavel, T. Parameswaran, J. M. Mannan, and U. Hariharan, “Security Vulnerabilities and Intelligent Solutions for IoMT Systems,” in Internet of Medical Things: Remote Healthcare Systems and Applications, D. J. Hemanth, J. Anitha, and G. A. Tsihrintzis, Eds., in Internet of Things. Cham: Springer International Publishing, 2021, pp. 175–194. doi: 10.1007/978-3-030-63937-2_10.

P. K. Sadhu, V. P. Yanambaka, A. Abdelgawad, and K. Yelamarthi, “Prospect of Internet of Medical Things: A Review on Security Requirements and Solutions,” Sensors (Basel), vol. 22, no. 15, p. 5517, Jul. 2022, doi: 10.3390/s22155517.

N. Dilawar, M. Rizwan, F. Ahmad, and S. Akram, “Blockchain: Securing Internet of Medical Things (IoMT),” ijacsa, vol. 10, no. 1, 2019, doi: 10.14569/IJACSA.2019.0100110.

H. Amintoosi, M. Nikooghadam, M. Shojafar, S. Kumari, and M. Alazab, “Slight: A lightweight authentication scheme for smart healthcare services,” Computers and Electrical Engineering, vol. 99, p. 107803, Apr. 2022, doi: 10.1016/j.compeleceng.2022.107803.

C. E. Aitzaouiat, A. Latif, A. Benslimane, and H.-H. Chin, “Machine Learning Based Prediction and Modeling in Healthcare Secured Internet of Things,” Mobile Netw Appl, vol. 27, no. 1, pp. 84–95, Feb. 2022, doi: 10.1007/s11036-020-01711-3.

S. A. Ajagbe, J. B. Awotunde, A. O. Adesina, P. Achimugu, and T. A. Kumar, “Internet of Medical Things (IoMT): Applications, Challenges, and Prospects in a Data-Driven Technology,” in Intelligent Healthcare: Infrastructure, Algorithms and Management, C. Chakraborty and M. R. Khosravi, Eds., Singapore: Springer Nature, 2022, pp. 299–319. doi: 10.1007/978-981-16-8150-9_14.

O. AlShorman, B. AlShorman, M. Al-khassaweneh, and F. Alkahtani, “A review of internet of medical things (IoMT) - based remote health monitoring through wearable sensors: a case study for diabetic patients,” IJEECS, vol. 20, no. 1, p. 414, Oct. 2020, doi: 10.11591/ijeecs.v20.i1.pp414-422.

Q. Chen, Y. Zhao, and Y. Liu, “Current development in wearable glucose meters,” Chinese Chemical Letters, vol. 32, no. 12, pp. 3705–3717, Dec. 2021, doi: 10.1016/j.cclet.2021.05.043.

R. Hireche, H. Mansouri, and A.-S. K. Pathan, “Security and Privacy Management in Internet of Medical Things (IoMT): A Synthesis,” Journal of Cybersecurity and Privacy, vol. 2, no. 3, Art. no. 3, Sep. 2022, doi: 10.3390/jcp2030033.

O. AlShorman, B. Alshorman, M. Masadeh, F. Alkahtani, and B. Al-Absi, “A review of remote health monitoring based on internet of things,” IJEECS, vol. 22, no. 1, p. 297, Apr. 2021, doi: 10.11591/ijeecs.v22.i1.pp297-306.

P. M. Chanal and M. S. Kakkasageri, “Security and Privacy in IoT: A Survey,” Wireless Pers Commun, vol. 115, no. 2, pp. 1667–1693, Nov. 2020, doi: 10.1007/s11277-020-07649-9.

S. Bowman, “Impact of Electronic Health Record Systems on Information Integrity: Quality and Safety Implications,” Perspect Health Inf Manag, vol. 10, no. Fall, p. 1c, Oct. 2013.

Djenna and D. Eddine Saidouni, “Cyber Attacks Classification in IoT-Based-Healthcare Infrastructure,” in 2018 2nd Cyber Security in Networking Conference (CSNet), Paris: IEEE, Oct. 2018, pp. 1–4. doi: 10.1109/CSNET.2018.8602974.

S. Weyer, M. Schmitt, M. Ohmer, and D. Gorecky, “Towards Industry 4.0 - Standardization as the crucial challenge for highly modular, multi-vendor production systems,” IFAC-PapersOnLine, vol. 48, no. 3, pp. 579–584, Jan. 2015, doi: 10.1016/j.ifacol.2015.06.143.

T. S. Messerges, E. A. Dabbish, and R. H. Sloan, “Examining smart-card security under the threat of power analysis attacks,” IEEE Transactions on Computers, vol. 51, no. 5, pp. 541–552, May 2002, doi: 10.1109/TC.2002.1004593.

H. Mohd Aman, W. H. Hassan, S. Sameen, Z. S. Attarbashi, M. Alizadeh, and L. A. Latiff, “IoMT amid COVID-19 pandemic: Application, architecture, technology, and security,” Journal of Network and Computer Applications, vol. 174, p. 102886, Jan. 2021, doi: 10.1016/j.jnca.2020.102886.

B. Šehović and K. Govender, “Addressing COVID-19 vulnerabilities: How do we achieve global health security in an inequitable world,” Global Public Health, vol. 16, no. 8–9, pp. 1198–1208, Sep. 2021, doi: 10.1080/17441692.2021.1916056.

Downloads

Published

2023-10-19

How to Cite

[1]
C. E. AIT ZAOUIAT, M. . . BASLAM, M. . EDDABBAH, M. . ABDELBAKI, M. . EL GHAZOUANI, and L. . AZIZ, “Security Considerations in the Internet of Medical Things: COVID-19 IoMT Gadgets”, IJCEDS, vol. 3, no. 2, pp. 26–32, Oct. 2023.