Cargando…
Prospect of Internet of Medical Things: A Review on Security Requirements and Solutions
With the widespread and increasing use of Internet-of-Things (IoT) devices in all aspects of daily life, a hopeful future for people, data, and processes is emerging. Extensive spans allow for an integrated life cycle to be created from home to enterprise. The Internet of Medical Things (IoMT) forms...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9371024/ https://www.ncbi.nlm.nih.gov/pubmed/35898021 http://dx.doi.org/10.3390/s22155517 |
_version_ | 1784767004753788928 |
---|---|
author | Sadhu, Pintu Kumar Yanambaka, Venkata P. Abdelgawad, Ahmed Yelamarthi, Kumar |
author_facet | Sadhu, Pintu Kumar Yanambaka, Venkata P. Abdelgawad, Ahmed Yelamarthi, Kumar |
author_sort | Sadhu, Pintu Kumar |
collection | PubMed |
description | With the widespread and increasing use of Internet-of-Things (IoT) devices in all aspects of daily life, a hopeful future for people, data, and processes is emerging. Extensive spans allow for an integrated life cycle to be created from home to enterprise. The Internet of Medical Things (IoMT) forms a flourishing surface that incorporates the sensitive information of human life being sent to doctors or hospitals. These open an enormous space for hackers to utilize flaws of the IoMT network to make a profit. This creates a demand for standardizing regulations and a secure system. Though many authorities are making standards, there are some lacking in the system which makes the product vulnerable. Although many established mechanisms are present for the IoT network, there are a number of obstacles preventing its general implementation in the IoMT network. One of the adoption challenges is the IoMT devices itself, because many IoMT networks consist of battery-powered devices with constrained processing capability. A general overview of the different security integrations with IoT applications has been presented in several papers. Therefore, this paper aims to provide an overview of the IoMT ecosystem, regulations, challenges of standards, security mechanisms using cryptographic solutions, physical unclonable functions (PUF)-based solutions, blockchain, and named data networking (NDN) as well, with pros and cons. |
format | Online Article Text |
id | pubmed-9371024 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-93710242022-08-12 Prospect of Internet of Medical Things: A Review on Security Requirements and Solutions Sadhu, Pintu Kumar Yanambaka, Venkata P. Abdelgawad, Ahmed Yelamarthi, Kumar Sensors (Basel) Review With the widespread and increasing use of Internet-of-Things (IoT) devices in all aspects of daily life, a hopeful future for people, data, and processes is emerging. Extensive spans allow for an integrated life cycle to be created from home to enterprise. The Internet of Medical Things (IoMT) forms a flourishing surface that incorporates the sensitive information of human life being sent to doctors or hospitals. These open an enormous space for hackers to utilize flaws of the IoMT network to make a profit. This creates a demand for standardizing regulations and a secure system. Though many authorities are making standards, there are some lacking in the system which makes the product vulnerable. Although many established mechanisms are present for the IoT network, there are a number of obstacles preventing its general implementation in the IoMT network. One of the adoption challenges is the IoMT devices itself, because many IoMT networks consist of battery-powered devices with constrained processing capability. A general overview of the different security integrations with IoT applications has been presented in several papers. Therefore, this paper aims to provide an overview of the IoMT ecosystem, regulations, challenges of standards, security mechanisms using cryptographic solutions, physical unclonable functions (PUF)-based solutions, blockchain, and named data networking (NDN) as well, with pros and cons. MDPI 2022-07-24 /pmc/articles/PMC9371024/ /pubmed/35898021 http://dx.doi.org/10.3390/s22155517 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Review Sadhu, Pintu Kumar Yanambaka, Venkata P. Abdelgawad, Ahmed Yelamarthi, Kumar Prospect of Internet of Medical Things: A Review on Security Requirements and Solutions |
title | Prospect of Internet of Medical Things: A Review on Security Requirements and Solutions |
title_full | Prospect of Internet of Medical Things: A Review on Security Requirements and Solutions |
title_fullStr | Prospect of Internet of Medical Things: A Review on Security Requirements and Solutions |
title_full_unstemmed | Prospect of Internet of Medical Things: A Review on Security Requirements and Solutions |
title_short | Prospect of Internet of Medical Things: A Review on Security Requirements and Solutions |
title_sort | prospect of internet of medical things: a review on security requirements and solutions |
topic | Review |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9371024/ https://www.ncbi.nlm.nih.gov/pubmed/35898021 http://dx.doi.org/10.3390/s22155517 |
work_keys_str_mv | AT sadhupintukumar prospectofinternetofmedicalthingsareviewonsecurityrequirementsandsolutions AT yanambakavenkatap prospectofinternetofmedicalthingsareviewonsecurityrequirementsandsolutions AT abdelgawadahmed prospectofinternetofmedicalthingsareviewonsecurityrequirementsandsolutions AT yelamarthikumar prospectofinternetofmedicalthingsareviewonsecurityrequirementsandsolutions |