IoMT Survey: Device, Architecture, Communication Protocols, Application and Security

PDF (664KB), PP.68-80

Views: 0 Downloads: 0

Author(s)

Dina Riyadh Ibrahim 1,* Mohammed Younis Thanoun 2

1. Electronics and communications engineering/electronics, University of Mosul, Iraq

2. Electrical engineering/ electronic and communication from the University of Mosul, Iraq

* Corresponding author.

DOI: https://doi.org/10.5815/ijwmt.2024.06.05

Received: 12 Jul. 2024 / Revised: 15 Aug. 2024 / Accepted: 24 Oct. 2024 / Published: 8 Dec. 2024

Index Terms

IoMT, wearable and implantable devices, Eavesdropping, Traffic analysis, Wi-fi, HECC, DES

Abstract

The technology-based lifestyle has led to a rise in people suffering from obesity, which in turn has led to the emergence of many chronic diseases such as elevated blood sugar and blood pressure, this give researchers a good reasons to develop Internet of Things networks, as the entry of technical innovations has led to Artificial intelligence in the medical field has revolutionized the provision of medical services and facilitated the lives of patients, from monitoring blood sugar levels to using remote surgery techniques, as it has saved a lot of effort and money for both the doctor and the patient at the same time, but these advantages open a wide scope for many problems as well. This survey studied the medical Internet of Things network in terms of presenting the definition, structure, types of devices used, their applications, and some of the communication protocols used in it. The attacks that the medical Internet of Things network may be exposed to were also classified based on the concerns they cause, and the solutions proposed by the researchers were presented. On the other hand, the previous works of the researchers were classified according to the types of devices used, communication protocols, and network security. In each of the mentioned parts, what the researchers have done and their contributions in this field were discussed, analyzed, and a review of the proposed future works in the used literature was presented.

Cite This Paper

Dina Riyadh Ibrahim, Mohammed Younis Thanoun, "IoMT Survey: Device, Architecture, Communication Protocols, Application and Security", International Journal of Wireless and Microwave Technologies(IJWMT), Vol.14, No.6, pp. 68-80, 2024. DOI:10.5815/ijwmt.2024.06.05

Reference

[1]F. Kamalov, B. Pourghebleh, M. Gheisari, Y. Liu, and S. Moussa, “Internet of Medical Things Privacy and Security: Challenges, Solutions, and Future Trends from a New Perspective,” Feb. 01, 2023, MDPI. doi: 10.3390/su15043317.
[2]D. Koutras, G. Stergiopoulos, T. Dasaklis, P. Kotzanikolaou, D. Glynos, and C. Douligeris, “Security in iomt communications: A survey,” Sep. 01, 2020, MDPI AG. doi: 10.3390/s20174828.
[3]S. C. P, S. Shabu, and A. Ashraf, “Internet of Medical Things: Architecture, Applications and Challenges,” Journal of Informatics Electrical and Electronics Engineering, vol. 04, no. 101, pp. 1–10, 2023, doi: 10.54060/jieee.202.
[4]B. Bhushan, A. Kumar, A. K. Agarwal, A. Kumar, P. Bhattacharya, and A. Kumar, “Towards a Secure and Sustainable Internet of Medical Things (IoMT): Requirements, Design Challenges, Security Techniques, and Future Trends,” Apr. 01, 2023, MDPI. doi: 10.3390/su15076177.
[5]S. F. Ahmed, M. S. Bin Alam, S. Afrin, S. J. Rafa, N. Rafa, and A. H. Gandomi, “Insights into Internet of Medical Things (IoMT): Data fusion, security issues and potential solutions,” Information Fusion, vol. 102, Feb. 2024, doi: 10.1016/j.inffus.2023.102060.
[6]N. Venu, K. Kumar Vaigandla, and A. Arunkumar, “Investigation on Internet of Things(IoT) : Technologies, Challenges and Applications in Healthcare,” 2022. [Online]. Available: https://www.researchgate.net/publication/361923382
[7]B. Pradhan, S. Bhattacharyya, and K. Pal, “IoT-Based Applications in Healthcare Devices,” 2021, Hindawi Limited. doi: 10.1155/2021/6632599.
[8]I. Ahmed and F. Lanonaca, “Recent Development in IoMT based Biomedical Measurement Systems: a Review.”
[9]P. Mishra and G. Singh, “Internet of Medical Things Healthcare for Sustainable Smart Cities: Current Status and Future Prospects,” Applied Sciences (Switzerland), vol. 13, no. 15, Aug. 2023, doi: 10.3390/app13158869.
[10]Y. A. Qadri, Zulqarnain, A. Nauman, A. Musaddiq, E. Garcia-Villegas, and S. W. Kim, “Preparing Wi-Fi 7 for Healthcare Internet-of-Things,” Sensors, vol. 22, no. 16, Aug. 2022, doi: 10.3390/s22166209.
[11]T. Yaqoob, H. Abbas, and M. Atiquzzaman, “Security Vulnerabilities, Attacks, Countermeasures, and Regulations of Networked Medical Devices-A Review,” IEEE Communications Surveys and Tutorials, vol. 21, no. 4, pp. 3723–3768, Oct. 2019, doi: 10.1109/COMST.2019.2914094.
[12]T. Jabeen, H. Ashraf, and A. Ullah, “A survey on healthcare data security in wireless body area networks,” J Ambient Intell Humaniz Comput, vol. 12, no. 10, pp. 9841–9854, Oct. 2021, doi: 10.1007/s12652-020-02728-y.
[13]P. Thippun, Y. Sasiwat, D. Buranapanichkit, A. Booranawong, N. Jindapetch, and H. Saito, “Implementation and experimental evaluation of dynamic capabilities in wireless body area networks: different setting parameters and environments,” Journal of Engineering and Applied Science, vol. 70, no. 1, Dec. 2023, doi: 10.1186/s44147-022-00171-8.
[14]C. Camara, P. Peris-Lopez, and J. E. Tapiador, “Security and privacy issues in implantable medical devices: A comprehensive survey,” Jun. 01, 2015, Academic Press Inc. doi: 10.1016/j.jbi.2015.04.007.
[15]L. M. Tseng, P. F. Chen, and C. Y. Wen, “Design of Edge-IoMT Network Architecture with Weight-Based Scheduling,” Sensors (Basel), vol. 23, no. 20, Oct. 2023, doi: 10.3390/s23208553.
[16]S. Zou, Y. Xu, H. Wang, Z. Li, S. Chen, and B. Hu, “A Survey on Secure Wireless Body Area Networks,” 2017, Hindawi Limited. doi: 10.1155/2017/3721234.
[17]M. Elhoseny, G. Ramírez-González, O. M. Abu-Elnasr, S. A. Shawkat, N. Arunkumar, and A. Farouk, “Secure Medical Data Transmission Model for IoT-Based Healthcare Systems,” IEEE Access, vol. 6, pp. 20596–20608, Mar. 2018, doi: 10.1109/ACCESS.2018.2817615.
[18]A. L. Martínez, M. G. Pérez, and A. Ruiz-Martínez, “A Comprehensive Review of the State-of-the-Art on Security and Privacy Issues in Healthcare,” ACM Comput Surv, vol. 55, no. 12, Mar. 2023, doi: 10.1145/3571156.
[19]M. Papaioannou et al., “A Survey on Security Threats and Countermeasures in Internet of Medical Things (IoMT),” Transactions on Emerging Telecommunications Technologies, vol. 33, no. 6, Jun. 2022, doi: 10.1002/ett.4049.
[20]M. S. Akhtar and T. Feng, “A Systemic Security and Privacy Review: Attacks and Prevention Mechanisms over IOT Layers,” ICST Transactions on Security and Safety, vol. 8, no. 30, p. e5, Aug. 2022, doi: 10.4108/eetss.v8i30.590.
[21]A. Ahad et al., “A Comprehensive review on 5G-based Smart Healthcare Network Security: Taxonomy, Issues, Solutions and Future research directions,” Jul. 01, 2023, Elsevier B.V. doi: 10.1016/j.array.2023.100290.
[22]A. Ghubaish, T. Salman, M. Zolanvari, D. Unal, A. Al-Ali, and R. Jain, “Recent Advances in the Internet-of-Medical-Things (IoMT) Systems Security,” IEEE Internet Things J, vol. 8, no. 11, pp. 8707–8718, Jun. 2021, doi: 10.1109/JIOT.2020.3045653.
[23]M. Wazid, J. Singh, A. K. Das, S. Shetty, M. K. Khan, and J. J. P. C. Rodrigues, “ASCP-IoMT: AI-Enabled Lightweight Secure Communication Protocol for Internet of Medical Things,” IEEE Access, vol. 10, pp. 57990–58004, 2022, doi: 10.1109/ACCESS.2022.3179418. 
[24]P. K. Sahoo, S. R. Pattanaik, and S. L. Wu, “Design and analysis of a low latency deterministic network MAC for wireless sensor networks,” Sensors (Switzerland), vol. 17, no. 10, Oct. 2017, doi: 10.3390/s17102185.
[25]V. Richert, B. Issac, and N. Israr, “Implementation of a modified wireless sensor network MAC protocol for critical environments,” Wirel Commun Mob Comput, vol. 2017, 2017, doi: 10.1155/2017/2801204.
[26]M. Fotouhi, M. Bayat, A. K. Das, H. A. N. Far, S. M. Pournaghi, and M. A. Doostari, “A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT,” Computer Networks, vol. 177, Aug. 2020, doi: 10.1016/j.comnet.2020.107333.
[27]T. Wan, L. Wang, W. Liao, and S. Yue, “A lightweight continuous authentication scheme for medical wireless body area networks,” Peer Peer Netw Appl, 2021, doi: 10.1007/s12083-021-01190-7.
[28]W. Villegas-Ch, J. García-Ortiz, and I. Urbina-Camacho, “Framework for a Secure and Sustainable Internet of Medical Things, Requirements, Design Challenges, and Future Trends,” Applied Sciences (Switzerland), vol. 13, no. 11, Jun. 2023, doi: 10.3390/app13116634.
[29]I. Ullah, M. A. Khan, A. M. Abdullah, F. Noor, N. Innab, and C. M. Chen, “Enabling Secure Communication in Wireless Body Area Networks with Heterogeneous Authentication Scheme,” Sensors, vol. 23, no. 3, Feb. 2023, doi: 10.3390/s23031121.
[30]M. H. Nasir, J. Arshad, and M. M. Khan, “Collaborative device-level botnet detection for internet of things,” Comput Secur, vol. 129, Jun. 2023, doi: 10.1016/j.cose.2023.103172.
[31]J. O. Healthcare Engineering, “Retracted: Designing a Healthcare-Enabled Software-Defined Wireless Body Area Network Architecture for Secure Medical Data and Efficient Diagnosis,” 2023, NLM (Medline). doi: 10.1155/2023/9805042.
[32]Minahil, M. F. Ayub, K. Mahmood, S. Kumari, and A. K. Sangaiah, “Lightweight authentication protocol for e-health clouds in IoT-based applications through 5G technology,” Digital Communications and Networks, vol. 7, no. 2, pp. 235–244, May 2021, doi: 10.1016/j.dcan.2020.06.003.
[33]M. Azees, P. Vijayakumar, M. Karuppiah, and A. Nayyar, “An efficient anonymous authentication and confidentiality preservation schemes for secure communications in wireless body area networks,” Wireless Networks, vol. 27, no. 3, pp. 2119–2130, Apr. 2021, doi: 10.1007/s11276-021-02560-y.
[34]L. Zheng, Z. Wang, and S. Tian, “Comparative study on electrocardiogram encryption using elliptic curves cryptography and data encryption standard for applications in Internet of medical things,” in Concurrency and Computation: Practice and Experience, John Wiley and Sons Ltd, Apr. 2022. doi: 10.1002/cpe.5776.