A systematic review of security and privacy issues in the internet of medical things; the role of machine learning approaches

Author:

Hameed Shilan S.12ORCID,Hassan Wan Haslina1ORCID,Abdul Latiff Liza3,Ghabban Fahad4

Affiliation:

1. Malaysia-Japan International Institute of Technology (MJIIT), Universiti Teknologi Malaysia, Kuala Lumpur, Malaysia

2. Directorate of Information Technology, Koya University, Koya, Kurdistan Region, Iraq

3. Razak Faculty of Technology and Informatics, Universiti Teknologi Malaysia, Kuala Lumpur, Malaysia

4. Information Systems Department, College of Computer Sciences and Engineering, Taibah University, Medina, Saudi Arabia

Abstract

Background The Internet of Medical Things (IoMTs) is gradually replacing the traditional healthcare system. However, little attention has been paid to their security requirements in the development of the IoMT devices and systems. One of the main reasons can be the difficulty of tuning conventional security solutions to the IoMT system. Machine Learning (ML) has been successfully employed in the attack detection and mitigation process. Advanced ML technique can also be a promising approach to address the existing and anticipated IoMT security and privacy issues. However, because of the existing challenges of IoMT system, it is imperative to know how these techniques can be effectively utilized to meet the security and privacy requirements without affecting the IoMT systems quality, services, and device’s lifespan. Methodology This article is devoted to perform a Systematic Literature Review (SLR) on the security and privacy issues of IoMT and their solutions by ML techniques. The recent research papers disseminated between 2010 and 2020 are selected from multiple databases and a standardized SLR method is conducted. A total of 153 papers were reviewed and a critical analysis was conducted on the selected papers. Furthermore, this review study attempts to highlight the limitation of the current methods and aims to find possible solutions to them. Thus, a detailed analysis was carried out on the selected papers through focusing on their methods, advantages, limitations, the utilized tools, and data. Results It was observed that ML techniques have been significantly deployed for device and network layer security. Most of the current studies improved traditional metrics while ignored performance complexity metrics in their evaluations. Their studies environments and utilized data barely represent IoMT system. Therefore, conventional ML techniques may fail if metrics such as resource complexity and power usage are not considered.

Publisher

PeerJ

Subject

General Computer Science

Reference152 articles.

1. Secure medical treatment with deep learning on embedded board;Abdaoui;Energy Efficiency of Medical Devices and Healthcare Applications,2020

2. An intrusion detection system for detecting compromised gateways in clustered IoT networks;Abhishek,2018

3. SecLAP: secure and lightweight RFID authentication protocol for Medical IoT;Aghili;Future Generation Computer Systems,2019a

4. LACO: lightweight three-factor authentication, access control and ownership transfer scheme for e-health systems in IoT;Aghili;Future Generation Computer Systems,2019b

5. 5G-based smart healthcare network: architecture, taxonomy, challenges and future research directions;Ahad;IEEE Access,2019

Cited by 37 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. A Systematic Review for Misuses Attack Detection based on Data Mining in NFV;Sakarya University Journal of Computer and Information Sciences;2023-12-31

2. LSBlocFL: A secure federated learning model combining blockchain and lightweight cryptographic solutions;Computers and Electrical Engineering;2023-11

3. Emerging Cyber Threats in Healthcare: A Study of Attacks in IoMT Ecosystems;2023 7th International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC);2023-10-11

4. A Recent Assessment for the Ransomware Attacks Against the Internet of Medical Things (IoMT): A Review;2023 IEEE 13th International Conference on Control System, Computing and Engineering (ICCSCE);2023-08-25

5. Survey of Machine Learning based intrusion detection methods for Internet of Medical Things;Applied Soft Computing;2023-06

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3