Security in IoMT Communications: A Survey

The Internet of Medical Things (IoMT) couples IoT technologies with healthcare services in order to support real-time, remote patient monitoring and treatment. However, the interconnectivity of critical medical devices with other systems in various network layers creates new opportunities for remote...

Full description

Bibliographic Details
Main Authors: Dimitris Koutras, George Stergiopoulos, Thomas Dasaklis, Panayiotis Kotzanikolaou, Dimitris Glynos, Christos Douligeris
Format: Article
Language:English
Published: MDPI AG 2020-08-01
Series:Sensors
Subjects:
Online Access:https://www.mdpi.com/1424-8220/20/17/4828
_version_ 1797555455706267648
author Dimitris Koutras
George Stergiopoulos
Thomas Dasaklis
Panayiotis Kotzanikolaou
Dimitris Glynos
Christos Douligeris
author_facet Dimitris Koutras
George Stergiopoulos
Thomas Dasaklis
Panayiotis Kotzanikolaou
Dimitris Glynos
Christos Douligeris
author_sort Dimitris Koutras
collection DOAJ
description The Internet of Medical Things (IoMT) couples IoT technologies with healthcare services in order to support real-time, remote patient monitoring and treatment. However, the interconnectivity of critical medical devices with other systems in various network layers creates new opportunities for remote adversaries. Since most of the communication protocols have not been specifically designed for the needs of connected medical devices, there is a need to classify the available IoT communication technologies in terms of security. In this paper we classify IoT communication protocols, with respect to their application in IoMT. Then we describe the main characteristics of IoT communication protocols used at the perception, network and application layer of medical devices. We examine the inherent security characteristics and limitations of IoMT-specific communication protocols. Based on realistic attacks we identify available mitigation controls that may be applied to secure IoMT communications, as well as existing research and implementation gaps.
first_indexed 2024-03-10T16:47:44Z
format Article
id doaj.art-5d44a4bd5750461b90ef2ee5c68c4e54
institution Directory Open Access Journal
issn 1424-8220
language English
last_indexed 2024-03-10T16:47:44Z
publishDate 2020-08-01
publisher MDPI AG
record_format Article
series Sensors
spelling doaj.art-5d44a4bd5750461b90ef2ee5c68c4e542023-11-20T11:27:55ZengMDPI AGSensors1424-82202020-08-012017482810.3390/s20174828Security in IoMT Communications: A SurveyDimitris Koutras0George Stergiopoulos1Thomas Dasaklis2Panayiotis Kotzanikolaou3Dimitris Glynos4Christos Douligeris5Department of Informatics, University of Piraeus, 80, M. Karaoli & A. Dimitriou St., 18534 Piraeus, GreeceDepartment of Informatics, University of Piraeus, 80, M. Karaoli & A. Dimitriou St., 18534 Piraeus, GreeceDepartment of Informatics, University of Piraeus, 80, M. Karaoli & A. Dimitriou St., 18534 Piraeus, GreeceDepartment of Informatics, University of Piraeus, 80, M. Karaoli & A. Dimitriou St., 18534 Piraeus, GreeceCENSUS S.A., I. Gkoura 16, 54352 Thessaloniki, GreeceDepartment of Informatics, University of Piraeus, 80, M. Karaoli & A. Dimitriou St., 18534 Piraeus, GreeceThe Internet of Medical Things (IoMT) couples IoT technologies with healthcare services in order to support real-time, remote patient monitoring and treatment. However, the interconnectivity of critical medical devices with other systems in various network layers creates new opportunities for remote adversaries. Since most of the communication protocols have not been specifically designed for the needs of connected medical devices, there is a need to classify the available IoT communication technologies in terms of security. In this paper we classify IoT communication protocols, with respect to their application in IoMT. Then we describe the main characteristics of IoT communication protocols used at the perception, network and application layer of medical devices. We examine the inherent security characteristics and limitations of IoMT-specific communication protocols. Based on realistic attacks we identify available mitigation controls that may be applied to secure IoMT communications, as well as existing research and implementation gaps.https://www.mdpi.com/1424-8220/20/17/4828IoT communication protocolsinternet of medical thingssecurityperception-network-application layer
spellingShingle Dimitris Koutras
George Stergiopoulos
Thomas Dasaklis
Panayiotis Kotzanikolaou
Dimitris Glynos
Christos Douligeris
Security in IoMT Communications: A Survey
Sensors
IoT communication protocols
internet of medical things
security
perception-network-application layer
title Security in IoMT Communications: A Survey
title_full Security in IoMT Communications: A Survey
title_fullStr Security in IoMT Communications: A Survey
title_full_unstemmed Security in IoMT Communications: A Survey
title_short Security in IoMT Communications: A Survey
title_sort security in iomt communications a survey
topic IoT communication protocols
internet of medical things
security
perception-network-application layer
url https://www.mdpi.com/1424-8220/20/17/4828
work_keys_str_mv AT dimitriskoutras securityiniomtcommunicationsasurvey
AT georgestergiopoulos securityiniomtcommunicationsasurvey
AT thomasdasaklis securityiniomtcommunicationsasurvey
AT panayiotiskotzanikolaou securityiniomtcommunicationsasurvey
AT dimitrisglynos securityiniomtcommunicationsasurvey
AT christosdouligeris securityiniomtcommunicationsasurvey