Security in IoMT Communications: A Survey
The Internet of Medical Things (IoMT) couples IoT technologies with healthcare services in order to support real-time, remote patient monitoring and treatment. However, the interconnectivity of critical medical devices with other systems in various network layers creates new opportunities for remote...
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2020-08-01
|
Series: | Sensors |
Subjects: | |
Online Access: | https://www.mdpi.com/1424-8220/20/17/4828 |
_version_ | 1827707451247427584 |
---|---|
author | Dimitris Koutras George Stergiopoulos Thomas Dasaklis Panayiotis Kotzanikolaou Dimitris Glynos Christos Douligeris |
author_facet | Dimitris Koutras George Stergiopoulos Thomas Dasaklis Panayiotis Kotzanikolaou Dimitris Glynos Christos Douligeris |
author_sort | Dimitris Koutras |
collection | DOAJ |
description | The Internet of Medical Things (IoMT) couples IoT technologies with healthcare services in order to support real-time, remote patient monitoring and treatment. However, the interconnectivity of critical medical devices with other systems in various network layers creates new opportunities for remote adversaries. Since most of the communication protocols have not been specifically designed for the needs of connected medical devices, there is a need to classify the available IoT communication technologies in terms of security. In this paper we classify IoT communication protocols, with respect to their application in IoMT. Then we describe the main characteristics of IoT communication protocols used at the perception, network and application layer of medical devices. We examine the inherent security characteristics and limitations of IoMT-specific communication protocols. Based on realistic attacks we identify available mitigation controls that may be applied to secure IoMT communications, as well as existing research and implementation gaps. |
first_indexed | 2024-03-10T16:47:44Z |
format | Article |
id | doaj.art-5d44a4bd5750461b90ef2ee5c68c4e54 |
institution | Directory Open Access Journal |
issn | 1424-8220 |
language | English |
last_indexed | 2024-03-10T16:47:44Z |
publishDate | 2020-08-01 |
publisher | MDPI AG |
record_format | Article |
series | Sensors |
spelling | doaj.art-5d44a4bd5750461b90ef2ee5c68c4e542023-11-20T11:27:55ZengMDPI AGSensors1424-82202020-08-012017482810.3390/s20174828Security in IoMT Communications: A SurveyDimitris Koutras0George Stergiopoulos1Thomas Dasaklis2Panayiotis Kotzanikolaou3Dimitris Glynos4Christos Douligeris5Department of Informatics, University of Piraeus, 80, M. Karaoli & A. Dimitriou St., 18534 Piraeus, GreeceDepartment of Informatics, University of Piraeus, 80, M. Karaoli & A. Dimitriou St., 18534 Piraeus, GreeceDepartment of Informatics, University of Piraeus, 80, M. Karaoli & A. Dimitriou St., 18534 Piraeus, GreeceDepartment of Informatics, University of Piraeus, 80, M. Karaoli & A. Dimitriou St., 18534 Piraeus, GreeceCENSUS S.A., I. Gkoura 16, 54352 Thessaloniki, GreeceDepartment of Informatics, University of Piraeus, 80, M. Karaoli & A. Dimitriou St., 18534 Piraeus, GreeceThe Internet of Medical Things (IoMT) couples IoT technologies with healthcare services in order to support real-time, remote patient monitoring and treatment. However, the interconnectivity of critical medical devices with other systems in various network layers creates new opportunities for remote adversaries. Since most of the communication protocols have not been specifically designed for the needs of connected medical devices, there is a need to classify the available IoT communication technologies in terms of security. In this paper we classify IoT communication protocols, with respect to their application in IoMT. Then we describe the main characteristics of IoT communication protocols used at the perception, network and application layer of medical devices. We examine the inherent security characteristics and limitations of IoMT-specific communication protocols. Based on realistic attacks we identify available mitigation controls that may be applied to secure IoMT communications, as well as existing research and implementation gaps.https://www.mdpi.com/1424-8220/20/17/4828IoT communication protocolsinternet of medical thingssecurityperception-network-application layer |
spellingShingle | Dimitris Koutras George Stergiopoulos Thomas Dasaklis Panayiotis Kotzanikolaou Dimitris Glynos Christos Douligeris Security in IoMT Communications: A Survey Sensors IoT communication protocols internet of medical things security perception-network-application layer |
title | Security in IoMT Communications: A Survey |
title_full | Security in IoMT Communications: A Survey |
title_fullStr | Security in IoMT Communications: A Survey |
title_full_unstemmed | Security in IoMT Communications: A Survey |
title_short | Security in IoMT Communications: A Survey |
title_sort | security in iomt communications a survey |
topic | IoT communication protocols internet of medical things security perception-network-application layer |
url | https://www.mdpi.com/1424-8220/20/17/4828 |
work_keys_str_mv | AT dimitriskoutras securityiniomtcommunicationsasurvey AT georgestergiopoulos securityiniomtcommunicationsasurvey AT thomasdasaklis securityiniomtcommunicationsasurvey AT panayiotiskotzanikolaou securityiniomtcommunicationsasurvey AT dimitrisglynos securityiniomtcommunicationsasurvey AT christosdouligeris securityiniomtcommunicationsasurvey |