Modern Study on Internet of Medical Things (IOMT) Security |
Aljumaie, Ghada Sultan
(Department of Computer Science College of Computers and Information Technology Taif University)
Alzeer, Ghada Hisham (Department of Computer Science College of Computers and Information Technology Taif University) Alghamdi, Reham Khaild (Department of Computer Science College of Computers and Information Technology Taif University) Alsuwat, Hatim (Department of Computer Science College of Computer and Information Systems Umm Al Qura University) Alsuwat, Emad (Department of Computer Science College of Computers and Information Technology Taif University) |
1 | Solangi, Z. A., Solangi, Y. A., Chandio, S., bin Hamzah, M. S., & Shah, A. (2018, May). The future of data privacy and security concerns in Internet of Things. In 2018 IEEE International Conference on Innovative Research and Development (ICIRD)(pp. 1-4). IEEE. |
2 | A lsubaei, F., Abuhussein, A., & Shiva, S. (2017, October). Security and privacy in the internet of medical things: taxonomy and risk assessment. In 2017 IEEE 42nd Conference on Local Computer Networks Workshops (LCN Workshops) (pp. 112-120). IEEE. |
3 | Rathnayake, R. M. P. H. K., Karunarathne, M. S., Nafi, N. S., & Gregory, M. A. (2018, November). Cloud enabled solution for privacy concerns in internet of medical things. In 2018 28th International Telecommunication Networks and Applications Conference (ITNAC) (pp. 1-4). IEEE. |
4 | Dai, H. N., Imran, M., & Haider, N. (2020). Blockchain-enabled Internet of Medical Things to Combat COVID-19. IEEE Internet of Things Magazine, 3(3), 52-57. DOI |
5 | Cano, M. D., & Canavate-Sanchez, A. (2020). Preserving data privacy in the internet of medical things using dual signature ECDSA. Security and Communication Networks, 2020. |
6 | Harvey, P., Toutsop, O., Kornegay, K., Alale, E., & Reaves, D. (2020, December). Security and Privacy of Medical Internet of Things Devices for Smart Homes. In 2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS) (pp. 1-6). IEEE. |
7 | Yao Liu, Peng Ning, and Michael K Reiter. False data injection attacks against state estimation in electric power grids. ACM Transactions on Information and System Security (TISSEC), 14(1):13, 2011. |
8 | T. Y. Mahmoud, R., Yousuf, T., Aloul, F., & Zualkernan, I. (2015, December). Internet of things (IoT) security: Current status, challenges, and prospective measures. In 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST) (pp. 336-341). IEEE. |
9 | Harvey, P., Toutsop, O., Kornegay, K., Alale, E., & Reaves, D. (2020, December). Security and Privacy of Medical Internet of Things Devices for Smart Homes. In 2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS) (pp. 1-6). IEEE. |
10 | Zubair A Baig and Abdul-Raoof Amoudi. An analysis of clever grid attacks and countermeasures. Journal of Communications, 8(8):473- 479, 2013. DOI |
11 | Kumar, M., & Chand, S. (2020). A lightweight cloud-assisted identity-based anonymous authentication and critical agreement body area network. IEEE Systems Journal. |
12 | Papaioannou, M., Karageorgou, M., Mantas, G., Sucasas, V., Essop, I., Rodriguez, J., & Lymberopoulos, D. (2020). A survey on security threats and countermeasures in internet of medical things (IoMT). Transactions on Emerging Telecommunications Technologies, e4049 |
13 | Angrishi, K. (2017). Turning Internet of things (IoT) into the Internet of vulnerabilities (iov): IoT botnets. arXiv preprint arXiv:1702.03681. |
14 | Wazid, M., Das, A. K., Rodrigues, J. J., Shetty, S., & Park, Y. (2019). IoMT malware detection approaches: analysis and research challenges. IEEE Access, 7, 182459-182476 DOI |
15 | Alsubaei, F., Abuhussein, A., Shandilya, V., & Shiva, S. (2019). IoMT-SAF: Internet of medical things security assessment framework. Internet of Things, 8, 100123.] DOI |
16 | Bibi, N., Sikandar, M., Ud Din, I., Almogren, A., & Ali, S. (2020). IoMT-Based Automated Detection and Classification of Leukemia Using Deep Learning. Journal of healthcare engineering, 2020 |
17 | Yang, T., Gentile, M., Shen, C. F., & Cheng, C. M. (2020). Combining point-of-care diagnostics and the Internet of medical things (IoMT) to combat the COVID-19 pandemic. |
18 | Nazir, A., Sholla, S., & Bashir, A. (2019). Internet of Things Security: Issues, Challenges, and Countermeasures. International Journal of Network and Technology, 7(3). |
19 | Karmakar, K. K., Varadharajan, V., Tupakula, U., Nepal, S., & Thapa, C. (2020, June). Towards a Security Enhanced Virtualised Network Infrastructure for Internet of Medical Things (IoMT). In 2020 6th IEEE Conference on Network Softwarization (NetSoft) (pp. 257-261). IEEE. |
20 | Sun, Y., Lo, F. P. W., & Lo, B. (2019). Security and privacy for the Internet of medical things enabled healthcare systems: A survey. IEEE Access, 7, 183339-183355. DOI |
21 | Food and Drug Administration, HHS, "Design considerations and premarket submission recommendations for interoperable medical devices," Sept. 2017. |
22 | Mitko Bogdanoski, Tomislav Suminoski, and Aleksandar Risteski. Analysis of the syn flood dos attack. International Journal of Computer Network and Information Security (IJCNIS), 5(8):1-11, 2013. |
23 | Alejandro Proano and Loukas Lazos. Selective jamming attacks in wireless networks. In 2010 IEEE International Conference on Communications pages 1-6. IEEE, 2010. |
24 | Kanika Grover, Alvin Lim, and Qing Yang. Jamming and anti-jamming techniques in wireless networks: a survey. International Journal of Ad Hoc and Ubiquitous Computing, 17(4):197-215, 2014. DOI |
25 | Harshita Harshita. Detection and prevention of ICMP flood DDoS attack. International Journal of New Technology and Research, 3(3), 2017. |
26 | Yuquan Shan, George Kesidis, Daniel Fleck, and Angelos Stavrou. Preliminary study of fission defenses against low-volume dos attacks on proxied multiserver systems. In 2017 12th International Conference on Malicious and Unwanted Software (MALWARE), pages 67-74. IEEE, 2017. |
27 | MdAshfaqur Rahmanand Hamed Mohsenian-Rad.False data injection attacks with incomplete information against intelligent power grids. In Global Communications Conference (GLOBECOM), 2012 IEEE, pages 3153-3158. Citeseer, 2012. |
28 | Satish Vadlamani, Burak Eksioglu, Hugh Medal, and Apurba Nandi. Jamming attacks on wireless networks: A taxonomic survey. International Journal of Production Economics, 172:76-94, 2016. DOI |
29 | X. Huang and S. Nazir, "Evaluating Security of Internet of Medical Things Using the" Security & Communication Networks, p. 15, 1 September 2020. |
30 | Ghorbani, H. R., & Ahmadzadegan, M. H. (2017, November). Security challenges in the Internet of things: a survey. In 2017 IEEE Conference on Wireless Sensors (ICWiSe) (pp. 1-6). IEEE. |
31 | Emma McMahon, Ryan Williams, Malaka El, Sagar Samtani, Mark Patton, and Hsinchun Chen. Assessing medical device vulnerabilities on the Internet of things. In 2017 IEEE International Conference on Intelligence and Security Informatics (ISI), pages 176-178. IEEE, 2017. |
32 | Pardeep Kumar and Hoon-Jae Lee. Security issues in healthcare applications using wireless medical sensor networks: A survey. Sensors, 12(1):55-91, 2012. DOI |
33 | Sarah Spiekermann. Ethical IT innovation: A value-based system design approach. Auerbach Publications, 2015.]. |
34 | David D Coleman and David A Westcott. Cwna: certified wireless network administrator official study guide: exam Pw0-105. John Wiley & Sons, 2012. |
35 | Chen, F., Luo, Y., Zhang, J., Zhu, J., Zhang, Z., Zhao, C., & Wang, T. (2018). An infrastructure framework for privacy protection of community medical internet of things. World Wide Web, 21(1), 33-57. DOI |
36 | Fizza, K., Banerjee, A., Mitra, K., Jayaraman, P. P., Ranjan, R., Patel, P., & Georgakopoulos, D. (2021). QoE in IoT: a vision, survey, and future directions. Discover the Internet of Things, 1(1), 1-14. DOI |
37 | Shanthamallu, U. S., Spanias, A., Tepedelenlioglu, C., & Stanley, M. (2017, August). A brief survey of machine learning methods and their sensor and IoT applications. In 2017 8th International Conference on Information, Intelligence, Systems & Applications (IISA) (pp. 1-8). IEEE. |
38 | Ahmed, G., Mehmood, D., Shahzad, K., & Malick, R. A. S. (2021). An efficient routing protocol for the Internet of medical things focusing on hot spot node problems. International Journal of Distributed Sensor Networks, 17(2), 1550147721991706. |
39 | Zhu, F., Li, P., Xu, H., & Wang, R. (2020). A Novel Lightweight Authentication Scheme for RFID-Based Healthcare Systems. Sensors, 20(17), 4846. DOI |
40 | Garg, N., Wazid, M., Das, A. K., Singh, D. P., Rodrigues, J. J., & Park, Y. (2020). BAKMP-IoMT: Design of blockchain enabled authenticated key management protocol for Internet of medical things deployment. IEEE Access, 8, 95956-95977. DOI |
41 | Liaqat, S., Akhunzada, A., Shaikh, F. S., Giannetsos, A., & Jan, M. A. (2020). SDN orchestration to combat evolving cyber threats in Internet of Medical Things (IoMT). Computer Communications, 160, 697-705.] DOI |
42 | Nicolas Falliere, Liam O Murchu, and Eric Chien. W32. Stuxnet dossier. White paper, Symantec Corp., Security Response, 5(6):29, 2011. |
43 | Lukas Grunwald. New attacks against RFID systems. GmbH Germany, 2006. |
44 | Junghyun Nam, Juryon Paik, H-K Kang, Ung Mo Kim, and Dongho Won. An offline dictionary attack on a simple three-party key exchange protocol. IEEE Communications Letters, 13(3):205-207, 2009. DOI |
45 | Jung-Sik Cho, Sang-Soo Yeo, and Sung Kwon Kim. Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value. Computer communications, 34(3):391-397, 201 DOI |
46 | Mihir Bellare and Tadayoshi Kohno. Hash function balance and its impact on birthday attacks. In International Conference on the Theory and Applications of Cryptographic Techniques, pages 401-418. Springer, 2004 |
47 | J. Deogirikar and A. Vidhate. Security attacks in IoT: A survey. In 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics, and Cloud) (I-SMAC), pages 32-37, 2017. |
48 | Sam Edwards and Ioannis Profetis. Hajime: Analysis of a decentralized internet worm for IoT devices. Rapidity Networks, 16, 2016. |
49 | Evan Cooke, Farnam Jahanian, and Danny McPherson. The zombie roundup: Understanding, detecting, and disrupting botnets. SRUTI, 5:6- 6, 2005 |
50 | Yan, X., Geng, T., & Ding, H. (2014). Efficient cryptographic access control protocol for sensitive data management. Journal of Computers, 9(1), 222-228 |
51 | Wong, A. M. K., Hsu, C. L., Le, T. V., Hsieh, M. C., & Lin, T. W. (2020). Three-Factor Fast Authentication Scheme with Time Bound and User Anonymity for Multi-Server E-Health Systems in 5G-Based Wireless Sensor Networks. Sensors, 20(9), 2511. DOI |
52 | Wazid, M., Das, A. K., Rodrigues, J. J., Shetty, S., & Park, Y. (2019). IoMT malware detection approaches: analysis and research challenges. IEEE Access, 7, 182459-182476 DOI |
53 | Daojing He, Sammy Chan, and Mohsen Guizani. Drone-assisted public safety networks: The security aspect. IEEE Communications Magazine, 55(8):218-223, 2017 DOI |
54 | Chee-Wooi Ten, Govindarasu Manimaran, and Chen-Ching Liu. Cy- cybersecurity for critical infrastructures: Attack and defense modeling. IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Humans, 40(4):853-865, 2010. DOI |
55 | Puat, H. A. M., & Abd Rahman, N. A. (2020, December). IoMT: A Review of Pacemaker Vulnerabilities and Security Strategy. In Journal of Physics: Conference Series (Vol. 1712, No. 1, p. 012009). IOP Publishing.]. DOI |
56 | Yaacoub J.-P.A., Noura M., Noura H.N., Salman O., Yaacoub E. Securing internet of medical things systems: limitations, issues, and recommendations. Future Generation. Comput. Syst. 2020;105:581-606 DOI |
57 | Javdani, H.; Kashanian, H. Internet of things in medical applications with a service-oriented and security approach: A survey. Health Technol. 2018, 8, 39-50. ][ Altawy, R.; Youssef, A.M. Security Tradeoffs in Cyber-Physical Systems: A Case Study Survey on Implantable Medical Devices. IEEE Access 2016, 4, 959-979. DOI |
58 | Singh, J., & Abd Rahman, N. A. (2020). IoMT: A review of Open APS System Security for Type 1Diabetes Mellitus. Int J Cur Res Rev| Vol, 12(17), 93. DOI |
59 | Chun-Wei Yang, Tzonelih Hwang, and Tzu-Han Lin. Modification attack on qsdc with authentication and the improvement. International Journal of Theoretical Physics, 52(7):2230-2234, 2013. DOI |