[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1383))

Included in the following conference series:

Abstract

The internet of medical things (IoMT) is taking an enormous part and a notable role in enhancing the health sector by anticipating medical facilities to people around the globe. With the rapid growth of internet of things, IoMT is having a massive effect in our everyday lifestyle. Rather than going to the health centers, patient clinical related data is remotely remarked and summons in a synchronal data system and then transferred to whom concerned for future use such as the cloud. IoMT is intensive data domain with an accelerating, growing rate which means that we must secure and protect large amount of delicate data without being interfered. And with the digital transformation we are living IoMT is being concerned as the most attractive topic in Saudi Arabia with the concern of cybersecurity implementation to the services and risk assessments in order to have the most secure and reliable user experience. Wishing this paper to be helpful and to add value to the researchers and to focus on the security challenges that we need to avoid.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 143.50
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 179.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Joyia, G.J., Liaqat, R.M., Farooq, A., Rehman, S.: Internet of Medical Things (IOMT): applications, benefits and future challenges in healthcare domain. J. Commun. 12(4), 240–247 (2017)

    Google Scholar 

  2. Dilawar, N., Rizwan, M., Ahmad, F., Akram, S.: Blockchain: securing Internet of Medical Things (IoMT). Int. J. Adv. Comput. Sci. Appl. (IJACSA) 10(1), 1–8 (2019)

    Google Scholar 

  3. Vishnu, S., Jino Ramson, S.R., Jegan, R.: Internet of Medical Things (IoMT) - an overview. In: 2020 5th International Conference on Devices, Circuits and Systems (ICDCS) (2020)

    Google Scholar 

  4. Habib, M.A., Faisal, C.M.N., Sarwar, S., Latif, M.A., Aadil, F., Ahmad, M., Ashraf, R., Maqsood, M.: Privacy-based medical data protection against internal security threats in heterogeneous Internet of Medical Things. Int. J. Distrib. Sens. Netw. 15, 1–12 (2019)

    Article  Google Scholar 

  5. Alsubaei, F., Abuhussein, A.: Security and privacy on the internet of medical things: taxonomy and risk assessment, October 2017. Conference Paper

    Google Scholar 

  6. Karmakar, K.K., Varadharajan, V., Tupakula, U., Nepal, S., Thapa, C.: Towards a security enhanced virtualised network infrastructure for the Internet of Medical Things (IoMT). In: 2020 6th IEEE International Conference on Network Softwarization (NetSoft) (2020)

    Google Scholar 

  7. Alqarni, A.: A survey and classification of security and privacy research in smart healthcare systems. Received 15 July 2019, accepted 22 July 2019, date of publication 25 July 2019, date of current version 9 August 2019

    Google Scholar 

  8. Yang, X.: Abnormal user detection based on the correlation probabilistic model. Received 25 October 2019, accepted 24 February 2020, date of publication 13 June 2020

    Google Scholar 

  9. Cano, M.-D.: Preserving data privacy in the Internet of Medical Things using dual signature ECDSA. Received 25 October 2019, accepted 17 February 2020, date of publication 10 June 2020

    Google Scholar 

  10. Lai, H.-L., Chen, T.-Y.: User audit model based on attribute measurement and similarity measurement. Received 18 February 2012, accepted 28 July 2012

    Google Scholar 

  11. Tang, K., Tang, W., Luo, E., Tan, Z., Meng, W., Qi, L.: Secure information transmissions in wireless-powered cognitive radio networks for Internet of Medical Things. Received 25 September 2019, accepted 20 December 2019, date of publication 24 February 2020

    Google Scholar 

  12. Hu, Z., Lin, Y.: Cryptanalysis and security improvement of two authentication schemes for healthcare systems using wireless medical sensor networks. Received 18 October 2019, accepted 18 January 2020, date of publication 19 February 2020

    Google Scholar 

  13. Zhou, X., Liu, J., Wu, Q.: Secure outsourced medical data against unexpected leakage with flexible access control in a cloud storage system. Received 30 August 2019, accepted 08 January 2020, date of publication 10 February 2020

    Google Scholar 

  14. Ma, X., Guo, S., Bai, W., Chen, J., Xia, S.: An API semantics-aware malware detection method based on deep learning. Received 19 February 2019, accepted 20 May 2019, date of publication 11 November 2019

    Google Scholar 

  15. Zhao, Y.-L., Zhu, C.-P.: An object proxy-based dynamic layer replacement to protect IoMT applications. Received 24 May 2019, accepted 26 August 2019, date of publication 30 September 2019

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Latifah Almaiman .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Almaiman, L., Alqahtani, N. (2021). Security and Privacy on IoMT. In: Abraham, A., et al. Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020). SoCPaR 2020. Advances in Intelligent Systems and Computing, vol 1383. Springer, Cham. https://doi.org/10.1007/978-3-030-73689-7_90

Download citation

Publish with us

Policies and ethics