Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
Review
. 2022 Nov 3:299:126-136.
doi: 10.3233/SHTI220970.

An Overview on Security and Privacy of Data in IoMT Devices: Performance Metrics, Merits, Demerits, and Challenges

Affiliations
Review

An Overview on Security and Privacy of Data in IoMT Devices: Performance Metrics, Merits, Demerits, and Challenges

Pankaj Khatiwada et al. Stud Health Technol Inform. .

Abstract

The Internet of Medical Things (IoMT) emerges with new trendsetter device applications, where it defines the incorporation of medical devices with the Internet of Things (IoT). The healthcare sector continues to encounter challenging obstacles that have an impact on the quality of treatment provided to patients. To get rid of this problem, IoMT is being deployed to achieve the high reliability and efficiency of the health system. The IoMT devices are superimposed with clinical information as they contain the details of patient health data, address, and other patient identifiers. By containing such amount of sensitive information, it becomes cumbersome to preserve data privacy and security. Due to inadequate security and privacy precautions, patient health data is susceptible to leakage, which has a direct impact on the patient's life. In addition, the majority of medical devices are susceptible to cyberattacks, putting patient information at risk. Inadequate control of life-support equipment can have a devastating effect on patient outcomes. Thus, this survey intends to review the various security models of IoMT devices using standard techniques to support health care systems. It provides a wide range of literature reviews regarding IoMT systems and compares them with traditional methodologies. This review work exhibits the motivation for current technologies to maintain the security and privacy of patients' data with IoMT devices. The systematic review entails background on security in IoMT devices, techniques for security, usage of diverse validation measures, and also discusses the problems and motivation for future research work.

Keywords: Authentication; Blockchain; Encryption; Internet of Medical Things; Performance metrics; Security and Privacy of Data.

PubMed Disclaimer

Similar articles

Cited by

LinkOut - more resources