Javascript must be enabled to continue!
Network security framework for Internet of medical things applications: A survey
View through CrossRef
Abstract
Limited device resources and an ever-changing cybersecurity landscape compound the challenges faced by the network protection infrastructure for Internet of medical things (IoMT) applications, which include different device ecosystems, privacy concerns, and problems with interoperability. Protecting private medical information in IoMT apps is challenging; a comprehensive strategy that provides user education, standard protocols, and robust security mechanisms is necessary to overcome these obstacles. With the advancement of IoMT, the network of clinical systems, gadgets, and sensors is integrated with the Internet of things (IoT) to enable intelligent healthcare solutions. However, the sensitive data sharing and the substantial connections in the IoMT systems raise security and privacy concerns in the network. Therefore, network security is critical in IoMT applications due to data breaches, vulnerabilities, and distributed denial of service attacks on medical data. This study reviews the network security techniques implemented in the existing studies for IoMT applications using machine learning and blockchain technology. This study presents an overview of IoMT healthcare applications by highlighting the security challenges encountered and the necessity of adopting advanced techniques to deal with complex threats. The research is mainly about how deep reinforcement learning (DRL), commonly used for intrusion detection, access control, and anomaly detection, works over time and how it can be used in IoMT applications. With the notion of providing robust security in IoMT applications, this study appraises the benefits of blockchain technology, such as data integrity, accountability, and confidentiality. Besides, this study addresses the limitations and challenges of various security techniques that IoMT systems employ. This work assesses the findings, research gaps, and future advancements for enhancing network security in IoMT applications. With an extensive analysis of existing research, this survey guides researchers, medical practitioners, and decision-makers to scale up the DRL and blockchain in IoMT systems more efficiently in the future.
Walter de Gruyter GmbH
Title: Network security framework for Internet of medical things applications: A survey
Description:
Abstract
Limited device resources and an ever-changing cybersecurity landscape compound the challenges faced by the network protection infrastructure for Internet of medical things (IoMT) applications, which include different device ecosystems, privacy concerns, and problems with interoperability.
Protecting private medical information in IoMT apps is challenging; a comprehensive strategy that provides user education, standard protocols, and robust security mechanisms is necessary to overcome these obstacles.
With the advancement of IoMT, the network of clinical systems, gadgets, and sensors is integrated with the Internet of things (IoT) to enable intelligent healthcare solutions.
However, the sensitive data sharing and the substantial connections in the IoMT systems raise security and privacy concerns in the network.
Therefore, network security is critical in IoMT applications due to data breaches, vulnerabilities, and distributed denial of service attacks on medical data.
This study reviews the network security techniques implemented in the existing studies for IoMT applications using machine learning and blockchain technology.
This study presents an overview of IoMT healthcare applications by highlighting the security challenges encountered and the necessity of adopting advanced techniques to deal with complex threats.
The research is mainly about how deep reinforcement learning (DRL), commonly used for intrusion detection, access control, and anomaly detection, works over time and how it can be used in IoMT applications.
With the notion of providing robust security in IoMT applications, this study appraises the benefits of blockchain technology, such as data integrity, accountability, and confidentiality.
Besides, this study addresses the limitations and challenges of various security techniques that IoMT systems employ.
This work assesses the findings, research gaps, and future advancements for enhancing network security in IoMT applications.
With an extensive analysis of existing research, this survey guides researchers, medical practitioners, and decision-makers to scale up the DRL and blockchain in IoMT systems more efficiently in the future.
Related Results
The Geography of Cyberspace
The Geography of Cyberspace
The Virtual and the Physical
The structure of virtual space is a product of the Internet’s geography and technology. Debates around the nature of the virtual — culture, s...
[RETRACTED] Keanu Reeves CBD Gummies v1
[RETRACTED] Keanu Reeves CBD Gummies v1
[RETRACTED]Keanu Reeves CBD Gummies ==❱❱ Huge Discounts:[HURRY UP ] Absolute Keanu Reeves CBD Gummies (Available)Order Online Only!! ❰❰= https://www.facebook.com/Keanu-Reeves-CBD-G...
Novel architectures and strategies for security offloading
Novel architectures and strategies for security offloading
Internet has become an indispensable and powerful tool in our modern society. Its ubiquitousness, pervasiveness and applicability have fostered paradigm changes around many aspects...
Key Technologies of IoT Service Security and Privacy Protection
Key Technologies of IoT Service Security and Privacy Protection
The Internet of Things in the industrial industry has attracted widespread attention from the government, academia, and industry due to its huge application prospects. The core ide...
Development Tasks of AI-based Security Industry
Development Tasks of AI-based Security Industry
Recently, the government's interest in industries utilizing AI has been amplified, with initiatives such as announcing a roadmap aiming to achieve the goal of becoming the world's ...
Contribution to the system architecture design for electromagnetic nano-network communications
Contribution to the system architecture design for electromagnetic nano-network communications
(English) A nano-network is a communication network at the nano-scale between nano-devices. Nanodevices face certain challenges in functionalities, because of limitations in their ...
A Survey Non-Terrestrial Networks in 6G/ 7G Smart Network for 2035+ and Beyond
A Survey Non-Terrestrial Networks in 6G/ 7G Smart Network for 2035+ and Beyond
3GPP TR 38.821, “Solutions for NR to support non-terrestrial networks (NTN),” Release 16, Jan. 2020. [Online]. Available: https://www.3gpp.org/.
P. K. Chowdhury, M. Atiquzzaman, W....
ESSENTIAL SECURITY PRACTICES FOR FORTIFYING MOBILE APPS
ESSENTIAL SECURITY PRACTICES FOR FORTIFYING MOBILE APPS
“Essential Security Practices for Fortifying Mobile Apps” is a definitive guide designed to empower developers, security professionals, and organizations with the knowledge and too...

