| Peer-Reviewed

Security Performance of Internet of Medical Things

Received: 11 January 2021    Accepted: 18 January 2021    Published: 2 February 2021
Views:       Downloads:
Abstract

Internet of Medical Things is the internet connection of medical devices to perform services and processes to support the healthcare sector. Wearable Technology in Healthcare has seen tremendous growth in recent times. This is due to a global increase in the aging population, the need for disease management, and effective patient monitoring. The prevalent technology of wearable devices is Bluetooth technology due to its low cost, low energy, and size. Despite the growth recorded in the adoption of Bluetooth Wearable IoMT, there are concerns by users and other healthcare stakeholders about security and privacy issues with its adoption. Our paper presents a simulation of passive and active attacks on 3 wearable IoMT devices, followed by analysis and evaluation of the experiment outcomes. Thereafter, countermeasures for the identified weaknesses were provided. It was discovered that some of the standard security features of Bluetooth Technology to mitigate privacy and security issues were not implemented in some of the devices, which can result in data compromise in the devices. A security assessment framework was developed to assess the security of Bluetooth IoMT devices using the Bayesian Network model. This is used to rank devices, identify their vulnerabilities, and apply security measures on the identified vulnerabilities. Our paper further provides recommendations on improving the security of Bluetooth IoMT devices.

Published in Advances in Networks (Volume 9, Issue 1)
DOI 10.11648/j.net.20210901.11
Page(s) 1-18
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2024. Published by Science Publishing Group

Keywords

Internet of Medical Things, Man-in-the-Middle Attack, Bluetooth Wearable IoMT, Wearable Device Security, Security Assessment Framework

References
[1] Casselman, J., Onopa, N. and Khansa, L., 2017. Wearable healthcare: Lessons from the past and a peek into the future. Telematics and Informatics, 34 (7), pp. 1011-1023.
[2] Alsubaei, F., Abuhussein, A. and Shiva, S., 2019a. Ontology-Based Security Recommendation for the Internet of Medical Things. IEEE Access, 7, pp. 48948-48960.
[3] Muck, J. E., Ünal, B., Butt, H. and Yetisen, A. K., 2019. Market and patent analyses of wearables in medicine. Trends in biotechnology, 37 (6), pp. 563-566.
[4] Shokeen, R., Shanmugam, B., Kannoorpatti, K., Azam, S., Jonkman, M., and Alazab, M. (2019). Vulnerabilities Analysis and Security Assessment Framework for the Internet of Things. 2019 Cybersecurity and Cyberforensics Conference (CCC), 22-29.
[5] Alasmari, S. and Anwar, M., 2016, December. Security & privacy challenges in IoT-based health cloud. In 2016 International Conference on Computational Science and Computational Intelligence (CSCI) (pp. 198-201). IEEE.
[6] Lonzetta, A. M., Cope, P., Campbell, J., Mohd, B. J. and Hayajneh, T., 2018. Security vulnerabilities in Bluetooth technology as used in IoT. Journal of Sensor and Actuator Networks, 7 (3), p. 28.
[7] Hale, M. L., Lotfy, K., Gamble, R. F., Walter, C. and Lin, J., 2019. Developing a platform to evaluate and assess the security of wearable devices. Digital Communications and Networks, 5 (3), pp. 147-159.
[8] Yaseen, M., Iqbal, W., Rashid, I., Abbas, H., Mohsin, M., Saleem, K. and Bangash, Y. A., 2019. MARC: A Novel Framework for Detecting MITM Attacks in eHealthcare BLE Systems. Journal of Medical Systems, 43 (11), p. 324.
[9] Melamed, T., 2018. An active man-in-the-middle attack on bluetooth smart devices. Safety and Security Studies (2018), 15.
[10] Darwish, S., Nouretdinov, I. and Wolthusen, S. D., 2017. Towards composable threat assessment for medical IoT (MIoT). Procedia computer science, 113, pp. 627-632.
[11] Pathinarupothi, R. K., 2019. Clinically Aware Data Summarization at the Edge for Internet of Medical Things. 2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), pp. 437–438.
[12] Alsubaei, F., Abuhussein, A., Shandilya, V., and Shiva, S., 2019b. IoMT-SAF: Internet of medical things security assessment framework. Internet of Things, 100-123.
[13] Zhang Y., Weng J., Dey R., Fu X. (2019) Bluetooth Low Energy (BLE) Security and Privacy. Encyclopedia of Wireless Networks. Springer, Cham. pp. 1-12.
[14] Zuo, C., Wen, H., Lin, Z. and Zhang, Y., 2019, November. Automatic Fingerprinting of Vulnerable BLE IoT Devices with Static UUIDs from Mobile Apps. In Proceedings of the 2019
[15] Qu, Y. and Chan, P., 2016, April. Assessing vulnerabilities in Bluetooth low energy (BLE) wireless network based IoT systems. In 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS) (pp. 42-48). IEEE.
[16] Padgette, J., Scarfone, K. and Chen, L., 2017. NIST Special Publication 800-121 Revision 2, Guide to Bluetooth Security. National Institute of Standards and Technology (NIST).
[17] Kammouh, O., Gardoni, P. and Cimellaro, G. P., 2020. Probabilistic framework to evaluate the resilience of engineering systems using Bayesian and dynamic Bayesian networks. Reliability Engineering & System Safety, 198, p. 106813.
Cite This Article
  • APA Style

    Taiwo Adenaiye, Waleed Bul’ajoul, Funminiyi Olajide. (2021). Security Performance of Internet of Medical Things. Advances in Networks, 9(1), 1-18. https://doi.org/10.11648/j.net.20210901.11

    Copy | Download

    ACS Style

    Taiwo Adenaiye; Waleed Bul’ajoul; Funminiyi Olajide. Security Performance of Internet of Medical Things. Adv. Netw. 2021, 9(1), 1-18. doi: 10.11648/j.net.20210901.11

    Copy | Download

    AMA Style

    Taiwo Adenaiye, Waleed Bul’ajoul, Funminiyi Olajide. Security Performance of Internet of Medical Things. Adv Netw. 2021;9(1):1-18. doi: 10.11648/j.net.20210901.11

    Copy | Download

  • @article{10.11648/j.net.20210901.11,
      author = {Taiwo Adenaiye and Waleed Bul’ajoul and Funminiyi Olajide},
      title = {Security Performance of Internet of Medical Things},
      journal = {Advances in Networks},
      volume = {9},
      number = {1},
      pages = {1-18},
      doi = {10.11648/j.net.20210901.11},
      url = {https://doi.org/10.11648/j.net.20210901.11},
      eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.net.20210901.11},
      abstract = {Internet of Medical Things is the internet connection of medical devices to perform services and processes to support the healthcare sector. Wearable Technology in Healthcare has seen tremendous growth in recent times. This is due to a global increase in the aging population, the need for disease management, and effective patient monitoring. The prevalent technology of wearable devices is Bluetooth technology due to its low cost, low energy, and size. Despite the growth recorded in the adoption of Bluetooth Wearable IoMT, there are concerns by users and other healthcare stakeholders about security and privacy issues with its adoption. Our paper presents a simulation of passive and active attacks on 3 wearable IoMT devices, followed by analysis and evaluation of the experiment outcomes. Thereafter, countermeasures for the identified weaknesses were provided. It was discovered that some of the standard security features of Bluetooth Technology to mitigate privacy and security issues were not implemented in some of the devices, which can result in data compromise in the devices. A security assessment framework was developed to assess the security of Bluetooth IoMT devices using the Bayesian Network model. This is used to rank devices, identify their vulnerabilities, and apply security measures on the identified vulnerabilities. Our paper further provides recommendations on improving the security of Bluetooth IoMT devices.},
     year = {2021}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - Security Performance of Internet of Medical Things
    AU  - Taiwo Adenaiye
    AU  - Waleed Bul’ajoul
    AU  - Funminiyi Olajide
    Y1  - 2021/02/02
    PY  - 2021
    N1  - https://doi.org/10.11648/j.net.20210901.11
    DO  - 10.11648/j.net.20210901.11
    T2  - Advances in Networks
    JF  - Advances in Networks
    JO  - Advances in Networks
    SP  - 1
    EP  - 18
    PB  - Science Publishing Group
    SN  - 2326-9782
    UR  - https://doi.org/10.11648/j.net.20210901.11
    AB  - Internet of Medical Things is the internet connection of medical devices to perform services and processes to support the healthcare sector. Wearable Technology in Healthcare has seen tremendous growth in recent times. This is due to a global increase in the aging population, the need for disease management, and effective patient monitoring. The prevalent technology of wearable devices is Bluetooth technology due to its low cost, low energy, and size. Despite the growth recorded in the adoption of Bluetooth Wearable IoMT, there are concerns by users and other healthcare stakeholders about security and privacy issues with its adoption. Our paper presents a simulation of passive and active attacks on 3 wearable IoMT devices, followed by analysis and evaluation of the experiment outcomes. Thereafter, countermeasures for the identified weaknesses were provided. It was discovered that some of the standard security features of Bluetooth Technology to mitigate privacy and security issues were not implemented in some of the devices, which can result in data compromise in the devices. A security assessment framework was developed to assess the security of Bluetooth IoMT devices using the Bayesian Network model. This is used to rank devices, identify their vulnerabilities, and apply security measures on the identified vulnerabilities. Our paper further provides recommendations on improving the security of Bluetooth IoMT devices.
    VL  - 9
    IS  - 1
    ER  - 

    Copy | Download

Author Information
  • School of Science and Technology, Nottingham Trent University, Nottingham, UK

  • School of Science and Technology, Nottingham Trent University, Nottingham, UK

  • School of Science and Technology, Nottingham Trent University, Nottingham, UK

  • Sections