{"title":"IoMT医疗物联网通信协议主要攻击分析","authors":"Carlos Jose Martinez, S. Galmés","doi":"10.1109/aiiot54504.2022.9817252","DOIUrl":null,"url":null,"abstract":"Technological evolution and the current situation in the world have given rise to new emerging realities in medicine, such as point-of-care diagnosis and individualized health service without limitations such as time and place. Thanks to IoMT, new forms of contact between healthcare providers and patients have been developed using the Internet. This research aims to analyze the security of IoMT communication protocols and their limitations. For this purpose, an exhaustive review of the literature on intelligent healthcare is performed because there are many articles published in indexed journals that have addressed these issues in recent years. This review involves a bibliometric analysis of the variables Protocols, Communication, and IoMT, which bases its search on Scopus to fulfill the objective. A total of 27 documents published during the period 2015–2020 were identified as 2019, the year in which the most significant record was achieved with 11 publications; it is also established that 51.9% of the identified documents are of type Journal Article 33.3 % Conference Articles. Next, this literature is analyzed, particularly those publications emphasizing the security measures of the protocols, their vulnerabilities, and the attacks to which IoMT implementations are subjected, to make known the position of different authors regarding the subject proposed in this document. Finally, future research directions are provided to further progress in constructing theories related to the topic studied.","PeriodicalId":409264,"journal":{"name":"2022 IEEE World AI IoT Congress (AIIoT)","volume":"328 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Analysis of the primary attacks on IoMT Internet of Medical Things communications protocols\",\"authors\":\"Carlos Jose Martinez, S. Galmés\",\"doi\":\"10.1109/aiiot54504.2022.9817252\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Technological evolution and the current situation in the world have given rise to new emerging realities in medicine, such as point-of-care diagnosis and individualized health service without limitations such as time and place. Thanks to IoMT, new forms of contact between healthcare providers and patients have been developed using the Internet. This research aims to analyze the security of IoMT communication protocols and their limitations. For this purpose, an exhaustive review of the literature on intelligent healthcare is performed because there are many articles published in indexed journals that have addressed these issues in recent years. This review involves a bibliometric analysis of the variables Protocols, Communication, and IoMT, which bases its search on Scopus to fulfill the objective. A total of 27 documents published during the period 2015–2020 were identified as 2019, the year in which the most significant record was achieved with 11 publications; it is also established that 51.9% of the identified documents are of type Journal Article 33.3 % Conference Articles. Next, this literature is analyzed, particularly those publications emphasizing the security measures of the protocols, their vulnerabilities, and the attacks to which IoMT implementations are subjected, to make known the position of different authors regarding the subject proposed in this document. Finally, future research directions are provided to further progress in constructing theories related to the topic studied.\",\"PeriodicalId\":409264,\"journal\":{\"name\":\"2022 IEEE World AI IoT Congress (AIIoT)\",\"volume\":\"328 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-06-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE World AI IoT Congress (AIIoT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/aiiot54504.2022.9817252\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE World AI IoT Congress (AIIoT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/aiiot54504.2022.9817252","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Analysis of the primary attacks on IoMT Internet of Medical Things communications protocols
Technological evolution and the current situation in the world have given rise to new emerging realities in medicine, such as point-of-care diagnosis and individualized health service without limitations such as time and place. Thanks to IoMT, new forms of contact between healthcare providers and patients have been developed using the Internet. This research aims to analyze the security of IoMT communication protocols and their limitations. For this purpose, an exhaustive review of the literature on intelligent healthcare is performed because there are many articles published in indexed journals that have addressed these issues in recent years. This review involves a bibliometric analysis of the variables Protocols, Communication, and IoMT, which bases its search on Scopus to fulfill the objective. A total of 27 documents published during the period 2015–2020 were identified as 2019, the year in which the most significant record was achieved with 11 publications; it is also established that 51.9% of the identified documents are of type Journal Article 33.3 % Conference Articles. Next, this literature is analyzed, particularly those publications emphasizing the security measures of the protocols, their vulnerabilities, and the attacks to which IoMT implementations are subjected, to make known the position of different authors regarding the subject proposed in this document. Finally, future research directions are provided to further progress in constructing theories related to the topic studied.