Keywords

1 Introduction

Nowadays, Internet of Medical Things (IoMT) has become a building block for modern healthcare as it is able to operate with significantly stringent resources. Over the course of last two decades, it has been greatly enhanced to be used by healthcare providers for different purposes within this field: improving quality of treatments, managing diseases, reducing errors, improving patient experience, managing drugs, and even lowering costs. However, these applications are often prone to serious security issues which is a major impediment to the evolution and rapid deployment of this sophisticated technology. Issues related to this include mainly: identity theft, information theft, and data modification. In fact, these security problems represent real danger for the IoMT environment as medical data are often considered personal and sensitive.

One of the prominent cases of DDoS (Distributed Denial-of-Service) attacks took place in October 2016, which was launched on DNS (Domain Name System) service provider through an IoT botnet. The botnet used a malware named Mirai. The latter led to shutdown of huge portions of the Internet including Twitter, the Guardian, Netflix, Reddit, and CNN [1].

With the fact that such dangerous threats could be active at any point of time, the need arises for strong security mechanisms to protect the IoMT infrastructure. As we know, the first step to ensure security, which is a critical factor, is the complete understanding and appropriate categorization of existing and potential threats to the IoMT environment. It has been shown through several on-going research works that the implementation of secure IoMT applications is achievable by incorporating security measures with each involved technology. Moreover, the development of new IoMT technologies combined with Artificial Intelligence (AI), Big Data and Blockchain offers a variety of possible solutions [2]. The aim of this chapter is to study the existing literature and identify the factors and obstacles affecting the expected development of IoMT and its wide-spread use.

Following the Introduction, the rest of the chapter includes the following:

  • In Sect. 2, we present the context of IoMT systems and their architecture, we specify the security requirements of IoMT systems, and also consider the current security techniques and their robustness against various existing attacks.

  • In Sect. 3, we discuss different attacks against the IoMT system and classify the security techniques discussed to prevent or mitigate these attacks.

  • In Sect. 4, we present for each layer of the IoMT system, the communication protocols and mechanisms used in different medical devices within the healthcare ecosystem. We also discuss the level of security for each mechanism studied as well as possible mitigation solutions.

  • We conclude the chapter in Sect. 5 with some future research directions.

2 Internet of Medical Things (IoMT)

In order to understand the later sections, this section presents a general overview of IoMT systems, their architecture, the different security requirements as well as the available security techniques.

2.1 IoT and IoMT

The term, Internet of Things (IoT) refers to a wide range of interrelated objects and devices which use embedded systems like processors and sensors to collect information from the environment. After harvesting data, these devices analyze that. Then, through actuators, they act back and take action on the physical world [3]. By integrating every object for interaction through embedded systems, IoT enhances the ubiquity of the Internet. This leads to a highly distributed network of devices that can communicate with other devices and human beings [4].

Nowadays, the field of healthcare is witnessing a remarkable development thanks to the Internet of Things (IoT). With the ongoing development of different IoT technologies such as smart sensors and advanced lightweight communication protocols, it has been possible to interconnect many medical “things” to monitor and examine biomedical signals. Moreover, these IoT devices can even diagnose different diseases without any human intervention and thus they are called Internet of Medical Things (IoMT) [5]. Therefore, we can conclude that IoMT is mainly a network of devices which is connected to the Internet that uses sensors and electronic circuits to collect data in the form of biomedical signals from a patient [6]. Then, a processing unit processes these biomedical signals, a network device transmits the collected data over a network, a permanent or temporary storage unit is used to store data, and finally, a visualization platform is used with artificial intelligence schemes, so that it is capable of making decisions at the convenience of the physician.

2.2 Types of IoMT Devices

IoMT systems provide either needed or enhanced assistance for many medical conditions. Consequently, they can be classified into two main categories: Implantable Medical Devices (IMDs) which are necessary devices for specific medical conditions like pacemakers, and the Internet of Wearable Devices (IoWD) which are assistive devices to enhance the healthcare experience like smart watches.

Implantable Medical Devices (IMDs). As the name suggests, an Implantable Medical Device (IMD) is a device which is implanted to replace a missing biological structure or to support a damaged biological structure. Moreover, an IMD can even be used to enhance an existing biological structure. The main purpose of such implantable devices is monitoring signals from the patient's body and to send them to other medical systems [7]. They are mainly made up of tiny wireless modules and health sensors that collect like temperature, motion blood glucose and blood pressure. An example of such IMDs is the pacemaker which can be very useful for controlling abnormal heart rhythms. If the heart ever beats too fast or too slow from its normal rate, the pacemaker will work in an effective way to bring back the heart to its normal rate [8]. To keep such kind of devices in the human body for a long time, there are certain requirements for the IMD. Some of these requirements include low power consumption and small batteries that last a long time. The typical lifetime of a pacemaker, for example, is determined by how frequently we need to use it. Consequently, this can range from 6 to 10 years. And, it all depends on how frequently the device needs to pace the heart [9].

Infusion pumps, such as enteral, Patient-Controlled Analgesia (PCA), and insulin infusion pumps can be used in a variety of treatments [10]. Infusion pumps have been linked to a number of patient safety issues. As a result, the development of authentication mechanisms is critical. In real-world applications, remote pump control is a common requirement. This is why many authors concentrate on it. For example, to avoid the implementation of encryption, the authors in [11] have developed a new protocol that can be used in the communication of remote implantable devices (such as Medtronic insulin pump), and it will rely on plain text.

A glycemia (i.e., the presence, or the level, of glucose in one's blood) alarm system is presented in [12]. This system has the ability of calculating the amount of insulin dynamically to be administered to diabetes patients. Although the wireless communication scheme may increase the security threats on these electronic devices, it remains the best desired communication scheme for the implementation of these devices. Examples of this include cable breakage and infection [13]. Figure 1 shows some of the most used IMDs and their positions in the human body.

Fig. 1
figure 1

Most used IMDs and their positions in the human body

Internet of Wearable Devices (IoWDs). Individuals wear such devices to monitor their biometrics, which may help improve their overall health. This category contains a wide range of IoMT systems. Examples of IoWDs include [14, 15]:

  • EEG (electroencephalography) and ECG (electrocardiography), which are used to monitor the heart and brain respectively.

  • Fall detection band, blood pressure monitors and electrocardiogram (ECG) monitors [16].

  • Smart watches that are quite famous currently for monitoring biometrics like heart rate and movement. When the individual is not active, the monitoring can detect slow and fast heartbeats. The new watches can also be used for fall detection and ECG readings to detect medical conditions such as atrial fibrillation (irregular heartbeat). They are now commonly used for non-critical patient monitoring [17].

  • Activity sensors which can be used to monitor actions like running and sleep.

  • Accelerating sensors which are capable of tracking the patient's rehabilitation.

  • Respiratory rate sensors monitoring the patient’s breathing and muscle activity.

  • Sensors and fitness trackers.

However, due to battery life limitations and sensor accuracy, these devices are unlikely to be used to replace IMDs in critical situations [18].

2.3 IoMT Systems Architecture

The existing IoMT systems [19] usually have four main stages: Sensor Layer, Gateway Layer, Cloud Layer and Visualization/Action Layer, as shown in Fig. 2. These layers include all the steps that data passes through, from the collection of patient biometric signals via wearable sensors/devices to the final step of storage and visualization by the patient or analysis with a physician in a healthcare application.

Fig. 2
figure 2

IoMT system architecture

Sensor Layer. The major function of the Sensor Layer is to establish an effective and accurate sensing technology to collect various types of health-related data [20]. The system uses implanted or worn sensors (like a pacemaker or a smart watch) to collect the patient’s biometric data. These data are transmitted through wireless protocols such as WI-FI, Bluetooth or over MedRadio frequency spectrum reserved for IMDs to the second layer [21].

The attacks at this layer can be against the hardware or software. The system must be appropriately protected against these attacks so as to ensure the right functioning of the system and not to threaten the life of people using the IoMT.

Gateway Layer. As shown in Fig. 2, this layer acts as a bridge between IoMT sensors with low processing and storage capacity and the Cloud layer. The data is transferred to this layer without any processing. Devices that can be used in this layer include the patient’s smartphone or a dedicated Access Point (AP), which can be typically more powerful than IoMT sensors. Some of their functions include performing some pre-processing operations as well as forwarding sensor data to the cloud through the Internet [22].

Cloud Layer. The retrieval and execution of the information obtained from the other layers, i.e., the sensor and gateway layer is performed at this level. Cloud servers control the systematic computing capacity. In addition to storage capacity, cloud servers also have the ability to make decisions based on the information obtained. In some critical heterogeneous IoMT applications, cloud servers can take action quickly based on emergency event detection mechanisms [23]. The analysis performed at the cloud layer includes processing data to find any changes in the patient’s health. After being detected, the changes are presented to the physicians for any emergency response or patients for further actions. This layer provides a means of remote access to manage and control the various sensors.

The data in the cloud and visualization layer is mostly at rest - it is just as vulnerable as any other stage. Therefore, it is essential to protect it from unauthorized access. Attacks in this layer range from stealing account credentials to DoS/DDoS attacks [24].

Visualization/Action Layer. Data is displayed to the physician and the patient in this layer to allow for ongoing monitoring and control of the patient’s condition. This layer also contains the procedures indicated by the physician in the event of a change in the patient’s health; these processes can include quantity, indication, prescription or change of dosage of different medications.

2.4 IoMT Security Requirements

One of the major concerns of internet-accessible medical devices and healthcare network infrastructures is the security. In this section, we present the security requirements of future healthcare network infrastructures for IoMTs. This is based on CIANA (Confidentiality, Integrity, Availability, Non-Repudiation, and Authentication) considerations and includes the 11 security requirements listed below [22, 25, 26]:

  1. (1)

    Confidentiality/Privacy. For the IoMT operations to be confidential, it is required to ensure that confidential information is not disclosed or made available to unauthorized parties [27, 28]. Confidentiality in the context of the IoMT refers to the protection of the medical information that the patient shares with his/her therapist, physician, or medical staff from any intrusion which can harm the patient (or a rogue entity can use the medical information against the individual) [29]. There are certainly rules for collecting and storing the patient’s health data like adhering to legal and ethical privacy regulations such as GDPR (General Data Protection Regulation) and HIPAA (Health Insurance Portability and Accountability Act). The latter requires that only authorized individuals have access to the data. To protect the privacy of the patients’ health data, adequate safeguards must be adopted so as to prevent any data breaches. Such measures should be handled seriously because cyber criminals do not only violate the patients’ privacy but can also cause financial and reputational harm if they decide to sell that data in the illegal markets [29]. Fortunately, a range of approaches that can be used to ensure confidentiality are available. These approaches can make the patients’ data unintelligible [28]. Currently, cryptography and access control lists are the techniques that best meet this requirement [22].

  2. (2)

    Integrity. The data integrity requirement for IoMT health systems is to make sure that the data arriving at its intended destination has not been altered in any way during wireless transmission [30]. Integrity for IoMT data ensures that the patient’s information, such as personal medical data and test results are accurate [28]. Nowadays, healthcare organizations are more aware than ever before about the importance of data integrity. The ability to detect possible unauthorized distortion or manipulation of data is critical to ensure that data has not been compromised. Therefore, appropriate data integrity mechanisms must be adopted to prevent the malicious attacks from altering transferred data. The legal and ethical GDPR state that medical providers must take the necessary steps to ensure that patient data is not altered i.e., it is accurate and up-to-date. Moreover, it insists that any altered personal data should be deleted or rectified as soon as possible [31]. The GDPR also emphasizes “accuracy” of data. It states that data owners should be able to request service providers to correct inaccurate information, and that service providers must respond to these requests within one calendar month. Similarly, HIPAA requires medical providers to adopt measures to ensure that PHI (Patient Health Information) stored in systems can only be changed by legal authorization [31].

  3. (3)

    Availability. Availability refers to the accessibility of services and data, provided by servers and medical equipment, to the affected users whenever they need them. Most importantly, these services and data will become unreachable in the event of DoS attacks. Any inaccessibility of data or services could result in life-threatening incidents for the patient, like the inability to provide early warning of a heart attack. Therefore, so as to ensure data availability to users and emergency services, any healthcare application must be always-on. By adopting preventive security measures and countermeasures to DoS attacks, healthcare providers can restore availability and access to personal data in a timely manner [32]. Therefore, to ensure availability, the system should be always updated to monitor any performance changes, provide suspicious data storage or transmission routes in case of DoS/DDoS attacks, and increase the performance of the systems to be able to solve any problem quickly.

  4. (4)

    Non-Repudiation. It refers to the ability of holding any authorized user accountable for his/her actions. Simply put, non-repudiation ensures that no operation in the system can be denied [22]. This requirement prevents the authorized users from disclaiming previous commitments or actions in the system [28]. A patient might deny that some data belongs to him, when in fact the extracted data was sent from his sensors. Another case could be updating a few sensors firmware by an authorized developer, but the latter refuses to admit its validity. In many cases, if an authorized entity denies previous commitment or action, a specific procedure involving a trusted third party is usually required to resolve the situation [28]. Using digital signature techniques is the best way to meet this requirement [22].

  5. (5)

    Authentication. This requirement refers to the ability to validate a user’s identity when the user accesses the system. On the other hand, the process by which a user is verified as the original source of given data at some point in the past is known as message authentication. The most secure form of authentication is mutual authentication. In this authentication, the client and the server authenticate each other before exchanging secure key or data. Because of the lack of memory storage in several IoMT devices or insufficient CPU (Central Processing Unit) power to perform the cryptographic operations required by traditional authentication protocols, lightweight authentication protocols are becoming more popular [33].

  6. (6)

    Authorization. It refers to confirming that authenticated users only execute commands that they are authorized to execute [34]. More specifically, authorization makes sure that only authorized entities can access to specific network services or resources, like patient’s collected medical data. Permission to perform a given action, like issuing commands to medical IoMT devices or updating the medical IoMT device software is granted only for trusted expertise parties.

  7. (7)

    Anonymity. This requirement ensures that the identity of the patient or physician remains hidden from unauthorized users when they interact with the system, i.e., both the patient and the physician should remain anonymous. The identity of the patient/physician should not be exposed when they are in communication [35]. Passive attacks can see what you do but not who you are. This anonymity can be achieved (for instance) by using smart card like mechanisms.

  8. (8)

    Forward and Backward Secrecy. Forward secrecy has been identified as a critical property of a variety of cryptographic primitives. It keeps the future transmitted data secure even if previous data have been compromised. However, even if the current data have been successfully attacked, backward secrecy makes sure that old data are safe. To achieve forward/backward secrecy, time-based authentication parameters must be used. The authors in [36] proposed a method that provides the secret both in front and behind the group’s members. Furthermore, it provides a formal analysis of the new method’s correction based on BAN (Burrows–Abadi–Needham) authentication logic.

  9. (9)

    Secure Key Exchange. This is the requirement which means the ability to securely distribute keys among system nodes. One of the most efficient algorithms for data security is the Elliptic Curve-Diffie Hellman (ECDH) using key exchange [37].

  1. (10)

    Key Escrow resilience. This requirement ensures that the system administrator is not allowed to impersonate any user authorized to use the system. This helps protect the system against internal threats. To meet this requirement, the Key Generation Server (KGS) only has half of the key and will be unable to compute the entire private key for both entities [38]. This requirement can be met by combining a cryptographic hash function (CHF) and asymmetric keys.

  2. (11)

    Session Key Agreement. Following the authentication process, Session keys must be used by every node in the system. The work in [39] proposed a system in which each sensor node agrees on the generation of session keys. This scheme improves performance so that the authenticated device can calculate session key ahead of time.

2.5 IoMT Security Techniques

For securing IoMT systems, several techniques are available by this time. Based on [22] (see Fig. 3), these techniques are classified into three types (mainly): symmetric, asymmetric, and keyless. Cryptographic algorithms are used in both symmetric and asymmetric techniques, whereas keyless techniques are non-cryptographic.

Fig. 3
figure 3

Security techniques

  1. (1)

    Symmetric Cryptography. Symmetrical key Cryptographic algorithms are the fundamental building blocks of any secure system that requires confidentiality. They are typically used to encrypt bulk messages transmitted between two systems. The keys used for encryption and decryption in these cryptographic algorithms are the same for both communicating entities, and this is shown in Fig. 4 [40]. This key must be generated and distributed prior to any communication.

    Fig. 4
    figure 4

    Symmetric cryptography operation flow

In this subsection, we will look into how symmetric cryptographic algorithms can be integrated into IoMT systems.

Continuous Facial Recognition. It is the technology that allows IoMT systems to authenticate users by scanning their faces. Identity hashing and continuous facial recognition are the two steps in this technique. The ID is hashed only once, at the start of the session. After passing the identification hash test, continuous facial recognition is performed throughout the session [41]. Biometric authentication is performed in this step. Each authorized person has a set of images taken and saved with their respective roles. This technique can effectively secure the system in a medical environment due to its continuous scanning of the user’s face while using the system.

Hierarchical Access. This technique enables patients’ data stored in the cloud layer to be accessed in a hierarchical manner. One approach makes use of a hierarchical role based model and gives permission based on the role of the user [26]. All authenticated nurses, for example, can dispense medications; however, in order to prescribe a new medication, a doctor is required. To support this hierarchical access, the work in [26] used the Chinese Remainder properties. It is a technique in which any patient’s data can be accessed by a user with a higher privilege. The user with a lower privilege, on the other hand, can access a portion according to his role. Additionally, the work in [41] proposed a hierarchical key allocation scheme that supports dynamic updates, in particular, the concept of security against key indistinguishability. As a foundation, the authors employed a symmetric encryption scheme.

Gait-Based Technique. Gait recognition refers to the task of identifying people based on how they walk. To generate unique symmetric keys, this method employs the human walking pattern. The work in [42] demonstrates that depending on the gait, additional tasks such as gender recognition or age estimation can be processed. When more than one walk-based task is jointly trained, the identification task converges faster than when trained independently, and multi-task pattern recognition performance is equal to or better than more complex single-task pattern recognition.

CHF with XOR. Converting data of arbitrary size to data of fixed size through a one-way mathematical function is known as CHF (Cryptographic Hash Function) [43]. In order to determine whether one of its operands is different, exclusive-OR (XOR) can be used. Within the healthcare field, a sensor ID or a shared key (or any other initial parameters) can be XORed and then hashed. Then, the hashed parameters are distributed from the key generation server to the sensor and gateway nodes. These nodes are enabled by the parameters to generate keys [44]. Experimental results and theoretical analysis indicate that when combining CHF, a symmetric key, and XOR operator, the scheme significantly reduces the computational cost compared to schemes using asymmetric encryption and presents a lower security risk compared to lightweight schemes, as demonstrated in [45] and [46]. The hash function is also used in this technique to support unique identification parameters. However, initial parameters must be added manually to all nodes by the system administrators during the system’s initialization step.

  1. (2)

    Asymmetric Cryptography. Asymmetric cryptography, also known as Public Key Cryptography (PKC), refers to cryptographic algorithms that encrypt and decrypt data using a pair of related keys, the public key and the private key, to prevent unauthorized access. Everyone has access to the public key, but only the owner has access to the private key. Two popular algorithms in this technique are Rivest–Shamir–Adleman (RSA) and Elliptic-Curve Cryptography (ECC) [47, 48]. However, due to its subtle characteristics, ECC is the most widely used cryptographic technique for securing IoMT systems. A 160-bit ECC key is as good as a 1024-bit RSA key and is 15 times faster [49]. Figure 5 [40] illustrates asymmetric encryption which uses two keys, mathematically linked but distinct to encrypt (public key) and decrypt data (private key).

    Fig. 5
    figure 5

    Asymmetric cryptography operation flow

CHF with ECC. When used in conjunction with ECC keys, the CHF feature allows the establishment of a secure, certificateless channel between patients and their physicians [25]. The two techniques are combined to provide a secure method for sharing keys between different layers of IoMT. After the nodes receive the hashed values, they can be used to generate their asymmetric keys. This technique can also reduce the overhead associated with certificate management for cloud data storage and sharing [50].

Homomorphic Encryption (HE). Homomorphic encryption allows for the secure transmission and storage of confidential information across and within a computer system [51]. HE attempts to help in the encryption process by allowing certain types of computations to be performed on ciphertext. This process ends up with an encrypted result that is also in ciphertext. Its output is the result of operations on the plaintext. However, this technique is different from others because it does not allow the medical staff to see the patient data. Only the patients can have access to their data, except in emergencies. This is helpful for some IoMT sensors, like smartwatches.

There are three types of HE schemes: partial HE (PHE), which can perform a single mathematical operation an infinite number of times; somewhat HE (SHE), which can only perform a limited number of operations; and fully HE (FHE), which supports an infinite number of operations. Thus, among the three schemes, the FHE is the most suitable for fast data aggregation without compromising data confidentiality [49]. Optimal HE (OHE) is an FHE variant that is best suited for hospital healthcare monitoring systems. The key is authenticated during encryption, and the best key is chosen using the Step Size Fire Fly (SFF) optimization algorithm. This strategy can be used to generate the encrypted key while achieving maximum key breaking time and minimal computational time while maintaining high security [52].

Digital Signatures. These techniques are frequently used to validate the authenticity of data/commands by signing and verifying them with the sender’s private and public keys, respectively [53]. Digital signatures can be embedded into sensor firmware in IoMT systems using an add-on software shim, allowing it to validate and intercept sensor wireless communications [54]. The sensor’s firmware must store a list of authorized users’ public keys in order to validate these techniques. The work in [55] propose a scheme for authenticating a device that includes multi-factor authentication, digital signatures, and device capability. The proposed scheme not only efficiently authenticates the device via multi-factor authentication, but also it authenticates the authentication server via digital signatures.

Smart Cards. Smart cards in healthcare systems are thought to have enormous potential for improving healthcare delivery as well as lowering healthcare costs. Because of its reliance on physical keys, this technique is different from the previous techniques [56]. With ECC keys serving as the first factors, the physical keys serve as the second for authentication. To gain access to a system IoMT, the user must first enter an access key before using their smart card. Apparently, this technique helps the system resist cyber break-ins if one of the two factors is compromised. This is why smart cards are quite common these days.

  1. (3)

    Keyless Techniques. In this subsection, we explain the keyless techniques that provide security without using pre-shared keys.

Biometric Technique. Owing to its simplicity, this technique has become the most used technique to ensure IoMT systems. This technique uses biometric sensors to identify users’ physical characteristics such as, fingerprint sensors, which can read the fingerprint image, and ECG-based sensors that record heartbeat activities in order to encrypt data. There are different fingerprint authentication algorithms such as: Delaunay triangulations, polar coordinates and Minutia Cylinder-Code (MCC) [57]. The performance and complexity of the applied algorithm determines the performance of the device used. The Finger to Heart (F2H) IMD fingerprint authentication algorithm based on Minutia Cylinder-Code (MCC) is proposed to ensure the safety of IMDs such as pacemakers and defibrillators. This improved algorithm significantly reduces both message size in transmission and device computational overhead, while conserving IMD’s limited resources [58].

Token-Based Security. The use of passwords or predefined keys presents many problems that limit their applicability for various IoMT applications. Whether software or hardware, tokens can be used for user authentication. The use of lightweight token-based user authentication (TBL UA) for IoMT devices, based on the token technique, improves the robustness of authentication [59]. Radio Frequency Identification (RFID) can also be used as a hardware token in a hospital information system (HIS) for secure sensor logistic management [60]. The work in [61] proposes an implementation of MQTT (Message Queue Telemetry Transport) protocol token authentication in constrained devices. According to the results of the usability and performance tests, the system can perform valid and expired token authentication in a reasonable amount of time.

Blockchain Technology and AI. Due to their impact with their advanced distributed security and remarkable role in securing other fields like finance, Blockchain and Artificial Intelligence (AI) have become the key technology for the requirements of IoMT systems, mainly to bring transaction and data processing at the cloud layer [62]. In IoMT systems, the blockchain technology is used as a security management to share information between the patient and other parties like the doctors. AI systems, on the other hand, can detect intrusions or anomalous behavior in patient data and network flows. Nevertheless, these techniques still face some challenges that allow them to be implemented in the IoMT systems that are discussed in [63, 64].

3 Risks and Attacks in IoMT

In this section, we will discuss the possible physical and network attacks that threaten the IoMT systems and how to avoid or mitigate them.

3.1 Physical Attacks

In this type of attack, the attacker must be physically close to the network or devices of the system in order to launch the attack wirelessly [65]. To extract security keys or patient data, the attacker targets the physical components of the IoMT systems. Some of the common types of physical attacks are the following:

Physical Security Token Loss. It is when the attacker steals a physical security token, like a smart card or proximity card, from an authorized user in order to have access to the system. The security requirements violated in this case are authentication, authorization, anonymity, and forward secrecy. As the smart card or proximity card alone is insufficient to hijack the system, authentication based on ECC combined with smart cards can be used to protect the system against this type of attack [56].

Impersonation attacks. The attacker pretends to be a legitimate entity or an authorized user to access resources to which he is not authorized. Bluetooth Impersonation Attacks (BIAs) are effective against any Bluetooth device, and they are undetectable because the Bluetooth standard does not require notifying end users of the outcome of an authentication procedure or the lack of mutual authentication [66]. To avoid such attacks, cryptographic techniques such as, CHF and biometrics should be employed.

Tampering. It is an attack in which the attacker physically modifies the data of the IoMT systems [67]. Any modification in a device like RFID or communication link is considered a tampering attack. Altering the IoMT data by attaching external devices and attacking sensors is also considered a tampering in an emergency. However, this attack can be mitigated if symmetric keys are combined with facial recognition or if keyless methods are employed [41, 57].

Side Channel. These attacks rely on information achieved from the encryption device’s side channels. In addition to plaintext and ciphertext messages, they are used to recover the secret key using electromagnetic analysis, power consumption or, differential power consumption during encryption/decryption of various messages and during computation of various security protocols [68]. In addition to cryptography techniques, the Datagram Transport Layer Security (DTLS) protocol can be used to avoid such attacks as the work presented in [69] recommended. On the other hand, Blockchain technology and AI were demonstrated as additional detection and mitigation strategies in [62].

Radio Frequency (RF) Jamming/Desynchronization. This is another serious type of attack on the IoMT systems. Because IoMT sensors are limited in energy by the battery, they may cause battery discharge. Blockchain and AI technologies have the potential to mitigate the effects of these intrusions by finding alternate routes or cutting off the canal’s connection to the attacker [70].

Fake Node Injection. In this intrusion technique, to control data flow between two legitimate nodes of the network, the attacker drops a fake node between them [65].

Permanent Denial of Service (PDoS). Also known as Phlashing, PDoS is a type of DoS attack in which hardware sabotage completely destroys an IoMT device. The attacker launches the attack using a malware to destroy firmware or to upload corrupted BIOS (Basic Input Output System) [45].

Sleep Denial Attack. In this attack, the battery powered devices are kept awake by the attacker who feeds them with wrong inputs. The batteries eventually get exhausted and thus cause the devices to shutdown [65].

Malicious Code Injection. In this intrusion technique, a malicious code is injected onto a physical device by the attacker. By compromising this device, the attacker may be able to launch other attacks as well [65].

The physical attacks, their effects, and the solutions proposed are summarized in Table1.

Table 1 List of physical attacks, effects and proposed solutions

3.2 Network Attacks

Bluetooth and Internet connections (wireless) can be targets of various types of attacks at different layers of the IoMT system. Stealing or fabricating patients’ data, creating congestion, jamming, or connection blocking can affect normal operations or result in a total communication failure, which is usually the primary objective of these kinds of attacks.

Man-In-The-Middle (MITM). It is an attack that targets the communication between two IoMT devices and gives access to their private data. In this attack, the attacker is able to eavesdrop or monitor the communication between the two devices [67]. The intercepted data can be modified by the attacker before it is sent to its original destination. For instance, a patient biometric data, which is transmitted between any two layers of the IoMT system, may be altered or modified. As explained in [77], this is possible with the use of Unmanned Aerial Vehicles (UAVs) that result in a Drone-in-the-Middle (DitM) attack. MITM can be made even more powerful if the UAV is linked to a cloud, allowing it to perform more intensive computation in a relatively shorter amount of time.

DoS/Distributed DoS (DDoS). Unlike DoS attacks, which were perpetrated by a single node, a DDoS attack involves multiple sources attacking a specific target by flooding it with messages or connection requests with the goal of making service unavailable, preventing legitimate users of a service (i.e., from using it) [78]. Network fragmentation can also occur because of such attacks. Typically, the cloud layer is the main target for these attacks so as to make the system unavailable to users [79]. Consequently, availability is the violated requirement in this type of attacks. Similar to Radio Frequency (RF) Jamming attacks, Blockchain technology and AI can find alternative paths or terminate the connection to the channel controlled by the attacker, and thus can mitigate these attacks [70].

Clock Synchronization. IoMT systems, like all real-time systems, require a clock synchronization protocol. The latter is the target of this type of attack. The secure key exchange is the violated requirement in this attack. This attack is considered serious because the attacker can make other attacks (such as relay, replay, and MITM) difficult to detect [22]. However, the combination of ECC with smart cards can be used to mitigate this kind of intrusion [56].

Sniffing. Sniffing attacks passively intercept data sent between two nodes. This attack results in a breach of patient data confidentiality as the attacker can see the data transmitted between the system’s layers [77]. Thus, the data confidentiality is the violated requirement in this attack. To mitigate this type of attack, any encryption algorithm, whether symmetric, asymmetric, or keyless can be used.

Relay. The intercepted data, after a successful sniffing attack, can be relayed to a third node without modifying it by the attacker. For instance, the intercepted patient data can be redirected to the attacker’s device before being sent to its final destination [70]. The authorization requirement is violated by this attack. Techniques such as hierarchical access and secure session keys can be used to mitigate this.

Replay. In this case, a signed packet may be captured by the attacker who would resend the packet several times to the destination [52]. As a result, a DoS/DDoS attack is possible. The authorization requirement is violated with this attack. To mitigate these attacks, a timestamp, which is part of some cryptography techniques, can be used [62].

Brute Force. Typically, in this type of intrusion, the attackers use automated software that generates different password combinations until it succeeds. The strength of these attacks stems from the fact that the passwords chosen by the user are inherently weak, or it employs default generated passwords or username as password [42]. An example, which is a significant problem for IoMT devices, is the dictionary attack. The latter relies on passwords or known words in dictionaries. After capturing the encrypted/decrypted data with machines or more powerful tools, these attacks can also be carried out offline. A dictionary attack is considered a dangerous attack for IoMTs, because the password selection criteria can be guessed with a simple python script [80]. Security requirements for authentication and authorization are violated through such attacks; however; they can be mitigated with the use of keyless methods like biometrics.

Selective Forwarding. In this attack, some messages may be simply altered, dropped, or selectively forwarded to other nodes in the network by a malicious node [52]. As a result, the destination receives incomplete information.

RFID Spoofing. To gain access to the information printed on the RFID tag, the attacker first forges an RFID signal [65]. Then, he/she can send his/her data as valid using the original tag identifier [81].

RFID Unauthorized Access. An attacker can update (i.e. read, modify, or delete) data on RFID nodes because of the lack of proper authentication mechanisms, [82].

Table 2 summarizes the network attacks, their effects and the corresponding solutions proposed.

Table 2 List of network attacks, effects and proposed solutions

4 Security in IoMT Communication Protocols

In this section, we explore the communication protocols of IoMT. According to [85], the IoMT system can be divided into three main layers: the perception, network, and application layers. There are two more sub-layers between these three main layers: the adaptation layer, which includes the protocols that communicate between the perception layer and the network layer [86], and the transport layer, which also includes the protocols that transport information between the network and application layers [87]. We also present for each layer the most documented security measures, mitigation and implementation for each protocol to secure modern healthcare infrastructures and networks.

Figure 6 shows the different layers of IoMT systems in relation to the OSI (Open Systems Interconnection) reference model. This classification is based on the protocols and functions that each layer requires. The perception layer is primarily used for hardware functions. The network layer is responsible for network functions, while the application layer is designated for user functions.

Fig. 6
figure 6

IoMT versus OSI layers

4.1 Perception Layer

The majority of the perception layer protocols are based on or implement the IEEE 802.15.4 standard [88, 89]. To collect information about the patient’s health status from sensors, health systems have used the following perception layer protocols and mechanisms:

RFID. Radio Frequency Identification (RFID) is a wireless object identification technology which uses radio frequency signals for very short range communications [90]. Autonomous RFID tag technology that is placed in or near the patient’s body plays an essential role in the development of body health systems [91]. Moreover, passive RFID tags can be used in several situations such as; patient environment monitoring, physical access control [90, 91], and storage temperature monitoring for each type of drug [92, 93].

RFID is a technology that is used in devices with very low-power features, making common security mechanisms difficult to implement. However, researchers have proposed several noteworthy custom authentication mechanisms. An RFID tag authentication protocol is proposed in [94] that requires less storage and computation on the tag side. This protocol protects against replay, DoS, forward and backward tracing, and server impersonation, as well as provides privacy and security features. On the other hand, a hash-based RFID security protocol with forward privacy is presented in [95]. Its main aim is to protect the RF tag from tracking attacks by observing previous unsuccessful tag sessions. Furthermore, partial solutions to various limitations are identified and proposed in [96]. Examples include: dynamic password, synchronized secrets and custom system authentication systems.

NFC. NFC, or Near Field Communication, is a protocol that is used to connect IoT devices in a simple and low-cost manner [93, 97]. However, when NFC is used in IoT devices in the medical field, a number of biocompatibility issues arise. This infrastructure has the potential to provide convenient and low-cost power distribution and communication channels for a variety of medical devices. In addition, a battery or external electrical connection is not necessarily required in NFC-enabled medical devices for their custom operations [98]. An NFC device embedded in a cell phone, for example, can transmit pacemaker measurements to a monitoring doctor, control an insulin pump remotely, or activate an implanted neural simulator [92].

NFC implementations can be theoretically attacked by MITM attacks; however, it is extremely complicated to launch these attacks in real-world executions because of the NFC’s architecture and distance limitations [99] (even if tried wirelessly). Moreover, a list of known security issues with the NFC protocol is presented in the existing literature like for instance, in [100], where some practical countermeasures are also suggested for each of the attacks mentioned. Furthermore, a single and multiple antenna design for the NFC controller component is suggested in [101], in order to mitigate attacks like, data corruption, low battery, and tag cloning.

Bluetooth/BLE. Bluetooth is a wireless technology that is based on the IEEE 802.15.1 standard. It is a low-power, low-cost wireless communication technology that can transmit data between mobile devices over a short distance (8–10 m with 2.4 GHz band). Bluetooth Low Energy is the ultra-low power, low-cost version of this standard (BLE or Bluetooth Smart) [90]. In addition, these features make Bluetooth/BLE more suitable for IoMT devices such as IoWDs and human interface (HID) devices [102].

Different attacks may threaten devices which are connected through BLE, and according to published research works, these threats are across all communication layers. Nevertheless, a variety of security controls to mitigate such attacks are provided by BLE implementation [103]. To achieve confidentiality and integrity, some solutions employ AES-CCM encryption. To authenticate data channel packet data units (PDUs), a 4-byte MIC module can also be used [104]. Furthermore, in order to protect Bluetooth Low Energy (BLE) technology from attacks, the authors in [105] propose a set of techniques and countermeasures that can be used to secure Bluetooth communications.

Z-Wave. Z-wave is a low-power wireless MAC protocol developed by Zensys. It is used for remote control applications and small commercial domains [90]. This protocol supports two types of devices: control devices and slave devices [106]. Z-wave can also support short messaging between IoMT devices for light, energy, and healthcare control [87].

Z-Wave provides confidentiality, source integrity, and data integrity services through AES (mostly 128) encryption, policy-driven and behavior detection mechanisms. The security command class included in the Z-wave allows application frames to be encapsulated in an encrypted and signed security frame. Symmetric encryption protects the frame by using AES with three shared keys known by every network node that needs the security service [107]. Furthermore, techniques like hiding the WLAN SSID (Service Set IDentifier), using WPA2 (Wireless Protected Access 2) instead of WEP (Wired Equivalent Privacy), and Reverse Proxy Server can also provide extra protection for IoMT devices using Z-wave [108].

UWB. UWB (Ultra-wideband) technology is based on the IEEE 802.15.3 standard, which has recently gained popularity as a method of high-speed, short-distance indoor wireless communication [109]. One of the most intriguing aspects of UWB is its bandwidth of more than 110 Mbps, which is sufficient for most multimedia applications and is applicable for hospitals. UWB for medical systems is suggested in [110] because when communicating with implanted sensors, high signal attenuation requires a protocol that transcends channel limitations. It works by transmitting signals from sensors to a microcontroller [93]. For instance, a short distance communication technology is required by the electrocardiogram procedure and this is the aim of using UWB (among other protocols) [97, 111, 112].

Being a distance protocol, UWB is threatened by attacks that differentiate the distances between nodes. UWB adopts the Advanced Encryption Standard (AES) block cipher with counter mode (CTR) and cipher block chaining message authentication code (CBC-MAC) [113]. In [114], a Verifiable Multilateration (VM) algorithm that uses verification triangles to detect a distance enlargement attack is suggested. A location-based secure authentication scheme is proposed by other works like [115, 116] to prevent external attacks. In addition, [117] suggests the first modulation technique to prevent ED/LC (Early Detect/Late Commit) attacks regardless of communication range in the UWB with pulse reordering (UWB-PR).

Table 3 summarizes these issues discussed so far.

Table 3 Perception Layer protocols—security level, attacks and countermeasures

4.2 Network Layer

The network layer is responsible for the transmission and reception of the collected medical data. As a result, this layer serves as the foundational infrastructure layer for the healthcare platform. As such network devices transfer sensitive data, network security is a major concern in the field of healthcare [131]. The IEEE 802.15 standard is the foundation for the majority of the protocols in this layer [132]. The following protocols are the most commonly used for IoMT at this layer:

WiFi. Wireless Fidelity (Wi-Fi) is a middle-range (up to 100 m) protocol based on the IEEE 802.11 family of standards [133, 134]. A number of authors have proposed using Wi-Fi to communicate with monitoring devices in an IoMT system. For instance, the authors in [135] use this protocol on a network of 45 critical medical care devices, demonstrating that communication between these devices is effective and secure via Wi-Fi. Moreover, this protocol is used in a system for remote patient health monitoring in conjunction with Global System for Mobile communication (GSM) to simulate the transfer of medical data between two different geographical locations [136].

Wi-Fi Protected Access (WPA), Wi-Fi Protected Access 2 (WPA2), and Wi-Fi Protected Access 3 (WPA3) are the mechanisms used to secure Wi-Fi 802.11 × communications. WPA technology is characterized by providing more powerful encryption mechanisms [137].

ZigBee. ZigBee is a wireless communication protocol that conforms to the IEEE 802.15.4 standard and is intended for low-power, low-cost, low-speed wireless personal area networks that connect devices primarily for personal use [138]. This protocol is used by health zones to connect sensors to the coordinator, as well as between the coordinators themselves [139]. Implementing a fully working application layer protocol for healthcare environments, the ZigBee Health Care Profile is based on ZigBee Pro [140]. To enforce MAC layer security, ZigBee uses The IEEE 802.15.4 standard to employ higher layers. AES is used for symmetric key cryptography in implemented security mechanisms. Several other security modes are defined in [141, 142]. The authors in [143] propose a framework capable of predicting and protecting against various potential malicious attacks in the ZigBee network and responding appropriately by notifying the system administrator. It can also make instantaneous automated decisions based on real-time data defined by the system administrator.

WIA-PA. WIA-PA is a Chinese industrial wireless communication standard for process automation [144]. Despite being an industrial protocol, the work in [145] proposes WIA-PA as a transmission protocol in the internal networks of wireless sensor network, in medical remote monitoring system. The WIA-PA network’s MAC layer security is based on IEEE STD 802.15.4–2006. Above the MAC layer, it provides two levels of security services: end-to-end security in the application sub layer and point-to-point security in the data link sub layer (DLSL). Furthermore, WIA-PA provides a secure access authentication mechanism for the entire network [146]. WIA-PA architecture was proposed by Wang et al. for device authentication [147]. Access is authorized through WIA-PA by using a join key shared by a device and a security manager. A security mechanism for WIA-PA and its protocol stack is also suggested and implemented in [148].

6LoWPAN. 6LoWPAN is an IPv6 adaptation layer that defines mechanisms for enabling IP connectivity for tightly resource constrained devices communicating over low power, lossy links such as IEEE 802.15.4 [93]. In the healthcare sector, IoMT sensors and local devices can be linked to IP networks via 6LoWPAN [149]. Moreover, the interconnection of sensors with middleware devices or Internet-connected routers is allowed by 6LowPAN [150]. Security protocols for different layers of the 6LoWPAN stack have been developed. The MAC security sub layer of IEEE 802.15.4 provides hop-to-hop security for the wireless medium, while the upper layer security is defined to provide end-to-end security between two remote peers [151]. The 6LowPAN security measures are classified into two taxonomies in [152]. The first is about communication outside of the 6LowPAN network (use DTLS (Datagram Transport Layer Security), HIP (Host Identity protocol) and IKE (Internet Key Exchange) technology). The second is about “protocols inside communication” (use IDS tool).

LoRaWAN. Originally developed by Semtech, LoRa (Long Range) is a physical layer protocol made to support low-power and wide area networks [153]. LoRaWAN, on the other hand, defines the network’s communication protocol as well as the underlying system architecture [154]. An loT-based health monitoring system is presented in [155]. In this system, the medical data collected by sensors is sent to an analysis module via secure, low-cost and low-power communication links, provided by an infrastructure LoRaWAN network. Moreover, an IoMT biofluid analyzer which uses LoRa and Bluetooth is presented in [156] in order to support long-range data transmission.

LoRaWAN uses the 128-bit Advanced Encryption Standard (AES128) to ensure complete network security, including mutual end-point authentication, data origin authentication, replay and integrity protection, and privacy. A 128-bit AES key (called AppKey) and a globally unique identifier based on EUI-64 are used to uniquely identify each LoRaWAN device [157, 158].

Table 4 summarizes the Network Layer protocols’ security level, attacks and countermeasures proposed.

Table 4 Network Layer protocols’ security level, attacks and countermeasures

4.3 Application Layer

The application layer is responsible for managing the smart medical platform, which includes custom interfaces and role-based control panels for diagnostic decision making. The most commonly used IoMT protocols in the application layer are listed below:

HL7. HL7 is a set of standards that enable the exchange, integration, sharing, and retrieval of electronic health information between various health entities, allowing for the development of flexible and effective processes [167]. For its great importance, it is recognized as the most widely used application layer protocol in the healthcare systems [168]. The transparency of the information flow between health care systems is ensured by this protocol. In addition to clinical practice, HL7 supports the delivery, management and evaluation of health services [169].

Protecting data is the major aim from the security scope, because HL7 transmits data that may have a high impact. Many institutions rely on SSL VPNs (Secure Sockets Layer Virtual Private Networks) and similar solutions to protect the entire network. Deidentification/anonymization is helpful in protecting patient data [170].

CoAP. The Constrained Application Protocol (CoAP) protocol was originally designed for web transfer in the IoT with limited nodes and networks. The initial motivation for developing this protocol was to meet the high requirements of the IoT as well as the need for a lightweight, low-rate protocol. This protocol is specifically suited to IoMT constrained nodes with limited memory and processing power [171]. CoAP, along with the MQTT protocol, is used in a proposed system in [172] for securing real-time health monitoring systems, to protect sensor data from security breaches during its continuous transmission over the layers. To avoid breaches such as data theft and DoS attacks, strong authentication techniques should be used. It is recommended to use an intrusion detection system to detect any malicious activity in the system [173]. DTLS can also be used to protect data [174].

MQTT. Message Queue Telemetry Transport (MQTT) is a standardized publish/subscribe Push protocol developed by IBM in 1999. This protocol is used by IoMT developers due to its low memory consumption and low bandwidth requirements; MQTT was designed to send data accurately even with long network delays and limited bandwidth [171]. A Blockchain-based medical application that connects various devices to an IoMT platform via MQTT is created in the work presented in [175]. In addition, the work in [136] proposed a system to connect a remote healthcare unit as it is inside the hospital, which uses the MQTT protocol to transfer measured data from the healthcare unit to the hospital’s gateway.

Unfortunately, the MQTT protocol only supports authentication for the security mechanism, which does not encrypt data in transit by default. As a result, implementing this protocol raises concerns about confidentiality, authentication, and data integrity. MQTT brokers may require username/password authentication to ensure security, which is handled by the TLS/SSL (Secure Sockets Layer/Secure Socket Layer) protocol [176].

HTTP. There are different uses of this protocol in the IoMT. For example, it is used in a system that also includes a portable medical module with a pulse oximeter and an accelerometer that communicates with the microcontroller via a custom display to which a ZigBee module is connected. The goal of this system is to track the speed and direction of movement as well as the pulse and oxygen saturation of the blood [177]. Furthermore, it is used by the work presented in [12] to provide a system capable of dynamically assessing the amount of insulin needed to be administered to diabetic patients.

In order to make this protocol more secure, it is implemented on top of an encryption layer like SSL or TLS, to form its secure version https; with an ‘s’ at the end to indicate that the data is exchanged securely via an encrypted tunnel using the SSL or TLS protocol. HTTPS client authentication is done below the protocol level (at the transport level). Only the server side of an SSL connection must use a certified public key from a server certification. This method is appropriate when the client wants to ensure that it is communicating with the intended server, but if the server needs to authenticate the client, it can use a traditional authentication mechanism (basic HTTP authentication or form authentication). On the other hand, Mutual SSL authentication, also known as two-way SSL authentication, necessitates the use of certified public keys by both the server and the client of the SSL connection. The server identifies the client in this case based on the client certificate used to establish the SSL connection [178].

Tables 5 summarizes the Application Layer protocols’ security level, attacks and countermeasures proposed.

Table 5 Application Layer protocols’ security level, attacks and countermeasures proposed

5 Conclusions and Future Research Directions

The use of IoMT has recently grown in popularity. The majority of current studies are concerned about how medical and health-monitoring devices can help reduce healthcare spending and improve patient health. As a result, securing this technology has become extremely important since this IoMT is vulnerable to different attacks mainly because of its heavy reliance on wireless connectivity. These attacks can breach the system and invade the privacy of patients and affect the medical services’ confidentiality, integrity and availability. Throughout this chapter, we have shown and explained the major security problems, challenges and drawbacks facing IoMT. In addition, we have discussed the way to secure the IoMT domains and their associated assets through varied suitable security measures to enhance IoMT services as well as the way to better the patients’ health and experience via different techniques. Moreover, we have highlighted the importance of an effective security policy of different wireless communication protocols used by the IoMT system in order to keep it secured, private, trusted, and accurate.

In short, the purpose of this chapter is to highlight the relations between various technical and non-technical solutions to guarantee a secure and efficient system in all IoMT domains. Therefore, the chapter in hand gives some open research areas on security issues in IoMT both for traditional and novel-technology based solutions. To conclude, the need for developing robust security solutions using the latest technologies like Artificial Intelligence, Big Data and Blockchain is significantly growing as the IoMT are nowadays widely applicable.