A SYSTEMATIC REVIEW ON SECURITY VULNERABILITIES TO PREVENY TYPES OF ATTACKS IN IOMT

Authors

  • Ahmed Bouriche University Center of Maghnia
  • Sihem Bouriche

DOI:

https://doi.org/10.54489/ijcim.v2i2.107

Keywords:

E-Supply, Ethics, loMT, Blockchain

Abstract

And here's a summary of latest developments in Internet of Things (IoT) integrated devices, wireless connections, and biosensing which have contributed in the fast development of wearable sensor implantation. This study also discusses the applications of the internet of medical things (IoMT), which now has attracted considerable interest as an environment of networked clinical systems, computational capabilities, and medical sensors designed to improve the quality of healthcare services. The perspective of healthcare and lifestyle can indeed be totally transformed by AI technology based on 5G. The aim of this proposed research design is to investigate risks which might undermine the credibility, confidentiality, and security of IoMT platforms in consideration of the relevance of IoT platforms and 5G networks.

Moreover, there have been cutting-edge blockchain-based techniques which can aid in enhancing IoMT network security. IoMT has indeed been discovered to be vulnerable to a range of attacks, notably malware, DoS attacks, and wiretapping attacks. IoMT is additionally prone to a range of issues, involving safety, privacy, and anonymity. There are revolutionary cryptography solutions, such as password protection, authentication protocols, and data encryption, which can aid in improving the security and trustworthiness of IoMT devices despite the different of security risks.

Downloads

Published

2022-11-20

Issue

Section

Articles

How to Cite

A SYSTEMATIC REVIEW ON SECURITY VULNERABILITIES TO PREVENY TYPES OF ATTACKS IN IOMT. (2022). International Journal of Computations, Information and Manufacturing (IJCIM), 2(2). https://doi.org/10.54489/ijcim.v2i2.107

Similar Articles

You may also start an advanced similarity search for this article.