References
- Ghorbani, H. R., & Ahmadzadegan, M. H. (2017, November). Security challenges in the Internet of things: a survey. In 2017 IEEE Conference on Wireless Sensors (ICWiSe) (pp. 1-6). IEEE.
- Fizza, K., Banerjee, A., Mitra, K., Jayaraman, P. P., Ranjan, R., Patel, P., & Georgakopoulos, D. (2021). QoE in IoT: a vision, survey, and future directions. Discover the Internet of Things, 1(1), 1-14. https://doi.org/10.1007/s43926-021-00007-6
- Shanthamallu, U. S., Spanias, A., Tepedelenlioglu, C., & Stanley, M. (2017, August). A brief survey of machine learning methods and their sensor and IoT applications. In 2017 8th International Conference on Information, Intelligence, Systems & Applications (IISA) (pp. 1-8). IEEE.
- Ahmed, G., Mehmood, D., Shahzad, K., & Malick, R. A. S. (2021). An efficient routing protocol for the Internet of medical things focusing on hot spot node problems. International Journal of Distributed Sensor Networks, 17(2), 1550147721991706.
- Harvey, P., Toutsop, O., Kornegay, K., Alale, E., & Reaves, D. (2020, December). Security and Privacy of Medical Internet of Things Devices for Smart Homes. In 2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS) (pp. 1-6). IEEE.
- Yang, T., Gentile, M., Shen, C. F., & Cheng, C. M. (2020). Combining point-of-care diagnostics and the Internet of medical things (IoMT) to combat the COVID-19 pandemic.
- Kumar, M., & Chand, S. (2020). A lightweight cloud-assisted identity-based anonymous authentication and critical agreement body area network. IEEE Systems Journal.
- Food and Drug Administration, HHS, "Design considerations and premarket submission recommendations for interoperable medical devices," Sept. 2017.
- Karmakar, K. K., Varadharajan, V., Tupakula, U., Nepal, S., & Thapa, C. (2020, June). Towards a Security Enhanced Virtualised Network Infrastructure for Internet of Medical Things (IoMT). In 2020 6th IEEE Conference on Network Softwarization (NetSoft) (pp. 257-261). IEEE.
- Sun, Y., Lo, F. P. W., & Lo, B. (2019). Security and privacy for the Internet of medical things enabled healthcare systems: A survey. IEEE Access, 7, 183339-183355. https://doi.org/10.1109/ACCESS.2019.2960617
- Angrishi, K. (2017). Turning Internet of things (IoT) into the Internet of vulnerabilities (iov): IoT botnets. arXiv preprint arXiv:1702.03681.
- X. Huang and S. Nazir, "Evaluating Security of Internet of Medical Things Using the" Security & Communication Networks, p. 15, 1 September 2020.
- Nazir, A., Sholla, S., & Bashir, A. (2019). Internet of Things Security: Issues, Challenges, and Countermeasures. International Journal of Network and Technology, 7(3).
- T. Y. Mahmoud, R., Yousuf, T., Aloul, F., & Zualkernan, I. (2015, December). Internet of things (IoT) security: Current status, challenges, and prospective measures. In 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST) (pp. 336-341). IEEE.
- Puat, H. A. M., & Abd Rahman, N. A. (2020, December). IoMT: A Review of Pacemaker Vulnerabilities and Security Strategy. In Journal of Physics: Conference Series (Vol. 1712, No. 1, p. 012009). IOP Publishing.]. https://doi.org/10.1088/1742-6596/1712/1/012009
- Yaacoub J.-P.A., Noura M., Noura H.N., Salman O., Yaacoub E. Securing internet of medical things systems: limitations, issues, and recommendations. Future Generation. Comput. Syst. 2020;105:581-606 https://doi.org/10.1016/j.future.2019.12.028
- Javdani, H.; Kashanian, H. Internet of things in medical applications with a service-oriented and security approach: A survey. Health Technol. 2018, 8, 39-50. ][ Altawy, R.; Youssef, A.M. Security Tradeoffs in Cyber-Physical Systems: A Case Study Survey on Implantable Medical Devices. IEEE Access 2016, 4, 959-979. https://doi.org/10.1007/s12553-017-0180-8
- Singh, J., & Abd Rahman, N. A. (2020). IoMT: A review of Open APS System Security for Type 1Diabetes Mellitus. Int J Cur Res Rev| Vol, 12(17), 93. https://doi.org/10.31782/ijcrr.2020.121721
- David D Coleman and David A Westcott. Cwna: certified wireless network administrator official study guide: exam Pw0-105. John Wiley & Sons, 2012.
- Daojing He, Sammy Chan, and Mohsen Guizani. Drone-assisted public safety networks: The security aspect. IEEE Communications Magazine, 55(8):218-223, 2017 https://doi.org/10.1109/MCOM.2017.1600799CM
- Chun-Wei Yang, Tzonelih Hwang, and Tzu-Han Lin. Modification attack on qsdc with authentication and the improvement. International Journal of Theoretical Physics, 52(7):2230-2234, 2013. https://doi.org/10.1007/s10773-013-1498-2
- Yao Liu, Peng Ning, and Michael K Reiter. False data injection attacks against state estimation in electric power grids. ACM Transactions on Information and System Security (TISSEC), 14(1):13, 2011.
- MdAshfaqur Rahmanand Hamed Mohsenian-Rad.False data injection attacks with incomplete information against intelligent power grids. In Global Communications Conference (GLOBECOM), 2012 IEEE, pages 3153-3158. Citeseer, 2012.
- Satish Vadlamani, Burak Eksioglu, Hugh Medal, and Apurba Nandi. Jamming attacks on wireless networks: A taxonomic survey. International Journal of Production Economics, 172:76-94, 2016. https://doi.org/10.1016/j.ijpe.2015.11.008
- Alejandro Proano and Loukas Lazos. Selective jamming attacks in wireless networks. In 2010 IEEE International Conference on Communications pages 1-6. IEEE, 2010.
- Kanika Grover, Alvin Lim, and Qing Yang. Jamming and anti-jamming techniques in wireless networks: a survey. International Journal of Ad Hoc and Ubiquitous Computing, 17(4):197-215, 2014. https://doi.org/10.1504/IJAHUC.2014.066419
- Zubair A Baig and Abdul-Raoof Amoudi. An analysis of clever grid attacks and countermeasures. Journal of Communications, 8(8):473- 479, 2013. https://doi.org/10.12720/jcm.8.8.473-479
- Harshita Harshita. Detection and prevention of ICMP flood DDoS attack. International Journal of New Technology and Research, 3(3), 2017.
- Mitko Bogdanoski, Tomislav Suminoski, and Aleksandar Risteski. Analysis of the syn flood dos attack. International Journal of Computer Network and Information Security (IJCNIS), 5(8):1-11, 2013.
- Yuquan Shan, George Kesidis, Daniel Fleck, and Angelos Stavrou. Preliminary study of fission defenses against low-volume dos attacks on proxied multiserver systems. In 2017 12th International Conference on Malicious and Unwanted Software (MALWARE), pages 67-74. IEEE, 2017.
- Chee-Wooi Ten, Govindarasu Manimaran, and Chen-Ching Liu. Cy- cybersecurity for critical infrastructures: Attack and defense modeling. IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Humans, 40(4):853-865, 2010. https://doi.org/10.1109/TSMCA.2010.2048028
- Emma McMahon, Ryan Williams, Malaka El, Sagar Samtani, Mark Patton, and Hsinchun Chen. Assessing medical device vulnerabilities on the Internet of things. In 2017 IEEE International Conference on Intelligence and Security Informatics (ISI), pages 176-178. IEEE, 2017.
- Pardeep Kumar and Hoon-Jae Lee. Security issues in healthcare applications using wireless medical sensor networks: A survey. Sensors, 12(1):55-91, 2012. https://doi.org/10.3390/s120100055
- Sarah Spiekermann. Ethical IT innovation: A value-based system design approach. Auerbach Publications, 2015.].
- Lukas Grunwald. New attacks against RFID systems. GmbH Germany, 2006.
- Junghyun Nam, Juryon Paik, H-K Kang, Ung Mo Kim, and Dongho Won. An offline dictionary attack on a simple three-party key exchange protocol. IEEE Communications Letters, 13(3):205-207, 2009. https://doi.org/10.1109/LCOMM.2009.081609
- Jung-Sik Cho, Sang-Soo Yeo, and Sung Kwon Kim. Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value. Computer communications, 34(3):391-397, 201 https://doi.org/10.1016/j.comcom.2010.02.029
- Mihir Bellare and Tadayoshi Kohno. Hash function balance and its impact on birthday attacks. In International Conference on the Theory and Applications of Cryptographic Techniques, pages 401-418. Springer, 2004
- J. Deogirikar and A. Vidhate. Security attacks in IoT: A survey. In 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics, and Cloud) (I-SMAC), pages 32-37, 2017.
- Nicolas Falliere, Liam O Murchu, and Eric Chien. W32. Stuxnet dossier. White paper, Symantec Corp., Security Response, 5(6):29, 2011.
- Sam Edwards and Ioannis Profetis. Hajime: Analysis of a decentralized internet worm for IoT devices. Rapidity Networks, 16, 2016.
- Evan Cooke, Farnam Jahanian, and Danny McPherson. The zombie roundup: Understanding, detecting, and disrupting botnets. SRUTI, 5:6- 6, 2005
- Solangi, Z. A., Solangi, Y. A., Chandio, S., bin Hamzah, M. S., & Shah, A. (2018, May). The future of data privacy and security concerns in Internet of Things. In 2018 IEEE International Conference on Innovative Research and Development (ICIRD)(pp. 1-4). IEEE.
- Rathnayake, R. M. P. H. K., Karunarathne, M. S., Nafi, N. S., & Gregory, M. A. (2018, November). Cloud enabled solution for privacy concerns in internet of medical things. In 2018 28th International Telecommunication Networks and Applications Conference (ITNAC) (pp. 1-4). IEEE.
- Dai, H. N., Imran, M., & Haider, N. (2020). Blockchain-enabled Internet of Medical Things to Combat COVID-19. IEEE Internet of Things Magazine, 3(3), 52-57. https://doi.org/10.1109/iotm.0001.2000087
- A lsubaei, F., Abuhussein, A., & Shiva, S. (2017, October). Security and privacy in the internet of medical things: taxonomy and risk assessment. In 2017 IEEE 42nd Conference on Local Computer Networks Workshops (LCN Workshops) (pp. 112-120). IEEE.
- Cano, M. D., & Canavate-Sanchez, A. (2020). Preserving data privacy in the internet of medical things using dual signature ECDSA. Security and Communication Networks, 2020.
- Harvey, P., Toutsop, O., Kornegay, K., Alale, E., & Reaves, D. (2020, December). Security and Privacy of Medical Internet of Things Devices for Smart Homes. In 2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS) (pp. 1-6). IEEE.
- Zhu, F., Li, P., Xu, H., & Wang, R. (2020). A Novel Lightweight Authentication Scheme for RFID-Based Healthcare Systems. Sensors, 20(17), 4846. https://doi.org/10.3390/s20174846
- Garg, N., Wazid, M., Das, A. K., Singh, D. P., Rodrigues, J. J., & Park, Y. (2020). BAKMP-IoMT: Design of blockchain enabled authenticated key management protocol for Internet of medical things deployment. IEEE Access, 8, 95956-95977. https://doi.org/10.1109/ACCESS.2020.2995917
- Yan, X., Geng, T., & Ding, H. (2014). Efficient cryptographic access control protocol for sensitive data management. Journal of Computers, 9(1), 222-228
- Wong, A. M. K., Hsu, C. L., Le, T. V., Hsieh, M. C., & Lin, T. W. (2020). Three-Factor Fast Authentication Scheme with Time Bound and User Anonymity for Multi-Server E-Health Systems in 5G-Based Wireless Sensor Networks. Sensors, 20(9), 2511. https://doi.org/10.3390/s20092511
- Chen, F., Luo, Y., Zhang, J., Zhu, J., Zhang, Z., Zhao, C., & Wang, T. (2018). An infrastructure framework for privacy protection of community medical internet of things. World Wide Web, 21(1), 33-57. https://doi.org/10.1007/s11280-017-0455-z
- Wazid, M., Das, A. K., Rodrigues, J. J., Shetty, S., & Park, Y. (2019). IoMT malware detection approaches: analysis and research challenges. IEEE Access, 7, 182459-182476 https://doi.org/10.1109/ACCESS.2019.2960412
- Wazid, M., Das, A. K., Rodrigues, J. J., Shetty, S., & Park, Y. (2019). IoMT malware detection approaches: analysis and research challenges. IEEE Access, 7, 182459-182476 https://doi.org/10.1109/ACCESS.2019.2960412
- Liaqat, S., Akhunzada, A., Shaikh, F. S., Giannetsos, A., & Jan, M. A. (2020). SDN orchestration to combat evolving cyber threats in Internet of Medical Things (IoMT). Computer Communications, 160, 697-705.] https://doi.org/10.1016/j.comcom.2020.07.006
- Alsubaei, F., Abuhussein, A., Shandilya, V., & Shiva, S. (2019). IoMT-SAF: Internet of medical things security assessment framework. Internet of Things, 8, 100123.] https://doi.org/10.1016/j.iot.2019.100123
- Bibi, N., Sikandar, M., Ud Din, I., Almogren, A., & Ali, S. (2020). IoMT-Based Automated Detection and Classification of Leukemia Using Deep Learning. Journal of healthcare engineering, 2020
- Papaioannou, M., Karageorgou, M., Mantas, G., Sucasas, V., Essop, I., Rodriguez, J., & Lymberopoulos, D. (2020). A survey on security threats and countermeasures in internet of medical things (IoMT). Transactions on Emerging Telecommunications Technologies, e4049