Preprint Review Version 1 Preserved in Portico This version is not peer-reviewed

Security and Privacy in Machine Learning for IoHT and IoMT: A Review

ORCID logo and *
Version 1 : Received: 5 March 2024 / Approved: 6 March 2024 / Online: 6 March 2024 (06:59:38 CET)

How to cite: Priyadarshi, R.; Gheisari, M. Security and Privacy in Machine Learning for IoHT and IoMT: A Review. Preprints 2024, 2024030329. https://doi.org/10.20944/preprints202403.0329.v1 Priyadarshi, R.; Gheisari, M. Security and Privacy in Machine Learning for IoHT and IoMT: A Review. Preprints 2024, 2024030329. https://doi.org/10.20944/preprints202403.0329.v1

Abstract

The emergence of Internet of Things (IoT) devices is revolutionizing healthcare. This dynamic healthcare environment relies on Internet of Healthcare Things (IoHT) and Internet of Medical Things (IoMT) technologies. Economic, social, and technological opportunities from the IoHT are transforming healthcare systems. This article covers the history, present condition, and future prospects of IoHT, as well as its topologies, platforms, services, applications, market trends, and solution types. It examines security issues, requirements, and a threat taxonomy, studying smart healthcare privacy and security. It explores future research and the challenges IoHT-based solutions face. International health rules and regulations based on the IoT and their social and economic effects on long-term development are also examined. Integrating IoMT into healthcare infrastructures enhances scalability, efficiency, reliability, and accuracy. Through communication networks and data-processing algorithms, IoMT creates smart hardware and software platforms that enhance decision-making. IoMT devices' low resources raise privacy and security concerns. Security and privacy issues are organised by healthcare IoMT adoption in this study. We give an extensive attack taxonomy against the IoMT infrastructure, encompassing devices, security mechanisms, and their pros and cons. Furthermore, it describes the privacy and security requirements for any unique security solutions against IoMT's multiple attack vectors. This article explains the complicated difficulties, security concerns, and future research pathways needed to safeguard and ensure the long-term expansion of these game-changing technologies in the healthcare ecosystem.

Keywords

Internet of Things, Internet of Health Things, Internet of Medical Things, Healthcare, Security, Network

Subject

Computer Science and Mathematics, Analysis

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.