Securing the Internet of Medical Things (IoMT): Real-World Attack Taxonomy and Practical Security Measures
- URL: http://arxiv.org/abs/2507.19609v1
- Date: Fri, 25 Jul 2025 18:24:45 GMT
- Title: Securing the Internet of Medical Things (IoMT): Real-World Attack Taxonomy and Practical Security Measures
- Authors: Suman Deb, Emil Lupu, Emm Mic Drakakis, Anil Anthony Bharath, Zhen Kit Leung, Guang Rui Ma, Anupam Chattopadhyay,
- Abstract summary: The Internet of Medical Things (IoMT) has the potential to radically improve healthcare by enabling real-time monitoring, remote diagnostics, and AI-driven decision making.<n>However, the connectivity, embedded intelligence, and inclusion of a wide variety of novel sensors expose medical devices to severe cybersecurity threats.<n>We provide a taxonomy of potential attacks targeting IoMT, presenting attack surfaces, vulnerabilities, and mitigation strategies across all layers of the IoMT architecture.
- Score: 3.99381596255401
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: The Internet of Medical Things (IoMT) has the potential to radically improve healthcare by enabling real-time monitoring, remote diagnostics, and AI-driven decision making. However, the connectivity, embedded intelligence, and inclusion of a wide variety of novel sensors expose medical devices to severe cybersecurity threats, compromising patient safety and data privacy. In addition, many devices also have direct capacity - individually or in conjunction with other IoMT devices - to perform actions on the patient, such as delivering an electrical stimulus, administering a drug, or activating a motor, which can potentially be life-threatening. We provide a taxonomy of potential attacks targeting IoMT, presenting attack surfaces, vulnerabilities, and mitigation strategies across all layers of the IoMT architecture. It answers key questions such as: What makes IoMT security different from traditional IT security? What are the cybersecurity threats to medical devices? How can engineers design secure IoMT systems and protect hospital networks from cyberattacks? By analyzing historical cyber incidents, we highlight critical security gaps and propose practical security guidelines for medical device engineers and security professionals. This work bridges the gap between research and implementation, equipping healthcare stakeholders with actionable insights to build resilient and privacy-preserving IoMT ecosystems. Finally, we present the latest standardization and compliance frameworks, that IoMT security designers should be aware of.
Related papers
- Systems-Theoretic and Data-Driven Security Analysis in ML-enabled Medical Devices [6.197430230611422]
We analyze publicly available data on device recalls and adverse events, and known vulnerabilities, to understand the threat landscape of AI/ML-enabled medical devices.<n>Our work aims to empower manufacturers to embed cybersecurity as a core design principle in AI/ML-enabled medical devices.
arXiv Detail & Related papers (2025-06-18T00:05:48Z) - Intelligent Detection of Non-Essential IoT Traffic on the Home Gateway [45.70482328441101]
This work presents ML-IoTrim, a system for detecting and mitigating non-essential IoT traffic by analyzing network behavior at the edge.<n>We test our framework in a consumer smart home setup with IoT devices from five categories, demonstrating that the model can accurately identify and block non-essential traffic.<n>This research advances privacy-aware traffic control in smart homes, paving the way for future developments in IoT device privacy.
arXiv Detail & Related papers (2025-04-22T09:40:05Z) - A Review on the Security Vulnerabilities of the IoMT against Malware Attacks and DDoS [0.0]
The Internet of Medical Things (IoMT) has transformed the healthcare industry by connecting medical devices in monitoring treatment outcomes of patients.<n>This literature review examines the vulnerabilities of IoMT devices, focusing on critical threats and exploring mitigation strategies.
arXiv Detail & Related papers (2025-01-13T21:29:06Z) - Open Problems in Machine Unlearning for AI Safety [61.43515658834902]
Machine unlearning -- the ability to selectively forget or suppress specific types of knowledge -- has shown promise for privacy and data removal tasks.<n>In this paper, we identify key limitations that prevent unlearning from serving as a comprehensive solution for AI safety.
arXiv Detail & Related papers (2025-01-09T03:59:10Z) - Facial Expression Analysis and Its Potentials in IoT Systems: A Contemporary Survey [48.60253527030446]
The integration of facial expression analysis with Internet-of-Thing (IoT) systems has significant potential across diverse scenarios.<n>Our work aims to provide a comprehensive overview of research progress in facial expression analysis and explores its potential integration with IoT systems.<n>We highlight challenges and future directions for the convergence of facial expression-based technologies and IoT systems.
arXiv Detail & Related papers (2024-12-23T14:41:01Z) - The Security and Privacy of Mobile Edge Computing: An Artificial Intelligence Perspective [64.36680481458868]
Mobile Edge Computing (MEC) is a new computing paradigm that enables cloud computing and information technology (IT) services to be delivered at the network's edge.
This paper provides a survey of security and privacy in MEC from the perspective of Artificial Intelligence (AI)
We focus on new security and privacy issues, as well as potential solutions from the viewpoints of AI.
arXiv Detail & Related papers (2024-01-03T07:47:22Z) - Towards Evaluating the Security of Wearable Devices in the Internet of Medical Things [0.0]
The Internet of Medical Things (IoMT) offers a promising solution to improve patient health and reduce human error.
Wearable smart infusion pumps that accurately administer medication and integrate with electronic health records are an example of technology that can improve healthcare.
However, as the number of connected medical devices increases, the risk of cyber threats also increases.
arXiv Detail & Related papers (2023-12-13T14:12:52Z) - Classification of cyber attacks on IoT and ubiquitous computing devices [49.1574468325115]
This paper provides a classification of IoT malware.
Major targets and used exploits for attacks are identified and referred to the specific malware.
The majority of current IoT attacks continue to be of comparably low effort and level of sophistication and could be mitigated by existing technical measures.
arXiv Detail & Related papers (2023-12-01T16:10:43Z) - Progression and Challenges of IoT in Healthcare: A Short Review [0.0]
The burgeoning field of smart healthcare is poised to generate substantial revenue in the foreseeable future.
Numerous nations have strategically deployed the Internet of Medical Things (IoMT) alongside other measures to combat the propagation of COVID-19.
The rapid and extensive adoption of IoMT worldwide has magnified issues related to security and privacy.
arXiv Detail & Related papers (2023-11-11T08:38:04Z) - Survey of Machine Learning Based Intrusion Detection Methods for
Internet of Medical Things [2.223733768286313]
Internet of Medical Things (IoMT) represents an application of the Internet of Things.
The sensitive and private nature of this data may represent a prime interest for attackers.
The use of traditional security methods on equipment that is limited in terms of storage and computing capacity is ineffective.
arXiv Detail & Related papers (2022-02-19T18:40:55Z) - Smart Home, security concerns of IoT [91.3755431537592]
The IoT (Internet of Things) has become widely popular in the domestic environments.
People are renewing their homes into smart homes; however, the privacy concerns of owning many Internet connected devices with always-on environmental sensors remain insufficiently addressed.
Default and weak passwords, cheap materials and hardware, and unencrypted communication are identified as the principal threats and vulnerabilities of IoT devices.
arXiv Detail & Related papers (2020-07-06T10:36:11Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.