Security and Communication Networks

Security and Privacy in Internet of Medical Things (IoMT)


Publishing date
01 Mar 2020
Status
Closed
Submission deadline
25 Oct 2019

1University of Washington Bothell, Bothell, USA

2University of Houston-Clear Lake, Houston, USA

3University of Nebraska-Lincoln, Omaha, USA

4New York Institute of Technology, New York City, USA

This issue is now closed for submissions.
More articles will be published in the near future.

Security and Privacy in Internet of Medical Things (IoMT)

This issue is now closed for submissions.
More articles will be published in the near future.

Description

The Internet of Medical Things (IoMT) is an ecosystem of connected sensors, wearable devices, medical devices, and clinical systems. It enables various healthcare applications to reduce healthcare costs, provide timely medical responses, and increase the quality of medical treatment. Driven largely by advances in wireless communications, sensor networks, mobile devices, big data analysis, and cloud computing, IoMT is transforming the healthcare industry by delivering targeted and personalized medicine and by enabling seamless communication of medical data.

While these increasingly ubiquitous medical devices offer several benefits, they also raise serious security and privacy concerns. Healthcare systems collect and process sensitive and often life-critical medical information and make critical decisions based on this information. Cybercriminals targeting the vulnerabilities in these IoMT devices can not only gain potential entry into the hospital network but also obtain unauthorized access to sensitive personal and healthcare information. Attacks on these connected devices can also cause significant physical harm and life-threatening damage to the patients.

The goal of this special issue is to highlight state-of-the-art security research in the field of IoMT. Contributions from both academia and industry describing novel security and privacy solutions that address the unique needs of healthcare systems are welcomed. Papers presenting lightweight security solutions for resource constrained medical devices are highly encouraged.

Potential topics include but are not limited to the following:

  • Threats and attack models in IoMT
  • Security risk analysis in IoMT
  • Wearable and implantable medical device security
  • Lightweight security solutions in IoMT
  • Intrusion detection in IoMT
  • Machine learning based security in IoMT
  • Privacy-preserving technology in IoMT
  • Blockchain for healthcare security in IoMT
  • Authentication and access control in IoMT

Articles

  • Special Issue
  • - Volume 2020
  • - Article ID 8014958
  • - Research Article

Abnormal User Detection Based on the Correlation Probabilistic Model

Xiaohui Yang | Ying Sun
  • Special Issue
  • - Volume 2020
  • - Article ID 4960964
  • - Research Article

Preserving Data Privacy in the Internet of Medical Things Using Dual Signature ECDSA

Maria-Dolores Cano | Antonio Cañavate-Sanchez
  • Special Issue
  • - Volume 2020
  • - Article ID 8387672
  • - Research Article

User Audit Model Based on Attribute Measurement and Similarity Measurement

Xiaohui Yang | Ying Sun
  • Special Issue
  • - Volume 2020
  • - Article ID 7542726
  • - Research Article

Secure Information Transmissions in Wireless-Powered Cognitive Radio Networks for Internet of Medical Things

Kun Tang | Wenjuan Tang | ... | Lianyong Qi
  • Special Issue
  • - Volume 2020
  • - Article ID 5047379
  • - Research Article

Cryptanalysis and Security Improvement of Two Authentication Schemes for Healthcare Systems Using Wireless Medical Sensor Networks

Jiaqing Mo | Zhongwang Hu | Yuhua Lin
  • Special Issue
  • - Volume 2020
  • - Article ID 8347213
  • - Research Article

Secure Outsourced Medical Data against Unexpected Leakage with Flexible Access Control in a Cloud Storage System

Xingguang Zhou | Jianwei Liu | ... | Qianhong Wu
  • Special Issue
  • - Volume 2019
  • - Article ID 1315047
  • - Research Article

An API Semantics-Aware Malware Detection Method Based on Deep Learning

Xin Ma | Shize Guo | ... | Zhisong Pan
  • Special Issue
  • - Volume 2019
  • - Article ID 2798571
  • - Research Article

An Object Proxy-Based Dynamic Layer Replacement to Protect IoMT Applications

Bo Han | Zhao Yin-Liang | Zhu Chang-Peng
  • Special Issue
  • - Volume 2019
  • - Article ID 6803801
  • - Research Article

Dynamics on Hybrid Complex Network: Botnet Modeling and Analysis of Medical IoT

Mingyong Yin | Xingshu Chen | ... | Yulong Wang
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
Acceptance rate31%
Submission to final decision83 days
Acceptance to publication42 days
CiteScore4.200
Impact Factor1.288
 Submit

We are committed to sharing findings related to COVID-19 as quickly as possible. We will be providing unlimited waivers of publication charges for accepted research articles as well as case reports and case series related to COVID-19. Review articles are excluded from this waiver policy. Sign up here as a reviewer to help fast-track new submissions.