Securing Internet of Medical Things with Friendly-jamming schemes

Xuran Li, Hong Ning Dai*, Qubeijian Wang, Muhammad Imran, Dengwang Li, Muhammad Ali Imran

*Corresponding author for this work

Research output: Contribution to journalReview articlepeer-review

47 Citations (Scopus)

Abstract

The Internet of Medical Things (IoMT)-enabled e-healthcare can complement traditional medical treatments in a flexible and convenient manner. However, security and privacy become the main concerns of IoMT due to the limited computational capability, memory space and energy constraint of medical sensors, leading to the in-feasibility for conventional cryptographic approaches, which are often computationally-complicated. In contrast to cryptographic approaches, friendly jamming (Fri-jam) schemes will not cause extra computing cost to medical sensors, thereby becoming potential countermeasures to ensure security of IoMT. In this paper, we present a study on using Fri-jam schemes in IoMT. We first analyze the data security in IoMT and discuss the challenges. We then propose using Fri-jam schemes to protect the confidential medical data of patients collected by medical sensors from being eavesdropped. We also discuss the integration of Fri-jam schemes with various communication technologies, including beamforming, Simultaneous Wireless Information and Power Transfer (SWIPT) and full duplexity. Moreover, we present two case studies of Fri-jam schemes in IoMT. The results of these two case studies indicate that the Fri-jam method will significantly decrease the eavesdropping risk while leading to no significant influence on legitimate transmission.

Original languageEnglish
Pages (from-to)431-442
Number of pages12
JournalComputer Communications
Volume160
DOIs
Publication statusPublished - 1 Jul 2020

Scopus Subject Areas

  • Computer Networks and Communications

User-Defined Keywords

  • Friendly jamming
  • Internet of medical things
  • Network security

Fingerprint

Dive into the research topics of 'Securing Internet of Medical Things with Friendly-jamming schemes'. Together they form a unique fingerprint.

Cite this