Table 4.
IoMT security requirements and methods.
Security | Confidentiality | Integrity | Availability | Authenticity |
---|---|---|---|---|
Key management methods | Kaushik et al. (2019); Sun et al. (2019); Zhang et al., 2018 | Shen et al. (2018); Suresh (2019) | ||
Intrusion detection methods | Hoa (2011); Bostami et al. (2019); Rahman and Mohsenian-Rad (2012) | Meng et al. (2020) | ||
Authentication methods | Sun et al. (2019) | Sun et al. (2019) | Yaacoub et al., 2020); Sun et al. (2019); Rathore et al. (2019) | Xu et al. (2019); Aghili et al. (2019) |
Access control methods | Luo et al. (2018); Fahim et al. (2019); Kumar et al. (2017); Mohsin et al. (2019); Hamidi (2018); Hossain et al. (2018); Yang (2018) | |||
Blockchain methods | Niu et al. (2020); Hussein et al. (2018) | Wang et al. (2020); Xia (2017); Daraghmi et al. (2019); Liu et al. (2019); Chen et al. (2019); Shen et al. (2019) | Luo et al. (2018); Yang (2020); Guo et al. (2019); Nguyen et al. (2019); Xu et al. (2019) | |
Ratio | 17% | 29% | 6% | 48% |