Next Article in Journal
SDR-Based 28 GHz mmWave Channel Modeling of Railway Marshaling Yard
Next Article in Special Issue
A Rivest–Shamir–Adleman-Based Robust and Effective Three-Factor User Authentication Protocol for Healthcare Use in Wireless Body Area Networks
Previous Article in Journal
EMO-MoviNet: Enhancing Action Recognition in Videos with EvoNorm, Mish Activation, and Optimal Frame Selection for Efficient Mobile Deployment
Previous Article in Special Issue
A Comprehensive Study on Cyber Attacks in Communication Networks in Water Purification and Distribution Plants: Challenges, Vulnerabilities, and Future Prospects
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Review

Cybersecurity in Internet of Medical Vehicles: State-of-the-Art Analysis, Research Challenges and Future Perspectives

by
Chidambar Rao Bhukya
1,
Prabhat Thakur
1,2,*,
Bhavesh Raju Mudhivarthi
1 and
Ghanshyam Singh
2
1
Symbiosis Institute of Technology, Symbiosis International Deemed University (SIDU), Pune 412115, India
2
Department of Electrical and Electronic Engineering Science, University of Johannesburg, Johannesburg 2006, South Africa
*
Author to whom correspondence should be addressed.
Sensors 2023, 23(19), 8107; https://doi.org/10.3390/s23198107
Submission received: 2 August 2023 / Revised: 13 September 2023 / Accepted: 22 September 2023 / Published: 27 September 2023

Abstract

:
The “Internet-of-Medical-Vehicles (IOMV)” is one of the special applications of the Internet of Things resulting from combining connected healthcare and connected vehicles. As the IOMV communicates with a variety of networks along its travel path, it incurs various security risks due to sophisticated cyber-attacks. This can endanger the onboard patient’s life. So, it is critical to understand subjects related to “cybersecurity” in the IOMV to develop robust cybersecurity measures. In this paper, the goal is to evaluate recent trends and state-of-the-art publications, gaps, and future outlooks related to this research area. With this aim, a variety of publications between 2016 and 2023 from “Web-of-Science” and “Scopus” databases were analysed. Our analysis revealed that the IOMV is a niche and unexplored research area with few defined standards and frameworks, and there is a great need to implement robust cybersecurity measures. This paper will help researchers to gain a comprehensive idea of this niche research topic, as it presents an analysis of top journals and highly cited papers, their challenges and limitations, the system model and architecture of the IOMV, related applicable standards, potential cyber-attacks, factors causing cybersecurity risks, various artificial intelligence techniques for developing potential countermeasures, the assessment and parameterisation of cybersecurity risks, constraints and challenges, and future outlooks for implementing cybersecurity measures in the IOMV.

1. Introduction

Automobile manufacturers consistently try to adopt the latest technological advancements in designing and enhancing automotive vehicles to provide customers with a greater variety of advanced features [1]. Autonomous vehicles (AVs) [2,3,4,5], Intelligent Transport Systems (ITSs) of Vehicles [4,6,7,8], and connected vehicles (CVs) [7,8,9,10] are a few of the advanced features that use new-generation technologies like the Internet of Things (IOT) [11], in which various “devices” in vehicles, like embedded sensors and output devices that use different types of software and technologies, possess processing capabilities to enable communication for connecting and exchanging data with internal and external devices located across the world using the Internet or other communication networks [11,12]. Such vehicles developed based on the application of IOT technology for interconnections are called the “Internet of Vehicle Things” or “Internet of Vehicles (IOV)” [12,13]. By using IOT technology, different devices, applications, and systems that are integrated into the IOV enable V2X (Vehicle-To-Everything) [3] communication with the help of Internet Networks, Wireless Technology, “LAN (Local-Area-Network)”, and In-Vehicle Communication Networks (IVNs) like “CAN (Controller-Area-Network)”, “LIN (Local-Interconnect-Network)”, “Ethernet”, etc., for sharing vehicle-related data with both internal and external devices to develop advanced vehicle features, like vehicle mobility, performance, comfort, efficiency, emissions, and infotainment, and address road safety and security issues [7,8,14]. Similarly, IOT technology is also applied to provide connected healthcare services [15], which is called the “Internet of Medical Things (IOMT)” [16,17]. In the IOMT [18], different medical devices are interconnected to enable machine-to-machine (M2M) communications using different communication networks, like the Internet, Wireless Fidelity (WiFi), Bluetooth (BT), Zigbee, radio signals, etc., with remote healthcare Information Technology (IT) systems to provide healthcare services outside conventional hospital settings as part of connected and smart healthcare [19] in developing next-generation smart cities. By using IOMT technology [20], medical personnel can track and monitor the state of health of a patient to deliver connected healthcare services with more a accurate diagnosis, fewer mistakes, and reduced costs [21,22] when the patient is not present in the hospital, when the patient is located in a remote area, or when the patient is being transported to the hospital in an ambulance, also called a medical vehicle (MV) [21].
The purpose of this analysis is based on the research questions, like firstly, what are the recent global trends and state of the art regarding scientific journals on cybersecurity in the IOMV, and how many “types of documents” have been published in this research area? Secondly, what is the architecture and system model of the IOMV? What are the relevant standards and guiding frameworks those are applicable to the IOMV system? Thirdly, to understand what are the different types and characteristics of potential cyber-attacks possible in the IOMV system? Fourth, to know various factors influencing the cybersecurity risk in the IOMV and how can we perform cybersecurity risk assessments and parameterisation to measure the strength of the cybersecurity of the IOMV system? Fifth, to analyse what are the different constraints and challenges involved in developing robust cybersecurity measures in the IOMV? And then find what types of different potential solutions which can help for developing countermeasures for cybersecurity risks in the IOMV system, and what are the future directions regarding this research field?

1.1. System of IOMV

MVs are one kind of specific utility vehicle used to transport patients from remote locations to hospitals and provide lifesaving healthcare assistance until patients are carried to hospitals [21].
MVs are equipped with some critical, essential medical devices that help to monitor and measure patients’ health conditions, like Body Temperature, Blood Pressure, Cardio and ECG, etc. [21,22], to provide this essential health information and life-supporting medical aid until patients are transported to hospitals for further treatment. Due to inadequate infrastructure, most of the time, trained medical staff may not be available onboard medical vehicles while they transport patients from remote locations to hospitals. So, it becomes a very challenging and critical issue from the patient health point of view. Referring to Figure 1, remotely travelling MVs with onboard essential medical devices are interconnected with communication networks like Bluetooth, WiFi, LAN, and V2X and over the Internet [23] using IOT technology to exchange patients’ health information with medical personnel available at hospitals. This concept is called the “Internet of Medical Vehicles (IOMV)”, which is a futuristic, special application of the IOT that is essentially derived from the integration of IOT applications with connected vehicles and connected healthcare, i.e., “Internet of Vehicles” and “Internet of Medical Things (IOMT)” [24], for realising connected healthcare services as part of developing next-generation smart cities.
The system model and architecture of the IOMV are based on the IOT architecture, which is derived from integrating IOT applications into connected vehicles and connected healthcare, i.e., the IOV and IOMT. As shown in Figure 1, it mainly consists of four layers, i.e., the Data Collection Layer, Communication or Network Layer, Middleware or Data Management Layer, and Application or Business Layer. And this communication can be bi-directional to enable real-time communication and applications for imparting real-time treatment.
  • Data Collection Layer: In the IOMV system, this layer is also known as the Physical Layer. And its key function is to collect data from various onboard medical devices related to patient health within MVs, in addition to other sensor/functional-related information from the IOV side. These medical devices enable D2D (Device-To-Device) communications and share their information with the Onboard Gateway/IVN, a layer called V2D (Vehicle To Device). D2D and V2D communications take place using Bluetooth, Zigbee, WiFi, LAN, etc., protocols. Next, Onboard-Gateway-to-Onboard-Unit (OBU) communication takes place using IVN protocols like CAN, LIN, Ethernet, etc.
  • Communication or Network Layer: In this layer, when the MV is moving or located remotely on its travel path, it may be required to form multiple and different networks external to the MV to share the intra-MV data collected by the OBU by using V2X communications, such as V2P (Vehicle To Person), V2I (Vehicle To Infrastructure), V2N (Vehicle To Network), V2V (Vehicle To Vehicle), V2R (Vehicle To Road-Side Units), etc. This layer may use the Internet, mobile networks, radio signals, etc.
  • Middleware or Data Management Layer: The data collected from the Communication or Network Layer are further shared with the Middleware or Data Management Layer. In this layer, the collected data are stored and aggregated as cloud data or big data for further analysis and computational analysis in the IOT Computing Layer. Preprocessing and knowledge extraction may be performed using analysis and computational techniques like artificial intelligence and machine learning (AIML). Or, as may be required, the raw information from the Network Layer may be directly shared with the Application or Business Layer, i.e., with the hospital for its analysis. Also, this layer may use the Internet, mobile networks, or radio signals for communication.
  • Application or Business Layer: This is the top or final layer as per the hierarchical order of the IOMV architecture. This layer is the Application or Business Layer, i.e., the hospital setting. The preprocessed data received from the Middleware or Data Management Layer, or the raw data received directly from the Communication or Network Layer as per requirements, will be received by the Hospital Servers. Medical staff like doctors and nurses can analyse these data for their further clinical processing to provide connected healthcare to the patient onboard the remotely moving MV. Further, with the uptake of Electronic Medical Records (EMRs), the exponential adoption of IOT devices in connected healthcare services has increased cyberthreats in the healthcare sector [25,26]. Within healthcare, there has been an explosion in the real-time usage of wired and wireless devices in the care of almost every patient—the IOMT, such as computers, medical pumps, ventilators, anaesthetic machines, operating tables, operating robots, infusion pumps, pacing devices, organ support, syringe pumps, implantable medical devices, a plethora of monitoring modalities, etc. All of these devices, once connected to a hospital network with the IOMV system, as shown in Figure 1, allow the collection of a huge amount of data that can aid decision making, monitor and alert staff to unsafe situations, and expedite patient care. But this interconnectivity presents an opportunity for hackers to attack the systems directly to cause erroneous monitoring, alter the settings of any device, and even access the EMR via the IOMV system using V2X communication, which poses a danger to patient safety.

1.2. Cybersecurity Risk in IOMV System

Today, the automotive and medical industries are at an important juncture in history. The IOV is offering exciting new-age advanced features. But the IOMV is prone to incur greater challenges regarding data privacy and potential hazards of cyber-attacks. The security of such shared data transmitted over a network will be at higher risk when malicious hackers try to intrude, attack, and manipulate by exploiting its inherent vulnerabilities. And this can endanger the onboard patient’s life. Therefore, cybersecurity in automotive vehicles will act like a shield by providing protection to the components used in them, like electronic systems and software, communication networks, control algorithms, and user and related data, from malicious attacks, manipulation, etc. [27]. As the IOT is an upcoming technology, most IOT devices do not have end-to-end secured communication connections due to the non-availability of and non-adherence to data security protocols and standards. Also, the communication networks used in automotive vehicles, like the IVN using, for example, the CAN or LIN protocol, are inherently vulnerable and can be prone to cyber-attacks [28,29,30]. And this problem becomes more hazardous in the IOMV because of several issues, like network integration, interoperability, connectivity, availability, etc., as the IOMV [31,32] keeps moving across various locations without being located at a fixed point. Therefore, these IOMV systems are more prone to attacks from hackers located across their travel paths since the communication connections vary, with several en route network points, signal towers, gateway devices, etc. [33,34]. In addition to this, there are no defined standard regulations or guidelines for vehicle-interconnected networks or interconnection protocols for medical devices, including standardised medical devices, which can be used in futuristic IOT applications like the IOMV.

1.3. Related Applicable Standards and Frameworks

The present conventional automotive- and medical-field-related safety and cybersecurity standards are imperfect and are not capable of handling new-age issues like the increasing cybersecurity risk. Therefore, this has led automotive manufacturers to follow their own guidelines, like the International Standard Organisation (ISO) ISO 26262 “Road vehicles—Functional safety” [35] standard, which is mainly focused on the aspects of functional safety only. And it does not cover software development or vehicle subsystems or deal with the concept of risk management of cybersecurity issues. And recently, ISO/SAE (Society of Automotive Engineers) released the first global automotive standard, ISO/SAE 21434:2021 “Road Vehicles—Cybersecurity Engineering” [36], for cybersecurity in automotive vehicles. This standard provides a common framework for addressing the cybersecurity risk in the lifecycle of automotive vehicles and their electronic systems. In addition to these standards, automakers also follow other frameworks, like the National Institute of Standards and Technology (NIST), NIST SP-800-30 [37], and standards by ISO/IEC (International Electrotechnical Commission), i.e., ISO/IEC 31010 [38], to conduct cybersecurity risk assessments in the automotive industry. Similarly, the standard ISO14971:2019 [39] for medical devices outlines the application of risk management to medical devices, software as a medical device, and in vitro diagnostic medical devices for identifying hazards, evaluating risks, and implementing risk controls. The risks associated with medical devices include biocompatibility, data and systems security, electricity, moving parts, radiation, and usability. ISO27001 [40] is the standard for dealing with information security risks and selecting appropriate controls to deal with them. And the standard ISO/IEC 80001—“Application of risk management for IT networks incorporating medical devices” [41]—provides a framework for organisations by using a combined approach associated with the safety of using medical devices and systems on IT networks. And there are numerous other individual standards, like the NIST Cybersecurity Framework, like NIST 800-53 Rev 4 [42], the Information Technology Infrastructure Library, ITIL v3.1.24 [43], ISO/IEC-27000 [44], the European Commission (EC)’s EC Directive 95/45/EC [45], etc. These standards are specific to automotive and medical fields at the individual level. However, these standards are not suitable or wholly applicable to the cybersecurity risks associated with the IOMV. Moreover, the medical personnel in hospitals do not routinely include risk management frameworks in the use of networked medical devices, which are basically supervised by IT specialists. Therefore, issues like uncertainties about non-standard regulations and protocols make the IOMV more vulnerable to cyber-attacks [46,47]. This allows attackers to hack into its systems much more easily and to attack, steal sensitive health information, or manipulate the patient’s health data or readings, medical diagnostics, etc., exchanged between the IOMV and the networks, which can endanger the patient’s life. Hence, it is crucial to define countermeasures to avoid or decrease the potential cybersecurity risks in the IOMV [28,48,49,50,51]. As this concept of the IOMV is one of the futuristic applications of the IOT for realising connected healthcare services as part of smart-city development, it is necessary to understand the existing research works available regarding subjects related to cybersecurity, as well as the issues and challenges involved in it. For this purpose, a comprehensive study and analysis of the existing literature must be carried out.
For this state-of-the-art paper, we have performed the following analysis to contribute to the progression of research in this research area. Our major contributions in this paper include:
  • We evaluated global trends relevant to this research field in terms of top publications, publication patterns, types of journals, top authors in this field, top contributing nations and affiliated institutions, top sponsoring agencies, top keyword searches based on the Boolean technique, gaps, future outlooks, etc., based on a survey analysis of 1582 and 1889 published documents between 2016 and 2023 from the Scopus and WOS databases, respectively.
  • We analysed the top journals and highly cited papers based on the databases WOS and Scopus relevant to this research area and present insights highlighting their methodologies, alongside contrasting each paper’s merits, challenges, and limitations.
  • We conducted a statistical study to analyse the effectiveness of the top-ten countries, and the results are discussed.
  • We define and present the system model and architecture of the IOMV system and types of communications and present the relevant applicable standards, protocols, and governing frameworks.
  • We describe a variety of factors that are responsible for causing a cybersecurity risk in the IOT-application-based IOMV. We discuss how to perform a risk assessment and parameterisation to strengthen the cybersecurity of the IOMV system and describe solutions helpful in addressing cybersecurity risks, like using AIML, artificial general intelligence (AGI), etc.
  • We classify and consolidate different types of sophisticated potential cyber-attacks in tabulated form; these attacks can occur at various layers of the IOMV, right from the source, i.e., onboard IOT-connected medical devices, up to the target recipient devices at hospitals and their interconnecting communication channels and networks. And we explain the cause and impact of various significant cyber-attacks.
  • In the last section, we provide the limitations of this work, major constraints, and significant potential challenges that need to be addressed and discuss the outlook for future work related to implementing robust cybersecurity measures in these IOT-application-based vehicles.
Further, this paper is organised as follows: Section 1 describes the introduction, research questions, system model, architecture, cybersecurity risk, and related applicable standards and frameworks of the IOMV system. Section 2 lists articles in the existing literature in this research area. How the study of the existing literature was conducted, using roadmaps and the research methodology, is explained in Section 3. Section 4 demonstrates the scrutiny of the literature review analysis and debate gaps. Section 5 discusses techniques to assess the cybersecurity risk in the IOMV system, the types and characteristics of cyber-attacks, the application of AIML techniques for strengthening cybersecurity in the IOMV, and parameterisation for measuring the strength of cybersecurity. The results and limitations of this research work are discussed in Section 6 and Section 7. Constraints and challenges, along with trends in this area of interest, are discussed in Section 8. Section 9 and Section 10 provide the conclusion, indicating guidelines regarding future implementations.

2. Primary Data

The following research analysis in this article is a “quantitative study” performed based on databases of publishing bodies, viz., Scopus, ABCD, EBSCO, CrossRef, Web of Science (WOS), and PubMed, and different types of documents, like Journal Articles, Conference Papers, Review Papers, Chapters of Books, Books and Short Studies, Conference Reviews, Editorials, etc. The literature analysis helps academics identify shortages in performing research in particular fields [52]. This analysis uses scientific methods, including mathematical representations and analytical tools, to assess the results. The literature study for the analysis in this research article, “Cybersecurity in Internet of Medical Vehicles”, explored one of the futuristic applications of technologies from the Internet of Things; this application is based on the integration of other IOT applications, the IOV and IOMT, to realise connected healthcare services as part of developing smart cities. To conduct this literature analysis, the databases WOS and Scopus were considered. A similar study was performed for different research areas and databases, as mentioned in reference [53]. The empirical data collection of all scientific publications from 2016 to 17 August 2023 was considered for this literature study. The combination of keywords used in the search field is “Internet of Things” AND “Cyber Security” OR “Internet of Vehicles” OR “Medical Devices” for the period between 2016 and 2023. The top-15 keywords reflected in this research study are listed in Table 1 with the number of documents published. The citations used in this database are from a large variety of domain fields, like Biomedical Engineering, Electrical Electronics Engineering, Healthcare Sciences Services, Computer Science Cybernetics, Legal Medicine, Emergency Medicine, Computer Sciences, Engineering, Biochemistry, Chemistry, Astronomy, Energy, Physics, Material Science, Decision Making, Social Sciences, Mathematics, etc. This paper helps research members like professors, manufacturers, scholars, and new and upcoming researchers in this field to gain an overview of the research topic of “cybersecurity in IOMVs”.
A systematic and complete analysis of literature data has given rise to several literature reviews in various areas. Various tools are used to derive relevant, useful data and to make visualisations. Analytical tools are used to find the research gaps and identify correlations among authors and keywords, making a literature analysis network.
Table 2 provides various corresponding analytical methods and databases for studying “Cybersecurity in Internet of Medical Vehicles”. An analytical study of the literature lets a person who reads find key research domain variables quickly. In [54], the authors give the vision, applications, and future challenges of the Internet of Things. But integrating the IOT has many constraints and challenges because there are many new and untapped research areas in this sector. In [55], the authors describe the analysis of a literature study explaining the interaction between AVs and manually driven vehicles, as well as the safe and efficient operation of AVs. The authors illustrate AVs with their challenges in sustainable urban mobility, like security vulnerabilities and privacy [56]. In [57,58], the authors discuss the gaps and opportunities in healthcare and cybersecurity. In [59,60,61], the authors propose blockchain technology (BCT) as one of the solutions for overcoming the challenges and constraints in implementing the IOT and Internet of Medical Things. Upon knowing this topic, several issues in blockchain problems can be resolved. In [62,63], the authors analyse various trends in cybersecurity. In [61], the author explains the implementation of smart healthcare services using the Internet of Things (IOT). Moreover, in [46,64], the authors present the architecture and communication models of the IOT, focusing on different types of “security attacks” at different layers of “the IOT system” and “countermeasures” that can be taken, whereas in [65], the authors describe security issues in developing smart automobiles, their attacks, and solutions and categorise different types of cyber-attacks and security threats in Vehicle Ad hoc Networks (VANETS) and the IOT [66].
In [67,68], the authors explain V2X communication and the integration of sensor data from vehicles for AVs using “localised vehicular-communications”, “cloud-connectivity,” and “long-range-cellular-networks”. In [20], the authors identify and compare the existing “Healthcare IOT (HIOT)” systems and classify them into five categories, viz., “resource-based”, “sensor-based”, “communication-based”, “security-based”, and “application-based” approaches. Also, they evaluate various merits and demerits of the selected methods and contrast them in evaluating techniques, tools, and metrics. At the same time, in [16,69], the authors discuss combining the IOT and telemedicine for implementing smart healthcare. And they explain the concepts of the IOT, its architecture, different network layers, their processing, and communication systems in remote and connected healthcare services.
In [70], the authors identify and classify different “attack-mechanisms” regarding various electronic components used in AVs, such as potentially affected domains in them, along with the profiles of the attackers. Also, they address information security principles, which help to address attack-mitigation steps. However, this study is confined to the security risk for the IOV only. In [71], the authors analyse the penetration of mobile health in the Indian context, such as health services using telemedicine, mobile phones, etc., and identify the low adoption of mobile health due to very little awareness of the word m-Health. And this analysis is based on a single nation, i.e., a perspective from India’s point of view only, not a global-level analysis. In [72], the authors emphasise the role of big data in the IOMT, i.e., healthcare with the IOT, related to patients’ health data, involving diagnosis, maintenance, and management. But this analysis emphasises data generated from interconnected medical devices from hospitals alone. The authors mention the usage of 5G technology for providing smarter healthcare and facilitating better quality, monitoring, and tracking in a more efficient and sustainable manner in applications such as “telemedicine”, “telesurgery”, “robotic surgery”, “connected ambulance”, etc., but this review mentions the 5G network application perspective in healthcare. In [73], the authors analyse the properties, evolution, and trends in autonomous vehicles and identify gaps and provide suggestions for improvements in terms of policies and regulations, cybersecurity related to the risk of data privacy and security breaches, attacks, etc. The authors analyse developments in the application of Information Technology (IT) in the healthcare system from 2004 to 2022 and emphasise the need for robust cybersecurity systems [58]. In [74], the authors explain that the IOMT is an application of the IOT in the healthcare sector in which data are transmitted across various communication networks. However, it is highlighted that this technology is still in the development phase only and yet to become mature, and there are security risks because of poor maintenance, insufficient standards, legacy devices, and equipment fitted in medical centres that are not designed for an Internet connection, coupled with little user awareness. And this can allow hackers to easily attack and control less secure IOMT devices, such as accessing an unencrypted IOMT device through unencrypted communication. And their research results highlight that artificial intelligence and machine-learning techniques, such as blockchain technology, can effectively address the security concerns of the IOMT [75]. But this study is limited to the security risks in the application of the IOT for medical devices connected to hospital networks only.
Table 3 provides an analysis of various review journals related to the research field of “Cybersecurity in IOMVs”, which illustrates their novelties, contrasts relevant advantages and disadvantages, and highlights their research gaps. In addition to these, in [32,76,77,78,79], the authors explain the development of the Internet of Vehicles for autonomous-vehicle applications for achieving a safer, better, efficient, and transformative future “Intelligent Transportation Systems (ITS)” for the realisation of smart mobility and smart cities [19]. These vehicles are equipped with sensors like radar, cameras, etc., and communicate their data with other vehicles and infrastructure based on the IOT using V2X communication technology, which can be an unreliable wireless and mobile network. In the IOV, communication occurs among onboard computers called “Electronic Control Units (ECUs)”, and their corresponding sensors and actuators form an In-Vehicle Network. Owing to their apparent simplicity, low cost, and reliability, CAN and LIN protocols are extensively used as default standards for IVN communication [80]. Failures and attacks in the networks of connected vehicles could also affect their connected things, and they can also become vulnerable and prone to various security attacks: e.g., an attempt to misguide inputs can cause them to be exchanged with other nearby connected vehicles, which can lead to hazards [27]. Security researchers specify that cyber-attacks can be broadly made at two layers, i.e., “in-vehicle threats” regarding the internal devices of the vehicles and “communication-threats” that the connected vehicles in the network of the IOV use to communicate for the proper functioning of their subsystems: e.g., an attacker can manipulate engine control by tampering with the vehicle IVN, which can potentially become harmful, as the receiving node does not validate the origin of a CAN message [80].
During the period of 2021–2023, many different highly cited journals published articles in a wide variety of domains, viz., global geoparks analysis [82], eye health/vision impairment [83], policy analysis using data science [84], the consequence of knowledge management in Industry 4.0 [85], security aspects corresponding to the smart grid [86], transfer pricing [87], etc. The study and analysis of existing literature works provide an overview, and they give only shallow insights into any article. On the other hand, a review of a journal paper gives a deeper understanding. In [88], the authors detail how a literature study analysis is performed.

3. Research Methodology

The literature analysis in this paper is organised into 5 phases: the objective and design of the study, the collection of data, data analysis, the visualisation of the data through various tools, and the interpretation and comprehension of the data, as presented in Figure 2. A literature review analysis is a scientific and systematic procedure implemented using mathematical, computational, and statistical analyses. The foremost objective and purpose of conducting this research is to explore which authors, nations, journals, keywords, years, subject areas, and leading languages and institutions are dominant in the fields of IOT, IOV, IOMT, IOMV, connected healthcare, smart cities, data privacy, and cybersecurity issues involved in integrating them.
The initial stage began by raising research-based questions. The selection of relevant and applicable keywords for analysis was also a major issue. The relevant keywords were finalised by referring to the topmost cited publications with critical keywords as per the authors [74]. Applicable and related databases from WOS and Scopus were searched and browsed for review journal articles associated with IOT, IOV, IOMT, connected healthcare, smart cities, data privacy, and cybersecurity issues involved in integrating them.
In the second stage, the appropriate, relevant keywords were collected by filtering key points, like the publication type, subject, year, keyword, citations gained, author, and affiliated body. The Boolean technique was used for searching keywords to obtain varied outcomes for the documents. For example, entering an “inverted comma (“ ”)” in each keyword search does not let two or more words in a block of words separate, and likewise, if a “single colon (‘’)” is used, it resembles a “suffix” along with a keyword for the search to obtain the desired results. We set “year constraints” as selection criteria for data mining, with the investigation’s period constrained from 2016 to 2023.
In the third stage, the analysis of the extracted data was performed. The process of normalisation of the data was performed to check and correct data that were irrelevant/missing/oversampled/redundant from the downloaded CSV file; then, the data network was mapped before proceeding to further steps.
In the next phase, i.e., phase 4, the visualisation of the data was performed. In the final step, interpretations were made, and inferences were derived based on available visualisation results. The derived outcomes help us to make conclusions regarding research-based “questions & answers”. Also, inference and comprehension from the literature study provide insights to identify gaps in the literature, possible trends in the future, and in-depth details of the work that has already been conducted in the chosen particular areas of research. This literature study and analysis accounts for “scientific & systematic” publications in a specific subject area within a shorter period.

3.1. Important Keywords

Important “keywords” used in the search are “Internet of Things” AND “Cyber Security” OR “Internet of Vehicles” OR “IOT in Vehicles” OR “Medical Devices” AND “IOT in Vehicles” OR “IOT in Medical Things”, OR “Internet of Medical Things” OR “Security in IOT” OR “Cybersecurity in Medical Things”. “Primary and secondary” keywords used are mentioned in Table 4. When using only “primary keywords”, the search resulted in 1593 documents in the DB “Scopus” and 1889 documents in the DB “WOS”. Then, using specialised keywords for a particular topic, i.e., combining primary and secondary keywords by “ORing”, resulted in 2021 documents in “Scopus” and 206 in “WOS”. Employing the above “query-sting” keywords with the “Boolean technique” side by side with the years limited between 2016 and 2023, a total of 1203 documents were available in “Scopus”, and 30 documents were found in “WOS”.
On the Scopus and WOS websites, options are available to consider or discard or restrict country, language, affiliation, types of publication, and several filtering options. The precise amalgamation of “keywords” simplifies classifying the target research areas in terms of the “Number of Publications (NOP)”.
The resulting documents show that the “WOS” DB has a greater number of documents than the “Scopus” DB. The pursuit of relevant and fitting keywords plus the time range for which a “keyword” is searched, moreover, plays a substantial role in identifying appropriate data. “Tips” for searching “results” in diversified ways are described in Table 5, which aids researchers in refining and zeroing in on their research topic.

3.2. Preliminary Analysis

Figure 3 shows documents published per annum from 2016 to 2023. The database WOS has more publications than the Scopus database. There were steep increments in the NOP in both databases, i.e., from 2016 to 2022, and most publications took place in the year 2022, with 404 compared to approximately only 33 in 2016 in the Scopus DB and 463 in 2022 compared to only 216 in 2016 in the WOS DB. And the data within the second quarter of 2023, with around 89 publications in the DB “Scopus” and 48 in “WOS”, indicate that the number of documents published every year is growing, which demonstrates that this area of research is an outstanding field for steering future potential research work.
Figure 4 presents the top-10 most influential authors in “Cybersecurity in Internet of Medical Vehicles” from both Scopus and WOS databases. Ross, J.S., is the author with the top number of publications, with a total of 27 published documents, trailed by Krumholz, H.M., with 17 publications in the WOS database. Javed A. R. is the most contributing author in the database Scopus with 19 publications, followed by many contributions by the authors Jalil, Z., Maple, C, and Zulkermine, M, with 14 publications. And the author Guizani, M., is the common significant contributor in both Scopus and WOS databases, with 11 and 10 publications, respectively. Figure 5 presents the top-10 affiliations in the DBs “Scopus” and “WOS”. The University of Texas at San Antonio is the front-runner with 25 publications, trailed by Beihang University, Coventry University, and the Air University of Islamabad with 22 publications in the Scopus DB list. Harvard University leads with 42 publications, followed by the University of California System with 38 and Yale University with 37 in the WOS DB list. Figure 6 and Figure 7 present the categories of documents with the number of “types of publications” in the DBs “Scopus” and “WOS”, respectively. In the Scopus DB, articles have more significant numbers, with 776 publications at around 51.7%, followed by Conference Papers and 481 journals at about 32.0%, while in the WOS DB, articles also have the largest number of publications, with 1105 published documents at around 54.12%, followed by Proceeding Papers with 482 published documents at 25.8%, Review Articles with 205 published papers at 10.97%, and categories like Editorials 3.96%, Materials, Early Access 2.52%, Book Chapters 2.03%, and others 0.61% etc.
Figure 8 illustrates the top-10 countries with the number of publications. China has the largest NOP with 352 published documents, followed by the USA in second position with 348, the UK in third with 156, and India in fourth place with 154 papers published in the Scopus DB. At the same time, the USA leads with its NOP at 571 in the WOS DB, followed by China with 179, the UK with 139, and India in fourth position with 123 published documents.
According to the analysis of the Scopus DB, Table 6 lists the top-10 nations with the highest number of publications and the most significantly cited papers. The “statistical t-test” calculates the “variance” in productivity among the top-10 nations. The “null hypothesis (Ho)” is that there exists no variance amongst NOPs of top-10 nations with outstanding cited papers or the max NOPs by the top-10 nations. Similarly, the “Alternative Hypothesis (Ha)” is that there exists a variation amongst NOPs of top-10 nations with significantly cited papers and the max NOPs by top-10 nations.
A one-sample t-test was performed, and Formula (1) below shows the t-ratio:
t = X ¯ μ s n
where:
X ¯ = “calculated mean”;
μ = “hypothetical mean”;
S = “standard deviation”;
n = “sample size”.
JASP is open-source software and is freely available for downloading. JASP software was used to perform the statistical analysis for this article, and its results are illustrated in Table 7 and Table 8. The calculated “p-value” is greater than 0.05 for both sample publications. This means that the “Null Hypothesis (Ho)” is accepted, and the “Alternative Hypothesis (Ha)” is rejected. It shows that the NOPs of the top-10 nations are the same as the highly cited papers and max NOPs by top-10 nations.
Figure 9 and Figure 10 present the top sponsoring agencies from 2016 to 2023 with the number of documents published from the Scopus and WOS databases. The sponsoring agency “The National Natural Science Foundation of China” leads the lists of Scopus and WOS databases with 151 and 77 publications, respectively. They were followed by the “National Science Foundation” with 76 publications in the Scopus DB and by the USA “Department of Health and Human Services” with 72 publications in the DB WOS. Figure 9 and Figure 10 show that most sponsoring is by “NSFC China”. Figure 10 reveals that most of the research papers are published by institutes from China.
Figure 11 presents the NOPs in the DBs Scopus and WOS relating to the subject area. “Engineering” has larger NOPs in both DBs. A total of 1163 documents linked to engineering were published in the DB WOS, followed by 328 “Computer Science” documents. A total of 696 documents were linked to “engineering” in the Scopus DB, followed by “Computer Science” with 1136 documents, whereas Figure 12 and Figure 13 present the proportions of the subject areas based on the databases Scopus and WOS.

4. Literature Review Analysis

The “citation index” indicates how many times a paper is referenced by other research members for their research work. Likewise, the “h-index” is one of the indicators that helps to evaluate how “productive” and “influential” authors are. The “h-index” is calculated when the NOP published by an author cited is more than or equal to the NOP published by the author.
Table 9 and Table 10 list the top-15 publications that have the highest number of citations based on the databases Scopus and WOS, respectively, provided side-by-side with “year of publication”, “title”, “author name”, “journal publication”, and “total citations” collected from 2016 to 2023. Stergiou, C., et al., in the Scopus DB, for their review paper “Secure Integration of IOT and Cloud Computing”, were cited the highest number of times, with 739 citations. In contrast, Yang, Y.C., et al., for their survey paper “A Survey on Security and Privacy Issues in Internet-of-Things”, leads the list of the WOS DB, which gathered 572 citations. Both papers discuss security issues in integrating the IOT, which shows that cybersecurity in the IOT is a highly discussed and researched interest topic by research members across the globe.
Many papers are available with similar works, which have made limited contributions to the research field. While comprehending a particular paper, its abstract and conclusion can be read to understand its objective and focus area. If the topic and subject seem helpful, then one can continue to study other details of the paper. While inspecting the complete details of the paper, the reader should first go through an overview of the debated topics in all other segments, figures, and tables to understand the pattern and to identify the relevancy of the work of that particular paper. Through this, the contribution of the paper to the research topic can be understood. Each paper is exceptional. This method must be adhered to while reviewing the literature (LR).
The literature review step provides insights into the qualitative contribution of articles, their outcomes, gaps in research, methods used in papers, the assessment of various procedures, and employed approaches. On the other hand, the literature review step emphasises the quantitative analysis of the papers, their authors, contributing countries, publication years, briefs about a focus area, used keywords, sponsoring agencies, journals, and affiliations with their institutes.
Figure 14 presents a crucial evaluation of the top-cited paper on “Scopus & WOS” DBs. The authors with more citations discuss a critical analysis of issues, challenges, and methodologies to address cybersecurity in the Internet of Medical Vehicles. Predominantly from 2022, these publications are mostly cited by other research members, which suggests that researchers are very excited about this cybersecurity-in-IOMV topic.
“Security” in the Internet of Things (IOT) has a total of 2021 papers in Scopus and 206 in WOS. Simultaneously, cybersecurity in medical devices has 28 papers in Scopus and 164 in the WOS DB. The difficulty level for addressing security issues for implementing the Internet of Medical Vehicles is higher than that for the IOT alone. But practically, more published documents are available for the latter, and very little research has been carried out regarding security issues and challenges.
Figure 15 and Figure 16 present the graphical trends of the top-5 published documents in the databases “Scopus & WOS”, respectively, in cybersecurity in the IOMV. The paper titled “Secure Integration of IoT and Cloud Computing” in 2019 and “A Survey on Security and Privacy Issues in Internet-of-Things” in 2021 had steep rises in the number of citations from the databases Scopus and WOS, respectively. In Figure 15, it can be observed that the papers titled “Deep Learning for cyber security intrusion detection: Approaches, datasets, and comparative study” and “A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security” have gathered a more significant number of citations over the period up to 2022. And likewise, in Figure 16, the number of citations for the papers titled “An effective feature engineering for DNN using Hybrid PCA-GWO for intrusion detection in IoMT Architecture” and “Internet of Medical Things: A Review of Recent Contributions Dealing with Cyber-Physical Systems in Medicine” increased in 2022. This illustrates that the tendency of highly cited papers changes from year to year. In that specific publication year, whichever paper was significantly cited upheld that it had considerably new, valuable substance during that period.
Figure 17 and Figure 18 explain the “Source Titles” from the databases Scopus and WOS, respectively. “IEEE Access” has a greater percentage of contributions with 6.03%, followed by “IEEE Transactions on Intelligent Transportation Systems” with 2.45% in the Scopus DB, whereas, in the database WOS, the “Journal of Medical Devices Transactions of the ASME” with 9.95% publication contributions has the highest percentage of publications, followed by “Expert Review of Medical Devices” with 7.81%.

5. Assessment of Cybersecurity in the IOMV System

This section discusses the assessment of cybersecurity in the IOMV system, like details regarding various types of potential cyber-attacks and their characteristics, the application of AIML techniques for developing countermeasures to cyber-attacks, the assessment of cybersecurity risks, and parameterisation for estimating the strength of cybersecurity.

5.1. Types and Characteristics of Cyber-Attacks

The application of the Internet of Medical Vehicles is essentially developed based on the application of IOT technology. Table 11 represents various potential sophisticated types of cyber-attacks that can be carried out by malicious hackers and attackers at various layers of the IOMV, right from the source, i.e., onboard medical devices, up to the target recipient devices at hospitals through their interconnecting communication channels and networks, including common attacks that can occur at any layer of the IOMV system [89,90]. A variety of network devices communicating through vehicle IVN and wireless communications (e.g., Gateways, Network Nodes, WiFi Devices, Servers), IOMV devices connected at the physical level (like medical devices, HMI, USBs, etc.), their software and firmware, etc., will be part of the IOMV network, which potentially allows more possibilities for cyber-attacks in the IOMV system, such as denial of service (DOS), Packet Injection, Spoofing Attacks, IVN bus flooding with overwriting messages, etc., leading to security and privacy risks to the end users and the shared data. Because the data that are transmitted are open to all third parties, and the attacks can be performed from a remote distance, either from the roadside (Roadside Units) or from other vehicles in the IOMV network, etc., the resultant consequences of different types of attackers, like internal, rational, external, individual, destructive, random, lasting, opposite, etc., will altogether vary. Hence, it may lead to a rise in newer types of combinational and sophisticated attacks that can exploit vulnerabilities of the IOMV system.
While IOMV systems have greater potential to transform human life, they pose significant security concerns, and they can become vulnerable targets for attackers. Thus, interest in the security of the IOMV has been increasing rapidly. Also, various factors influencing the cybersecurity risk in the IOMV, like the operating conditions, integration, interoperability, restraints, and user necessities for vehicular communication (VC) systems, make security an increasing challenge. Cybersecurity regulations are essential to any Information and Communication Technology infrastructure [77].
However, the effectiveness of the countermeasures applicable to the IOMV has not been evaluated yet. So, as per this analysis, there are many issues that are still open that need to be addressed, like protecting IOMV systems from outside attacks and securing V2X communication, as they can spread to the smart infrastructure level and vice versa. Also, the capability of responding in real time, suitability, affordability with minimum changes to the architecture of the IOMV, etc., can be requirements for robust security enhancement strategies, which require new techniques and standards that are not based on outdated transportation protocols and that can work successfully in realistic, challenging, and niche environments like the IOMV system.
There is a big challenge in how to implement this without compromising safety, reliability, security, and privacy. To address these challenges, effective detection and defence mechanisms and countermeasures, like technologies and policies that can reduce the risk of security vulnerabilities at the vehicle level and infrastructure level, must be developed and assessed against various types of attacks by collaborating with government agencies, academicians, and industry. Various stakeholders of the IOMV system, like the manufacturers, are responsible for the development of safety countermeasures applicable to the IOMV system in addition to the development of countermeasures applicable to infrastructure, requiring more effort from governments and regulating agencies as well.

5.2. Artificial Intelligence and Machine Learning for Strengthening Cybersecurity in IOMV System

The conventional standard algorithms needed for decision making, which are designed based on hard-wired logic to develop cybersecurity defensive countermeasures for combating quickly growing intelligence and dynamically evolving sophisticated cyber-attacks, are not sufficient alone. And it is not possible to detect all the threats or to handle such cyber-attacks by human efforts alone [91,92]. Such algorithms might be slow and insufficient, owing to the speed of processes and the quantity of information that needs to be processed. Human security experts may not be capable of handling the degree of security threats [92,93]. Therefore, they must have strong support from intelligent machines, software, and the latest technologies for fighting cyberthreats [94,95]. Therefore, cybersecurity capabilities can be enhanced by the usage of artificial intelligence and machine-learning (AIML) techniques. AIML comprehends and simulates human intelligence [92]. AIML techniques can improve the overall security performance, as they are more flexible, adaptable, and robust. And they help to provide better protection from an increasing number of sophisticated cyberthreats [96,97]. It is necessary to advance in AIML applications since the increasing volume and complexity of cyber-attacks require more resources to address issues of cybersecurity. And AIML algorithms can analyse the data and learn to identify threats from existing attacks and can detect intrusions with the same patterns in the future and limit the risk of breaching [98,99]. To combat cybersecurity risks in IOT/IOMV applications, AIML techniques deal with machine learning, deep learning, natural language processing, computational intelligence, etc. [93,100].
AIML techniques have the capability to replicate human intelligence. And they are efficient in Automation, Smart Decision Making, Accuracy, Exploration, Data Collection, Data Analysis, Solving Complex Problems, Managing Repetitive Tasks, Minimising Errors, etc. And AIML has emerged as one of the most crucial tactics for addressing issues of cyber-attacks. When deployed for cybersecurity management, they can identify threats and examine relationships among cyberthreats quickly, and they accelerate detection. AIML techniques work efficiently in scanning the entire network very fast, detecting potential threats, and shortening safety tasks, unlike humans. AIML techniques help in eliminating cumbersome tasks and make instant decisions to remediate threats. AIML applications are capable of handling huge amounts of data, and hidden threats can also be screened and handled. They provide enhanced security and vulnerability management. And they perform various tasks, including data loss prevention, threat identification, security management, vulnerability management, fraud detection, access management, threat and compliance management, intrusion detection, threat intelligence, etc. They can address various types of threats and help to prioritise them to safeguard the whole system. AIML helps in securing validation and authentication each time someone performs a login activity for the recognition of genuine login attempts through fingerprint identification, face recognition, OTPs, etc. [92]. Data trends can be identified, which also enables security systems to make informed decisions. And AIML techniques help to reduce response times and enhance security measures in cybersecurity issues [92,101].
The authors have explained that due to the transmission of large-scale data through IOT devices in the IOMV system, AIML plays a primary role in anomaly detection, addresses the types of cyber-attacks, and provides defensive countermeasures. And the applications of deep learning (DL) and deep neural networks (DNNs) are possibly the most promising and powerful tools among AIML techniques [92,95,102,103]. Deep neural networks (DNNs) may be able to predict cyber-attacks in advance, in addition to preventing them. And this can lead to a new phase in addressing the cybersecurity risk in the IOV and IOMT [26,103]. Also, BCT intelligence, which combines the advantages of both BCT and ML techniques, is helpful for the rapid development of IOV security systems. Driven by its advantages, four aspects, namely, reliable interaction, network security and data privacy, trustworthy environment, and scalability, can be achieved by BCT [104]. The authors have summarised potential vehicle-level cyber-attacks in the IOV, both within IVNs and mobile networks. Further, they have presented a centralised third-order model and designed resilient-based adaptive countermeasures against cyber-attacks for controlling the IOV system and mitigating the limited network communication bandwidth under the threat of denial-of-service (DOS) attacks, deception attacks, etc. [105,106].
And regarding IOMT applications, most IOMT devices are small and easy to access, and they suffer from issues like latency and low power consumption, and thus, the IOMT needs new measures to keep the system secure [101]. Blockchain techniques can consistently identify the most severe and potentially life-threatening attacks in the IOMT field. The use of blockchain for decentralised data protection helps to protect patient health records from being compromised. And there is an emphasis on focusing on integrating DL, ML, and BCT techniques to improve cybersecurity by utilising lightweight solutions like a decentralised digital ledger approach that allows end-to-end communication and interaction between untrustworthy persons. This technique uses BCT to record and collect accumulated medical information in a secured and distributed format from the IOMT and integrated devices [107]. Another way to improve cybersecurity is integrating blockchain with currently used safety measures, like authorisation and access control providers [108].
The authors have proposed a comprehensive combination of traditional and Quantum Neural Network/ML (QNN) techniques as part of AIML in the IOMT vulnerability assessment. Specifically, the protection of sensitive and private data at multiple levels can start from storing data in distributed cloud nodes and then fuse heterogeneous IOMT data by using ML classification algorithms such as QNN to predict which vulnerability in IOMT-based network traffic is a malicious attack [109,110]. In [111], the authors highlight types of cybersecurity attacks related to the IOT, especially those using RFID and WSN technologies, which are the basic technologies used in IOT applications. In [104,112], the authors emphasise that BCT and ML can effectively address the current issues of decentralisation, cybersecurity, and data privacy in the IOMV. In [104], the authors propose token-based authorisation and authentication (TAA) for providing cybersecurity in IOV systems. This method uses AIML techniques like BCT and Random Forest learning for authorisation and key management for authentication, respectively. And BCT-based authorisation helps to update specific fields of tokens to retain the communication ratio by reducing vehicle-to-vehicle losses [93,99,100,101].
However, though the application of AIML provides greater opportunities to counter cybersecurity risks, its usage has limitations as well [91]. At present, AIML applications as countermeasures for dynamic and sophisticated cybersecurity defence systems remain mainly at the proof-of-concept stage. As of now, it is not clear how much development in general computing is penetrated for detecting cyberthreats [92]. Also, the major issues with the usage of AIML in cybersecurity include the lack of AIML’s full autonomy, data privacy risks, insufficient legal frameworks, and ethical concerns arising from autonomous decision making and its adversarial usage due to its dual use. It can be used for defensive and offensive purposes as well [94]. Cybersecurity will be governed by regulations, while hackers have the freedom to use AIML technology for developing and introducing multiple quick, accurate, efficient, advanced, and vicious malicious attacks to break the IOMV system, including AIML-enabled security tools as well; e.g., a cyber-attacker can create an identical or fake website resembling a legitimate website and may be able to trick AIML-based security systems by spoofing it as a real one [98]. Also, AIML systems are not always perfect, as they can make mistakes by incorrectly flagging an activity as malicious due to incorrect data labelling or the overfitting of training data. Or AIML can be biased due to skewed training data, etc.; therefore, even AIML techniques may not provide protection from all types of threats. And AIML techniques need to be redesigned, updated, and maintained, as hackers keep on improving and updating the cyberthreats. Owing to the fast adoption of AIML in cybersecurity, it is necessary to resolve these related risks and concerns at a faster pace [94,98].
AIML is used to analyse data at runtime and to detect unauthorised users in the early stage, especially for tracking online harm. As of now, systems solely using AIML techniques are not completely secured, because the encryption techniques have some loopholes, such as the algorithm’s short life expectancy and low computation power, the use of various AIML techniques for various categories of faults, etc. [92,94]. Therefore, future cybersecurity may use artificial general intelligence: e.g., to analyse the behaviour of the intruder and overcome encryption weaknesses, artificial general intelligence (AGI) can be used to detect the rational behaviour of the different attack types. Human intelligence cannot apply encryption techniques but uses different cognitive correlations, like intention, perception, motivation, emotions, and implicit and explicit knowledge, to keep sensitive information confidential. Therefore, using AGI techniques can help to emulate human-like rationality for protecting information like a human mind would [103,113]. Also, like the application of AGI, the concept of Explainable Artificial Intelligence (EAI) seems to possess the potential to revolutionise cybersecurity in IOMV systems by better understanding the behaviour of various types of cyberthreats and allowing the development of effective countermeasures. The EAI method can become the most suitable for IOMV systems, where peer-to-peer communication takes place between healthcare devices, and anomaly-based intrusion detection in the IOMV networks [114,115]. Also, brain-inspired neuromorphic computing techniques are promising biologically inspired methods by using brain cognition mechanism to address diversified technologies for IOV system to develop intelligent and fault-tolerant transport systems [116].
The analyses of the research indicate that, to develop these new security enhancement strategies, a few techniques, like machine learning and artificial intelligence (AIML) with big data like blockchain technology (BCT) [60], can be promisingly employed to develop anomaly-based intrusion detection systems [81] and to defend against cybersecurity attacks. And a Cognitive Radio Network [69,117] offers an innovative way of solving spectrum underutilisation problems by exploiting spectrum opportunities like spectrum prediction, monitoring, and MAC protocols, to mention a few proposed solutions, but their holistic applicability must be determined as the research continues to progress in this field.

5.3. Assessment of Cybersecurity Risk in IOMV System

As per the NIST Cybersecurity Framework, “risk of cybersecurity is an effect of uncertainty regarding information & technology, which may be caused due to loss of confidentiality, integrity, availability of information, data, control systems and which can potentially impact organisations’ operations”. And this NIST Framework defines how to assess cybersecurity risks and how to prioritise the actions to reduce those risks. Also, another standard framework, ISO-27001:2022, defines information security management, risk assessment, and risk treatment [39]. But all cybersecurity risks may not be equal. Therefore, the cybersecurity risk is subject to identifying security threats, the degree of vulnerability, the likelihood of exploitation, severity, frequency of occurrences, and their impact. And it can be estimated based on quantitative and qualitative assessments. The cybersecurity risk can be quantified in a mathematical equation, as in (2). Various types of potential cybersecurity attacks in IOMV systems are provided in Table 11.
Cybersecurity Risk = (Threat) × (Vulnerability) × (Information Value)
Similarly, as shown in Table 12, the assessment of the qualitative cybersecurity risk helps to identify the likelihood of occurrence and its impact as per the Risk Assessment Matrix (RAM). The qualitative risk assessment is estimated based on the combination of the likelihood and severity. For example, with a combination of x11 and x21, the risk is low. Similarly, with a combination of x24 and x34, the risk is considered critical. Based on this degree-of-risk estimation, the risks can be prioritised, and accordingly, countermeasures specific to the type of risks need to be taken.
The approach to the management of cybersecurity risk needs to be dynamic. The steps involved in the mitigation of cybersecurity are shown in the flowchart in Figure 19, which specifies the levels of acceptance in assessing a risk. Then, a suitable risk assessment strategy is chosen. The risks are prioritised based on their degree of impact and importance. Then, control strategies and countermeasures are developed and implemented to strengthen cybersecurity in the IOMV.

5.4. Parameterisation of Cybersecurity

A “parameter” is a value or a metric that is used by a function to control the operation or to determine or compute the outputs of a function. And the mathematical representation, in terms of a parameter for expressing the state of a system, a process, or a model as a function of any independent quantity, can be termed the “process of parameterisation”.
In the assessment of cybersecurity risks, the key parameters that can be used to determine the vulnerability, the strength of cybersecurity, system resilience, etc., include the MTTI (Mean Time to Identify) and MTTR (Mean Time to Respond). These parameters provide the degree of vulnerability of the cybersecurity of the IOMV system and how much time it takes to identify a potential cyber-attack and then respond to such threats in the network or system. The higher the values of MTTI and MTTR, the greater the loss to the system. The MTTR is a direct measurement of how long critical systems of the IOMV remain offline due to an attack. As shown in Figure 20, there are other metrics that are within the breach-response timelines, which can help to estimate the degree of cybersecurity of the IOMV system. They are the MTTR (Mean Time to Repair), MTBF (Mean Time Between Failures), MTTF (Mean Time to Failure), MTRS (Mean Time to Restoration), and MTBSI (Mean Time Between System Incidents). These common parameters help to measure each segment of the cybersecurity breach timelines from the initial penetration to recovery to the next attack. These numbers help to understand the effectiveness of the IOMV cybersecurity system.
Referring to Figure 20, the MTTD is the average time duration that the system takes to notice a breach from the time the actual breach has taken place. And the MTTI is the average time duration that the system takes to identify the breach from the time it has actually noticed the breach. The MTTR is the average time that the system takes to fix the breach of the system from the time the system has actually noticed the breach. MTTRepair is the average time that the system takes to bring back the system to normalcy, i.e., the average time that it takes the system to repair the breach and restore it to normalcy from the time the actual breach in the system is noticed. The MTBSI is the average time between breaching incidents from the time the previous breach was noticed. And the MTBF is the average time between when the system was made available after the previous breach and the new breach. For the strong cybersecurity of an IOMV system, parameters like MTTD, MTTI, MTTR, MTTRepair should be very small, and parameters like the MTBSI and MTBF are ideally maximized. These can be achieved by strong countermeasures in combating cyber-attacks.

6. Results

The aim of the present work is to provide guiding information to researchers seeking to investigate and analyse subjects related to “cybersecurity in the IOMV”, an IOT-based application that is derived from the integration of IOT applications, i.e., IOV and IOMT, and can help to enhance connected healthcare services as part of developing smart-city realm. This is realised by making innovations and merging physical infrastructure. This article, based on our systemic state-of-the-art analysis, provides suggestions for future research on cybersecurity attacks, gaps, factors influencing cybersecurity, and challenges to overcome in implementing defence strategies, etc., on the subject/topic of “Cybersecurity in Internet of Medical Vehicles”. The following are the major findings and outcomes of our analysis based on the research work presented in this paper related to the “Cybersecurity in Internet-of-Medical-Vehicles”:
  • We perceive that this is a niche yet unexplored research area and that it appears to be an upcoming and widely trending topic, as the concept of the IOMV is basically derived from integrating IOT-based applications, i.e., the IOV and IOMT.
  • Most of the research gaps corresponding to this topic of the IOMV are still unexplored, and there is a great need to implement robust cybersecurity measures due to increasingly sophisticated cyber-attacks; many challenges and factors influencing security vulnerabilities, like integrity, interoperability, etc., and many issues like few defined standards, regulations, guidelines, frameworks, protocols, etc., are significant gaps and issues that need to be explored and addressed, and hence, it is becoming an upcoming and widely trending topic.
  • Also, as part of the study and analysis, we have presented various types of potential cyber-attacks that can take place at different layers of the IOMV system.
  • We have discussed and provided the application of AIML and AGI techniques as solutions for developing countermeasures to strengthen cybersecurity in IOMV systems.
  • We have presented the IOMV system model and architecture and the types of communications that can take place at different layers of the IOT structure.
  • We have presented details of relevant standards, protocols, frameworks, and guidelines applicable to the IOMV.
  • Factors affecting the cybersecurity risk in the IOMV system have been discussed, along with various challenges and constraints affecting the cybersecurity risk in the IOMV.
  • We have presented methods for assessing the cybersecurity risk and parameterisation details for assessing the strength of cybersecurity, which can help to develop countermeasures for cybersecurity.
  • And we have discussed the future scope to focus on, which can be helpful for researchers to develop robust cybersecurity in IOMV systems.

7. Limitations

This paper is primarily about discussing a state-of-the-art analysis regarding the research topic of cybersecurity in the IOMV, which is a derived concept based on the integration of IOT, IOV, and IOMT applications. Therefore, only major journals on diverse topics from the vast literature are considered for discussion to gain knowledge, to know the various visualisation tools used and types of analyses performed in those papers, and to understand the objectives, research challenges, and limitations of their studies. As the safety and security of the IOMV system is a broad area, admittedly, this work may not have fully or thoroughly covered all the security aspects of the IOMV system. This paper discusses and analyses various kinds of cyber-attacks and techniques for strengthening cybersecurity in the IOMV. As part of our future research works, to understand the behaviour of the IOMV system, these cyber-attacks need to be evaluated by performing simulations in terms of performing risk assessments and parameterisation. And then, various solutions for countering the cybersecurity risk need to be developed. Also, as the focus of this paper is to discuss the state-of-the-art analysis only, proposals of new methods or algorithms for countering cyber-attacks and strengthening the cybersecurity of the IOMV shall be part of our future research works.

8. Challenges and Constraints

The applications of IOT technology are vast and virtually have no limits, and they are rapidly growing—both in size and in scope in different fields. The rapid evolution of the IOV and IOMT and thus the IOMV system, which is the integration of applications of the IOT, i.e., IOV and IOMT, helps to shape the infrastructure of “connected-healthcare” services as part of the “smart-cities” realm. However, the corresponding industries, including the automobile and healthcare industries, need to prepare for different types of constraints and challenges during their integration and the associated cybersecurity risk of the IOMV system. The following are some of the major constraints and challenges.

8.1. Unexplored and Niche Area

As the applications of IOT technology in the fields of IOV and IOMT are themselves new, the combined application derived from integrating IOV and IOMT, i.e., the IOMV, the “Internet of Medical Vehicles”, is a further new, futuristic, and yet still unexplored research area.

8.2. Not Immune to Variety of Security Anomalies

The issue of cybersecurity risk is one of the primary yet critical and difficult parts of all the challenges in the deployment of the IOMV system that need to be addressed by the automobile and medical industries, because it is more vulnerable to cyber-attacks, as it involves dealing with sensitive health data and health-monitoring systems [118,119,120] in a vehicle application, and data breaches and unauthorised access can occur due to exposure to various communication systems and interconnected networks, very limited computing resources, and the typical lack of traditional security controls; these systems are not designed to be immune to the variety of security anomalies.

8.3. Complicated Requirements of IOMV System

The implementation of cybersecurity measures in the IOMV is complicated and yet still not explored, as it is subject to various factors and constraints because potential cybersecurity risks in the IOMV can take place with different types of attacks at various layers right from the source, i.e., onboard connected medical devices, up to the target recipient devices at the hospitals and their interconnecting communication channels and networks. Those significant factors and constraints are due to the requirements for:
  • Seamless Integration—with existing technology and infrastructure.
  • Scalability—without any significant decline in IOMV system performance, scalable and flexible architectures are needed to maintain uniformity in handling the future demand of rapidly increasingly connected devices, as scalability affects network capacity and device and data management, e.g., healthcare devices and their increased data and communication volume.
  • Interoperability—connecting many diverse devices.
  • Usability and Cost—tradeoff and balance between the cost of deployment and benefits.
  • Reliability—performance of the system can suffer even if one IOT device is unresponsive or compromised due to network blockages, DOS attacks, and malfunctions in communications.
  • Power Management—device-level energy issues, as IOT devices are developed to be smaller, use low power, and operate using batteries.
  • Data Management—collection, storage, and processing of data.
  • Lack of Standardisation—absence of common agreed-upon specifications, which leads to inefficient interconnection, communication, and exchange of data between devices.
  • Lack of Protocols—in the automotive and healthcare industries, systems manufactured by various manufacturers follow their own standard rules and protocols.
  • Lack of Skill Set—conventional vehicle manufacturers/operators and medical personnel are not trained for cybersecurity adversaries, and usually, IT systems are supported by the IT teams.
  • Device and Network Infrastructure—continuously building, maintaining, and supporting connections of large numbers of advanced IOT devices used in IOV and IOMT applications require regularly updating existing devices.
  • Poor Connectivity—IOT sensors are required to monitor process data and supply information.

8.4. Complex Nature of Cybersecurity of IOMV System

There are many significant issues that make providing cybersecurity in the IOMV system difficult. The main issues include:
  • Lack of encryption—where hackers can easily manipulate the software.
  • Inadequate testing and updating—automotive and medical manufacturers not placing much emphasis on system testing and updating, showing eagerness to manufacture and deliver their devices into markets.
  • Brute-force password and weak credential details—make the IOT devices used in the IOV and IOMT vulnerable to cyber-attacks.
  • Software Vulnerabilities—can happen from errors and mistakes like bugs and weaknesses in the software code by using unsupported or outdated software that can be exploited by attackers to carry out malicious attacks.
The various issues, as discussed in Section 8, explain the significant reasons that cybersecurity risks arise. A cybersecurity risk can also take place at various points and layers of the IOMV system, from the source of data-generating IOT devices, through the networks and communication channels, to the target recipients [121,122]. And the typical significant types of cyber-attacks, in which the attackers can exploit or hack the IOMV systems, include attacks that can happen against IOT devices; a few are specific to IOMT devices and a few are related to the IOV application. And the majority of those attacks are common, and a few are specific to either the IOV level or the IOMT level. And a few of them are more vigorous due to their undetectable nature, and a few others have the potential to create disruption or completely shut down the IOMV system.
Therefore, the above challenges and constraints only highlight the complexity of the cybersecurity risk and finding countermeasures in the IOMV application. All of the challenges and constraints, as discussed above, along with the different types of cyber-attacks, are interrelated, affecting cybersecurity and the overall performance of the IOMV system.

9. Future Outlook

Researchers estimate that the number of “connected things” part of the IOT will reach more than 40 to 50 billion by the year 2030. The applications of “IOT in Vehicles” and “IOT in Medical Things” are two distinct fields. Together, they represent a higher proportion of the IOT network along with their interconnected sensors, applied devices, communication systems, various integrated technologies, standards, services, etc., and their applications as the IOV and IOMT are only projected to grow rapidly as they help to shape the infrastructure of the smart-city [87] realm, offering safer, autonomous, connected, and intelligent transportation and meeting the increased need for cost reductions in connected healthcare services, respectively, which is influencing the growth of the IOV and IOMT markets.
The automotive and medical industries are at an important juncture in history. Though the concept of the connected car is offering an exciting new era of car ownership to drivers, this expanded capability introduces cybersecurity risks that could threaten the safety of drivers. Cybercriminals are becoming more sophisticated in their attacks, and the types of cyber-attacks in the IOT system are manifold, as illustrated in Table 11, and day by day, their numbers are alarmingly increasing, e.g., IOT malware attacks rose by 220% in 2022 as compared to 2020. The automotive industry witnessed a sharp increment of approximately 600% in incidents related to cybersecurity from 2016 through 2019, and for the IOMT, the increase was about 405%. It is becoming a serious concern that, because of the growth in the rate of attacks, combined with the growing number of IOT devices, the combinations of hacking or methodologies of hacking are becoming sophisticated. Therefore, the risks of cyber-attacks are evident and real, which needs to be addressed, and cybersecurity in the “Internet of Vehicles” [123] and “connected medical devices” [23,124] is a fast-expanding research field that interests serious researchers and industries.
The “cybersecurity in IOMV”, i.e., the cybersecurity risk arising after the integration of the IOV and IOMT, is an important, futuristic, and need-of-the-hour topic, which is crucial to the concept of providing connected healthcare services as part of the development of smart cities [87,125,126]. But, at present, there is no single technology or one-stop solution that can be deployed to prevent the multitude of types of cyber-attacks and cybersecurity risks in the IOMV. And due to a lack of regulations, standards, and protocols, and as various devices are interconnected with multiple communication technologies and communication points, the security and privacy of these interconnected networks still have potential risks [47].
Human security experts may not be capable of handling the degree of security threats. And they must have strong support from intelligent machines, software, and the latest technologies for fighting cyberthreats. Cybersecurity capabilities can be enhanced by the usage of AIML techniques. They can comprehend and simulate human intelligence. AIML techniques can improve the overall security performance, as they are more flexible, adaptable, and robust. But their usage has limitations as well. At present, AIML applications as countermeasures remain mainly at the proof-of-concept stage, as they lack full autonomy and are associated with data privacy risks, insufficient legal frameworks, and ethical concerns. Also, AIML techniques can be misused by hackers to develop and introduce multiple quick, accurate, efficient, advanced, and vicious malicious attacks to break the IOMV system, including AIML-enabled security tools as well. And the systems solely using AIML techniques are not completely secured due to the algorithm’s short life expectancy, low computation power, etc.; therefore, future cybersecurity may use artificial general intelligence and Explainable Artificial Intelligence, which have the potential to revolutionise cybersecurity in IOMV systems. They can be used to detect the rational behaviour of different attack types. They can help to emulate human-like rationality and cognitive correlations like intention, perception, motivation, emotions, and implicit and explicit knowledge to keep sensitive information confidential.
Several challenges and implications, as discussed, exist today that need to be addressed before the mass adoption of the IOMV, and such cybersecurity enhancement measures need to satisfy balancing the trade-off of their deployment and the cost of implementation. This can be achieved through collaborations among researchers, relevant industries, various organisations, and standardisation bodies. The security and privacy of these interconnected networks still have potential risks [47] and addressing these issues [33] of cybersecurity is the need of the hour and has enormous potential for research at various levels [127] of interconnected networks [29].
This paper discusses and analyses various kinds of cyber-attacks and techniques to strengthen cybersecurity. In the future, they need to be evaluated by considering and simulating cyber-attacks, performing estimations, updating parameterisation, etc., to ascertain the behaviour of the IOMV system in terms of countering the cybersecurity risk.

10. Conclusions

This analysis focuses on an upcoming and futuristic trend, “Cybersecurity in Internet of Medical Vehicles”, which is a niche yet unexplored research area. This analysis was performed based on the published literature between 2016 and 2023 from the databases “Scopus” and “Web-of-Science”. The main objectives of this journal paper regarding this research field are to evaluate global trends in terms of top publication outputs, publication patterns, gaps, future outlooks, etc. The analysis presented in this paper will help beginners, relevant industries, and serious researchers to distinguish the topmost authors and their contributions to the research work. Based on our analysis, we found that “cybersecurity” is an extensively used keyword. The privacy and security of medical data related to onboard patients are critical in delivering “connected-healthcare” services using the IOMV system as part of the smart-city realm. Connected IOT devices of the IOMV have to offer exact data and should be unaffected by noise factors. The “Internet-of-Medical-Vehicles” has security risks from a variety of sophisticated cyber-attacks as devices communicate with different networks, and this can endanger the onboard patient’s life. Hence, it is critical to understand subjects related to “cybersecurity” in these vehicles to develop robust cybersecurity measures. And our analysis in this paper will help researchers to gain a comprehensive idea of this multidisciplinary research area related to “Cybersecurity in Internet-of-Medical-Vehicles”, as it presents a review of top journals, highlighting their gist, merits, and limitations, an analysis of highly cited papers, the IOMV architecture and system model, related applicable standards, types of potential-cyber-attacks, factors causing cybersecurity risks, various artificial intelligence techniques as solutions for developing potential countermeasures, the assessment and parameterisation of cybersecurity risks, constraints and challenges, and future outlooks for implementing cybersecurity measures in the IOMV. Also, our analysis reveals that there has been a sudden growth in publications in this research area since 2018 and that this is a niche yet unexplored research area with few defined standards, regulations, and frameworks, and there is a great need to implement robust cybersecurity measures due to increasingly sophisticated cyber-attacks. And we found that very little work has been conducted in this area of research; therefore, there are great opportunities for researchers to explore and work towards contributing to this upcoming, futuristic research field.

Author Contributions

C.R.B. and P.T.—conceptualisation and methodology; C.R.B.—writing, software, documentation, data collection, validation, formal analysis, investigation, resources, and data curation; B.R.M.—documentation and tools; P.T.—supervision, tools for analysis, corrections, domain analysis, review, and project administration; G.S.—guidance and corrections. All authors have read and agreed to the published version of the manuscript.

Funding

The open-access publication of this article is supported by the National Research Foundation, South Africa under the IPRR program with Grant no. 145909 and the University of Johannesburg, South Africa.

Institutional Review Board Statement

The conducted research is not related to either human or animal use.

Informed Consent Statement

Informed consent was obtained from all individuals included in this study.

Data Availability Statement

The data gathered for this research are accessible from the DBs Scopus and WOS.

Acknowledgments

The authors are thankful to “Symbiosis International (Deemed University)”, Pune, for guidance in conducting this study.

Conflicts of Interest

The authors declare that there are no conflict of interest relevant to the topic and publication of this paper. This manuscript has not been submitted to any other journal for review and publication.

References

  1. Leen, G.; Heffernan, D. Expanding automotive electronic systems. Computer 2002, 35, 88–93. [Google Scholar] [CrossRef]
  2. Rajasekhar, M.V.; Jaswal, A.K. Autonomous vehicles: The future of automobiles. In Proceedings of the 2015 IEEE International Transportation Electrification Conference (ITEC), Chennai, India, 27–29 August 2015; pp. 1–6. [Google Scholar]
  3. Hakak, S.; Gadekallu, T.R.; Maddikunta, P.K.R.; Ramu, S.P.; M, P.; De Alwis, C.; Liyanage, M. Autonomous vehicles in 5G and beyond: A survey. Veh. Commun. 2023, 39, 100551. [Google Scholar] [CrossRef]
  4. Bagloee, S.A.; Tavana, M.; Asadi, M.; Oliver, T. Autonomous vehicles: Challenges, opportunities, and future implications for transportation policies. J. Mod. Transp. 2016, 24, 284–303. [Google Scholar] [CrossRef]
  5. John, A.A.; Thakur, P.; Singh, G. Potential, concepts, and key advances for a ubiquitous adaptive indigenous microengineering and nanoengineering in 6G network. Int. J. Commun. Syst. 2022, 2022, e5410. [Google Scholar] [CrossRef]
  6. Hu, Z.; Tang, H. Design and Implementation of Intelligent Vehicle Control System Based on Internet of Things and Intelligent Transportation. Sci. Program. 2022, 2022, 6201367. [Google Scholar] [CrossRef]
  7. Jadaan, K.; Zeater, S.; Abukhalil, Y. Connected Vehicles: An Innovative Transport Technology. Procedia Eng. 2017, 187, 641–648. [Google Scholar] [CrossRef]
  8. Yang, D.; Jiang, K.; Zhao, D.; Yu, C.; Cao, Z.; Xie, S.; Xiao, Z.; Jiao, X.; Wang, S.; Zhang, K. Intelligent and connected vehicles: Current status and future perspectives. Sci. China Technol. Sci. 2018, 61, 1446–1471. [Google Scholar] [CrossRef]
  9. Uhlemann, E. Introducing Connected Vehicles [Connected Vehicles]. IEEE Veh. Technol. Mag. 2015, 10, 23–31. [Google Scholar] [CrossRef]
  10. Coppola, R.; Morisio, M. Connected car: Technologies, issues, future trends. ACM Comput. Surv. (CSUR) 2016, 49, 1–36. [Google Scholar] [CrossRef]
  11. Holler, J.; Tsiatsis, V.; Mulligan, C.; Karnouskos, S.; Avesand, S.; Boyle, D. Internet of Things; Academic Press: Cambridge, MA, USA, 2014. [Google Scholar]
  12. Yang, F.; Wang, S.; Li, J.; Liu, Z.; Sun, Q. An overview of Internet of Vehicles. China Commun. 2014, 11, 1–15. [Google Scholar] [CrossRef]
  13. Ji, B.; Zhang, X.; Mumtaz, S.; Han, C.; Li, C.; Wen, H.; Wang, D. Survey on the Internet of Vehicles: Network Architectures and Applications. IEEE Commun. Stand. Mag. 2020, 4, 34–41. [Google Scholar] [CrossRef]
  14. Raul, N.M.; Wagdarikar, N.M.; Bhukya, C.R. Development of hardware-in-loop automated test bench for liquid-assisted after-treatment controls system’s regression tests. In Proceedings of the 2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA), Pune, India, 16–18 August 2018; pp. 1–6. [Google Scholar]
  15. Zhang, G.; Navimipour, N.J. A comprehensive and systematic review of the IoT-based medical management systems: Applications, techniques, trends and open issues. Sustain. Cities Soc. 2022, 82, 103914. [Google Scholar] [CrossRef]
  16. Lu, D.; Liu, T. The application of IOT in medical system. In Proceedings of the 2011 IEEE International Symposium on IT in Medicine and Education, Cuangzhou, China, 9–11 December 2011; Volume 1, pp. 272–275. [Google Scholar]
  17. Dimitrov, D.V. Medical Internet of Things and Big Data in Healthcare. Healthc. Inform. Res. 2016, 22, 156–163. [Google Scholar] [CrossRef] [PubMed]
  18. Javdani, H.; Kashanian, H. Internet of things in medical applications with a service-oriented and security approach: A survey. Health Technol. 2017, 8, 39–50. [Google Scholar] [CrossRef]
  19. Mishra, P.; Thakur, P.; Singh, G. Enabling technologies for IoT based smart city. In Proceedings of the 2021 Sixth International Conference on Image Information Processing (ICIIP), Shimla, India, 26–28 November 2021; Volume 6, pp. 99–104. [Google Scholar]
  20. Kashani, M.H.; Madanipour, M.; Nikravan, M.; Asghari, P.; Mahdipour, E. A systematic review of IoT in healthcare: Applications, techniques, and trends. J. Netw. Comput. Appl. 2021, 192, 103164. [Google Scholar] [CrossRef]
  21. IEC 60601-1: 2005; Medical Electrical Equipment-Part 1: General Requirements for Basic Safety and Essential Performance. International Electrotechnical Commission: Geneva, Switzerland, 2005.
  22. Karthika, B.; Vijayakumar, A.R. ISO 13485: Medical Devices–Quality Management Systems, Requirements for Regulatory Purposes. In Medical Device Guidelines and Regulations Handbook; Springer International Publishing: Cham, Switzerland, 2022; pp. 19–29. [Google Scholar]
  23. Qian, Y. The Future of e-Health and Wireless Technologies. IEEE Wirel. Commun. 2021, 28, 2–3. [Google Scholar] [CrossRef]
  24. Lin, D.; Tang, Y.; Labeau, F.; Yao, Y.; Imran, M.; Vasilakos, A.V. Internet of Vehicles for E-Health Applications: A Potential Game for Optimal Network Capacity. IEEE Syst. J. 2015, 11, 1888–1896. [Google Scholar] [CrossRef]
  25. Cartwright, A.J. The elephant in the room: Cybersecurity in healthcare. J. Clin. Monit. Comput. 2023, 1–10. [Google Scholar] [CrossRef]
  26. Chakraborty, C.; Nagarajan, S.M.; Devarajan, G.G.; Ramana, T.V.; Mohanty, R. Intelligent AI-based Healthcare Cyber Security System using Multi-Source Transfer Learning Method. ACM Trans. Sens. Networks 2023. [Google Scholar] [CrossRef]
  27. Mohanty, J.; Mishra, S.; Patra, S.; Pati, B.; Panigrahi, C.R. IoT security, challenges, and solutions: A review. In Progress in Advanced Computing and Intelligent Engineering: Proceedings of ICACIE 2019; Springer: New York, NY, USA, 2021; Volume 2, pp. 493–504. [Google Scholar]
  28. Noor, M.B.M.; Hassan, W.H. Current research on Internet of Things (IoT) security: A survey. Comput. Netw. 2019, 148, 283–294. [Google Scholar] [CrossRef]
  29. Mudhivarthi, B.R.; Thakur, P.; Singh, G. Aspects of Cyber Security in Autonomous and Connected Vehicles. Appl. Sci. 2023, 13, 3014. [Google Scholar] [CrossRef]
  30. Abdullah, A.; Hamad, R.; Abdulrahman, M.; Moala, H.; Elkhediri, S. CyberSecurity: A review of internet of things (IoT) security issues, challenges and techniques. In Proceedings of the 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS), Riyadh, Saudi Arabia, 1–3 May 2019; pp. 1–6. [Google Scholar]
  31. Parkinson, S.; Ward, P.; Wilson, K.; Miller, J. Cyber Threats Facing Autonomous and Connected Vehicles: Future Challenges. IEEE Trans. Intell. Transp. Syst. 2017, 18, 2898–2915. [Google Scholar] [CrossRef]
  32. Cui, J.; Liew, L.S.; Sabaliauskaite, G.; Zhou, F. A review on safety failures, security attacks, and available countermeasures for autonomous vehicles. Ad. Hoc. Netw. 2018, 90, 101823. [Google Scholar] [CrossRef]
  33. Rathee, G.; Saini, H.; Kerrache, C.A.; Herrera-Tapia, J. A Computational Framework for Cyber Threats in Medical IoT Systems. Electronics 2022, 11, 1705. [Google Scholar] [CrossRef]
  34. Yaqoob, T.; Abbas, H.; Atiquzzaman, M. Security vulnerabilities, attacks, countermeasures, and regulations of networked medical devices—A review. IEEE Commun. Surv. Tutor. 2019, 21, 3723–3768. [Google Scholar] [CrossRef]
  35. ISO 26262-1; 2018–Road Vehicles—Functional Safety. International Organization for Standardization (ISO): Geneva, Switzerland, 2018.
  36. ISO/SAE 21434; 2021: Road Vehicles: Cybersecurity Engineering. International Organization for Standardization: Geneva, Switzerland, 2021.
  37. Ross, R.S. NIST SP 800-30 REV. 1: Guide for Conducting Risk Assessments; National Institute of Standards Technology: Gaithersburg, MD, USA, 2012. [Google Scholar]
  38. IEC 31010:2009; Risk Management—Risk Assessment Techniques. International Organization for Standardization: Geneva, Switzerland, 2009.
  39. ISO 14971: 2019; Medical Devices: Application of Risk Management to Medical Devices. British Standards Institute: London, UK, 2019.
  40. Malatji, M. Management of enterprise cyber security: A review of ISO/IEC 27001: 2022. In Proceedings of the 2023 International Conference on Cyber Management and Engineering (CyMaEn), Bangkok, Thailand, 26–27 January 2023; pp. 117–122. [Google Scholar]
  41. Janssen, M.; Schrenker, R. Guidelines From 80001: Maintaining a Medical IT Network. Biomed. Instrum. Technol. 2011, 45, 295–299. [Google Scholar] [CrossRef]
  42. Dempsey, K.; Witte, G.; Rike, D. Summary of NIST SP 800-53, Revision 4: Security and Privacy Controls for Federal Information Systems and Organizations; No. NIST CSWP 2; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2014; p. 13. [Google Scholar]
  43. Clinch, J. ITIL V3 and Information Security. Best Manag. Pract. 2009. Available online: https://trainingcreatively.com/backend/web/uploads/resources/d10dc29f496ee8151f5a223d56b59eb37b8b304b.pdf (accessed on 1 August 2023).
  44. Disterer, G. ISO/IEC 27000, 27001 and 27002 for information security management. J. Inf. Secur. 2013, 4. Available online: https://serwiss.bib.hs-hannover.de/files/938/ISOIEC_27000_27001_and_27002_for_Information_Security_Management.pdf (accessed on 1 August 2023). [CrossRef]
  45. Mantelero, A. Cloud computing, trans-border data flows and the European Directive 95/46/EC: Applicable law and task distribution. Eur. J. Law Technol. 2012, 3. Available online: https://ejlt.org/index.php/ejlt/article/view/96 (accessed on 1 August 2023).
  46. Kumar, P.; Lee, H.-J. Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey. Sensors 2011, 12, 55–91. [Google Scholar] [CrossRef]
  47. Bagga, M.; Thakral, P.; Bagga, T. A Study on IoT: Model, Communication Protocols, Security Hazards & Countermeasures. In Proceedings of the 2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC), Solan, India, 20–22 December 2018; pp. 591–598. [Google Scholar]
  48. Argaw, S.T.; Troncoso-Pastoriza, J.R.; Lacey, D.; Florin, M.-V.; Calcavecchia, F.; Anderson, D.; Burleson, W.; Vogel, J.-M.; O’leary, C.; Eshaya-Chauvin, B.; et al. Cybersecurity of Hospitals: Discussing the challenges and working towards mitigating the risks. BMC Med. Informatics Decis. Mak. 2020, 20, 1–10. [Google Scholar] [CrossRef]
  49. Almogren, A.; Mohiuddin, I.; Din, I.U.; Almajed, H.; Guizani, N. Ftm-iomt: Fuzzy-based trust management for preventing sybil attacks in internet of medical things. IEEE Internet Things J. 2020, 8, 4485–4497. [Google Scholar] [CrossRef]
  50. Sharma, S.; Kaushik, B. A survey on internet of vehicles: Applications, security issues & solutions. Veh. Commun. 2019, 20, 100182. [Google Scholar] [CrossRef]
  51. Rathee, G.; Thakur, P.; Singh, G.; Saini, H. Aspects of secure communication during spectrum handoff in cognitive radio networks. In Proceedings of the 2016 International Conference on Signal Processing and Communication (ICSC), Noida, India, 26–28 December 2016; pp. 64–69. [Google Scholar] [CrossRef]
  52. Mudhivarthi, B.R.; Thakur, P. Integration of artificial intelligence in robotic vehicles: A bibliometric analysis. Paladyn J. Behav. Robot. 2022, 13, 110–120. [Google Scholar] [CrossRef]
  53. Wagle, S.A.; Harikrishnan, R. A Bibliometric Analysis of Plant Disease Classification with Artificial Intelligence based on Scopus and WOS. Libr. Philos. Pract. 2021, 1–27. Available online: https://www.researchgate.net/profile/Shivali-Wagle/publication/350092508_A_Bibliometric_Analysis_of_Plant_Disease_Classification_with_Artificial_Intelligence_based_on_Scopus_and_WOS/links/6062165f458515e8347d7837/A-Bibliometric-Analysis-of-Plant-Disease-Classification-with-Artificial-Intelligence-based-on-Scopus-and-WOS.pdf (accessed on 1 August 2023).
  54. Mishra, D.; Gunasekaran, A.; Childe, S.J.; Papadopoulos, T.; Dubey, R.; Wamba, S. Vision, applications and future challenges of Internet of Things: A bibliometric study of the recent literature. Ind. Manag. Data Syst. 2016, 116, 1331–1355. [Google Scholar] [CrossRef]
  55. Azam, M.; Hassan, S.A.; Puan, O.C. Autonomous Vehicles in Mixed Traffic Conditions—A Bibliometric Analysis. Sustainability 2022, 14, 10743. [Google Scholar] [CrossRef]
  56. Parekh, D.; Poddar, N.; Rajpurkar, A.; Chahal, M.; Kumar, N.; Joshi, G.P.; Cho, W. A Review on Autonomous Vehicles: Progress, Methods and Challenges. Electronics 2022, 11, 2162. [Google Scholar] [CrossRef]
  57. Jalali, M.S.; Razak, S.; Gordon, W.; Perakslis, E.; Madnick, S. Health Care and Cybersecurity: Bibliometric Analysis of the Literature. J. Med. Internet Res. 2019, 21, e12644. [Google Scholar] [CrossRef]
  58. Nair, S.V.R.; Saha, S.K. Advancements in Cyber Security and Information Systems in Healthcare from 2004 to 2022: A Bibliometric Analysis. In Proceedings of the 2023 International Conference on Intelligent Systems, Advanced Computing and Communication (ISACC), Silchar, India, 3–4 February 2023; pp. 1–6. [Google Scholar] [CrossRef]
  59. Shukla, G.; Gochhait, S. Cyber security trend analysis using Web of Science: A bibliometric analysis. Eur. J. Mol. Clin. Med. 2020, 7, 2567–2576. [Google Scholar]
  60. Maphathe, B.F.; Thakur, P.; Singh, G.; Iddi, H.E. Deemed the Terahertz Channel Modeling in Internet of Multimedia Design In-Body Antenna. Int. J. E-Health Med Commun. 2022, 13, 1–17. [Google Scholar] [CrossRef]
  61. Taherdoost, H. Blockchain-Based Internet of Medical Things. Appl. Sci. 2023, 13, 1287. [Google Scholar] [CrossRef]
  62. Swarnkar, R.; Harikrishnan, R.; Thakur, P.; Singh, G. Electric Vehicle Lithium-ion Battery Ageing Analysis under Dynamic Condition: A Machine Learning Approach. SAIEE Afr. Res. J. 2023, 114, 4–13. [Google Scholar] [CrossRef]
  63. Rejeb, A.; Rejeb, K.; Treiblmaier, H.; Appolloni, A.; Alghamdi, S.; Alhasawi, Y.; Iranmanesh, M. The Internet of Things (IoT) in healthcare: Taking stock and moving forward. Internet Things 2023, 22, 100721. [Google Scholar] [CrossRef]
  64. Singh, A.K.; Maurya, A.K.; Prakash, R.; Thakur, P.; Tiwari, B.B. Reconfigurable intelligent surface with 6G for industrial revolution: Potential applications and research challenges. Paladyn. J. Behav. Robot. 2023, 14, 20220114. [Google Scholar] [CrossRef]
  65. Sharma, P.; Patel, M.; Prasad, A. A systematic literature review on Internet of Vehicles Security. arXiv 2022, arXiv:2212.08754. [Google Scholar]
  66. Hsu, C.-H.; Alavi, A.H.; Dong, M. Introduction to the Special Section on Cyber Security in Internet of Vehicles. ACM Trans. Internet Technol. 2022, 22, 1–6. [Google Scholar] [CrossRef]
  67. Rocha, D.; Teixeira, G.; Vieira, E.; Almeida, J.; Ferreira, J. A Modular In-Vehicle C-ITS Architecture for Sensor Data Collection, Vehicular Communications and Cloud Connectivity. Sensors 2023, 23, 1724. [Google Scholar] [CrossRef]
  68. Thakur, P.; Singh, G. Potential Simulation Frameworks and Challenges for Internet of Vehicles Networks. In Proceedings of the 2020 International Conference on Artificial Intelligence, Big Data, Computing and Data Communication Systems (icABCD), Durban, South Africa, 6–7 August 2020; pp. 1–6. [Google Scholar] [CrossRef]
  69. Mishra, P.; Thakur, P.; Singh, G. Sustainable Smart City to Society 5.0: State-of-the-Art and Research Challenges. SAIEE Afr. Res. J. 2022, 113, 152–164. [Google Scholar] [CrossRef]
  70. Pekaric, I.; Sauerwein, C.; Haselwanter, S.; Felderer, M. A taxonomy of attack mechanisms in the automotive domain. Comput. Stand. Interfaces 2021, 78, 103539. [Google Scholar] [CrossRef]
  71. Pai, R.R.; Alathur, S. Bibliometric Analysis and Methodological Review of Mobile Health Services and Applications in India. Int. J. Med. Informatics 2020, 145, 104330. [Google Scholar] [CrossRef]
  72. Cabanillas-Carbonell, M.; Pérez-Martínez, J.; Yáñez, J.A. 5G Technology in the Digital Transformation of Healthcare, a Systematic Review. Sustainability 2023, 15, 3178. [Google Scholar] [CrossRef]
  73. Gandia, R.M.; Antonialli, F.; Cavazza, B.H.; Neto, A.M.; de Lima, D.A.; Sugano, J.Y.; Nicolai, I.; Zambalde, A.L. Autonomous vehicles: Scientometric and bibliometric review. Transp. Rev. 2018, 39, 9–28. [Google Scholar] [CrossRef]
  74. Kamalov, F.; Pourghebleh, B.; Gheisari, M.; Liu, Y.; Moussa, S. Internet of Medical Things Privacy and Security: Challenges, Solutions, and Future Trends from a New Perspective. Sustainability 2023, 15, 3317. [Google Scholar] [CrossRef]
  75. Akinola, S.A.; Thakur, P.; Sharma, M.S.; Kumar, K.; Singh, G. Deep learning approach to load forecasting: A survey. In Communication, Networks and Computing: Second International Conference, CNC 2020, Gwalior, India, 29–31 December 2020; Revised Selected Papers 2; Springer: Singapore, 2021; pp. 250–262. [Google Scholar]
  76. Benyahya, M.; Collen, A.; Kechagia, S.; Nijdam, N.A. Automated city shuttles: Mapping the key challenges in cybersecurity, privacy and standards to future developments. Comput. Secur. 2022, 122, 102904. [Google Scholar] [CrossRef]
  77. Kim, K.; Kim, J.S.; Jeong, S.; Park, J.-H.; Kim, H.K. Cybersecurity for autonomous vehicles: Review of attacks and defense. Comput. Secur. 2021, 103, 102150. [Google Scholar] [CrossRef]
  78. Pham, M.; Xiong, K. A Survey on Security Attacks and Defense Techniques for Connected and Autonomous Vehicles. Comput. Secur. 2021, 109, 102269. [Google Scholar] [CrossRef]
  79. Arif, M.; Wang, G.; Alam Bhuiyan, Z.; Wang, T.; Chen, J. A survey on security attacks in VANETs: Communication, applications and challenges. Veh. Commun. 2019, 19, 100179. [Google Scholar] [CrossRef]
  80. Tariq, S.; Lee, S.; Kim, H.K.; Woo, S.S. CAN-ADF: The controller area network attack detection framework. Comput. Secur. 2020, 94, 101857. [Google Scholar] [CrossRef]
  81. Ahmad, Z.; Khan, A.S.; Shiang, C.W.; Abdullah, J.; Ahmad, F. Network intrusion detection system: A systematic study of machine learning and deep learning approaches. Trans. Emerg. Telecommun. Technol. 2020, 32. [Google Scholar] [CrossRef]
  82. Gao, X.; Liu, H.; Deng, W.; Tian, Y.; Zou, G.; Hou, H.; Ji, X. Iron-Based Layered Cathodes for Sodium-Ion Batteries. Batter. Supercaps 2021, 4, 1657–1679. [Google Scholar] [CrossRef]
  83. Ramke, J.; Evans, J.R.; Habtamu, E.; Mwangi, N.; Silva, J.C.; Swenor, B.K.; Congdon, N.; Faal, H.B.; Foster, A.; Friedman, D.S.; et al. Grand Challenges in global eye health: A global prioritisation process using Delphi method. Lancet Health Longev. 2022, 3, e31–e41. [Google Scholar] [CrossRef]
  84. Zhang, Y.; Porter, A.L.; Cunningham, S.; Chiavetta, D.; Newman, N. Parallel or Intersecting Lines? Intelligent Bibliometrics for Investigating the Involvement of Data Science in Policy Analysis. IEEE Trans. Eng. Manag. 2020, 68, 1259–1271. [Google Scholar] [CrossRef]
  85. Chen, Y.; Kang, Y.; Zhao, Y.; Wang, L.; Liu, J.; Li, Y.; Liang, Z.; He, X.; Li, X.; Tavajohi, N.; et al. A review of lithium-ion battery safety concerns: The issues, strategies, and testing standards. J. Energy Chem. 2020, 59, 83–99. [Google Scholar] [CrossRef]
  86. Sakhnini, J.; Karimipour, H.; Dehghantanha, A.; Parizi, R.M.; Srivastava, G. Security aspects of Internet of Things aided smart grids: A bibliometric survey. Internet Things 2019, 14, 100111. [Google Scholar] [CrossRef]
  87. Kumar, S.; Pandey, N.; Lim, W.M.; Chatterjee, A.N.; Pandey, N. What do we know about transfer pricing? Insights from bibliometric analysis. J. Bus. Res. 2021, 134, 275–287. [Google Scholar] [CrossRef]
  88. Guo, Y.-M.; Huang, Z.-L.; Guo, J.; Guo, X.-R.; Li, H.; Liu, M.-Y.; Ezzeddine, S.; Nkeli, M.J. A bibliometric analysis and visualization of blockchain. Futur. Gener. Comput. Syst. 2020, 116, 316–332. [Google Scholar] [CrossRef]
  89. Sithole, S.E.; Thakur, P.; Singh, G. Congestion Control Mechanism on Transport Layer Protocol: Th Application of Terahertz Frequency. Instrum. Mes. Metrol. 2023, 22, 53. [Google Scholar] [CrossRef]
  90. Kumar, A.; Thakur, P.; Pandit, S.; Singh, G. HSA-SPC: Hybrid Spectrum Access with Spectrum Prediction and Cooperation for Performance Enhancement of Multiuser Cognitive Radio Network. Comput. Networks 2021, 203, 108596. [Google Scholar] [CrossRef]
  91. Patil, P. Artificial intelligence in cybersecurity. Int. J. Res. Comput. Appl. Robot. 2016, 4, 1–5. [Google Scholar]
  92. Wirkuttis, N.; Klein, H. Artificial intelligence in cybersecurity. Cyber Intell. Secur. 2017, 1, 103–119. [Google Scholar]
  93. Das, R.; Sandhane, R. Artificial intelligence in cyber security. J. Phys. Conf. Ser. 2021, 1964, 042072. [Google Scholar] [CrossRef]
  94. Thomas, M.A. Machine Learning Applications for Cybersecurity. Cyber Def. Rev. 2023, 8, 87–102. [Google Scholar]
  95. de Azambuja, A.J.G.; Plesker, C.; Schützer, K.; Anderl, R.; Schleich, B.; Almeida, V.R. Artificial Intelligence-Based Cyber Security in the Context of Industry 4.0—A Survey. Electronics 2023, 12, 1920. [Google Scholar] [CrossRef]
  96. Potula, S.R.; Selvanambi, R.; Karuppiah, M.; Pelusi, D. Artificial Intelligence-Based Cyber Security Applications. In Artificial Intelligence and Cyber Security in Industry 4.0; Springer Nature: Singapore, 2023; pp. 343–373. [Google Scholar]
  97. Mijwil, M.; Aljanabi, M.; ChatGPT. Towards Artificial Intelligence-Based Cybersecurity: The Practices and ChatGPT Generated Ways to Combat Cybercrime. Iraqi J. Comput. Sci. Math. 2023, 4, 65–70. [Google Scholar] [CrossRef]
  98. Ali, A.; Khan, M.A.; Farid, K.; Akbar, S.S.; Ilyas, A.; Ghazal, T.M.; Al Hamadi, H. The Effect of Artificial Intelligence on Cybersecurity. In Proceedings of the 2023 International Conference on Business Analytics for Technology and Security (ICBATS), Dubai, United Arab Emirates, 7–8 March 2023; pp. 1–7. [Google Scholar]
  99. Sagar, B.S.; Niranjan, S.; Kashyap, N.; Sachin, D.N. Providing cyber security using artificial intelligence—A survey. In Proceedings of the 2019 3rd international conference on computing methodologies and communication (ICCMC), Erode, India, 27–29 March 2019; pp. 717–720. [Google Scholar]
  100. Kim, K.; Alshenaifi, I.M.; Ramachandran, S.; Kim, J.; Zia, T.; Almorjan, A. Cybersecurity and Cyber Forensics for Smart Cities: A Comprehensive Literature Review and Survey. Sensors 2023, 23, 3681. [Google Scholar] [CrossRef] [PubMed]
  101. Alshehri, M. Blockchain-assisted cyber security in medical things using artificial intelligence. Electron. Res. Arch. 2023, 31, 708–728. [Google Scholar] [CrossRef]
  102. Vijayakumar, K.P.; Pradeep, K.; Balasundaram, A.; Prusty, M.R. Enhanced Cyber Attack Detection Process for Internet of Health Things (IoHT) Devices Using Deep Neural Network. Processes 2023, 11, 1072. [Google Scholar] [CrossRef]
  103. Abbas, S.; Sampedro, G.A.; Abisado, M.; Almadhor, A.; Yousaf, I.; Hong, S.-P. Harris-Hawk-Optimization-Based Deep Recurrent Neural Network for Securing the Internet of Medical Things. Electronics 2023, 12, 2612. [Google Scholar] [CrossRef]
  104. Wang, X.; Zhu, H.; Ning, Z.; Guo, L.; Zhang, Y. Blockchain Intelligence for Internet of Vehicles: Challenges and Solutions. IEEE Commun. Surv. Tutorials 2023, 1. [Google Scholar] [CrossRef]
  105. Shichun, Y.; Zheng, Z.; Bin, M.; Yifan, Z.; Sida, Z.; Mingyan, L.; Yu, L.; Qiangwei, L.; Xinan, Z.; Mengyue, Z.; et al. Essential Technics of Cybersecurity for Intelligent Connected Vehicles: Comprehensive Review and Perspective. IEEE Internet Things J. 2023, 1. [Google Scholar] [CrossRef]
  106. Yue, W.; Guo, X.; Shen, H. Internet of connected vehicles against cyber-attacks based on resilient adaptive event trigger mechanism control. Trans. Inst. Meas. Control. 2023. [Google Scholar] [CrossRef]
  107. Ameen, A.H.; Mohammed, M.A.; Rashid, A.N. Dimensions of artificial intelligence techniques, blockchain, and cyber security in the Internet of medical things: Opportunities, challenges, and future directions. J. Intell. Syst. 2023, 32, 20220267. [Google Scholar] [CrossRef]
  108. Alkatheiri, M.S.; Alghamdi, A.S. Blockchain-Assisted Cybersecurity for the Internet of Medical Things in the Healthcare Industry. Electronics 2023, 12, 1801. [Google Scholar] [CrossRef]
  109. Al-Hawawreh, M.; Hossain, M.S. A privacy-aware framework for detecting cyber attacks on internet of medical things systems using data fusion and quantum deep learning. Inf. Fusion 2023, 99, 101889. [Google Scholar] [CrossRef]
  110. Rajawat, A.S.; Goyal, S.B.; Bedi, P.; Jan, T.; Whaiduzzaman; Prasad, M. Quantum Machine Learning for Security Assessment in the Internet of Medical Things (IoMT). Futur. Internet 2023, 15, 271. [Google Scholar] [CrossRef]
  111. Lawu, B.L.; Filbert; Asih, K.; Suharjito; Ohliati, J. A systematic literature review of internet of things cybersecurity. In AIP Conference Proceedings; AIP Publishing: Long Island, NY, USA, 2023; Volume 2594. [Google Scholar] [CrossRef]
  112. Manogaran, G.; Rawal, B.S.; Saravanan, V.; Kumar, P.M.; Xin, Q.; Shakeel, P.M. Token-based Authorization and Authentication for Secure Internet of Vehicles Communication. ACM Trans. Internet Technol. 2022, 22, 1–20. [Google Scholar] [CrossRef]
  113. Naseem, S.; Alhudhaif, A.; Anwar, M.; Qureshi, K.N.; Jeon, G. Artificial general intelligence-based rational behavior detection using cognitive correlates for tracking online harms. Pers. Ubiquitous Comput. 2022, 27, 119–137. [Google Scholar] [CrossRef]
  114. Rjoub, G.; Bentahar, J.; Wahab, O.A.; Mizouni, R.; Song, A.; Cohen, R.; Otrok, H.; Mourad, A. A Survey on Explainable Artificial Intelligence for Cybersecurity. IEEE Trans. Netw. Serv. Manag. 2023, 1. [Google Scholar] [CrossRef]
  115. Moustafa, N.; Koroniotis, N.; Keshk, M.; Zomaya, A.Y.; Tari, Z. Explainable Intrusion Detection for Cyber Defences in the Internet of Things: Opportunities and Solutions. IEEE Commun. Surv. Tutorials 2023, 1. [Google Scholar] [CrossRef]
  116. Yang, S.; Tan, J.; Lei, T.; Linares-Barranco, B. Smart traffic navigation system for fault-tolerant edge computing of internet of vehicle in intelligent transportation gateway. IEEE Trans. Intell. Transp. Syst. 2023. [Google Scholar] [CrossRef]
  117. Singh, G.; Thakur, P. Spectrum Sharing in Cognitive Radio Networks: Towards Highly Connected Environments; John Wiley & Sons: New York, NY, USA, 2021. [Google Scholar]
  118. Toorani, M. On vulnerabilities of the security association in the IEEE 802.15.6 standard. In Financial Cryptography and Data Security: FC 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, 30 January 2015; Revised Selected Papers; Springer: Berlin/Heidelberg, Germany, 2015; pp. 245–260. [Google Scholar]
  119. Nwakanma, C.I.; Ahakonye, L.A.C.; Njoku, J.N.; Odirichukwu, J.C.; Okolie, S.A.; Uzondu, C.; Nweke, C.C.N.; Kim, D.-S. Explainable Artificial Intelligence (XAI) for Intrusion Detection and Mitigation in Intelligent Connected Vehicles: A Review. Appl. Sci. 2023, 13, 1252. [Google Scholar] [CrossRef]
  120. Secinaro, S.; Brescia, V.; Calandra, D.; Biancone, P. Employing bibliometric analysis to identify suitable business models for electric cars. J. Clean. Prod. 2020, 264, 121503. [Google Scholar] [CrossRef]
  121. Aski, V.J.; Gupta, S.; Sarkar, B. An authentication-centric multi-layered security model for data security in iot-enabled biomedical applications. In Proceedings of the 2019 IEEE 8th Global Conference on Consumer Electronics (GCCE), Osaka, Japan, 15–18 October 2019; pp. 957–960. [Google Scholar]
  122. Zhang, Y.; Zheng, D.; Deng, R.H. Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control. IEEE Internet Things J. 2018, 5, 2130–2145. [Google Scholar] [CrossRef]
  123. Habib, M.A.; Ahmad, M.; Jabbar, S.; Khalid, S.; Chaudhry, J.; Saleem, K.; Rodrigues, J.J.C.; Khalil, M.S. Security and privacy based access control model for internet of connected vehicles. Futur. Gener. Comput. Syst. 2019, 97, 687–696. [Google Scholar] [CrossRef]
  124. Stergiou, C.; Psannis, K.E.; Kim, B.-G.; Gupta, B. Secure integration of IoT and Cloud Computing. Futur. Gener. Comput. Syst. 2018, 78, 964–975. [Google Scholar] [CrossRef]
  125. Khan, I.A.; Moustafa, N.; Razzak, I.; Tanveer, M.; Pi, D.; Pan, Y.; Ali, B.S. XSRU-IoMT: Explainable simple recurrent units for threat detection in Internet of Medical Things networks. Future Gener. Comput. Syst. 2022, 127, 181–193. [Google Scholar] [CrossRef]
  126. Almotiri, S.H.; Khan, M.A.; Alghamdi, M.A. Mobile health (m-health) system in the context of IoT. In Proceedings of the 2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW), Vienna, Austria, 22–24 August 2016; pp. 39–42. [Google Scholar]
  127. Newaz, A.I.; Sikder, A.K.; Rahman, M.A.; Uluagac, A.S. A survey on security and privacy issues in modern healthcare systems: Attacks and defenses. ACM Trans. Comput. Healthc. 2021, 2, 1–44. [Google Scholar] [CrossRef]
Figure 1. Architecture of Internet of Medical Vehicle (IOMV) system.
Figure 1. Architecture of Internet of Medical Vehicle (IOMV) system.
Sensors 23 08107 g001
Figure 2. Step-by-step research methodology process.
Figure 2. Step-by-step research methodology process.
Sensors 23 08107 g002
Figure 3. Total NOP between 2016 and 2023 in DBs Scopus and WOS.
Figure 3. Total NOP between 2016 and 2023 in DBs Scopus and WOS.
Sensors 23 08107 g003
Figure 4. Top-10 authors from DBs Scopus and WOS, along with their NOPs.
Figure 4. Top-10 authors from DBs Scopus and WOS, along with their NOPs.
Sensors 23 08107 g004
Figure 5. Top-10 affiliations from DBs Scopus and WOS, along with their NOPs.
Figure 5. Top-10 affiliations from DBs Scopus and WOS, along with their NOPs.
Sensors 23 08107 g005
Figure 6. Top-10 types of documents published from 2016 to 2023 in Scopus DB.
Figure 6. Top-10 types of documents published from 2016 to 2023 in Scopus DB.
Sensors 23 08107 g006
Figure 7. Top-10 types of documents published from 2016 to 2023 in WOS DB.
Figure 7. Top-10 types of documents published from 2016 to 2023 in WOS DB.
Sensors 23 08107 g007
Figure 8. Country-wise No. of Publications (NOP) in Scopus and WOS DBs from 2016 to 2023.
Figure 8. Country-wise No. of Publications (NOP) in Scopus and WOS DBs from 2016 to 2023.
Sensors 23 08107 g008
Figure 9. Top-10 sponsoring agencies from Scopus DB publications from 2016 to 2023.
Figure 9. Top-10 sponsoring agencies from Scopus DB publications from 2016 to 2023.
Sensors 23 08107 g009
Figure 10. Top-10 sponsoring agencies from WOS DB publications from 2016 to 2023.
Figure 10. Top-10 sponsoring agencies from WOS DB publications from 2016 to 2023.
Sensors 23 08107 g010
Figure 11. Subject-wise “NOPs” in “Scopus” and “WOS” DB from 2016 to 2023.
Figure 11. Subject-wise “NOPs” in “Scopus” and “WOS” DB from 2016 to 2023.
Sensors 23 08107 g011
Figure 12. Percentage of documents published with subject areas in the DB Scopus.
Figure 12. Percentage of documents published with subject areas in the DB Scopus.
Sensors 23 08107 g012
Figure 13. Percentage of documents published with subject areas in WOS DB.
Figure 13. Percentage of documents published with subject areas in WOS DB.
Sensors 23 08107 g013
Figure 14. Critical analysis of top-cited paper of Scopus and WOS DBs.
Figure 14. Critical analysis of top-cited paper of Scopus and WOS DBs.
Sensors 23 08107 g014
Figure 15. Top-five cited papers on cybersecurity in IOMV over five years in Scopus DB.
Figure 15. Top-five cited papers on cybersecurity in IOMV over five years in Scopus DB.
Sensors 23 08107 g015
Figure 16. Top-five cited papers on cybersecurity in IOMV across five years in WOS DB.
Figure 16. Top-five cited papers on cybersecurity in IOMV across five years in WOS DB.
Sensors 23 08107 g016
Figure 17. Top-10 source titles in Scopus DB.
Figure 17. Top-10 source titles in Scopus DB.
Sensors 23 08107 g017
Figure 18. Top-10 source titles in WOS DB.
Figure 18. Top-10 source titles in WOS DB.
Sensors 23 08107 g018
Figure 19. Flowchart showing the steps for addressing cybersecurity risk in IOMV.
Figure 19. Flowchart showing the steps for addressing cybersecurity risk in IOMV.
Sensors 23 08107 g019
Figure 20. Parameters and metrics to measure strength of cybersecurity of IOMV.
Figure 20. Parameters and metrics to measure strength of cybersecurity of IOMV.
Sensors 23 08107 g020
Table 1. The top-15 keywords with the number of documents published from Scopus DB.
Table 1. The top-15 keywords with the number of documents published from Scopus DB.
KeywordsNumber of Publications
Network Security424
Vehicles340
Cyber Security317
Cybersecurity265
Internet of Things255
Security200
Autonomous Vehicles180
Vehicle-To-Vehicle Communications171
Computer Crime141
Intelligent Systems138
Intrusion Detection124
Machine Learning116
Embedded Systems114
Blockchain108
Intelligent Vehicle Highway Systems105
Table 2. List of analysis studies regarding literature analytical methods and “Cybersecurity in IOMVs”.
Table 2. List of analysis studies regarding literature analytical methods and “Cybersecurity in IOMVs”.
CitationsArea of StudyJournalTools
[53]Vision, applications, and future challenges of IOTEmerald InsightForce Atlas Layout, Gephi and Hitscite, BibExcel
[54]Interaction between
AVs and human-driven vehicles, safe and efficient operation of AVs
Sustainability, MDPIVOSviewer, Biblioshiny
[55]Autonomous vehicles, challenges in sustainable urban mobilitySustainability, MDPIVOSviewer
[56]Healthcare and cybersecurity—gaps and opportunitiesJournal of Medical Internet ResearchAbstrackr, Leximancer, Heat Maps
[57]Advancements in cybersecurity and information
systems in healthcare
International Conference on Intelligent Systems, Advanced Computing and CommunicationVOSviewer
[58]Blockchain-based Internet of Medical ThingsApplied Sciences, MDPIWordCloud
[60]IOT in healthcare, smart healthcareInternet of ThingsGephi, BibExcel
[61]Performance improvement with cloud
connectivity of IOT-sensed devices and real-time data
South African Institute of Electrical EngineersWordCloud
[62]Cybersecurity trend analysisEuropean Journal of Molecular & Clinical MedicineVOSviewer
Table 3. List of analyses corresponding to review journals relevant to “Cybersecurity in IOMVs”.
Table 3. List of analyses corresponding to review journals relevant to “Cybersecurity in IOMVs”.
Review Doc Ref.Discussed PointsAdvantagesDisadvantages
[24]
  • Protection of medical sensors from harmful interference like EMI
  • Robust power control using wireless network for e-health applications
  • Data transmission framework over IOV for e-health purposes
  • Simulation and modelling for enhancing network capacity and performance
  • Proposed power control algorithm reduces the amount of EMI on medical sensors
  • Analysis of dynamic setting is needed; i.e., the structure of the Internet of Vehicles changes dynamically over time.
[47]
  • IOT architecture and communication models
  • Survey on 3-layer IOT architecture (Perception/Network/Application)
  • Communication technologies used in IOT, security attacks and their countermeasures
  • Possible types of attacks at different layers of IOT system
  • Existing security worries in boundless heterogeneous networks need to be tackled.
  • Design a lightweight, robust security system with data confidentiality, availability, and integrity.
[81]
  • Review of network-based intrusion-detection-system-based articles is provided with strengths and limitations of proposed solutions
  • Comparative study of ML/DL techniques—network-based intrusion studies and their methods with merits/demerits of suggested methodologies
  • Recent trends and advancements of ML/DL-based NIDS are given (proposed methodology, evaluation metrics and dataset selection)
  • Generalised ML/DL-network-based intrusion detection system method
  • Proposed schemes are complex. Need extensive computing resources, like processing power, storage capabilities.
  • Research gaps in improving model performance for low-frequency attacks, absence of systematic dataset, lower performance in a real-world setting. Solutions with regard to complex models needed.
[67]
  • V2X communication and integration of sensor data of vehicles for autonomous vehicles
  • Modular and scalable C-ITS architecture (in-vehicle sensor CAN bus data, fascia smartphone, car sensors with cloud connectivity, localised vehicular communications, and long-range mobile nets)
  • Implementation details in devices (Onboard Unit, OBD-II reader and smartphone)
  • Tests conducted; results used to justify the intended system
  • Data collection system can be a valuable tool for improving road safety
  • Proposed outcome is constrained due to non-standardised CAN messages (specifically need to configure for each vehicle/OEM)
  • Obtained vehicular sensor data have many uses
[65]
  • Security issues in smart automobiles, their attacks and solutions.
  • Types of cyber-attacks with categorisation of security attacks in VANETS and IOT and different threats
  • Efficiency of information routing and dissemination (e.g., multiple MAC-address-based issues in multi-level comm. that take place during transportation need efficient comm. protocols in VANETS)
[7]
  • Various aspects of connected vehicles (CVs); their effects on transport system and urban mobility.
  • Short-range wireless communications, Veh-to-Veh (V2V) and Veh-to-Infra (V2I).
  • Evolution of CVs, operational aspects with its applications
  • Impacts, operational benefits of CVs
  • Review of CVs’ best practices and initiatives
  • Investigations of public perception of CV applications
  • Challenges to CV technology are identified.
  • Further study is required on AVs to verify tradeoff amongst capacity improvement and occupant comfort and to fully know mobility data needs
  • Performance effort, replacing classical vehicles with CVs and needed infrastructure
[20]
  • Identification, comparison, and classification of existing assessments in healthcare IOT systems
  • 5 categories classified (sensor/resource/communication/application and security-based approaches)
  • Benefits/constraints of selected methods; contrast in terms of evaluation—techniques, tools, metrics
  • Consider open issues such as power management, trust, and privacy, fog computing, multi-objective optimisation, resource management, blockchain, tactile Internet, QOS, SDN/NFV, big data analytics, online social networks
  • Interoperability, mobility, scalability, and real-testbed implementation needed
[28]
  • Exploration of the latest research in IOT security (2016 to 2018); its developments and open problems.
  • Overview of the existing condition of IOT-security research, IOT modellers and simulators, relevant tools
  • Necessity for development of complete IOT threat modelling, design of a zero-trust algorithm to mitigate known and unknown cyber-attacks in IOT systems
[27]
  • Cybersecurity state in IOT domain along with its security challenges
  • Security requirements and techniques to overcome challenge.
  • Blockchain technology advised for IOT security
  • Required evaluation of blockchain integration with IOT, dealing with real-life models regarding security and privacy of IOT
[16]
  • IOT in health application as traditional medical practices unable to address demands of specific healthcare needs in today’s world setting
  • Combine IOT and telemedicine for smart healthcare
  • IOT concept, its architecture, different layers and their processing, and communications systems in remote healthcare services
  • Still, the concept of IOT is not yet mature
  • Telemedicine needs a fast, safer, and firm mobile comm. network for achieving objectives of real-time communications (between doctors and patients)
Table 4. Keywords used for querying DBs Scopus and WOS.
Table 4. Keywords used for querying DBs Scopus and WOS.
Keyword TypeDatabaseKeyword Combination
Primary keywordsScopus and WOS“Internet of Vehicles” AND “Cyber Security” OR “Medical Devices” OR “Internet of Medical Things”
Secondary keywordsScopus and WOS“IOT in Vehicles” OR “IOT in Medical Things” OR “Internet of Things” AND “Security in IOT” AND “Cybersecurity in Medical Things”
Table 5. Tips to search relevant document results in different ways using the keyword search.
Table 5. Tips to search relevant document results in different ways using the keyword search.
TechniqueSignSpecimen Instance
BooleanANDAll search terms must occur to be retrieved,
e.g., Soft Drink AND Cold Drink
BooleanORAny one of the search terms must occur to be retrieved,
e.g., Soft Drink OR Cold Drink
BooleanNOTExcludes records that contain a given search term,
e.g., Vehicle NOT Heavy. It retrieves documents with the vehicle term that do not include heavy.
Proximity Search for an exact phrase and input the term in quotation marks. The use of quotation marks disables the lemmatisation of terms,
e.g., “Cyber Security”.
It shows documents related to the Cyber Security term only.
Truncation$Search for zero or more characters in between letters,
e.g., hono$r = honor, honour
Truncation**Search for zero or more characters in suffix/prefix,
e.g., *form* = formation, form, transform, inform
Truncation?Search for one character only in between letters,
e.g., gre?t = great, greet
Table 6. Descriptive statistics of top-10 nation-states overall and countries with highly cited papers.
Table 6. Descriptive statistics of top-10 nation-states overall and countries with highly cited papers.
RegionsMax Publication Country-WiseCountries with Highly Cited PapersCountry-Wise
Highly Cited Publications
USA571China56
China179India8
United Kingdom139Australia8
India123Canada6
Italy111Turkey4
Canada95Singapore2
Germany89USA2
France73Iran2
Netherlands68Turkey2
South Korea67Norway2
Table 7. Descriptive statistics of top-10 nation-states overall and nations with highly cited papers.
Table 7. Descriptive statistics of top-10 nation-states overall and nations with highly cited papers.
One-Sample t-Test
tdfp
Max Publications Country-wise2.0290.07
Highly Cited Publications Country-wise1.7590.12
Table 8. Descriptive statistics of top-10 nations overall and nations with highly cited papers.
Table 8. Descriptive statistics of top-10 nations overall and nations with highly cited papers.
Descriptive Statistics
StatsMax Publications Country-WiseHighly Cited Publications Country-WiseNation-StatesHighly Cited Papers Nation-States
Valid10101010
Mode5.001.00
Median5.001.50
Mean13.504.60
Std. Deviation21.068.31
Skewness2.893.03
Std. Error of Skewness0.680.68
Minimum3.001.00
Maximum72.0028.00
25th Percentile4.251.00
50th Percentile5.001.50
75th Percentile12.753.75
Table 9. Top-15 highly cited papers in Scopus DB for “Cybersecurity in Internet of Medical Vehicles”.
Table 9. Top-15 highly cited papers in Scopus DB for “Cybersecurity in Internet of Medical Vehicles”.
S.NoPublication YearPublication TitleAuthorsJournal TitleCited by
1. 2018Secure Integration of IoT and Cloud ComputingStergiou, C., et al.Future Generation Computer Systems739
2. 2018Survey on Multi-Access Edge Computing for Internet of Things RealizationPorambage, P., et al.IEEE Communications Surveys and Tutorials411
3. 2020Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative studyFerrag, M.A., et al.Journal of Information Security and Applications405
4. 2020A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) SecurityAl-Garadi, M.A., et al.IEEE Communications Surveys and Tutorials383
5. 2016Autonomous vehicles: challenges, opportunities, and future implications for transportation policies.Bagloee, S.A., et al.Journal of Modern Transportation356
6. 2019A survey of machine learning techniques applied to software-defined networking (SDN): Research issues and challengesXie, J., et al.IEEE Communications Surveys and Tutorials341
7. 2020A Survey on the Internet of Things (IoT) Forensics: Challenges, Approaches, and Open IssuesStoyanova, M., et al.IEEE Communications Surveys and Tutorials301
8. 2020Thirty Years of Machine Learning: The Road to Pareto-Optimal Wireless NetworksWang, J., et al.IEEE Communications Surveys and Tutorials296
9. 2016An overview of Fog computing and its security issuesStojmenovic, I., et al.Concurrency and Computation: Practice and Experience285
10. 2018The Blockchain as a Decentralized Security Framework [Future Directions]Puthal, D., et al.IEEE Consumer Electronics Magazine273
11. 2017Cyber Threats Facing Autonomous and Connected Vehicles: Future ChallengesParkinson, S., et al.IEEE Transactions on Intelligent Transportation System261
12. 2017Fog of Everything: Energy-Efficient Networked Computing Architectures, Research Challenges, and a Case StudyBaccarelli, E., et al.IEEE Access249
13. 2017A Survey on Smart Grid Cyber-Physical System TestbedsCintuglu, M.H., et al.IEEE Communications Surveys and Tutorials247
14. 2017Fog computing security: a review of current applications and security solutionsKhan, S., et al.Journal of Cloud Computing240
15. 2017From Cloud to Fog Computing: A Review and a Conceptual Live VM Migration Framework Osanaiye, O., et al.IEEE Access234
Table 10. Top-15 highly cited papers in “WOS” DB for “Cybersecurity in Internet of Medical Vehicles”.
Table 10. Top-15 highly cited papers in “WOS” DB for “Cybersecurity in Internet of Medical Vehicles”.
S.No.Publication YearPublication TitleAuthorsJournal TitleCited By
1.2017A Survey on Security and Privacy Issues in Internet-of-ThingsYang, Y.C., et al.IEEE Internet of Things Journal572
2.2017Cyber-Physical Systems Security-A SurveyHumayed, A., et al.IEEE Internet of Things Journal390
3.2017Cost Efficient Resource Management in Fog Computing Supported Medical Cyber-Physical SystemGu, L., et al.IEEE Transactions on Emerging Topics in Computing240
4.2019 What are the respiratory effects of e-cigarettes?Gotts, J.E., et al.BMJ-British Medical Journal236
5.2020 An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architecturePriya, R.M.S., et al.Computer Communications172
6.2018 Internet of Medical Things: A Review of Recent Contributions Dealing with Cyber-Physical Systems in MedicineGatouillat, A., et al.IEEE Internet of Things Journal145
7.2017 Industry Sponsorship and research outcomeLundh, A., et al.Cochrane Database of Systematic Reviews127
8.2018 PrivacyProtector: Privacy-Protected Patient Data Collection in IoT-Based Healthcare SystemsLuo, E.T., et al.IEEE Communications Magazine125
9.2017 A Review of In-Body Biotelemetry Devices: Implantables, Ingestibles, and InjectablesKiourti, A. and Nikita, K.S.IEEE Transactions on Biomedical Transactions on Biomedical Engineering120
10.2016 IDEAL-D: a rational framework for evaluating and regulating the use of medical devicesSedrakyan, A., et al.BMJ-British Medical Journal120
11.2020 Intelligence in the Internet of Medical Things era: A systematic review of current and future trendsAl-Turjman, F., et al.Computer Communications101
12.2016 A Triple-Loop Inductive Power Transmission System for Biomedical ApplicationLee, B., et al.IEEE Transactions on Biomedical Circuits & Systems85
13.2016 A survey on actuators-driven surgical robotsLe, HM., et al.Sensors And Actuators a Physical84
14.2016 Security Tradeoffs in Cyber Physical Systems: A Case Study Survey on Implantable Medical DevicesAltawy, H and Youssef, AMIEEE Access71
15.2019 Security and Privacy for the Internet of Medical Things Enabled Healthcare Systems: A SurveySun, YN, et al.IEEE Access69
Table 11. Typical types of potential cyber-attacks targeting each layer of IOMV applications.
Table 11. Typical types of potential cyber-attacks targeting each layer of IOMV applications.
IOMV LayerTypes of Potential Cyber-Attacks at Each IOMV Layer
Network and Servers• Man in the middle • Session Hijacking • IP Spoofing • Replay • Eavesdropping • Man in the Browser • Buffer Overflow • Mobileware • Ransomware • DoS—denial of service • DDoS—Distributed Denial of Service
IVN• TCP SYN flood attack • Teardrop attack • Smurf attack • Ping of death attack • Spoofing • ARP—Spoofing • DNS Tunnelling • DNS Hijacking • DNS Spoofing/Poisoning • Cross-Site Scripting Attack • URL Manipulation • Birthday Attack
Network devices• Phishing
Physical• Physical Tampering • Malicious code introduction through HMI devices like USBs
IOMV devices• Encryption Attacks • Privilege Escalation • Brute-Force Password Attack • Credential Stuffing • Password Spraying • Dictionary Attack • Malvertising • DDoS Botnets • Cryptojacking
Software/firmware• Firmware Hijacking • Botnets • Malware • Code Injection Attacks • Cross-Site Scripting (XSS) • Malvertising • SQL Injection • Malicious Node Injection • Drive-By Attacks (like legit software; fake software; fake warning messages and update prompts; links; spammy websites; drive-by download attacks) • Spyware Attacks • Zero-day exploits
Common attacks irrespective of IOMV layers• Identity-Based • IOT-Based Attacks • Supply Chain Attacks • Insider Threats • Social Engineering • Illustrative cyber-attacks—(like Mirai Botnet; Verkada Hack (Network and Device); Cold in Finland (DDoS); Jeep Hack (Firmware); Stuxnet (IOT attack))
Table 12. Risk Assessment Matrix for qualitative analysis of cybersecurity risk.
Table 12. Risk Assessment Matrix for qualitative analysis of cybersecurity risk.
SeveritySensors 23 08107 i001
Likelihood
Sensors 23 08107 i002
SeverityLow
(1)
Medium
(2)
High
(3)
Critical
(4)
Likelihood
Impossible
(1)
(Risk Unlikely to Occur)
x11
Low
x12
Medium
x13
Medium
x14
High
Possible
(2)
(Risk Might Occur)
x21
Low
x22
Medium
x23
High
x24
Critical
Probably
(3)
(Risk Will Occur)
x31
Medium
x32
High
x33
High
x34
Critical
Note: (1) The text represented in the Bold letters are the headings. Colour represents the order of criticality. Green—represents lesser risk, Light Yellow—medium risk, Dark Yellow—Higher risk and Red—Critical risk.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Bhukya, C.R.; Thakur, P.; Mudhivarthi, B.R.; Singh, G. Cybersecurity in Internet of Medical Vehicles: State-of-the-Art Analysis, Research Challenges and Future Perspectives. Sensors 2023, 23, 8107. https://doi.org/10.3390/s23198107

AMA Style

Bhukya CR, Thakur P, Mudhivarthi BR, Singh G. Cybersecurity in Internet of Medical Vehicles: State-of-the-Art Analysis, Research Challenges and Future Perspectives. Sensors. 2023; 23(19):8107. https://doi.org/10.3390/s23198107

Chicago/Turabian Style

Bhukya, Chidambar Rao, Prabhat Thakur, Bhavesh Raju Mudhivarthi, and Ghanshyam Singh. 2023. "Cybersecurity in Internet of Medical Vehicles: State-of-the-Art Analysis, Research Challenges and Future Perspectives" Sensors 23, no. 19: 8107. https://doi.org/10.3390/s23198107

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop