Enabling Zero Trust Security in IoMT Edge Network

Maha Ali Allouzi,Javed Khan
2024-02-16
Abstract:Internet of Medical Things (IoMT) deals with a patient-data-rich segment, which makes security and privacy a severe concern for patients. Therefore, access control is a significant aspect of ensuring trust in the IoMT. However, deploying existing authentication and authorization solutions to the Internet of Medical Things (IoMT) is not straightforward because of highly dynamic and possibly unprotected environments and untrusted supply chain for the IoT devices. In this article, we propose Soter, a Zero-Trust based authentication system for the IoMT. Soter Incorporates trust negotiation mechanisms within the Zero Trust framework to enable dynamic trust establishment. When a user or device seeks access to a resource, initiate a trust negotiation process. During this process, credentials, attributes, and contextual information are exchanged between the requester and the resource owner. Soter defines access rules based on various factors, including user identity, device health, and location. Access is granted or denied based on these conditions.
Cryptography and Security,Computers and Society
What problem does this paper attempt to address?
The paper aims to address the security and privacy issues in the Internet of Medical Things (IoMT) caused by highly dynamic, potentially unprotected environments and untrusted IoT device supply chains. Specifically, the paper points out that existing authentication and authorization solutions are difficult to apply directly to IoMT because these solutions cannot adapt to the high dynamism and uncertainty of the IoMT environment. To solve these problems, the authors propose an authentication system based on Zero Trust Management (ZTM) called Soter. Soter achieves dynamic trust establishment by incorporating a trust negotiation mechanism within the zero trust framework. When a user or device requests access to resources, a trust negotiation process is initiated, during which credentials, attributes, and contextual information are exchanged. Access rules are defined based on various factors such as user identity, device health status, and location, ultimately deciding whether to grant access. This system aims to enhance the security and privacy protection levels of IoMT edge networks, ensuring effective access control even in complex and changing environments.