A hybrid computing solution and resource scheduling strategy for edge computing in smart manufacturing
- Authors: Li, Xiaomin , Wan, Jiafu , Dai, Hong-Ning , Imran, Muhammad , Xia, Min , Celesti, Antonio
- Date: 2019
- Type: Text , Journal article
- Relation: IEEE Transactions on Industrial Informatics Vol. 15, no. 7 (2019), p. 4225-4234
- Full Text: false
- Reviewed:
- Description: At present, smart manufacturing computing framework has faced many challenges such as the lack of an effective framework of fusing computing historical heritages and resource scheduling strategy to guarantee the low-latency requirement. In this paper, we propose a hybrid computing framework and design an intelligent resource scheduling strategy to fulfill the real-time requirement in smart manufacturing with edge computing support. First, a four-layer computing system in a smart manufacturing environment is provided to support the artificial intelligence task operation with the network perspective. Then, a two-phase algorithm for scheduling the computing resources in the edge layer is designed based on greedy and threshold strategies with latency constraints. Finally, a prototype platform was developed. We conducted experiments on the prototype to evaluate the performance of the proposed framework with a comparison of the traditionally-used methods. The proposed strategies have demonstrated the excellent real-time, satisfaction degree (SD), and energy consumption performance of computing services in smart manufacturing with edge computing. © 2005-2012 IEEE.
UAV-enabled data acquisition scheme with directional wireless energy transfer for Internet of Things
- Authors: Liu, Yalin , Dai, Hong-Ning , Wang, Hao , Imran, Muhammad , Wang, Xiaofen , Shoaib, Muhammad
- Date: 2020
- Type: Text , Journal article
- Relation: Computer Communications Vol. 155, no. (2020), p. 184-196
- Full Text: false
- Reviewed:
- Description: Low power Internet of Things (IoT) is suffering from two limitations: battery-power limitation of IoT nodes and inflexibility of infrastructure-node deployment. In this paper, we propose an Unmanned Aerial Vehicle (UAV)-enabled data acquisition scheme with directional wireless energy transfer (WET) to overcome the limitations of low power IoT. The main idea of the proposed scheme is to employ a UAV to serve as both a data collector and an energy supplier. The UAV first transfers directional wireless energy to an IoT node which then sends back the data packets to the UAV by using the harvested energy. Meanwhile, we minimize the overall energy consumption under conditions of balanced energy supply and limited overall time. Moreover, we derive the optimal values of WET time and data transmission power. After analysing the feasibility of the optimal WET time and data transmission, we design an allocation scheme based on the feasible ranges of data size level and channel-fading degree. The numerical results show the feasibility and adaptability of our allocation scheme against the varied values of multiple system parameters. We further extend our scheme to the multi-node scenario by re-designing energy beamforming and adopting multi-access mechanisms. Moreover, we also analyse the mobility of UAVs in the proposed scheme. © 2020 Elsevier B.V.
An overview on smart contracts : challenges, advances and platforms
- Authors: Zheng, Zibin , Xie, Shaoan , Dai, Hong-Ning , Chen, Weili , Imran, Muhammad
- Date: 2020
- Type: Text , Journal article
- Relation: Future Generation Computer Systems Vol. 105, no. (2020), p. 475-491
- Full Text: false
- Reviewed:
- Description: Smart contract technology is reshaping conventional industry and business processes. Being embedded in blockchains, smart contracts enable the contractual terms of an agreement to be enforced automatically without the intervention of a trusted third party. As a result, smart contracts can cut down administration and save services costs, improve the efficiency of business processes and reduce the risks. Although smart contracts are promising to drive the new wave of innovation in business processes, there are a number of challenges to be tackled. This paper presents a survey on smart contracts. We first introduce blockchains and smart contracts. We then present the challenges in smart contracts as well as recent technical advances. We also compare typical smart contract platforms and give a categorization of smart contract applications along with some representative examples. © 2019 Elsevier B.V.
A cloud-based IoMT data sharing scheme with conditional anonymous source authentication
- Authors: Wang, Yan-Ping , Wang, Xiao-Fen , Dai, Hong-Ning , Zhang, Xiao-Song , Su, Yu , Imran, Muhammad , Nasser, Nidal
- Date: 2022
- Type: Text , Conference paper
- Relation: 2022 IEEE Global Communications Conference, GLOBECOM 2022, Virtual, online, 4-8 December 2022, 2022 IEEE Global Communications Conference, GLOBECOM 2022 - Proceedings p. 2915-2920
- Full Text: false
- Reviewed:
- Description: As a rapidly growing subset of the Internet of Thing (IoT), the cloud-based Internet of Medical Thing (IoMT) has been widely applied in remote healthcare industries, which allows the physicians to monitor patients' body parameters remotely to offer continuous and timely healthcare. These healthcare parameters usually contain sensitive information, such as heart rates, glucose levels and etc., and the exposure of them may pose serious threats to the patients' health and lives. To guarantee security and privacy, many IoMT data sharing schemes have been proposed. However, most of these schemes either exhibit a one-to-one data sharing structure or fail to protect the patients' privacy. Since the data usually needs to be shared to different physicians, patients may want to be assisted without revealing their identities. To meet these requirements in healthcare systems, we propose a multi-receiver secure healthcare data sharing scheme, in which the patients are allowed to share their IoMT data to multiple physicians simultaneously for a multidisciplinary treatment, and the conditional anonymity is achieved where data source authentication is provided without revealing the patient's identity. When the patient health condition is abnormal, the hospital can correctly and quickly trace the patient's identity and inform him/her immediately. Our scheme is formally proved to achieve multiple security properties including confidentiality, unforgeability and anonymity. Simulation results demonstrate that the proposed scheme is efficient and practical. © 2022 IEEE.
Lightweight searchable encryption protocol for industrial internet of things
- Authors: Zhang, Ke , Long, Jiahuan , Wang, Xiaofen , Dai, Hong-Ning , Liang, Kaitai , Imran, Muhammad
- Date: 2021
- Type: Text , Journal article
- Relation: IEEE Transactions on Industrial Informatics Vol. 17, no. 6 (2021), p. 4248-4259
- Full Text: false
- Reviewed:
- Description: Industrial Internet of Things (IoT) has suffered from insufficient identity authentication and dynamic network topology, thereby resulting in vulnerabilities to data confidentiality. Recently, the attribute-based encryption (ABE) schemes have been regarded as a solution to ensure data transmission security and the fine-grained sharing of encrypted IoT data. However, most of existing ABE schemes that bring tremendous computational cost are not suitable for resource-constrained IoT devices. Therefore, lightweight and efficient data sharing and searching schemes suitable for IoT applications are of great importance. To this end, In this article, we propose a light searchable ABE scheme (namely LSABE). Our scheme can significantly reduce the computing cost of IoT devices with the provision of multiple-keyword searching for data users. Meanwhile, we extend the LSABE scheme to multiauthority scenarios so as to effectively generate and manage the public/secret keys in the distributed IoT environment. Finally, the experimental results demonstrate that our schemes can significantly maintain computational efficiency and save the computational cost at IoT devices, compared to other existing schemes. © 2005-2012 IEEE.
Big data analytics for manufacturing internet of things: opportunities, challenges and enabling technologies
- Authors: Dai, Hong-Ning , Wang, Hao , Xu, Guangquan , Wan, Jiafu , Imran, Muhammad
- Date: 2020
- Type: Text , Journal article
- Relation: Enterprise Information Systems Vol. 14, no. 9-10 (2020), p. 1279-1303
- Full Text: false
- Reviewed:
- Description: Data analytics in massive manufacturing data can extract huge business values while can also result in research challenges due to the heterogeneous data types, enormous volume and real-time velocity of manufacturing data. This paper provides an overview on big data analytics in manufacturing Internet of Things (MIoT). This paper first starts with a discussion on necessities and challenges of big data analytics in manufacturing data of MIoT. Then, the enabling technologies of big data analytics of manufacturing data are surveyed and discussed. Moreover, this paper also outlines the future directions in this promising area. © 2019 Informa UK Limited, trading as Taylor & Francis Group.
Wireless powering internet of things with UAVs : challenges and opportunities
- Authors: Liu, Yalin , Dai, Hong-Ning , Wang, Qubeijian , Imran, Muhammad , Guizani, Nadra
- Date: 2022
- Type: Text , Journal article , Review
- Relation: IEEE Network Vol. 36, no. 2 (2022), p. 146-152
- Full Text: false
- Reviewed:
- Description: Unmanned aerial vehicles (UAVs) have the potential to overcome the deployment constraint of The Internet of Things (IoT) in remote or rural areas. Wirelessly powered communications (WPC) can address the battery limitation of IoT devices through transferring wireless power to IoT devices. The integration of UAVs and WPC, namely UAV-enabled wireless powering IoT (Ue-WPI-o T) can greatly extend the IoT applications from cities to remote or rural areas. In this article, we present a state-of-the-art overview of Ue-WPIoT by first illustrating the working flow of Ue-WPIoT and discussing the challenges. We then introduce the enabling technologies in realizing Ue-WPI-oT. Simulation results validate the effectiveness of the enabling technologies in Ue-WPIoT. We finally outline the future directions and open issues. © 1986-2012 IEEE.
Blockchain-based data privacy management with Nudge theory in open banking
- Authors: Wang, Hao , Ma, Shenglan , Dai, Hong-Ning , Imran, Muhammad , Wang, Tongsen
- Date: 2020
- Type: Text , Journal article
- Relation: Future Generation Computer Systems Vol. 110, no. (2020), p. 812-823
- Full Text:
- Reviewed:
- Description: Open banking brings both opportunities and challenges to banks all over the world especially in data management. A blockchain as a continuously growing list of records managed by a peer-to-peer network is widely used in various application scenarios; and it is commonly agreed that the blockchain technology can improve the protection of financial data privacy. However, current blockchain technology still poses some challenges in fully meeting the needs of financial data privacy protection. In order to address the existing problems, this paper proposes a new data privacy management framework based on the blockchain technology for the financial sector. The framework consists of three components: (1) a data privacy classification method according to the characteristics of financial data; (2) a new collaborative-filtering-based model; and (3) a data disclosure confirmation scheme for customer strategies based on the Nudge Theory. We implement a prototype and propose a set of algorithms for this framework. The framework is validated through field experiments and laboratory experiments. © 2019 Elsevier B.V.
Is blockchain for internet of medical things a panacea for COVID-19 pandemic?
- Authors: Li, Xuran , Tao, Bishenghui , Dai, Hong-Ning , Imran, Muhammad , Wan, Dehuan , Li, Dengwang
- Date: 2021
- Type: Text , Journal article
- Relation: Pervasive and Mobile Computing Vol. 75, no. (2021), p.
- Full Text: false
- Reviewed:
- Description: The outbreak of the COVID-19 pandemic has deeply influenced the lifestyle of the general public and the healthcare system of the society. As a promising approach to address the emerging challenges caused by the epidemic of infectious diseases like COVID-19, Internet of Medical Things (IoMT) deployed in hospitals, clinics, and healthcare centers can save the diagnosis time and improve the efficiency of medical resources though privacy and security concerns of IoMT stall the wide adoption. In order to tackle the privacy, security, and interoperability issues of IoMT, we propose a framework of blockchain-enabled IoMT by introducing blockchain to incumbent IoMT systems. In this paper, we review the benefits of this architecture and illustrate the opportunities brought by blockchain-enabled IoMT. We also provide use cases of blockchain-enabled IoMT on fighting against the COVID-19 pandemic, including the prevention of infectious diseases, location sharing and contact tracing, and the supply chain of injectable medicines. We also outline future work in this area. © 2021 Elsevier B.V.
Modeling and analysis of finite-scale clustered backscatter communication networks
- Authors: Wang, Qiu , Zhou, Yong , Dai, Hong-Ning , Zhang, Guopeng , Imran, Muhammad , Nasser, Nidal
- Date: 2023
- Type: Text , Conference paper
- Relation: 2023 IEEE International Conference on Communications, ICC 2023, Rome, 28 May-1 June 2023, ICC 2023 - IEEE International Conference on Communications Vol. 2023-May, p. 1456-1461
- Full Text: false
- Reviewed:
- Description: Backscatter communication (BackCom) is an intriguing technology that enables devices to transmit information by reflecting environmental radio frequency signals while consuming ultra-low energy. Applying BackCom in the Internet of things (IoT) networks can effectively address the power-unsustainability issue of energy-constraint devices. Considering many practical IoT applications, networks are finite-scale and devices are needed to be deployed at hotspot regions organized in clusters to cooperate for specific tasks. This paper considers finite-scale clustered backscatter communication networks (F-CBackCom Nets). To ensure communications, this paper establishes a theoretic model to analyze the communication connectivity of F-CBackCom Nets. Different from prior studies analyzing the connectivity with a focus on the transmission pair located at the center of the network, this paper analyzes the connectivity of a transmission pair located in an arbitrary location, because the performance of transmission pairs potentially varies with their network location. Extensive simulations validate the accuracy of our analytical model. Our results show that the connectivity of a transmission pair can be affected by its network location. Our analytical model and results can offer beneficial implications for constructing F-CBackCom Nets. © 2023 IEEE.
On connectivity of wireless sensor networks with directional antennas
- Authors: Wang, Qiu , Dai, Hong-Ning , Zheng, Zibin , Imran, Muhammad , Vasilakos, Athanasios
- Date: 2017
- Type: Text , Journal article
- Relation: Sensors (Switzerland) Vol. 17, no. 1 (2017), p.
- Full Text:
- Reviewed:
- Description: In this paper, we investigate the network connectivity of wireless sensor networks with directional antennas. In particular, we establish a general framework to analyze the network connectivity while considering various antenna models and the channel randomness. Since existing directional antenna models have their pros and cons in the accuracy of reflecting realistic antennas and the computational complexity, we propose a new analytical directional antenna model called the iris model to balance the accuracy against the complexity. We conduct extensive simulations to evaluate the analytical framework. Our results show that our proposed analytical model on the network connectivity is accurate, and our iris antenna model can provide a better approximation to realistic directional antennas than other existing antenna models. © 2017 by the authors; licensee MDPI, Basel, Switzerland.
Artificial noise aided scheme to secure UAV-assisted internet of things with wireless power transfer
- Authors: Wang, Qubeijian , Dai, Hong-Ning , Li, Xuran , Shukla, Mahendra , Imran, Muhammad
- Date: 2020
- Type: Text , Journal article
- Relation: Computer Communications Vol. 164, no. (2020), p. 1-12
- Full Text: false
- Reviewed:
- Description: The proliferation of massive Internet of Things (IoT) devices poses research challenges especially in unmanned aerial vehicles(UAV)-assisted IoT. In particular, the limited battery capacity not only restricts the life time of UAV-assisted IoT but also brings security vulnerabilities since computation-complex cryptographic algorithms cannot be adopted in UAV-assisted IoT systems. In this paper, artificial noise and wireless power transfer technologies are integrated to secure communications in UAV-assisted IoT (particularly in secret key distribution). We present the artificial noise aided scheme to secure UAV-assisted IoT communications by letting UAV gateway transfer energy to a number of helpers who will generate artificial noise to interfere with the eavesdroppers while the legitimate nodes can decode the information by canceling additive artificial noise. We introduce the eavesdropping probability and the security rate to validate the effectiveness of our proposed scheme. We further formulate an eavesdropping probability constrained security rate maximization problem to investigate the optimal power allocation. Moreover, analytical and numerical results are provided to obtain some useful insights, and to demonstrate the effect of crucial parameters (e.g., the transmit power, the main channel gain) on the eavesdropping probability, the security rate, and the optimal power allocation. © 2020 Elsevier B.V.
A data reporting protocol with revocable anonymous authentication for edge-assisted intelligent transport systems
- Authors: Wang, Yanping , Wang, Xiaofen , Dai, Hong-Ning , Zhang, Xiaosong , Imran, Muhammad
- Date: 2023
- Type: Text , Journal article
- Relation: IEEE Transactions on Industrial Informatics Vol. 19, no. 6 (2023), p. 7835-7847
- Full Text: false
- Reviewed:
- Description: Intelligent Transport Systems (ITS) have received growing attention recently driven by technical advances in Industrial Internet of Vehicles (IIoV). In IIoV, vehicles report traffic data to management infrastructures to achieve better ITS services. To ensure security and privacy, many anonymous authentication-enabled data reporting protocols are proposed. However, these protocols usually require a large number of preloaded pseudonyms or involve a costly and irrevocable group signature. Thus, they are not ready for realistic deployment due to large storage overhead, expensive computation costs, or absence of malicious users' revocation. To address these issues, we present a novel data reporting protocol for edge-assisted ITS in this paper, where the traffic data is sent to distributed edge nodes for local processing. Specifically, we propose a new anonymous authentication scheme fine-tuned to fulfill the needs of vehicular data reporting, which allows authenticated vehicles to report unlimited unlinkable messages to edge nodes without huge pseudonyms download and storage costs. Moreover, we designed an efficient certificate update scheme based on a bivariate polynomial function. In this way, malicious vehicles can be revoked with time complexity O(1). The security analysis demonstrates that our protocol satisfies source authentication, anonymity, unlinkability, traceability, revocability, nonframeability, and nonrepudiation. Further, extensive simulation results show that the performance of our protocol is greatly improved since the signature size is reduced by at least 8%, the computation costs in message signing and verification are reduced by at least 56% and 67%, respectively, and the packet loss rate is reduced by at least 14%. © 2005-2012 IEEE.
Unmanned aerial vehicle for internet of everything : opportunities and challenges
- Authors: Liu, Yalin , Dai, Hong-Ning , Wang, Qubeijian , Shukla, Mahendra , Imran, Muhammad
- Date: 2020
- Type: Text , Journal article , Review
- Relation: Computer Communications Vol. 155, no. (2020), p. 66-83
- Full Text:
- Reviewed:
- Description: The recent advances in information and communication technology (ICT) have further extended Internet of Things (IoT) from the sole “things” aspect to the omnipotent role of “intelligent connection of things”. Meanwhile, the concept of internet of everything (IoE) is presented as such an omnipotent extension of IoT. However, the IoE realization meets critical challenges including the restricted network coverage and the limited resource of existing network technologies. Recently, Unmanned Aerial Vehicles (UAVs) have attracted significant attentions attributed to their high mobility, low cost, and flexible deployment. Thus, UAVs may potentially overcome the challenges of IoE. This article presents a comprehensive survey on opportunities and challenges of UAV-enabled IoE. We first present three critical expectations of IoE: (1) scalability requiring a scalable network architecture with ubiquitous coverage, (2) intelligence requiring a global computing plane enabling intelligent things, (3) diversity requiring provisions of diverse applications. Thereafter, we review the enabling technologies to achieve these expectations and discuss four intrinsic constraints of IoE (i.e., coverage constraint, battery constraint, computing constraint, and security issues). We then present an overview of UAVs. We next discuss the opportunities brought by UAV to IoE. Additionally, we introduce a UAV-enabled IoE (Ue-IoE) solution by exploiting UAVs's mobility, in which we show that Ue-IoE can greatly enhance the scalability, intelligence and diversity of IoE. Finally, we outline the future directions in Ue-IoE. © 2020 Elsevier B.V.
Friendly-jamming schemes to secure ultra-reliable and low-latency communications in 5G and beyond communications
- Authors: Li, Xuran , Dai, Hong-Ning , Shukla, Mahendra , Li, Dengwang , Xu, Huaqiang , Imran, Muhammad
- Date: 2021
- Type: Text , Journal article
- Relation: Computer Standards and Interfaces Vol. 78, no. (2021), p.
- Full Text: false
- Reviewed:
- Description: The security vulnerabilities are becoming the major obstacle to prevent the wide adoption of ultra-reliable and low latency communications (URLLC) in 5G and beyond communications. Current security countermeasures based on cryptographic algorithms have a stringent requirement on the centralized key management as well as computational capabilities of end devices while it may not be feasible for URLLC in 5G and beyond communications. In contrast to cryptographic approaches, friendly jamming (FJ) as a promising physical layer security method can enhance wireless communications security while it has less resource requirement on end devices and it can be applied to the full distribution environment. In order to protect wireless communications, FJ signals are introduced to degrade the decoding ability of eavesdroppers who maliciously wiretap confidential information. This article presents a state-of-the-art survey on FJ schemes to enhance network security for IoT networks with consideration of various emerging wireless technologies and different types of networks. First, we present various secrecy performance metrics and introduce the FJ method. The interference caused by FJ signals on legitimate communication is the major challenge of using FJ schemes. In order to overcome this challenge, we next introduce the integration of FJ schemes with various communication technologies, including beamforming, multiple-input multiple-output, full duplex, and relay selection. In addition, we also integrate FJ schemes with different types of communication networks. Finally, a case study of FJ schemes is illustrated and future research directions of FJ schemes have been outlined. © 2021 Elsevier B.V.
Blockchain for cloud exchange : a survey
- Authors: Xie, Shaoan , Zheng, Zibin , Chen, Weili , Wu, Jiajing , Dai, Hong-Ning , Imran, Muhammad
- Date: 2020
- Type: Text , Journal article
- Relation: Computers and Electrical Engineering Vol. 81, no. (2020), p.
- Full Text: false
- Reviewed:
- Description: Compared with single cloud service providers, cloud exchange provides users with lower price and flexible options. However, conventional cloud exchange markets are suffering from a number of challenges such as central architecture being vulnerable to malicious attacks and cheating behaviours of third-party auctioneers. The recent advances in blockchain technologies bring the opportunities to overcome the limitations of cloud exchange. However, the integration of blockchain with cloud exchange is still in infancy and extensive research efforts are needed to tackle a number of research challenges. To bridge this gap, this paper presents an overview on using blockchain for cloud exchange. In particular, we first give an overview on cloud exchange. We then briefly survey blockchain technology and discuss the issues on using blockchain for cloud exchange in aspects of security, privacy, reputation systems and transaction management. Finally, we present the open research issues in this promising area. © 2019
Ear in the sky : terrestrial mobile jamming to prevent aerial eavesdropping
- Authors: Wang, Qubeijian , Liu, Yalin , Dai, Hong-Ning , Imran, Muhammad , Nasser, Nidal
- Date: 2021
- Type: Text , Conference paper
- Relation: 2021 IEEE Global Communications Conference, GLOBECOM 2021, Madrid, 7-11 December 2021, 2021 IEEE Global Communications Conference, GLOBECOM 2021 - Proceedings
- Full Text: false
- Reviewed:
- Description: The emerging unmanned aerial vehicles (UAVs) pose a potential security threat for terrestrial communications when UAVs can be maliciously employed as UAV-eavesdroppers to wiretap confidential communications. To address such an aerial security threat, we present a friendly jamming scheme named terrestrial mobile jamming (TMJ) to protect terrestrial confidential communications from UAV eavesdropping. In our TMJ scheme, a jammer moving along the protection area can emit jamming signals toward the UAV-eavesdropper so as to reduce the eavesdropping risk. We evaluate the performance of our scheme by analyzing a secrecy-capacity maximization problem subject to the legitimate connectivity and eavesdropping probability. In addition, we investigate the optimized position for the jammer as well as its jamming power. Simulation results verify the effectiveness of the proposed scheme. © 2021 IEEE.
Integration of blockchain and network softwarization for space-air-ground-sea integrated networks
- Authors: Dai, Hong-Ning , Wu, Yulei , Imran, Muhammad , Nasser, Nidal
- Date: 2022
- Type: Text , Journal article
- Relation: IEEE internet of things magazine Vol. 5, no. 1 (2022), p. 166-172
- Full Text: false
- Reviewed:
- Description: Space-air-ground-sea integrated networks (SAGSINs) are promising to offer ubiquitous Internet services across the globe while confronting research challenges such as security vulnerabilities, privacy leakage concerns, and difficulty in resource sharing. On one hand, emerging network slicing and network softwarization technologies can fulfill diverse requirements with the provision of various services on top of heterogeneous SAGSIN hardware and software resources. On the other hand, blockchain and smart contracts can compensate for network slicing and softwarization to offer secure and automatic network services. This article presents an investigation on the convergence of blockchains with network slicing and network softwarization technologies for SAGSINs from the perspectives of network management and brokerage services of SAGSINs. In contrast to existing studies, this article is the first to incorporate blockchains into network slicing and network softwarization dedicated for SAGSINs. This article starts with a summary of key characteristics and challenges of SAGSINs. Then a review of network slicing and network softwarization is given in the context of SAGSINs. This article next presents an integrated framework of network slicing, network softwarization, and blockchain for SAGSINs. Moreover, this article outlines a set of open issues and research challenges that would be useful to guide future research in this area.
Securing internet of medical things with friendly-jamming schemes
- Authors: Li, Xuran , Dai, Hong-Ning , Wang, Qubeijian , Imran, Muhammad , Li, Dengwang
- Date: 2020
- Type: Text , Journal article , Review
- Relation: Computer Communications Vol. 160, no. (2020), p. 431-442
- Full Text: false
- Reviewed:
- Description: The Internet of Medical Things (IoMT)-enabled e-healthcare can complement traditional medical treatments in a flexible and convenient manner. However, security and privacy become the main concerns of IoMT due to the limited computational capability, memory space and energy constraint of medical sensors, leading to the in-feasibility for conventional cryptographic approaches, which are often computationally-complicated. In contrast to cryptographic approaches, friendly jamming (Fri-jam) schemes will not cause extra computing cost to medical sensors, thereby becoming potential countermeasures to ensure security of IoMT. In this paper, we present a study on using Fri-jam schemes in IoMT. We first analyze the data security in IoMT and discuss the challenges. We then propose using Fri-jam schemes to protect the confidential medical data of patients collected by medical sensors from being eavesdropped. We also discuss the integration of Fri-jam schemes with various communication technologies, including beamforming, Simultaneous Wireless Information and Power Transfer (SWIPT) and full duplexity. Moreover, we present two case studies of Fri-jam schemes in IoMT. The results of these two case studies indicate that the Fri-jam method will significantly decrease the eavesdropping risk while leading to no significant influence on legitimate transmission. © 2020