
Research Article
An Investigation of Vulnerabilities in Internet of Health Things
@INPROCEEDINGS{10.1007/978-3-030-98002-3_22, author={Saifur Rahman and Tance Suleski and Mohiuddin Ahmed and A. S. M. Kayes}, title={An Investigation of Vulnerabilities in Internet of Health Things}, proceedings={Cognitive Radio Oriented Wireless Networks and Wireless Internet. 16th EAI International Conference, CROWNCOM 2021, Virtual Event, December 11, 2021, and 14th EAI International Conference, WiCON 2021, Virtual Event, November 9, 2021, Proceedings}, proceedings_a={CROWNCOM \& WICON}, year={2022}, month={3}, keywords={IoHT Healthcare Cybersecurity Medical device Vulnerability}, doi={10.1007/978-3-030-98002-3_22} }
- Saifur Rahman
Tance Suleski
Mohiuddin Ahmed
A. S. M. Kayes
Year: 2022
An Investigation of Vulnerabilities in Internet of Health Things
CROWNCOM & WICON
Springer
DOI: 10.1007/978-3-030-98002-3_22
Abstract
Medical devices are the machines or instruments that play a vital role in diagnosis or treatment for patients in a healthcare ecosystem. As technologies advances so are these medical devices, and with time they are getting smarter and interconnected to themselves and other devices. These smarter devices attract attracts hackers to launch cyber-attack against these machines targeting vulnerabilities that exist within them. In this paper, we provide a brief description of medical devices in relation to different regulatory bodies, through which we try to understand the need to make the medical device safe for the users. We explore the vulnerabilities of medical devices and how they may be exploited to infiltrate the full healthcare system and other devices in the network. The paper covers three recent incidents of medical device vulnerabilities and explores the concept of blockchain that may be used to limit the vulnerabilities and their limitation. To ensure patient safety and privacy, it is essential that all relevant bodies including manufacturers, regulators, healthcare providers, etc. understand the risk and take proper steps to limit the threats.