About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Cognitive Radio Oriented Wireless Networks and Wireless Internet. 16th EAI International Conference, CROWNCOM 2021, Virtual Event, December 11, 2021, and 14th EAI International Conference, WiCON 2021, Virtual Event, November 9, 2021, Proceedings

Research Article

An Investigation of Vulnerabilities in Internet of Health Things

Download(Requires a free EAI acccount)
4 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-030-98002-3_22,
        author={Saifur Rahman and Tance Suleski and Mohiuddin Ahmed and A. S. M. Kayes},
        title={An Investigation of Vulnerabilities in Internet of Health Things},
        proceedings={Cognitive Radio Oriented Wireless Networks and Wireless Internet. 16th EAI International Conference, CROWNCOM 2021, Virtual Event, December 11, 2021, and 14th EAI International Conference, WiCON 2021, Virtual Event, November 9, 2021, Proceedings},
        proceedings_a={CROWNCOM \& WICON},
        year={2022},
        month={3},
        keywords={IoHT Healthcare Cybersecurity Medical device Vulnerability},
        doi={10.1007/978-3-030-98002-3_22}
    }
    
  • Saifur Rahman
    Tance Suleski
    Mohiuddin Ahmed
    A. S. M. Kayes
    Year: 2022
    An Investigation of Vulnerabilities in Internet of Health Things
    CROWNCOM & WICON
    Springer
    DOI: 10.1007/978-3-030-98002-3_22
Saifur Rahman1,*, Tance Suleski1, Mohiuddin Ahmed1, A. S. M. Kayes2
  • 1: School of Science, Edith Cowan University, Joondalup
  • 2: Department of Computer Science and Information Technology, La Trobe University, Melbourne
*Contact email: saifurb@our.ecu.edu.au

Abstract

Medical devices are the machines or instruments that play a vital role in diagnosis or treatment for patients in a healthcare ecosystem. As technologies advances so are these medical devices, and with time they are getting smarter and interconnected to themselves and other devices. These smarter devices attract attracts hackers to launch cyber-attack against these machines targeting vulnerabilities that exist within them. In this paper, we provide a brief description of medical devices in relation to different regulatory bodies, through which we try to understand the need to make the medical device safe for the users. We explore the vulnerabilities of medical devices and how they may be exploited to infiltrate the full healthcare system and other devices in the network. The paper covers three recent incidents of medical device vulnerabilities and explores the concept of blockchain that may be used to limit the vulnerabilities and their limitation. To ensure patient safety and privacy, it is essential that all relevant bodies including manufacturers, regulators, healthcare providers, etc. understand the risk and take proper steps to limit the threats.

Keywords
IoHT Healthcare Cybersecurity Medical device Vulnerability
Published
2022-03-31
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-030-98002-3_22
Copyright © 2021–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL