Privacy Threats on the Internet of Medical Things
- URL: http://arxiv.org/abs/2207.09593v1
- Date: Tue, 19 Jul 2022 23:45:16 GMT
- Title: Privacy Threats on the Internet of Medical Things
- Authors: Nyteisha Bookert (1), Mohd Anwar (1) ((1) North Carolina Agricultural
and Technical State University)
- Abstract summary: The Internet of Medical Things (IoMT) is a frequent target of attacks.
We briefly discuss specific privacy threats and threat actors in IoMT.
We argue that the privacy policy gap needs to be identified for the IoMT threat landscape.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: The Internet of Medical Things (IoMT) is a frequent target of attacks --
compromising both patient data and healthcare infra-structure. While
privacy-enhanced technologies and services (PETS) are developed to mitigate
traditional privacy concerns, they cannot be applied without identifying
specific threat models. Therefore, our position is that the new threat
land-scape created by the relatively new and underexplored IoMT domain must be
studied. We briefly discuss specific privacy threats and threat actors in IoMT.
Furthermore, we argue that the privacy policy gap needs to be identified for
the IoMT threat landscape.
Related papers
- Abusing the Internet of Medical Things: Evaluating Threat Models and Forensic Readiness for Multi-Vector Attacks on Connected Healthcare Devices [0.0]
We develop hazard-integrated threat models that fuse Cyber physical system security modeling with tech-abuse frameworks.<n>We conduct an immersive simulation with practitioners, deploying a live version of our model, identifying gaps in digital forensic practice.<n>Our findings show that MedTech cybersecurity in IPV contexts requires integrated threat modeling and improved forensic capabilities.
arXiv Detail & Related papers (2026-01-18T21:32:52Z) - PTMF: A Privacy Threat Modeling Framework for IoT with Expert-Driven Threat Propagation Analysis [0.5156484100374058]
We present a novel Privacy Threat Model Framework (PTMF) that analyzes privacy threats through different phases.<n>The proposed PTMF can be employed in various ways, including analyzing the activities of threat actors during privacy threats and assessing privacy risks in IoT systems.
arXiv Detail & Related papers (2025-10-24T16:06:04Z) - Securing the Internet of Medical Things (IoMT): Real-World Attack Taxonomy and Practical Security Measures [3.99381596255401]
The Internet of Medical Things (IoMT) has the potential to radically improve healthcare by enabling real-time monitoring, remote diagnostics, and AI-driven decision making.<n>However, the connectivity, embedded intelligence, and inclusion of a wide variety of novel sensors expose medical devices to severe cybersecurity threats.<n>We provide a taxonomy of potential attacks targeting IoMT, presenting attack surfaces, vulnerabilities, and mitigation strategies across all layers of the IoMT architecture.
arXiv Detail & Related papers (2025-07-25T18:24:45Z) - Model Inversion Attacks: A Survey of Approaches and Countermeasures [59.986922963781]
Recently, a new type of privacy attack, the model inversion attacks (MIAs), aims to extract sensitive features of private data for training.
Despite the significance, there is a lack of systematic studies that provide a comprehensive overview and deeper insights into MIAs.
This survey aims to summarize up-to-date MIA methods in both attacks and defenses.
arXiv Detail & Related papers (2024-11-15T08:09:28Z) - PrivacyLens: Evaluating Privacy Norm Awareness of Language Models in Action [54.11479432110771]
PrivacyLens is a novel framework designed to extend privacy-sensitive seeds into expressive vignettes and further into agent trajectories.
We instantiate PrivacyLens with a collection of privacy norms grounded in privacy literature and crowdsourced seeds.
State-of-the-art LMs, like GPT-4 and Llama-3-70B, leak sensitive information in 25.68% and 38.69% of cases, even when prompted with privacy-enhancing instructions.
arXiv Detail & Related papers (2024-08-29T17:58:38Z) - Privacy Threats and Countermeasures in Federated Learning for Internet of Things: A Systematic Review [0.0]
Federated Learning in the Internet of Things (IoT) might introduce significant privacy and security concerns.
We systematically analysed recent literature to identify privacy threats in FL within IoT environments.
We evaluated the defensive measures that can be employed to mitigate these threats.
arXiv Detail & Related papers (2024-07-25T15:01:56Z) - Collection, usage and privacy of mobility data in the enterprise and public administrations [55.2480439325792]
Security measures such as anonymization are needed to protect individuals' privacy.
Within our study, we conducted expert interviews to gain insights into practices in the field.
We survey privacy-enhancing methods in use, which generally do not comply with state-of-the-art standards of differential privacy.
arXiv Detail & Related papers (2024-07-04T08:29:27Z) - Secure Aggregation is Not Private Against Membership Inference Attacks [66.59892736942953]
We investigate the privacy implications of SecAgg in federated learning.
We show that SecAgg offers weak privacy against membership inference attacks even in a single training round.
Our findings underscore the imperative for additional privacy-enhancing mechanisms, such as noise injection.
arXiv Detail & Related papers (2024-03-26T15:07:58Z) - Progression and Challenges of IoT in Healthcare: A Short Review [0.0]
The burgeoning field of smart healthcare is poised to generate substantial revenue in the foreseeable future.
Numerous nations have strategically deployed the Internet of Medical Things (IoMT) alongside other measures to combat the propagation of COVID-19.
The rapid and extensive adoption of IoMT worldwide has magnified issues related to security and privacy.
arXiv Detail & Related papers (2023-11-11T08:38:04Z) - A Unified View of Differentially Private Deep Generative Modeling [60.72161965018005]
Data with privacy concerns comes with stringent regulations that frequently prohibited data access and data sharing.
Overcoming these obstacles is key for technological progress in many real-world application scenarios that involve privacy sensitive data.
Differentially private (DP) data publishing provides a compelling solution, where only a sanitized form of the data is publicly released.
arXiv Detail & Related papers (2023-09-27T14:38:16Z) - Secure Multi-Party Computation based Privacy Preserving Data Analysis in
Healthcare IoT Systems [0.0]
Data transferred to the digital environment pose a threat of privacy leakage.
In this study, it is aimed to propose a model to handle the privacy problems based on federated learning.
Our proposed model presents an extensive privacy and data analysis and achieve high performance.
arXiv Detail & Related papers (2021-09-29T10:39:25Z) - Target Privacy Threat Modeling for COVID-19 Exposure Notification
Systems [8.080564346335542]
Digital contact tracing (DCT) technology has helped to slow the spread of infectious disease.
To support both ethical technology deployment and user adoption, privacy must be at the forefront.
With the loss of privacy being a critical threat, thorough threat modeling will help us to strategize and protect privacy as DCT technologies advance.
arXiv Detail & Related papers (2020-09-25T02:09:51Z) - Digital Ariadne: Citizen Empowerment for Epidemic Control [55.41644538483948]
The COVID-19 crisis represents the most dangerous threat to public health since the H1N1 pandemic of 1918.
Technology-assisted location and contact tracing, if broadly adopted, may help limit the spread of infectious diseases.
We present a tool, called 'diAry' or 'digital Ariadne', based on voluntary location and Bluetooth tracking on personal devices.
arXiv Detail & Related papers (2020-04-16T15:53:42Z) - Assessing Disease Exposure Risk with Location Data: A Proposal for
Cryptographic Preservation of Privacy [10.527218766532192]
Governments and researchers are implementing digital contact tracing solutions to stem the spread of infectious disease, namely COVID-19.
Many of these solutions threaten individual rights and privacy.
We offer an alternative approach to assess and communicate users' risk of exposure to an infectious disease while preserving individual privacy.
arXiv Detail & Related papers (2020-03-31T17:56:30Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.