Towards Evaluating the Security of Wearable Devices in the Internet of Medical Things
- URL: http://arxiv.org/abs/2312.08160v1
- Date: Wed, 13 Dec 2023 14:12:52 GMT
- Title: Towards Evaluating the Security of Wearable Devices in the Internet of Medical Things
- Authors: Yas Vaseghi, Behnaz Behara, Mehdi Delrobaei,
- Abstract summary: The Internet of Medical Things (IoMT) offers a promising solution to improve patient health and reduce human error.
Wearable smart infusion pumps that accurately administer medication and integrate with electronic health records are an example of technology that can improve healthcare.
However, as the number of connected medical devices increases, the risk of cyber threats also increases.
- Score: 0.0
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: The Internet of Medical Things (IoMT) offers a promising solution to improve patient health and reduce human error. Wearable smart infusion pumps that accurately administer medication and integrate with electronic health records are an example of technology that can improve healthcare. They can even alert healthcare professionals or remote servers during operational failure, preventing distressing incidents. However, as the number of connected medical devices increases, the risk of cyber threats also increases. Wearable medication devices based on IoT attached to patients' bodies are prone to significant cyber threats. Being connected to the Internet exposes these devices to potential harm, which could disrupt or degrade device performance and harm patients. To ensure patient safety and well-being, it is crucial to establish secure data authentication for internet-connected medical devices. It is also important to note that the wearability option of such devices might downgrade the computational resources, making them more susceptible to security risks. This paper implements a security approach to a wearable infusion pump. We discuss practical challenges in implementing security-enabled devices and propose initial solutions to mitigate cyber threats.
Related papers
- A Biomechatronic Approach to Evaluating the Security of Wearable Devices in the Internet of Medical Things [0.0]
Internet of Medical Things (IoMT) has the potential to revolutionize healthcare by reducing human error and improving patient health.
Wearable smart infusion pumps can accurately administer medication and integrate with electronic health records.
These pumps can alert healthcare professionals or remote servers when an operation fails, preventing distressing incidents.
However, as the number of connected medical devices increases, so does the risk of cyber threats.
arXiv Detail & Related papers (2024-06-21T09:17:51Z) - Machine Learning for Healthcare-IoT Security: A Review and Risk Mitigation [4.499833362998488]
This paper reviews the fundamentals of healthcare IoT, its privacy, and data security challenges associated with machine learning and H-IoT devices.
The paper further emphasizes the importance of monitoring healthcare IoT layers such as perception, network, cloud, and application.
arXiv Detail & Related papers (2024-01-17T10:55:26Z) - Classification of cyber attacks on IoT and ubiquitous computing devices [49.1574468325115]
This paper provides a classification of IoT malware.
Major targets and used exploits for attacks are identified and referred to the specific malware.
The majority of current IoT attacks continue to be of comparably low effort and level of sophistication and could be mitigated by existing technical measures.
arXiv Detail & Related papers (2023-12-01T16:10:43Z) - Progression and Challenges of IoT in Healthcare: A Short Review [0.0]
The burgeoning field of smart healthcare is poised to generate substantial revenue in the foreseeable future.
Numerous nations have strategically deployed the Internet of Medical Things (IoMT) alongside other measures to combat the propagation of COVID-19.
The rapid and extensive adoption of IoMT worldwide has magnified issues related to security and privacy.
arXiv Detail & Related papers (2023-11-11T08:38:04Z) - Visual Detection of Personal Protective Equipment and Safety Gear on
Industry Workers [49.36909714011171]
We develop a system that will improve workers' safety using a camera that will detect the usage of Personal Protective Equipment (PPE)
Our focus is to implement our system into an entry control point where workers must present themselves to obtain access to a restricted area.
A novelty of this work is that we increase the number of classes to five objects (hardhat, safety vest, safety gloves, safety glasses, and hearing protection)
arXiv Detail & Related papers (2022-12-09T11:50:03Z) - A Secure Healthcare 5.0 System Based on Blockchain Technology Entangled
with Federated Learning Technique [0.44040106718326594]
Security and privacy are key concerns on the Internet of Medical Things (IoMT) industry.
By identifying concerns early, a smart healthcare system can help avoid long-term damage.
This study is to construct a secure health monitoring system in healthcare 5.0 by utilizing a blockchain technology and Intrusion Detection System (IDS)
arXiv Detail & Related papers (2022-09-16T23:25:42Z) - Safety, Security, and Privacy Threats Posed by Accelerating Trends in
the Internet of Things [13.286330786426278]
The Internet of Things (IoT) is already transforming industries, cities, and homes.
The economic value of this transformation across all industries is estimated to be trillions of dollars.
Alongside potential benefits of interconnected smart devices comes increased risk and potential for abuse.
arXiv Detail & Related papers (2020-07-31T18:04:20Z) - Smart Home, security concerns of IoT [91.3755431537592]
The IoT (Internet of Things) has become widely popular in the domestic environments.
People are renewing their homes into smart homes; however, the privacy concerns of owning many Internet connected devices with always-on environmental sensors remain insufficiently addressed.
Default and weak passwords, cheap materials and hardware, and unencrypted communication are identified as the principal threats and vulnerabilities of IoT devices.
arXiv Detail & Related papers (2020-07-06T10:36:11Z) - Decentralized Privacy-Preserving Proximity Tracing [50.27258414960402]
DP3T provides a technological foundation to help slow the spread of SARS-CoV-2.
System aims to minimise privacy and security risks for individuals and communities.
arXiv Detail & Related papers (2020-05-25T12:32:02Z) - COVI White Paper [67.04578448931741]
Contact tracing is an essential tool to change the course of the Covid-19 pandemic.
We present an overview of the rationale, design, ethical considerations and privacy strategy of COVI,' a Covid-19 public peer-to-peer contact tracing and risk awareness mobile application developed in Canada.
arXiv Detail & Related papers (2020-05-18T07:40:49Z) - Digital Ariadne: Citizen Empowerment for Epidemic Control [55.41644538483948]
The COVID-19 crisis represents the most dangerous threat to public health since the H1N1 pandemic of 1918.
Technology-assisted location and contact tracing, if broadly adopted, may help limit the spread of infectious diseases.
We present a tool, called 'diAry' or 'digital Ariadne', based on voluntary location and Bluetooth tracking on personal devices.
arXiv Detail & Related papers (2020-04-16T15:53:42Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.