A Biomechatronic Approach to Evaluating the Security of Wearable Devices in the Internet of Medical Things
- URL: http://arxiv.org/abs/2406.14996v1
- Date: Fri, 21 Jun 2024 09:17:51 GMT
- Title: A Biomechatronic Approach to Evaluating the Security of Wearable Devices in the Internet of Medical Things
- Authors: Yas Vaseghi, Behnaz Behara, Mehdi Delrobaei,
- Abstract summary: Internet of Medical Things (IoMT) has the potential to revolutionize healthcare by reducing human error and improving patient health.
Wearable smart infusion pumps can accurately administer medication and integrate with electronic health records.
These pumps can alert healthcare professionals or remote servers when an operation fails, preventing distressing incidents.
However, as the number of connected medical devices increases, so does the risk of cyber threats.
- Score: 0.0
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: The Internet of Medical Things (IoMT) has the potential to revolutionize healthcare by reducing human error and improving patient health. For instance, wearable smart infusion pumps can accurately administer medication and integrate with electronic health records. These pumps can alert healthcare professionals or remote servers when an operation fails, preventing distressing incidents. However, as the number of connected medical devices increases, so does the risk of cyber threats. Wearable medication devices based on IoT attached to patients' bodies are particularly vulnerable to significant cyber threats. Since they are connected to the internet, these devices can be exposed to potential harm, which can disrupt or degrade device performance and harm patients. Therefore, it is crucial to establish secure data authentication for internet-connected medical devices to ensure patient safety and well-being. It is also important to note that the wearability option of such devices might downgrade the computational resources, making them more susceptible to security risks. We propose implementing a security approach for a wearable infusion pump to mitigate cyber threats. We evaluated the proposed architecture with 20, 50, and 100 users for 10 minutes and repeated the evaluation 10 times with two infusion settings, each repeated five times. The desired volumes and rates for the two settings were 2 ml and 4 ml/hr and 5 ml and 5 ml/hr, respectively. The maximum error in infusion rate was measured to be 2.5%. We discuss the practical challenges of implementing such a security-enabled device and suggest initial solutions.
Related papers
- Defining and Evaluating Physical Safety for Large Language Models [62.4971588282174]
Large Language Models (LLMs) are increasingly used to control robotic systems such as drones.
Their risks of causing physical threats and harm in real-world applications remain unexplored.
We classify the physical safety risks of drones into four categories: (1) human-targeted threats, (2) object-targeted threats, (3) infrastructure attacks, and (4) regulatory violations.
arXiv Detail & Related papers (2024-11-04T17:41:25Z) - Machine Learning for Healthcare-IoT Security: A Review and Risk Mitigation [4.499833362998488]
This paper reviews the fundamentals of healthcare IoT, its privacy, and data security challenges associated with machine learning and H-IoT devices.
The paper further emphasizes the importance of monitoring healthcare IoT layers such as perception, network, cloud, and application.
arXiv Detail & Related papers (2024-01-17T10:55:26Z) - A Novel Zero-Trust Machine Learning Green Architecture for Healthcare IoT Cybersecurity: Review, Analysis, and Implementation [0.0]
The integration of Internet of Things (IoT) devices in healthcare applications has revolutionized patient care, monitoring, and data management.
However, the rapid involvement of these devices brings information security concerns that pose critical threats to patient privacy and the integrity of healthcare data.
This paper introduces a novel machine learning (ML) based architecture explicitly designed to address and mitigate security vulnerabilities in IoT devices within healthcare applications.
arXiv Detail & Related papers (2024-01-14T21:01:21Z) - Towards Evaluating the Security of Wearable Devices in the Internet of Medical Things [0.0]
The Internet of Medical Things (IoMT) offers a promising solution to improve patient health and reduce human error.
Wearable smart infusion pumps that accurately administer medication and integrate with electronic health records are an example of technology that can improve healthcare.
However, as the number of connected medical devices increases, the risk of cyber threats also increases.
arXiv Detail & Related papers (2023-12-13T14:12:52Z) - Visual Detection of Personal Protective Equipment and Safety Gear on
Industry Workers [49.36909714011171]
We develop a system that will improve workers' safety using a camera that will detect the usage of Personal Protective Equipment (PPE)
Our focus is to implement our system into an entry control point where workers must present themselves to obtain access to a restricted area.
A novelty of this work is that we increase the number of classes to five objects (hardhat, safety vest, safety gloves, safety glasses, and hearing protection)
arXiv Detail & Related papers (2022-12-09T11:50:03Z) - A Secure Healthcare 5.0 System Based on Blockchain Technology Entangled
with Federated Learning Technique [0.44040106718326594]
Security and privacy are key concerns on the Internet of Medical Things (IoMT) industry.
By identifying concerns early, a smart healthcare system can help avoid long-term damage.
This study is to construct a secure health monitoring system in healthcare 5.0 by utilizing a blockchain technology and Intrusion Detection System (IDS)
arXiv Detail & Related papers (2022-09-16T23:25:42Z) - A Novel Framework for Threat Analysis of Machine Learning-based Smart
Healthcare Systems [2.519906683279153]
We propose SHChecker, a novel threat analysis framework that integrates machine learning and formal analysis capabilities.
We implement SHChecker on a synthetic and a real dataset, which affirms that our framework can reveal potential attack vectors in an IoMT system.
arXiv Detail & Related papers (2021-03-05T04:51:02Z) - BinaryCoP: Binary Neural Network-based COVID-19 Face-Mask Wear and
Positioning Predictor on Edge Devices [63.56630165340053]
Face masks offer an effective solution in healthcare for bi-directional protection against air-borne diseases.
CNNs offer an excellent solution for face recognition and classification of correct mask wearing and positioning.
CNNs can be used at entrances to corporate buildings, airports, shopping areas, and other indoor locations, to mitigate the spread of the virus.
arXiv Detail & Related papers (2021-02-06T00:14:06Z) - Decentralized Privacy-Preserving Proximity Tracing [50.27258414960402]
DP3T provides a technological foundation to help slow the spread of SARS-CoV-2.
System aims to minimise privacy and security risks for individuals and communities.
arXiv Detail & Related papers (2020-05-25T12:32:02Z) - COVI White Paper [67.04578448931741]
Contact tracing is an essential tool to change the course of the Covid-19 pandemic.
We present an overview of the rationale, design, ethical considerations and privacy strategy of COVI,' a Covid-19 public peer-to-peer contact tracing and risk awareness mobile application developed in Canada.
arXiv Detail & Related papers (2020-05-18T07:40:49Z) - Digital Ariadne: Citizen Empowerment for Epidemic Control [55.41644538483948]
The COVID-19 crisis represents the most dangerous threat to public health since the H1N1 pandemic of 1918.
Technology-assisted location and contact tracing, if broadly adopted, may help limit the spread of infectious diseases.
We present a tool, called 'diAry' or 'digital Ariadne', based on voluntary location and Bluetooth tracking on personal devices.
arXiv Detail & Related papers (2020-04-16T15:53:42Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.