Security and Privacy Issues with IoT in Healthcare
DOI:
https://doi.org/10.4108/eai.13-7-2018.155079Abstract
In healthcare, the Internet of Things (IoT) offers many benefits, including being able to monitor patients more closely and using data for analytics. When it comes to IoT for medical device integration, the focus is shifted towards the consumer end, such as glucose meters, blood pressure cuffs, and other devices designed to record data on patient vital signs. This enables healthcare providers to automatically collect information and apply decision support rules to allow for earlier intervention in the treatment process. Unfortunately, medical companies often do not consider the security risks of connecting these devices to the internet. There is a possibility that a zero-day exploit in a medical device can be used to injure or even kill someone without being detected. The rise in hackable medical devices has forced the FDA to issue formal guidance on how medical device makers should handle reports about cyber vulnerabilities. This paper aims to explore the role of IoT in healthcare, vulnerabilities, attacks, and security issues and solutions.
Downloads
References
[1] B. Harpham, Writer and Editor,“ How the Internet of Things is changing healthcare and transportation,” CIO, 8 September 2015; http://www.cio.com/article/2981481/healthcare/howthe-internet-of-things-is-changing-healthcare-andtransportation.html
[2] J. Finkle, “J&J warns diabetic patients: Insulin pump vulnerable to hacking,” TECHNOLOGY NEWS, 4 October, 2016; http://www.reuters.com/article/us-johnsonjohnson-cyber-insulin-pumps-e-idUSKCN12411L
[3] C. Brook, “Health and fitness applications poor at protecting privacy, FTC says,” Threatpost, 8 May 2014; http://threatpost.com/health-and-fitness-applicationspoor-at-protecting-privacy-ftc-says
[4] BCC Research, “Mobile health (mHealth) technologies and global markets 2014” 14 March 2014; http://www.bccresearch.com/marketresearch/healthcare/mobile-health-hlc162a.html
[5] Privacy Rights Clearinghouse. Fact Sheet 39: Mobile health and fitness applications: What are the privacy risks? (1 December 2014);
https://www.privacyrights.org/mobile-health-andfitness-applications-what-are-privacy-risks
[6] K. Michael, “Hackers create more IoT botnets with Mirai source code,” PCWorld, 18 October 2016; http://www.pcworld.com/article/3132571/hackerscreate-more-iot-botnets-with-mirai-source-code.html
[7] K. Lee, “Healthcare IoT security issues: Risks and what to do about them,” December 2015; http://searchhealthit.techtarget.com/feature/Healthcare-IoT-security-issues-Risks-and-what-to-do-about-them
[8] C. Catalin, “Thousands of IoT Medical Devices Found Vulnerable to Online Attacks,” 29 September 2015;
[9] T. William, “Healthcare’s ‘Internet of Things’ should be the ‘security of Things’,” 19 May 2015; http://www.healthcareitnews.com/blog/healthcaresinternet-things-should-be-security-things
[10] S. Mahmood, “Medjacking: The newest health care risk?” 24 September 2015; http://www.healthcareitnews.com/news/medjackingnewest-healthcare-risk
[11] T. Harriet, “How the ‘Internet of Things’ could be fatal,” 4 March 2016; http://www.cnbc.com/2016/03/04/howthe-internet-of-things-could-be-fatal.html
[12] Ayala Luis, “Cybersecurity for Hospitals and Healthcare facilities - A guide to detection and prevention” Fredericksburg, VA. www.allite.com
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2022 EAI Endorsed Transactions on Pervasive Health and Technology
This work is licensed under a Creative Commons Attribution 3.0 Unported License.
This is an open access article distributed under the terms of the CC BY-NC-SA 4.0, which permits copying, redistributing, remixing, transformation, and building upon the material in any medium so long as the original work is properly cited.