Health IoT Threats: Survey of Risks and Vulnerabilities
| aut.relation.endpage | 389 | |
| aut.relation.issue | 11 | |
| aut.relation.journal | Future Internet | |
| aut.relation.startpage | 389 | |
| aut.relation.volume | 16 | |
| dc.contributor.author | Madanian, Samaneh | |
| dc.contributor.author | Chinbat, Tserendorj | |
| dc.contributor.author | Subasinghage, Maduka | |
| dc.contributor.author | Airehrour, David | |
| dc.contributor.author | Hassandoust, Farkhondeh | |
| dc.contributor.author | Yongchareon, Sira | |
| dc.date.accessioned | 2024-11-19T23:49:21Z | |
| dc.date.available | 2024-11-19T23:49:21Z | |
| dc.date.issued | 2024-10-23 | |
| dc.description.abstract | The secure and efficient collection of patients’ vital information is a challenge faced by the healthcare industry. Through the adoption and application of Internet of Things (IoT), the healthcare industry has seen an improvement in the quality of delivered services and patient safety. However, IoT utilization in healthcare is challenging due to the sensitive nature of patients’ clinical information and communicating this across heterogeneous networks and among IoT devices. We conducted a semi-systematic literature review to provide an overview of IoT security and privacy challenges in the healthcare sector over time. We collected 279 studies from 5 scientific databases, of which 69 articles met the requirements for inclusion. We performed thematic and qualitative content analysis to extract trends and information. According to our analysis, the vulnerabilities in IoT in healthcare are classified into three main layers: perception, network, and application. We comprehensively reviewed IoT privacy and security threats on each layer. Different technological advancements were suggested to address the identified vulnerabilities in healthcare. This review has practical implications, emphasizing that healthcare organizations, software developers, and device manufacturers must prioritize healthcare IoT security and privacy. A comprehensive, multilayered security approach, security-by-design principles, and training for staff and end-users must be adopted. Regulators and policy makers must also establish and enforce standards and regulations that promote the security and privacy of healthcare IoT. Overall, this study underscores the importance of ensuring the security and privacy of healthcare IoT, with stakeholders’ coordinated efforts to address the complex and evolving security and privacy threats in this field. This can enhance healthcare IoT trust and reliability, reduce the risks of security and privacy issues and attacks, and ultimately improve healthcare delivery quality and safety. | |
| dc.identifier.citation | Future Internet, ISSN: 1999-5903 (Print); 1999-5903 (Online), MDPI AG, 16(11), 389-389. doi: 10.3390/fi16110389 | |
| dc.identifier.doi | 10.3390/fi16110389 | |
| dc.identifier.issn | 1999-5903 | |
| dc.identifier.issn | 1999-5903 | |
| dc.identifier.uri | http://hdl.handle.net/10292/18363 | |
| dc.language | en | |
| dc.publisher | MDPI AG | |
| dc.relation.uri | https://www.mdpi.com/1999-5903/16/11/389 | |
| dc.rights | © 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). | |
| dc.rights.accessrights | OpenAccess | |
| dc.rights.uri | https://creativecommons.org/licenses/by/4.0/ | |
| dc.subject | 46 Information and Computing Sciences | |
| dc.subject | 4604 Cybersecurity and Privacy | |
| dc.subject | 8.1 Organisation and delivery of services | |
| dc.subject | Generic health relevance | |
| dc.subject | 46 Information and computing sciences | |
| dc.title | Health IoT Threats: Survey of Risks and Vulnerabilities | |
| dc.type | Journal Article | |
| pubs.elements-id | 573175 |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- Madanian et al_2024_Health IoT threats.pdf
- Size:
- 1.54 MB
- Format:
- Adobe Portable Document Format
- Description:
- Journal article
