2022
DOI: 10.3390/electronics11111705
|View full text |Cite
|
Sign up to set email alerts
|

A Computational Framework for Cyber Threats in Medical IoT Systems

Abstract: Smart social systems are ones where a number of individuals share and interact with each other via various networking devices. There exist a number of benefits to including smart-based systems in networks such as religions, economy, medicine, and other networks. However, the involvement of several cyber threats leads to adverse effects on society in terms of finance, business, liability, economy, psychology etc. The aim of this paper is to present a secure and efficient medical Internet of Things communication… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 26 publications
0
3
0
Order By: Relevance
“…Note that some references are cited in several areas. Health Medicine [1], [2], [10], [31], [41], [12], [33], [38] Medicine/nursing and midwifery [29], [8] Wellness Care of the elderly and adults with disabilities [32], [11], [4], [30] Social assistance and advice [40] Health & Wellness Medicine / care of the elderly and adults with disabilities [9], [10], [42], [34], [35], [37], [39], [44], [43], [45] The devices for assistance and technology for vulnerable groups demonstrate concern for developing assistive technology devices and managing medication-taking programs for these population groups [30]. These efforts highlight the practical application of IoT to improve the quality of life.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…Note that some references are cited in several areas. Health Medicine [1], [2], [10], [31], [41], [12], [33], [38] Medicine/nursing and midwifery [29], [8] Wellness Care of the elderly and adults with disabilities [32], [11], [4], [30] Social assistance and advice [40] Health & Wellness Medicine / care of the elderly and adults with disabilities [9], [10], [42], [34], [35], [37], [39], [44], [43], [45] The devices for assistance and technology for vulnerable groups demonstrate concern for developing assistive technology devices and managing medication-taking programs for these population groups [30]. These efforts highlight the practical application of IoT to improve the quality of life.…”
Section: Resultsmentioning
confidence: 99%
“…Data privacy and security [3], [10], [11], [12], [29], [35], [36], [41], [44] Device interoperability [41] Regulatory compliance [12], [35] Implementation costs [9], [41] Management of large volumes of data [12], [35] Technical faults and reliability [3], [9], [11], [29], [32], [41], [43], [45] Scalability [35], [38], [41] Ethics in data collection and use [29], [35] Regarding the challenges in implementing IoT-based health systems, most of them generally mention that privacy and data security emerge as crucial challenges. They focus on protecting the confidential patient information and highlight limitations in the security protocols, emphasizing the need for robust approaches to safeguard information [3], [10], [11], [12], [29], [35], [36], [41], [44].…”
Section: Challenges and Limitations Referencesmentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, these IOMV systems are more prone to attacks from hackers located across their travel paths since the communication connections vary, with several en route network points, signal towers, gateway devices, etc. [33,34]. In addition to this, there are no defined standard regulations or guidelines for vehicle-interconnected networks or interconnection protocols for medical devices, including standardised medical devices, which can be used in futuristic IOT applications like the IOMV.…”
Section: Cybersecurity Risk In Iomv Systemmentioning
confidence: 99%
“…This can be achieved through collaborations among researchers, relevant industries, various organisations, and standardisation bodies. The security and privacy of these interconnected networks still have potential risks [47] and addressing these issues [33] of cybersecurity is the need of the hour and has enormous potential for research at various levels [127] of interconnected networks [29].…”
Section: Future Outlookmentioning
confidence: 99%