2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and I 2017
DOI: 10.1109/ithings-greencom-cpscom-smartdata.2017.62
|View full text |Cite
|
Sign up to set email alerts
|

Internet of Things Security: A Review of Risks and Threats to Healthcare Sector

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 33 publications
(19 citation statements)
references
References 5 publications
0
14
0
Order By: Relevance
“…Other applications may have a commercial need to secure data in transit, but the impact of security vulnerabilities of healthcare information systems are high [14], [15] and so they need to demonstrate compliance to best practice, security and privacy of data guidelines [16]. The following factors must be addressed during the initial design and throughout the life of the system [17]:  Confidentialitydata is accessible only to those who have the right to know.…”
Section: Overall System Requirementsmentioning
confidence: 99%
“…Other applications may have a commercial need to secure data in transit, but the impact of security vulnerabilities of healthcare information systems are high [14], [15] and so they need to demonstrate compliance to best practice, security and privacy of data guidelines [16]. The following factors must be addressed during the initial design and throughout the life of the system [17]:  Confidentialitydata is accessible only to those who have the right to know.…”
Section: Overall System Requirementsmentioning
confidence: 99%
“…Andrew Jones et al [4] IoT devices make use of cloud services (Database-as-a-service approach as NoSQL Mongo tool and Storage-as-a-Service )using IPv6 and Wi-Fi for storing large amount of sensor data and therefore user sensitive information are more risk in hands of cyber-attacks. The attacker can easily spread malicious activities, systems malfunction, power failures and security threats while using IoT devices.…”
Section: Cyber Se Security In Internet Of Thingsmentioning
confidence: 99%
“…Despite the many notable benefits of the healthcare applications discussed, many issues and challenges are also present, especially regarding the security and privacy of often sensitive gathered medical data and interference with other medical devices. These issues are often made more challenging by the diversity of IoT components (Abouzakhar, Jones, & Angelopouloui, ). In particular, IoT based healthcare applications rely on interconnected devices exchanging potentially sensitive information (Abouzakhar et al, ) and, as such, are prone to a range of different security and privacy attacks (Al‐mawee, ).…”
Section: Iot Applicationsmentioning
confidence: 99%
“…These issues are often made more challenging by the diversity of IoT components (Abouzakhar, Jones, & Angelopouloui, ). In particular, IoT based healthcare applications rely on interconnected devices exchanging potentially sensitive information (Abouzakhar et al, ) and, as such, are prone to a range of different security and privacy attacks (Al‐mawee, ). Multiple questions have been raised regarding gathered personal medical data, specifically about ownership of the data, who has access rights to it and where it is stored, questions that must be answered to ensure the integrity of the data and the privacy of the individual it belongs to.…”
Section: Iot Applicationsmentioning
confidence: 99%