2019 19th International Conference on Computational Science and Its Applications (ICCSA) 2019
DOI: 10.1109/iccsa.2019.000-8
|View full text |Cite
|
Sign up to set email alerts
|

IoT Smart Health Security Threats

Abstract: The Internet of things (IoT) is an active area in the current research community due to the improvement in mobile computing and wireless networks. Currently, the IoT is involved in many fields like smart cities, smart health monitoring, smart tracking, and smart factory; therefore, it is introducing new research opportunities and industrial revolutions. Smart health, in particular, is very important and trendy domain for researchers and practitioners due to its continuous monitoring of health of patients. The … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
23
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
6
3
1

Relationship

1
9

Authors

Journals

citations
Cited by 55 publications
(25 citation statements)
references
References 18 publications
0
23
0
Order By: Relevance
“…Other studies classify the threat agents in a different way. For instance, in [56], methodology is based on adversarial model. The authors identify two types of attackers in IoT health systems: a) Internal Attackers (that exist within the healthcare system and execute malicious operations secretly), and b) External Attackers (that reside outside the healthcare system and and perform malicious activities.…”
Section: A: Threat Modeling For Iomtmentioning
confidence: 99%
“…Other studies classify the threat agents in a different way. For instance, in [56], methodology is based on adversarial model. The authors identify two types of attackers in IoT health systems: a) Internal Attackers (that exist within the healthcare system and execute malicious operations secretly), and b) External Attackers (that reside outside the healthcare system and and perform malicious activities.…”
Section: A: Threat Modeling For Iomtmentioning
confidence: 99%
“…3) Since Network and system can only handle a limited amount of traffic and an attacker overloads the targeted system with the unlimited amount of traffic. 4) Denial-of-service attacks disable the computer or the network partially or completely depending on the nature of the enterprise [7].…”
Section: How Does An Attack Work?mentioning
confidence: 99%
“…The protocols involved here are mainly from the application layer (COAP, MQTT). The need of early detection is considered highly important [ 196 ].…”
Section: Secure Iomt Communications: Threat Landscape and Protocolmentioning
confidence: 99%