2023
DOI: 10.1109/access.2023.3346320
|View full text |Cite
|
Sign up to set email alerts
|

Machine Learning for Healthcare-IoT Security: A Review and Risk Mitigation

Mirza Akhi Khatun,
Sanober Farheen Memon,
Ciarán Eising
et al.

Abstract: The Healthcare Internet-of-Things (H-IoT), commonly known as Digital Healthcare, is a datadriven infrastructure that highly relies on smart sensing devices (i.e., blood pressure monitors, temperature sensors, etc.) for faster response time, treatments, and diagnosis. However, with the evolving cyber threat landscape, IoT devices have become more vulnerable to the broader risk surface (e.g., risks associated with generative AI, 5G-IoT, etc.), which, if exploited, may lead to data breaches, unauthorized access, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 271 publications
(279 reference statements)
0
2
0
Order By: Relevance
“…Emerging cyber threats, IT/OT risk mitigation, auditing, compliance, cyber resilience, cyber laws. [15] Demonstrates various cyber-attacks in Healthcare-IoT (H-IoT) impacting the security and privacy domains. The research also provides potential risk mitigation strategies in H-IoT using AI/ML techniques.…”
Section: Tablementioning
confidence: 99%
See 1 more Smart Citation
“…Emerging cyber threats, IT/OT risk mitigation, auditing, compliance, cyber resilience, cyber laws. [15] Demonstrates various cyber-attacks in Healthcare-IoT (H-IoT) impacting the security and privacy domains. The research also provides potential risk mitigation strategies in H-IoT using AI/ML techniques.…”
Section: Tablementioning
confidence: 99%
“…Industry 5.0 facilitates the seamless integration of cyber and physical domains within manufacturing ecosystems, however, with the increased connectivity in a plant and/or between plants this widens the cyberphysical system attack surface for potential exploitation [3,15,16,17] causing enormous damages to the manufacturing system [18,19,20,21,22,23,24,25]. It is just a matter of time before the IoT turns into Ransomware of Things (RoT) [26], the advanced connectivity and denser network infrastructure create new openings for probable exploitation.…”
Section: Data Security It/ot Cybersecurity Standards and Risk Assessmentmentioning
confidence: 99%
“…Intrusion detection systems have three components: information sources, analyses, and responses. Data from information sources are used in the analysis component to identify anomalies, and when an anomaly is detected, a response is initiated [167]. Intrusion detection systems can be network-based, which monitors data packets across the smart healthcare network for malicious activity, or host-based, which monitors all activities occurring within IoMT devices, servers, databases, and other system components [92].…”
Section: Intrusion Detection Systemsmentioning
confidence: 99%