2020
DOI: 10.4236/cn.2020.122003
|View full text |Cite
|
Sign up to set email alerts
|

Risk Assessment Framework of mHealth System Vulnerabilities: A Multilayer Analysis of the Patient Hub

Abstract: Although there have been remarkable technological developments in healthcare, the privacy and security of mobile health systems (mHealth) still raise many concerns with considerable consequences for patients using these technologies. For instance, potential security and privacy threats in wireless devices, such as Wi-Fi and Bluetooth connected to a patient hub at the application, middleware and sensory layers, may result in the disclosure of private and sensitive data. This paper explores the security and priv… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
2
1
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 26 publications
(30 reference statements)
0
2
0
Order By: Relevance
“…The widespread adoption of IoT-enabled telemedicine presents several challenges that require attention. In particular, data security and privacy are of utmost concern, given the continuous collection of sensitive patient health information by IoT devices (Ali et al, 2020). The risk of data breaches and unauthorized access is a signi cant concern, emphasizing the need for robust encryption, authentication, and access controls to protect patient data (Tiersma et al, 2022).…”
Section: Challenges and Considerationsmentioning
confidence: 99%
“…The widespread adoption of IoT-enabled telemedicine presents several challenges that require attention. In particular, data security and privacy are of utmost concern, given the continuous collection of sensitive patient health information by IoT devices (Ali et al, 2020). The risk of data breaches and unauthorized access is a signi cant concern, emphasizing the need for robust encryption, authentication, and access controls to protect patient data (Tiersma et al, 2022).…”
Section: Challenges and Considerationsmentioning
confidence: 99%
“…In addition, the US-CERT released the ICS-CERT 8 vulnerability advisories by product vendors related to the IoT industrial control systems and medical devices, respectively classified by the ICSA and ICSMA identifiers. Other vulnerability databases exist in the literature, such as Japan's vulnerability notes ipedia vulnerability database (JVNDB 9 ), China's national vulnerability database of information security (CNNVD 10 ), and the Chinese industrial internet security emergency response center (CN-ICS-CERT 11 ). However, the majority of entries of these databases are based on information from the NVD, and use scoring systems based on CVSS.…”
Section: A Vulnerability Databasesmentioning
confidence: 99%