2019 Global IoT Summit (GIoTS) 2019
DOI: 10.1109/giots.2019.8766383
|View full text |Cite
|
Sign up to set email alerts
|

Securing Things in the Healthcare Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 24 publications
(11 citation statements)
references
References 13 publications
0
7
0
Order By: Relevance
“…The Internet of Things has enabled intelligent connection between physical devices and applications in many domains. The Internet of Things have a positive impact on the healthcare domain [ 9 ], starting from ambient assisted living applications [ 10 ] or applications that target the monitoring of several vital parameters [ 11 ] and aiming to build the so-called Internet of Medical Things (IoMT) framework [ 12 ]. Even though the IoMT concept is at its early stage, the technologies used to embody each layer of IoMT architectures allow for the collection of health data that may be the premise for new diagnostics and treatments [ 13 ].…”
Section: Security In the Internet Of Thingsmentioning
confidence: 99%
See 3 more Smart Citations
“…The Internet of Things has enabled intelligent connection between physical devices and applications in many domains. The Internet of Things have a positive impact on the healthcare domain [ 9 ], starting from ambient assisted living applications [ 10 ] or applications that target the monitoring of several vital parameters [ 11 ] and aiming to build the so-called Internet of Medical Things (IoMT) framework [ 12 ]. Even though the IoMT concept is at its early stage, the technologies used to embody each layer of IoMT architectures allow for the collection of health data that may be the premise for new diagnostics and treatments [ 13 ].…”
Section: Security In the Internet Of Thingsmentioning
confidence: 99%
“…Furthermore, the users may not have the appropriate knowledge or skills to assess the malfunctioning or to operate them properly, as in the case of healthcare or ambient assisted living use cases, where non-technical and even cognitive-impaired users are implied [ 20 ]. The attacks met on this layer include physical cloning (counterfeiting) [ 9 , 21 , 22 ], malware, spyware [ 9 ] and physical attacks (intentional damage to the device, theft [ 9 ] especially for those deployed to work autonomously [ 23 ]). Agarwal et al [ 24 ] developed two tools to detect IoT devices in heterogeneous networks and to retrieve device-related data (manufacturer, model, firmware version) and they concluded that many IoT devices manufacturers do not secure the devices at all.…”
Section: Security In the Internet Of Thingsmentioning
confidence: 99%
See 2 more Smart Citations
“…Security is the paramount in IoT based health care applications since disclosure or loss of patient sensitive data leads to loss of patient life [2]. Some of the most recent survey for proposed solutions for security in IoT applications are blockchain and Software Defined Networking(SDN), Multi-agent approach to threat detection with machine learning(Vulnerabiities-Patterns) for H-IoT , Two Firewalls with vendor diversity, security integration in SDLC, Authorization of Users using Security Patterns in IoT, security design patterns for vulnerabilities in IoT systems, Remote security management server for safety and security for IoT environment, Mutual Authentication Mechanism using Multi-key [3,4,5,6,7,8,9,10] respectively. Motivation towards PESS methodology: The Security aware Software Development Life Cycle (Sa-SDLC) is security must be considered as functional parameter, these parameters must be identified, designed and implemented throughout SDLC.…”
Section: Introductionmentioning
confidence: 99%