Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies 2017
DOI: 10.5220/0006224603830388
|View full text |Cite
|
Sign up to set email alerts
|

Security And Privacy Issues in Healthcare Monitoring Systems: A Case Study

Abstract: Abstract:Security and privacy issues are rarely taken into account in automated systems for monitoring elderly people in their home, exposing inhabitants to a number of threats they are usually not aware of. As a case study to expose the major vulnerabilities these systems are exposed to, this paper reviews a generic example of automated healthcare monitoring system. The security and privacy issues identified in this case study can be easily generalised and regarded as alarm bells for all the pervasive healthc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 7 publications
0
5
0
Order By: Relevance
“…Social engineering can affect all types of P2P PHSs, where an attacker can easily leverage the user layer to deceive patients (older adult patients are more vulnerable to this attack than others [ 135 ]). In the case of P2P PHSs, the threat impact could be one user at a time, with the probability of escalating and affecting others in the network.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…Social engineering can affect all types of P2P PHSs, where an attacker can easily leverage the user layer to deceive patients (older adult patients are more vulnerable to this attack than others [ 135 ]). In the case of P2P PHSs, the threat impact could be one user at a time, with the probability of escalating and affecting others in the network.…”
Section: Resultsmentioning
confidence: 99%
“…P2P PHSs on a patient device can be configured with wearable smart sensors to allow health practitioners or an embedded machine learning model to monitor vital parameters (eg, heart rate variability). In the case of a successful MitM attack on such P2P PHSs, the practitioners or machine learning models may receive unreliable data, which could lead to poor therapeutic or diagnostic decisions and even loss of life [ 93 , 135 ]. An attacker can also share fake messages that an older adult has fallen in order to summon the next-of-kin or emergency services or use the patient's location or personal data for blackmail [ 93 , 135 ].…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Though this work focuses on the proposed framework's design and practical implementation, we have endeavoured to analyse the threats facing the framework, and included our assessment of how risks are mitigated. For a more formalized insight on the threats facing remote health monitoring systems, readers are recommended to read the work by Handler et al [23]. Additionally, the work [24] contains a security analysis on blockchain technologies in particular.…”
Section: Security Analysismentioning
confidence: 99%
“…In our opinion, federated learning is the right solution for meeting the abovementioned requirements. Furthermore, when we will make our bot public, we will provide the user with privacy management tools as described in [47]:…”
Section: Privacy and Control Mechanismsmentioning
confidence: 99%