2022
DOI: 10.3390/math10060886
|View full text |Cite
|
Sign up to set email alerts
|

Security Threats and Cryptographic Protocols for Medical Wearables

Abstract: In the past few years, the use of several medical devices is increasing. This paper will pay attention to a device developed to get measures of the temperature of diabetic foot. These wearables usually do not have cryptographic protocols to guarantee data security. This study analyzes the existing security in these devices, and simulate malware propagation taking into account the vulnerabilities and lack of security in these highly-constrained interconnected devices. A simulation of malware spreading in a netw… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 68 publications
0
5
0
Order By: Relevance
“…Data collection, integration, analytic techniques, real-time monitoring, alerting systems, response and intervention, feedback loops, and security and privacy are all components of continuous monitoring and anomaly detection. Early warning of possible threats allows healthcare providers to respond more readily and organize their actions more efficiently [78]. Continuous monitoring and anomaly detection in the SHS provides benefits such as improved patient outcomes and safety, increased efficiency and cost-effectiveness in healthcare delivery, and the ability to identify and respond quickly to cybersecurity incidents [139][140].…”
Section: Continuous Monitoring and Detection Of Anomaliesmentioning
confidence: 99%
“…Data collection, integration, analytic techniques, real-time monitoring, alerting systems, response and intervention, feedback loops, and security and privacy are all components of continuous monitoring and anomaly detection. Early warning of possible threats allows healthcare providers to respond more readily and organize their actions more efficiently [78]. Continuous monitoring and anomaly detection in the SHS provides benefits such as improved patient outcomes and safety, increased efficiency and cost-effectiveness in healthcare delivery, and the ability to identify and respond quickly to cybersecurity incidents [139][140].…”
Section: Continuous Monitoring and Detection Of Anomaliesmentioning
confidence: 99%
“…Also, the NIST's other recent initiative [52,53] underscores the critical need for lightweight cryptography in constrained environments as analyzed, for example, in [54]. These efforts reflect a future trend in the cryptographic towards developing solutions that are both quantum-resistant and resource-efficient.…”
Section: Applicability On Performance-constrained Platformsmentioning
confidence: 99%
“…In addition, they are not feasible for systems that include wearable devices, such as HARSs. In addition, studies such as [23,24] refer to authentication protocols via wireless sensor networks and wearable devices using individual cryptographic solutions, not a holistic approach. Thus, there is no total assessment to offer protection at all stages of the system procedures.…”
Section: Related Workmentioning
confidence: 99%