Patients' mental health data and Internet of Medical Things Safety: Analyzing Raspberry pi vulnerabilities

被引:0
|
作者
Rajput, Adil E. [1 ]
Ahmed, Samara [2 ]
Kasher, Lora I. [1 ]
机构
[1] Effat Univ, Coll Engn, Comp Sci Dept, Jeddah, Saudi Arabia
[2] King Abdulaziz Univ, Coll Med, Psychiat Div, Jeddah, Saudi Arabia
来源
RAWAL MEDICAL JOURNAL | 2024年 / 49卷 / 03期
关键词
Critical cases; effective mitigation techniques; Internet of Medical Things; mental health; patient data;
D O I
暂无
中图分类号
R5 [内科学];
学科分类号
1002 ; 100201 ;
摘要
Objective: To evaluate the safety of patient's data in an Internet of Medical Things (IoMT) ecosystem. The study focuses on these main objectives: To assess the vulnerability of IoMT devices and systems to cyber threats and data breaches. Specifically, we look at the vulnerability of the raspberry pi servers that are considered the essential building block of an IOT/IOMT environment; to pinpoint vulnerability areas of IoMT ecosystem; and to identify and propose mitigation strategies for the key risks associated with the IoMT ecosystem. Methodology: The study employed setting up a representative IOMT model where a raspberry pi server controls the IOMT devices. An empirical analysis of a range of IoMT devices and systems was performed to identify specific vulnerabilities. This involved penetration testing and security assessments in controlled environments. We identified the mitigation strategies to gauge the effectiveness and tested the effectiveness of the mitigation strategies. Results: There were several critical vulnerabilities within the IoMT ecosystem such as weak encryption methods, lack of proper monitoring, effective authentication mechanisms, and the use of outdated software. The underlying raspberry pi server were vulnerable to common cyberattack vectors. However, such vulnerabilities could be countered by effective mitigation techniques allowing to capitalize on the IoMT ecosystem. Conclusion: The study confirms the need for ongoing monitoring and improvement in the IoMT ecosystem. The healthcare practitioners and administrators need to put a string governance process in place to ensure the continuous monitoring of potential vulnerabilities and in turn providing an effective remedy.
引用
收藏
页码:612 / 616
页数:5
相关论文
共 50 条
  • [1] An Investigation of Vulnerabilities in Internet of Health Things
    Rahman, Saifur
    Suleski, Tance
    Ahmed, Mohiuddin
    Kayes, A. S. M.
    COGNITIVE RADIO ORIENTED WIRELESS NETWORKS AND WIRELESS INTERNET, 2022, 427 : 296 - 306
  • [2] Internet of Things for Surgery Process Using Raspberry Pi
    Mamdouh, Rafeek
    El-Bakry, Hazem M.
    Riad, Alaa
    El-Khamisy, Nashaat
    INTERNATIONAL JOURNAL OF ONLINE AND BIOMEDICAL ENGINEERING, 2020, 16 (10) : 96 - 115
  • [3] Internet of things: A prototype architecture using a raspberry Pi
    Molano, José Ignacio Rodríguez
    Betancourt, Diana
    Gómez, Germán
    Lecture Notes in Business Information Processing, 2015, 224 : 618 - 631
  • [4] Assessing Medical Device Vulnerabilities on the Internet of Things
    McMahon, Emma
    Williams, Ryan
    El, Malaka
    Samtani, Sagar
    Patton, Mark
    Chen, Hsinchun
    2017 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2017, : 176 - 178
  • [5] A Quantitative Study of Vulnerabilities in the Internet of Medical Things
    Debar, Herve
    Beuran, Razvan
    Tan, Yasuo
    ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 164 - 175
  • [6] An Internet of Things Approach for Motion Detection using Raspberry Pi
    Ansari, Aamir Nizam
    Sedky, Mohamed
    Sharma, Neelam
    Tyagi, Anurag
    PROCEEDINGS OF 2015 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND INTERNET OF THINGS, 2015, : 131 - 134
  • [7] Raspberry Pi as a Platform for the Internet of Things Projects: Experiences and Lessons
    Kurkovsky, Stan
    Williams, Chad
    ITICSE'17: PROCEEDINGS OF THE 2017 ACM CONFERENCE ON INNOVATION AND TECHNOLOGY IN COMPUTER SCIENCE EDUCATION, 2017, : 64 - 69
  • [8] Internet of Things Based Home Security Using Raspberry Pi
    Pawar, Ashwini
    Umale, V. M.
    2018 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION (ICCUBEA), 2018,
  • [9] Low Delay Video Streaming on the Internet of Things Using Raspberry Pi
    Jennehag, Ulf
    Forsstrom, Stefan
    Fiordigigli, Federico V.
    ELECTRONICS, 2016, 5 (03)
  • [10] Smart Harvest Analysis using Raspberry Pi based on Internet of Things
    Negi, Dhira
    Kumar, Ajit
    Kadam, Pradnya
    Savant, Bhairavi N.
    2018 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION (ICCUBEA), 2018,