Patients' mental health data and Internet of Medical Things Safety: Analyzing Raspberry pi vulnerabilities

被引:0
|
作者
Rajput, Adil E. [1 ]
Ahmed, Samara [2 ]
Kasher, Lora I. [1 ]
机构
[1] Effat Univ, Coll Engn, Comp Sci Dept, Jeddah, Saudi Arabia
[2] King Abdulaziz Univ, Coll Med, Psychiat Div, Jeddah, Saudi Arabia
来源
RAWAL MEDICAL JOURNAL | 2024年 / 49卷 / 03期
关键词
Critical cases; effective mitigation techniques; Internet of Medical Things; mental health; patient data;
D O I
暂无
中图分类号
R5 [内科学];
学科分类号
1002 ; 100201 ;
摘要
Objective: To evaluate the safety of patient's data in an Internet of Medical Things (IoMT) ecosystem. The study focuses on these main objectives: To assess the vulnerability of IoMT devices and systems to cyber threats and data breaches. Specifically, we look at the vulnerability of the raspberry pi servers that are considered the essential building block of an IOT/IOMT environment; to pinpoint vulnerability areas of IoMT ecosystem; and to identify and propose mitigation strategies for the key risks associated with the IoMT ecosystem. Methodology: The study employed setting up a representative IOMT model where a raspberry pi server controls the IOMT devices. An empirical analysis of a range of IoMT devices and systems was performed to identify specific vulnerabilities. This involved penetration testing and security assessments in controlled environments. We identified the mitigation strategies to gauge the effectiveness and tested the effectiveness of the mitigation strategies. Results: There were several critical vulnerabilities within the IoMT ecosystem such as weak encryption methods, lack of proper monitoring, effective authentication mechanisms, and the use of outdated software. The underlying raspberry pi server were vulnerable to common cyberattack vectors. However, such vulnerabilities could be countered by effective mitigation techniques allowing to capitalize on the IoMT ecosystem. Conclusion: The study confirms the need for ongoing monitoring and improvement in the IoMT ecosystem. The healthcare practitioners and administrators need to put a string governance process in place to ensure the continuous monitoring of potential vulnerabilities and in turn providing an effective remedy.
引用
收藏
页码:612 / 616
页数:5
相关论文
共 50 条
  • [31] Personal Wireless Data in Formal Electronic Health Records: Future Potential of Internet of Medical Things Data
    Koren, Ana
    Prasad, Ramjee
    2020 23RD INTERNATIONAL SYMPOSIUM ON WIRELESS PERSONAL MULTIMEDIA COMMUNICATIONS (WPMC 2020), 2020,
  • [32] Guest Editorial: Internet of Medical Things for Health Engineering
    Guo, Jinhong
    Huang, Xiwei
    Pandey, Santosh
    Zhang, Yuan-Ting
    IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2020, 24 (06) : 1539 - 1540
  • [33] Medical data fusion algorithm based on Internet of things
    Zhang, Weiping
    Yang, Jingzhi
    Su, Hang
    Kumar, Mohit
    Mao, Yihua
    PERSONAL AND UBIQUITOUS COMPUTING, 2018, 22 (5-6) : 895 - 902
  • [34] Medical data fusion algorithm based on Internet of things
    Weiping Zhang
    Jingzhi Yang
    Hang Su
    Mohit Kumar
    Yihua Mao
    Personal and Ubiquitous Computing, 2018, 22 : 895 - 902
  • [35] EWPS: Emergency Data Communication in the Internet of Medical Things
    Gopikrishnan, S.
    Priakanth, P.
    Srivastava, Gautam
    Fortino, Giancarlo
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (14): : 11345 - 11356
  • [36] Robust Watermarking Algorithm for Medical Volume Data in Internet of Medical Things
    Liu, Jing
    Ma, Jixin
    Li, Jingbing
    Huang, Mengxing
    Sadiq, Naveed
    Ai, Yang
    IEEE ACCESS, 2020, 8 (08) : 93939 - 93961
  • [37] ECU-IoHT: A dataset for analyzing cyberattacks in Internet of Health Things
    Ahmed, Mohiuddin
    Byreddy, Surender
    Nutakki, Anush
    Sikos, Leslie F.
    Haskell-Dowland, Paul
    AD HOC NETWORKS, 2021, 122
  • [38] Maleficent Mirror with ALEXA Voice Services as an Internet of Things Implement Using Raspberry Pi 3 Model B
    Sarnin, Suzi Seroja
    Akbar, Aida
    Mohamad, Wan Norsyafizan W.
    Idris, Azlina
    Naim, Nani Fadzlina
    Ya'acob, Norsuzila
    PROCEEDINGS OF TENCON 2018 - 2018 IEEE REGION 10 CONFERENCE, 2018, : 1202 - 1207
  • [39] Drone Hacking with Raspberry-Pi 3 and WiFi Pineapple: Security and Privacy Threats for the Internet-of-Things
    Westerlund, Ottilia
    Asif, Rameez
    2019 1ST INTERNATIONAL CONFERENCE ON UNMANNED VEHICLE SYSTEMS-OMAN (UVS), 2019,
  • [40] The Application of Internet of Things for the Elderly Health Safety: A Systematic Review
    Dorri, Sara
    Zabolinezhad, Hedieh
    Sattari, Mohammad
    ADVANCED BIOMEDICAL RESEARCH, 2023, 12 (01):