Device Security Assessment of Internet of Healthcare Things

被引:27
作者
Attaallah, Abdulaziz [1 ]
Ahmad, Masood [2 ]
Ansari, Md Tarique Jamal [2 ]
Pandey, Abhishek Kumar [2 ]
Kumar, Rajeev [2 ,3 ]
Khan, Raees Ahmad [2 ]
机构
[1] King Abdulaziz Univ, Fac Comp & Informat Technol, Jeddah 21589, Saudi Arabia
[2] Babasaheb Bhimrao Ambedkar Univ, Dept Informat Technol, Lucknow 226025, Uttar Pradesh, India
[3] Shri Ramswaroop Mem Univ, Dept Comp Applicat, Barabanki 225003, Uttar Pradesh, India
关键词
Healthcare device; TOPSIS method; security and privacy; IoHT; ISSUES;
D O I
10.32604/iasc.2021.015092
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security of the Internet of Healthcare Things (IoHT) devices plays a vital role in e-healthcare today and there has been a rapid increase in the use of networked devices of IoHT in the present healthcare services. However, these networked devices are also highly vulnerable to attackers who constantly target the security of devices and their components to gain access to the patients' data. Infringement of patients' data is not only a violation of privacy but can also jeo-pardize patients' health if the health records are tampered with. Once the device has been intruded upon, attackers can not only change the record of the patients but also block and switch off the device. Decidedly, the security of IoHT devices is at a huge risk and needs to be designed, manufactured and networked with more secure mechanisms. In this league, the present study employs a new methodology to assess the privacy and security of the IoHT devices. The study analyses the security defects of the medical devices by enlisting the opinions of the hacking experts. Based on the collated list of defects cited by the experts, the authors have designed a list of criteria and represented the defects in hierarchical format for assessing the security defects in the devices. Thereafter, the Technical for Order Preference by Similarity to Ideal Solution (TOPSIS) method has been used for ranking the security of IoHT devices, based on their security features. The findings of the study iterate that the proposed mechanism would be an efficacious approach for evaluating the security of the medical devices.
引用
收藏
页码:593 / 603
页数:11
相关论文
共 24 条
[1]  
Algarni A., 2020, International Journal of Intelligent Engineering & Systems, V13, P51, DOI [10.22266/ijies2020.1031.06, DOI 10.22266/IJIES2020.1031.06]
[2]  
Algarni A, 2020, INT J ADV COMPUT SC, V11, P481
[3]   On Threat Modeling and Mitigation of Medical Cyber-Physical Systems [J].
Almohri, Hussain ;
Cheng, Long ;
Yao, Danfeng ;
Alemzadeh, Homa .
2017 IEEE/ACM SECOND INTERNATIONAL CONFERENCE ON CONNECTED HEALTH - APPLICATIONS, SYSTEMS AND ENGINEERING TECHNOLOGIES (CHASE), 2017, :114-119
[4]  
[Anonymous], 2017, HUFFPOST
[5]   STORE: Security Threat Oriented Requirements Engineering Methodology [J].
Ansari, Md Tarique Jamal ;
Pandey, Dhirendra ;
Alenezi, Mamdouh .
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (02) :191-203
[6]   A fuzzy TOPSIS based analysis toward selection of effective security requirements engineering approach for trustworthy healthcare software development [J].
Ansari, Md Tarique Jamal ;
Al-Zahrani, Fahad Ahmed ;
Pandey, Dhirendra ;
Agrawal, Alka .
BMC MEDICAL INFORMATICS AND DECISION MAKING, 2020, 20 (01)
[7]  
Ansari MTJ, 2018, ADV HEALTHC INF SYST, P117, DOI 10.4018/978-1-5225-3203-3.ch005
[8]   Security Issues for Mobile Medical Imaging: A Primer [J].
Choudhri, Asim F. ;
Chatterjee, Arindam R. ;
Javan, Ramin ;
Radvany, Martin G. ;
Shih, George .
RADIOGRAPHICS, 2015, 35 (06) :1814-1824
[9]   Price-Dividend Ratio Factor Proxies for Long-Run Risks [J].
Jagannathan, Ravi ;
Marakani, Srikant .
REVIEW OF ASSET PRICING STUDIES, 2015, 5 (01) :1-47
[10]  
Klonoff D., 2017, MEDSEC 2017 SECURITY