A Comprehensive Study of Security and Cyber-Security Risk Management within e-Health Systems: Synthesis, Analysis and a Novel Quantified Approach

被引:0
作者
Sondes Ksibi
Faouzi Jaidi
Adel Bouhoula
机构
[1] University of Carthage,Higher School of Communication of Tunis, LR18TIC01 Digital Security Research Lab
[2] University of Carthage,National School of Engineers of Carthage
[3] Arabian Gulf University,Department of Next
来源
Mobile Networks and Applications | 2023年 / 28卷
关键词
e-Health; IoT; IoMT; Security; Risk management; Trust;
D O I
暂无
中图分类号
学科分类号
摘要
Internet of Things (IoT) applications are among the major trends of nowadays. Billions of connected devices are creating great business profits and performing a multitude of automated tasks in many daily human activities. In healthcare service delivery, IoT capabilities are difficult to overestimate, they are progressively becoming entangled and commonly coined Internet of Medical Things (IoMT). The participating nodes in IoMT networks generate, collect and exchange huge amounts of extremely private and sensitive data. Numerous security vulnerabilities arise due to the complexity and the heterogeneity of the technology. New risks, born out of IoMT systems, cannot easily be supported by existing risk management frameworks. The existing cyber-security risk assessment methods and approaches, deployed in several organizations, will not address the IoMT inherent risks properly. This study includes a comprehensive review of IoMT systems. Popular risk assessment methods are discussed and their suitability to IoMT is dealt with in detail. Based on this study, we propose a framework to enhance trust and help with decision making in e-healthcare environments given its high-risk exposure. The proposal is based on a quantified risk assessment approach. Our aim is to define a novel approach/model for improving trust and risk management in an e-health context.
引用
收藏
页码:107 / 127
页数:20
相关论文
共 51 条
  • [1] Al-Fuqaha A(2015)Internet of things: A survey on enabling technologies, protocols, and applications IEEE Commun Surv Tutor 17 2347-2376
  • [2] Guizani M(2015)The internet of things for health care: a comprehensive survey IEEE Access 3 678-708
  • [3] Mohammadi M(2015)Cybersecurity vulnerabilities in medical devices: a complex environment and multifaceted problem Med Devices (Auckland, NZ) 8 305-449
  • [4] Aledhari M(2014)Security aspects of short-range wireless communication-risk analysis for the healthcare application Int J Intell Comput Res 5 438-133
  • [5] Ayyash M(2017)Performance analysis of security algorithms for IoT devices. 2017 IEEE Region 10 Humanitarian Technology Conference (R10-HTC) Dhaka 2017 130-35
  • [6] Islam SR(2016)Army: architecture for a secure and privacy-aware lifecycle of smart objects in the internet of my things IEEE Commun Mag 54 28-185505
  • [7] Kwak D(2019)Intrusion prevention framework for secure routing in WSN-based mobile Internet of Things Ieee Access 7 185496-22
  • [8] Kabir MH(2018)Risk management framework for information systems and organizations NIST Spec Publ 800 37-26
  • [9] Hossain M(2018)Future developments in cyber risk assessment for the internet of things Comput Ind 102 14-709
  • [10] Kwak KS(2017)Security risk assessment in Internet of Things systems IT Prof 19 20-16