Abstract
The introduction of IoT in the healthcare sector has benefited the healthcare sector in several ways, such as minimal doctor visits, on-time medication, regular checkups at home, and health alerts. The paper dwells on the development of a technical field—The Internet of Healthcare Things (IoHT) which is growing exponentially. Traditional network security systems have a well-defined set of features. Traditional security techniques, however, cannot be directly employed to protect IoT devices and networks from cyber-attacks due to the resource restrictions of IoT devices and the distinctive behavior of IoT protocols. It primarily focuses on various IoT devices currently employed in the healthcare field. The following paper reviews current implementations of IoHT security protocols and suggests alternative methodologies to enhance the security of various IoHT devices. A detailed exploration of the cyber security issues and potential improvements in security measures of several IoHT devices like iTBra, infusion pumps, Pacemakers, Smart Inhalers, and blood pressure monitors are discussed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Gillis AS (2022) What is the Internet of Things (IoT)? IoT Agenda. https://www.techtarget.com/iotagenda/definition/Internet-of-Things-IoT#:%7E:text=IoT%20enables%20companies%20to%20automate,offering%20transparency%20into%20customer%20transactions
Statista (2021) IoT and non-IoT connections worldwide 2010–2025. https://www.statista.com/statistics/1101442/iot-number-of-connected-devices-worldwide/#:%7E:text=The%20total%20installed%20base%20of,that%20are%20expected%20in%202021
Statista (2021a) Number of IoT devices 2015–2025. https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/
Maiman M (2020) IoT technology for healthcare in 2020. IoT Agenda. https://www.techtarget.com/iotagenda/blog/IoT-Agenda/IoT-technology-for-healthcare-in-2020?_gl=1*km9yxn*_ga*MzM0OTcwMjczLjE2NTUzOTI2NzA.*_ga_TQKE4GS5P9*MTY1NTM5MjY3MC4xLjEuMTY1NTM5Mjc3MS4w&_ga=2.206253139.1147549647.1655392670-334970273.1655392670
Williams A (2020) Why healthcare is an attractive target for Malicious Actors. VerSprite Cybersecurity Consulting Services. https://versprite.com/geopolitical-risk/healthcare-cybersecurity/
Hussain F, Abbas SG, Shah GA, Pires IM, Fayyaz UU, Shahzad F, Garcia NM, Zdravevski E (2021) A framework for malicious traffic detection in IoT healthcare environment. Sensors 21(9):3025.https://doi.org/10.3390/s21093025
The Impact of the Internet of Hospital Things (IoHT) on the Healthcare IT Industry (2020) Covetus. https://www.covetus.com/blog/the-impact-of-the-internet-of-hospital-things-ioht-on-the-healthcare-it-industry
Aroosa, Ullah SS, Hussain S, Alroobaea R, Ali I (2021) Securing NDN-based Internet of Health Things through cost-effective Signcryption Scheme. Wirel Commun Mob Comput, 2021, 1–13. https://doi.org/10.1155/2021/5569365
Geevarghese D (2018) Revolutionizing modern healthcare with Internet of Things. Cabot Solutions. https://www.cabotsolutions.com/revolutionizing-modern-healthcare-with-internet-of-things
Albesher A. (2019) IoT in health-care: recent advances in the development of smart cyber-physical ubiquitous environments. https://www.researchgate.net/publication/331642487_IoT_in_Health-care_Recent_Advances_in_the_Development_of_Smart_Cyber-Physical_Ubiquitous_Environments
(2015) Bra helps to detect breast cancer. Wearable Technology Insights. https://www.wearabletechnologyinsights.com/articles/7625/bra-helps-to-detect-breast-cancer
O’Brien G, Edwards S, Littlefield K, McNab N, Wang S, Zheng K (2018) Securing wireless infusion pumps in healthcare delivery organizations. Secur Wirel Infusion Pumps Healthc Deliv Organ. https://doi.org/10.6028/nist.sp.1800-8
Pacemaker - Mayo Clinic (2021) Mayo Clinic. https://www.mayoclinic.org/tests-procedures/pacemaker/about/pac-20384689
Shahid J, Ahmad R, Kiani AK, Ahmad T, Saeed S, Almuhaideb AM (2022) Data protection and privacy of the Internet of Healthcare Things (IoHTs). Appl Sci 12(4):1927. https://doi.org/10.3390/app12041927
Iqbal M, Iqbal F, Mohsin F, Rizwan M, Ahmad, F (2019) Security issues in software defined networking (SDN): risks, challenges and potential solutions. Int J Adv Comput Sci Appl 10(10). https://doi.org/10.14569/ijacsa.2019.0101042
B. (2020) Smart Inhalers Market: an innovative solution for management of respiratory conditions. BioSpace. https://www.biospace.com/article/smart-inhalers-market-an-innovative-solution-for-management-of-respiratory-conditions/#:%7E:text=Smart%20inhaler%20technology%20is%20birthing,various%20intervals%20during%20the%20day
Smart inhalers—your questions answered | Asthma UK (2017) Asthma + Lung UK. https://www.asthma.org.uk/about/media/news/smart-inhalers-questions-answered/#:%7E:text=Smart%20inhalers%20contain%20sensors%20that,from%20the%20smart%20inhaler%20automatically
Chen L, Cooper P, Liu Q (2013) Security in Bluetooth networks and communications. Wirel Netw Secur 77–94. https://doi.org/10.1007/978-3-642-36511-9_5
Near field communication (NFC) technology, vulnerabilities and principal attack schema (2021) Infosec resources. https://resources.infosecinstitute.com/topic/near-field-communication-nfc-technology-vulnerabilities-and-principal-attack-schema/
RFC 4493—The AES-CMAC Algorithm (2006) Data tracker. https://datatracker.ietf.org/doc/html/rfc4493#page-10
Igor (2020) IoT in healthcare: enhancing medical environments with innovative solutions. Blue Compass, Des Moines, Iowa, www.Bluecompass.com. https://www.igor-tech.com/news-and-insights/articles/iot-in-healthcare-enhancing-medical-environments-with-innovative-solutions
M. (2019) Cyrcadia Asia | Our Technology. Cyrcadia Asia. https://cyrcadia.asia/our-technology/
Bhavya G, Manjunath TN, Hegadi RS, Pushpa SK (2019) A study on personalized early detection of breast cancer using modern technology. Lect Notes Electric Eng, 355–362. https://doi.org/10.1007/978-981-13-5802-9_33
Center for Devices and Radiological Health (2017) What Is an Infusion Pump? U.S. Food and Drug Administration. https://www.fda.gov/medical-devices/infusion-pumps/what-infusion-pump
Nevon Projects (2022) IOT syringe infusion pump. https://nevonprojects.com/iot-syringe-infusion-pump/
Scanlon M (2012) The role of “smart” infusion pumps in patient safety. Pediatr Clin North Am 59(6):1257–1267. https://doi.org/10.1016/j.pcl.2012.08.005
Cardiovascular diseases (CVDs) (2021). WHO. https://www.who.int/news-room/fact-sheets/detail/cardiovascular-diseases-(cvds)
Puat HAM, Rahman NAA (2020) IoMT: a review of pacemaker vulnerabilities and security strategy. J Phys: Conf Ser 1712(1):012009. https://doi.org/10.1088/1742-6596/1712/1/012009
Focus on EP | Leadless Technology: A Paradigm Shift in Cardiac Implantable Electronic Devices (2021) American College of Cardiology. https://www.acc.org/latest-in-cardiology/articles/2021/04/01/01/42/focus-on-ep-leadless-technology-a-paradigm-shift-in-cardiac-implantable-electronic-devices
All IF (2020) Asthma management. IoT For All. https://www.iotforall.com/use-case/asthma-management
Slavens D (2019) How smart inhaler technology can help people with Asthma and COPD. LPT Medical. https://blog.lptmedical.com/how-smart-inhaler-technology-can-help-people-with-asthma-and-copd
Thomas L, (2022) What are smart inhalers? News-Medical.Net. https://www.news-medical.net/health/What-are-Smart-Inhalers.aspx
Ciemins EL, Arora A, Coombs NC, Holloway B, Mullette EJ, Garland R, (Walsh) Bishop-Green S, Penso J, Coon PJ (2018) Improving blood pressure control using smart technology. Telemed E-Health 24(3):222–228. https://doi.org/10.1089/tmj.2017.0028
Goldberg EM, Levy PD (2016) New approaches to evaluating and monitoring blood pressure. Curr Hypertens Rep 18(6). https://doi.org/10.1007/s11906-016-0650-9
Kumar S, Wollinger T (2006) Fundamentals of symmetric cryptography. In: Lemke K, Paar C, Wolf M (eds) Embedded security in cars. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-28428-1_8
Kerner SM, Burke J (2021) FTP (File Transfer Protocol). SearchNetworking. https://www.techtarget.com/searchnetworking/definition/File-Transfer-Protocol-FTP
GeeksforGeeks (2021). File transfer protocol (FTP). https://www.geeksforgeeks.org/file-transfer-protocol-ftp/#:%7E:text=FTP%20works%20on%20a%20client,and%20then%20closes%20the%20connection
About telnet (2022) Copyright 2022, The Trustees of Indiana University. https://kb.iu.edu/d/aayd
Telnet Protocol—Definition & How it Works—ExtraHop | ExtraHop. (2022). ExtraHop. https://www.extrahop.com/resources/protocols/telnet/
Feamster N, Rexford J, Zegura E (2014) The road to SDN. ACM SIGCOMM Comput Commun Rev 44(2):87–98. https://doi.org/10.1145/2602204.2602219
What is Software-Defined Networking (SDN)? (n.d.) Vmware. https://www.vmware.com/topics/glossary/content/software-defined-networking.html
U.S. Department of Commerce-NIST (2012) Guide to Bluetooth Security. CreateSpace Independent Publishing Platform. http://mcs.csueastbay.edu/~lertaul/BluetoothSECV1.pdf
Muhammed Rijah UL, Mosharani S, Amuthapriya S, Mufthas MMM, Hezretov M, Dhammearatchi D (2018) Bluetooth security analysis and solution; Int J Sci Res Publ 6(4) (ISSN: 2250-3153). http://www.ijsrp.org/research-paper-0416.php?rp=P525267
Kavitha M (2019) Smart Inhalers. J Nurs Trendz 10(3):34. https://doi.org/10.5958/2249-3190.2019.00029.4
S. (2022) What is AES encryption and how does it work? Simplilearn.Com. https://www.simplilearn.com/tutorials/cryptography-tutorial/aes-encryption
Thorsteinson P, Ganesh AGG (2003) Net security and cryptography, 1st edn. Pearson P T R. https://www.oreilly.com/library/view/net-security-and/013100851X/
What is FTP Security? Securing FTP Usage. (2018). Digital Guardian. https://digitalguardian.com/blog/what-ftp-security-securing-ftp-usage#:%7E:text=Security%20Challenges%20of%20FTP&text=It%20is%20generally%20considered%20to,among%20other%20basic%20attack%20methods
Advantages of TELNET | disadvantages of TELNET. (n.d.). RF Wireless world. https://www.rfwireless-world.com/Terminology/Advantages-and-Disadvantages-of-TELNET.html
Advantages of AES | disadvantages of AES. (n.d.). RF Wireless world. https://www.rfwireless-world.com/Terminology/Advantages-and-disadvantages-of-AES.html
GeeksforGeeks (2022) Difference between symmetric and asymmetric key encryption. https://www.geeksforgeeks.org/difference-between-symmetric-and-asymmetric-key-encryption/#:%7E:text=Asymmetric%20Key%20Encryption%3A%20Asymmetric%20Key,technique%20but%20is%20much%20slower.&text=It%20only%20requires%20a%20single%20key%20for%20both%20encryption%20and%20decryption
S. (2022b) What is data encryption: types, algorithms, techniques and methods. Simplilearn.Com. https://www.simplilearn.com/data-encryption-methods-article
Reynolds J (2019) Five alternatives to FTP—secure file transfers. Advancedcyber.Co.Uk. https://www.advancedcyber.co.uk/it-security-blog/five-alternatives-to-ftp-secure-file-transfers#:%7E:text=SFTP%20(SSH%20File%20Transfer%20Protocol)&text=SFTP%20has%20become%20the%20de,incorrectly%20described%20as%20secure%2DFTP.
Kovačević A (2021) Telnet versus SSH: how is SSH different from telnet? Knowledge Base by phoenixNAP. https://phoenixnap.com/kb/telnet-vs-ssh#:%7E:text=SSH%20serves%20the%20same%20primary,files%20between%20devices%2C%20and%20more.
Obe BB (2022). I know HMAC, but what's CMAC?—ASecuritySite: When Bob Met Alice. Medium. https://medium.com/asecuritysite-when-bob-met-alice/i-know-hmac-but-whats-cmac-b859799af732
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Surti, M., Shah, V., Makadiya, Y., Shah, K., Padhya, M. (2023). Exploring Cyber Security Issues in the Internet of Healthcare Things (IoHT) with Potential Improvements. In: Kaiser, M.S., Xie, J., Rathore, V.S. (eds) Information and Communication Technology for Competitive Strategies (ICTCS 2022). Lecture Notes in Networks and Systems, vol 615. Springer, Singapore. https://doi.org/10.1007/978-981-19-9304-6_52
Download citation
DOI: https://doi.org/10.1007/978-981-19-9304-6_52
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-9303-9
Online ISBN: 978-981-19-9304-6
eBook Packages: EngineeringEngineering (R0)