Skip to main content

Exploring Cyber Security Issues in the Internet of Healthcare Things (IoHT) with Potential Improvements

  • Chapter
  • First Online:
Information and Communication Technology for Competitive Strategies (ICTCS 2022)

Abstract

The introduction of IoT in the healthcare sector has benefited the healthcare sector in several ways, such as minimal doctor visits, on-time medication, regular checkups at home, and health alerts. The paper dwells on the development of a technical field—The Internet of Healthcare Things (IoHT) which is growing exponentially. Traditional network security systems have a well-defined set of features. Traditional security techniques, however, cannot be directly employed to protect IoT devices and networks from cyber-attacks due to the resource restrictions of IoT devices and the distinctive behavior of IoT protocols. It primarily focuses on various IoT devices currently employed in the healthcare field. The following paper reviews current implementations of IoHT security protocols and suggests alternative methodologies to enhance the security of various IoHT devices. A detailed exploration of the cyber security issues and potential improvements in security measures of several IoHT devices like iTBra, infusion pumps, Pacemakers, Smart Inhalers, and blood pressure monitors are discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Gillis AS (2022) What is the Internet of Things (IoT)? IoT Agenda. https://www.techtarget.com/iotagenda/definition/Internet-of-Things-IoT#:%7E:text=IoT%20enables%20companies%20to%20automate,offering%20transparency%20into%20customer%20transactions

  2. Statista (2021) IoT and non-IoT connections worldwide 2010–2025. https://www.statista.com/statistics/1101442/iot-number-of-connected-devices-worldwide/#:%7E:text=The%20total%20installed%20base%20of,that%20are%20expected%20in%202021

  3. Statista (2021a) Number of IoT devices 2015–2025. https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/

  4. Maiman M (2020) IoT technology for healthcare in 2020. IoT Agenda. https://www.techtarget.com/iotagenda/blog/IoT-Agenda/IoT-technology-for-healthcare-in-2020?_gl=1*km9yxn*_ga*MzM0OTcwMjczLjE2NTUzOTI2NzA.*_ga_TQKE4GS5P9*MTY1NTM5MjY3MC4xLjEuMTY1NTM5Mjc3MS4w&_ga=2.206253139.1147549647.1655392670-334970273.1655392670

  5. Williams A (2020) Why healthcare is an attractive target for Malicious Actors. VerSprite Cybersecurity Consulting Services. https://versprite.com/geopolitical-risk/healthcare-cybersecurity/

  6. Hussain F, Abbas SG, Shah GA, Pires IM, Fayyaz UU, Shahzad F, Garcia NM, Zdravevski E (2021) A framework for malicious traffic detection in IoT healthcare environment. Sensors 21(9):3025.https://doi.org/10.3390/s21093025

  7. The Impact of the Internet of Hospital Things (IoHT) on the Healthcare IT Industry (2020) Covetus. https://www.covetus.com/blog/the-impact-of-the-internet-of-hospital-things-ioht-on-the-healthcare-it-industry

  8. Aroosa, Ullah SS, Hussain S, Alroobaea R, Ali I (2021) Securing NDN-based Internet of Health Things through cost-effective Signcryption Scheme. Wirel Commun Mob Comput, 2021, 1–13. https://doi.org/10.1155/2021/5569365

  9. Geevarghese D (2018) Revolutionizing modern healthcare with Internet of Things. Cabot Solutions. https://www.cabotsolutions.com/revolutionizing-modern-healthcare-with-internet-of-things

  10. Albesher A. (2019) IoT in health-care: recent advances in the development of smart cyber-physical ubiquitous environments. https://www.researchgate.net/publication/331642487_IoT_in_Health-care_Recent_Advances_in_the_Development_of_Smart_Cyber-Physical_Ubiquitous_Environments

  11. (2015) Bra helps to detect breast cancer. Wearable Technology Insights. https://www.wearabletechnologyinsights.com/articles/7625/bra-helps-to-detect-breast-cancer

  12. O’Brien G, Edwards S, Littlefield K, McNab N, Wang S, Zheng K (2018) Securing wireless infusion pumps in healthcare delivery organizations. Secur Wirel Infusion Pumps Healthc Deliv Organ. https://doi.org/10.6028/nist.sp.1800-8

    Article  Google Scholar 

  13. Pacemaker - Mayo Clinic (2021) Mayo Clinic. https://www.mayoclinic.org/tests-procedures/pacemaker/about/pac-20384689

  14. Shahid J, Ahmad R, Kiani AK, Ahmad T, Saeed S, Almuhaideb AM (2022) Data protection and privacy of the Internet of Healthcare Things (IoHTs). Appl Sci 12(4):1927. https://doi.org/10.3390/app12041927

    Article  Google Scholar 

  15. Iqbal M, Iqbal F, Mohsin F, Rizwan M, Ahmad, F (2019) Security issues in software defined networking (SDN): risks, challenges and potential solutions. Int J Adv Comput Sci Appl 10(10). https://doi.org/10.14569/ijacsa.2019.0101042

  16. B. (2020) Smart Inhalers Market: an innovative solution for management of respiratory conditions. BioSpace. https://www.biospace.com/article/smart-inhalers-market-an-innovative-solution-for-management-of-respiratory-conditions/#:%7E:text=Smart%20inhaler%20technology%20is%20birthing,various%20intervals%20during%20the%20day

  17. Smart inhalers—your questions answered | Asthma UK (2017) Asthma + Lung UK. https://www.asthma.org.uk/about/media/news/smart-inhalers-questions-answered/#:%7E:text=Smart%20inhalers%20contain%20sensors%20that,from%20the%20smart%20inhaler%20automatically

  18. Chen L, Cooper P, Liu Q (2013) Security in Bluetooth networks and communications. Wirel Netw Secur 77–94. https://doi.org/10.1007/978-3-642-36511-9_5

  19. Near field communication (NFC) technology, vulnerabilities and principal attack schema (2021) Infosec resources. https://resources.infosecinstitute.com/topic/near-field-communication-nfc-technology-vulnerabilities-and-principal-attack-schema/

  20. RFC 4493—The AES-CMAC Algorithm (2006) Data tracker. https://datatracker.ietf.org/doc/html/rfc4493#page-10

  21. Igor (2020) IoT in healthcare: enhancing medical environments with innovative solutions. Blue Compass, Des Moines, Iowa, www.Bluecompass.com. https://www.igor-tech.com/news-and-insights/articles/iot-in-healthcare-enhancing-medical-environments-with-innovative-solutions

  22. M. (2019) Cyrcadia Asia | Our Technology. Cyrcadia Asia. https://cyrcadia.asia/our-technology/

  23. Bhavya G, Manjunath TN, Hegadi RS, Pushpa SK (2019) A study on personalized early detection of breast cancer using modern technology. Lect Notes Electric Eng, 355–362. https://doi.org/10.1007/978-981-13-5802-9_33

  24. Center for Devices and Radiological Health (2017) What Is an Infusion Pump? U.S. Food and Drug Administration. https://www.fda.gov/medical-devices/infusion-pumps/what-infusion-pump

  25. Nevon Projects (2022) IOT syringe infusion pump. https://nevonprojects.com/iot-syringe-infusion-pump/

  26. Scanlon M (2012) The role of “smart” infusion pumps in patient safety. Pediatr Clin North Am 59(6):1257–1267. https://doi.org/10.1016/j.pcl.2012.08.005

    Article  Google Scholar 

  27. Cardiovascular diseases (CVDs) (2021). WHO. https://www.who.int/news-room/fact-sheets/detail/cardiovascular-diseases-(cvds)

  28. Puat HAM, Rahman NAA (2020) IoMT: a review of pacemaker vulnerabilities and security strategy. J Phys: Conf Ser 1712(1):012009. https://doi.org/10.1088/1742-6596/1712/1/012009

    Article  Google Scholar 

  29. Focus on EP | Leadless Technology: A Paradigm Shift in Cardiac Implantable Electronic Devices (2021) American College of Cardiology. https://www.acc.org/latest-in-cardiology/articles/2021/04/01/01/42/focus-on-ep-leadless-technology-a-paradigm-shift-in-cardiac-implantable-electronic-devices

  30. All IF (2020) Asthma management. IoT For All. https://www.iotforall.com/use-case/asthma-management

  31. Slavens D (2019) How smart inhaler technology can help people with Asthma and COPD. LPT Medical. https://blog.lptmedical.com/how-smart-inhaler-technology-can-help-people-with-asthma-and-copd

  32. Thomas L, (2022) What are smart inhalers? News-Medical.Net. https://www.news-medical.net/health/What-are-Smart-Inhalers.aspx

  33. Ciemins EL, Arora A, Coombs NC, Holloway B, Mullette EJ, Garland R, (Walsh) Bishop-Green S, Penso J, Coon PJ (2018) Improving blood pressure control using smart technology. Telemed E-Health 24(3):222–228. https://doi.org/10.1089/tmj.2017.0028

  34. Goldberg EM, Levy PD (2016) New approaches to evaluating and monitoring blood pressure. Curr Hypertens Rep 18(6). https://doi.org/10.1007/s11906-016-0650-9

  35. Kumar S, Wollinger T (2006) Fundamentals of symmetric cryptography. In: Lemke K, Paar C, Wolf M (eds) Embedded security in cars. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-28428-1_8

  36. Kerner SM, Burke J (2021) FTP (File Transfer Protocol). SearchNetworking. https://www.techtarget.com/searchnetworking/definition/File-Transfer-Protocol-FTP

  37. GeeksforGeeks (2021). File transfer protocol (FTP). https://www.geeksforgeeks.org/file-transfer-protocol-ftp/#:%7E:text=FTP%20works%20on%20a%20client,and%20then%20closes%20the%20connection

  38. About telnet (2022) Copyright 2022, The Trustees of Indiana University. https://kb.iu.edu/d/aayd

  39. Telnet Protocol—Definition & How it Works—ExtraHop | ExtraHop. (2022). ExtraHop. https://www.extrahop.com/resources/protocols/telnet/

  40. Feamster N, Rexford J, Zegura E (2014) The road to SDN. ACM SIGCOMM Comput Commun Rev 44(2):87–98. https://doi.org/10.1145/2602204.2602219

    Article  Google Scholar 

  41. What is Software-Defined Networking (SDN)? (n.d.) Vmware. https://www.vmware.com/topics/glossary/content/software-defined-networking.html

  42. U.S. Department of Commerce-NIST (2012) Guide to Bluetooth Security. CreateSpace Independent Publishing Platform. http://mcs.csueastbay.edu/~lertaul/BluetoothSECV1.pdf

  43. Muhammed Rijah UL, Mosharani S, Amuthapriya S, Mufthas MMM, Hezretov M, Dhammearatchi D (2018) Bluetooth security analysis and solution; Int J Sci Res Publ 6(4) (ISSN: 2250-3153). http://www.ijsrp.org/research-paper-0416.php?rp=P525267

  44. Kavitha M (2019) Smart Inhalers. J Nurs Trendz 10(3):34. https://doi.org/10.5958/2249-3190.2019.00029.4

    Article  Google Scholar 

  45. S. (2022) What is AES encryption and how does it work? Simplilearn.Com. https://www.simplilearn.com/tutorials/cryptography-tutorial/aes-encryption

  46. Thorsteinson P, Ganesh AGG (2003) Net security and cryptography, 1st edn. Pearson P T R. https://www.oreilly.com/library/view/net-security-and/013100851X/

  47. What is FTP Security? Securing FTP Usage. (2018). Digital Guardian. https://digitalguardian.com/blog/what-ftp-security-securing-ftp-usage#:%7E:text=Security%20Challenges%20of%20FTP&text=It%20is%20generally%20considered%20to,among%20other%20basic%20attack%20methods

  48. Advantages of TELNET | disadvantages of TELNET. (n.d.). RF Wireless world. https://www.rfwireless-world.com/Terminology/Advantages-and-Disadvantages-of-TELNET.html

  49. Advantages of AES | disadvantages of AES. (n.d.). RF Wireless world. https://www.rfwireless-world.com/Terminology/Advantages-and-disadvantages-of-AES.html

  50. GeeksforGeeks (2022) Difference between symmetric and asymmetric key encryption. https://www.geeksforgeeks.org/difference-between-symmetric-and-asymmetric-key-encryption/#:%7E:text=Asymmetric%20Key%20Encryption%3A%20Asymmetric%20Key,technique%20but%20is%20much%20slower.&text=It%20only%20requires%20a%20single%20key%20for%20both%20encryption%20and%20decryption

  51. S. (2022b) What is data encryption: types, algorithms, techniques and methods. Simplilearn.Com. https://www.simplilearn.com/data-encryption-methods-article

  52. Reynolds J (2019) Five alternatives to FTP—secure file transfers. Advancedcyber.Co.Uk. https://www.advancedcyber.co.uk/it-security-blog/five-alternatives-to-ftp-secure-file-transfers#:%7E:text=SFTP%20(SSH%20File%20Transfer%20Protocol)&text=SFTP%20has%20become%20the%20de,incorrectly%20described%20as%20secure%2DFTP.

  53. Kovačević A (2021) Telnet versus SSH: how is SSH different from telnet? Knowledge Base by phoenixNAP. https://phoenixnap.com/kb/telnet-vs-ssh#:%7E:text=SSH%20serves%20the%20same%20primary,files%20between%20devices%2C%20and%20more.

  54. Obe BB (2022). I know HMAC, but what's CMAC?—ASecuritySite: When Bob Met Alice. Medium. https://medium.com/asecuritysite-when-bob-met-alice/i-know-hmac-but-whats-cmac-b859799af732

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kaushal Shah .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Surti, M., Shah, V., Makadiya, Y., Shah, K., Padhya, M. (2023). Exploring Cyber Security Issues in the Internet of Healthcare Things (IoHT) with Potential Improvements. In: Kaiser, M.S., Xie, J., Rathore, V.S. (eds) Information and Communication Technology for Competitive Strategies (ICTCS 2022). Lecture Notes in Networks and Systems, vol 615. Springer, Singapore. https://doi.org/10.1007/978-981-19-9304-6_52

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-9304-6_52

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-9303-9

  • Online ISBN: 978-981-19-9304-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics