Document Type
Article
Publication Date
5-2023
DOI
10.3390/iot4020009
Publication Title
IoT
Volume
4
Issue
2
Pages
150-182
Abstract
The concept of the Internet of Things (IoT) spans decades, and the same can be said for its inclusion in healthcare. The IoT is an attractive target in medicine; it offers considerable potential in expanding care. However, the application of the IoT in healthcare is fraught with an array of challenges, and also, through it, numerous vulnerabilities that translate to wider attack surfaces and deeper degrees of damage possible to both consumers and their confidence within health systems, as a result of patient-specific data being available to access. Further, when IoT health devices (IoTHDs) are developed, a diverse range of attacks are possible. To understand the risks in this new landscape, it is important to understand the architecture of IoTHDs, operations, and the social dynamics that may govern their interactions. This paper aims to document and create a map regarding IoTHDs, lay the groundwork for better understanding security risks in emerging IoTHD modalities through a multi-layer approach, and suggest means for improved governance and interaction. We also discuss technological innovations expected to set the stage for novel exploits leading into the middle and latter parts of the 21st century.
Original Publication Citation
Affia, A. A. O., Finch, H., Jung, W., Samori, I. A., Potter, L., & Palmer, X. L. (2023). IoT health devices: Exploring security risks in the connected landscape. IoT, 4(2), 150-182. https://doi.org/10.3390/iot4020009
Repository Citation
Affia, A. A. O., Finch, H., Jung, W., Samori, I. A., Potter, L., & Palmer, X. L. (2023). IoT health devices: Exploring security risks in the connected landscape. IoT, 4(2), 150-182. https://doi.org/10.3390/iot4020009
ORCID
0000-0001-5881-5059 (Finch), 0000-0002-1289-5302 (Palmer)
Included in
Data Storage Systems Commons, Digital Communications and Networking Commons, Graphics and Human Computer Interfaces Commons, Information Security Commons
Comments
Copyright: © 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https:// creativecommons.org/licenses/by/ 4.0/).