IDEAS home Printed from https://ideas.repec.org/a/gam/jftint/v16y2024i11p389-d1504827.html
   My bibliography  Save this article

Health IoT Threats: Survey of Risks and Vulnerabilities

Author

Listed:
  • Samaneh Madanian

    (Department of Computer Science and Software Engineering, Auckland University of Technology (AUT), 6 St. Paul Street, Auckland 1010, New Zealand)

  • Tserendorj Chinbat

    (Department of Computer Science and Software Engineering, Auckland University of Technology (AUT), 6 St. Paul Street, Auckland 1010, New Zealand)

  • Maduka Subasinghage

    (Business School, University of Western Australia, Perth 6009, Australia)

  • David Airehrour

    (Together Communications, 77 Cook Street, Auckland 1010, New Zealand)

  • Farkhondeh Hassandoust

    (Department of Information Systems and Operation Management, University of Auckland, 12 Grafton Road, Auckland CBD, Auckland 1010, New Zealand)

  • Sira Yongchareon

    (Department of Computer Science and Software Engineering, Auckland University of Technology (AUT), 6 St. Paul Street, Auckland 1010, New Zealand)

Abstract

The secure and efficient collection of patients’ vital information is a challenge faced by the healthcare industry. Through the adoption and application of Internet of Things (IoT), the healthcare industry has seen an improvement in the quality of delivered services and patient safety. However, IoT utilization in healthcare is challenging due to the sensitive nature of patients’ clinical information and communicating this across heterogeneous networks and among IoT devices. We conducted a semi-systematic literature review to provide an overview of IoT security and privacy challenges in the healthcare sector over time. We collected 279 studies from 5 scientific databases, of which 69 articles met the requirements for inclusion. We performed thematic and qualitative content analysis to extract trends and information. According to our analysis, the vulnerabilities in IoT in healthcare are classified into three main layers: perception, network, and application. We comprehensively reviewed IoT privacy and security threats on each layer. Different technological advancements were suggested to address the identified vulnerabilities in healthcare. This review has practical implications, emphasizing that healthcare organizations, software developers, and device manufacturers must prioritize healthcare IoT security and privacy. A comprehensive, multilayered security approach, security-by-design principles, and training for staff and end-users must be adopted. Regulators and policy makers must also establish and enforce standards and regulations that promote the security and privacy of healthcare IoT. Overall, this study underscores the importance of ensuring the security and privacy of healthcare IoT, with stakeholders’ coordinated efforts to address the complex and evolving security and privacy threats in this field. This can enhance healthcare IoT trust and reliability, reduce the risks of security and privacy issues and attacks, and ultimately improve healthcare delivery quality and safety.

Suggested Citation

  • Samaneh Madanian & Tserendorj Chinbat & Maduka Subasinghage & David Airehrour & Farkhondeh Hassandoust & Sira Yongchareon, 2024. "Health IoT Threats: Survey of Risks and Vulnerabilities," Future Internet, MDPI, vol. 16(11), pages 1-33, October.
  • Handle: RePEc:gam:jftint:v:16:y:2024:i:11:p:389-:d:1504827
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/1999-5903/16/11/389/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/1999-5903/16/11/389/
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Frank Cremer & Barry Sheehan & Michael Fortmann & Arash N. Kia & Martin Mullins & Finbarr Murphy & Stefan Materne, 2022. "Cyber risk and cybersecurity: a systematic review of data availability," The Geneva Papers on Risk and Insurance - Issues and Practice, Palgrave Macmillan;The Geneva Association, vol. 47(3), pages 698-736, July.
    2. Kavita Sharma & B. B. Gupta, 2018. "Taxonomy of Distributed Denial of Service (DDoS) Attacks and Defense Mechanisms in Present Era of Smartphone Devices," International Journal of E-Services and Mobile Applications (IJESMA), IGI Global, vol. 10(2), pages 58-74, April.
    3. Mohamed Elhoseny & Navod Neranjan Thilakarathne & Mohammed I. Alghamdi & Rakesh Kumar Mahendran & Akber Abid Gardezi & Hesiri Weerasinghe & Anuradhi Welhenge, 2021. "Security and Privacy Issues in Medical Internet of Things: Overview, Countermeasures, Challenges and Future Directions," Sustainability, MDPI, vol. 13(21), pages 1-31, October.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Agbodoh-Falschau, Kouassi Raymond & Ravaonorohanta, Bako Harinivo, 2023. "Investigating the influence of governance determinants on reporting cybersecurity incidents to police: Evidence from Canadian organizations’ perspectives," Technology in Society, Elsevier, vol. 74(C).
    2. Puthearath Chan, 2024. "Cambodian Green Economy Transition: Background, Progress, and SWOT Analysis," World, MDPI, vol. 5(2), pages 1-40, June.
    3. Ng, S.C.H. & Ho, G.T.S. & Wu, C.H., 2023. "Blockchain-IIoT-big data aided process control and quality analytics," International Journal of Production Economics, Elsevier, vol. 261(C).
    4. Fahim Sufi, 2023. "A New AI-Based Semantic Cyber Intelligence Agent," Future Internet, MDPI, vol. 15(7), pages 1-27, June.
    5. Pircalaboiu Alexandra & Cazoni Camelia & Ceausescu Casandra Elena & Petre Bogdan & Dobrea Catalin Razvan, 2024. "Cyber Risk Assessment In The Pharmaceutical Industry: Vulnerabilities, Threats, And Global Response Strategies," Annals - Economy Series, Constantin Brancusi University, Faculty of Economics, vol. 5, pages 307-319, October.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jftint:v:16:y:2024:i:11:p:389-:d:1504827. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.