Patient data security in the era of medical connected devices
Journal Title: Applied Medical Informatics - Year 2019, Vol 41, Issue 0
Abstract
Internet of Things (IoT) is a domain that includes embedded devices connected to a network and used in multiple applications such as: transport, telecommunications, medicine, industrial field and many others. Medical Connected Devices are IoT devices and have their origins in wireless sensor networks and extend this concept by proposing applications in which embedded devices connected to the Internet help automate user tasks. Thus, IoT devices are imagined in multiple applications, from home scenarios (smart home) to clinical scenarios. Considering that IoT devices impact the medical practice and patient life, there is a pressing need for security mechanisms. Security is considered one of the most important IoT characteristics, but it is not considered a key factor influencing acceptance rate. Medical IoT devices are an attractive target for attackers, as they operate with private user data and can be used as an attack vector (for example, for DoS attacks). The peculiarity of the IoT context is that a security breach can endanger human lives or privacy, as well as causing economic damage. Another particular feature of the Medical IoT context is the difficulty of designing security solutions, due to the multiple limitations of the devices, including: hardware and software limitations, lack of input-output modules, installation scenarios and more. Given these particularities of IoT devices and adding the multitude of software and hardware platforms, along with the lack of standardization, there is a pressing need for new security solutions. Without complying with basic cyber security standards, many medical IoT manufacturers focus exclusively on the features of the devices they sell. In many cases, they do not check for vulnerabilities in the final version of the product, nor for the corresponding applications through which the product can be controlled. It could be negligence, but a more likely explanation is that this approach reduces production costs and speeds up product placement. In any case, this affects buyers who are likely to suffer financial consequences or lose sensitive information when hackers start exploiting the flaws.
Authors and Affiliations
Tudor DRUGAN, Dan ISTRATE
Analysis of the baccalaureate performances of nursing candidates at the Timişoara, Cluj-Napoca and Bucharest Universities
Introduction: The substantial technological developments in medicine and nursing may warrant research to improve the scientific curriculum during high school. The aim of this study was to analyse the high school baccalau...
Data Sources and Information to be Collected for a Romanian Diabetes Register
Diabetes is a serious condition that damages many systems and organs, mainly the blood vessels and the nerves. The importance of the diabetes and its complications, along with the prevalence of the disease makes it a maj...
Satistical Graphical User Interface Plug-In for Survival Analysis in R Statistical and Graphics Language and Environment.
[i][b]Introduction[/b][/i]: R is a statistical and graphics language and environment. Although it is extensively used in command line, graphical user interfaces exist to ease the accommodation with it for new users. Rcmd...
Patient data security in the era of medical connected devices
Internet of Things (IoT) is a domain that includes embedded devices connected to a network and used in multiple applications such as: transport, telecommunications, medicine, industrial field and many others. Medical Con...
From Passive to Active in the Design of External Radiotherapy Database at Oncology Institute "Prof. Dr. Ion Chiricuţă" from Cluj-Napoca
Implementation during 1997 of a computer network at Oncology Institute “Prof. Dr. Ion Chiricuţă" from Cluj-Napoca (OICN) opens the era of patient electronic file where the presented database is included. The database dev...