DOI QR코드

DOI QR Code

Secure and Resilient Framework for Internet of Medical Things (IoMT) with an Effective Cybersecurity Risk Management

  • Latifah Khalid Alabdulwahhab (Department of Information Technology, College of Computer and Information Sciences Majmaah University) ;
  • Shaik Shakeel Ahamad (Department of Information Technology, College of Computer and Information Sciences Majmaah University)
  • Received : 2024.05.05
  • Published : 2024.05.30

Abstract

COVID-19 pandemic outbreak increased the use of Internet of Medical Things (IoMT), but the existing IoMT solutions are not free from attacks. This paper proposes a secure and resilient framework for IoMT, it computes the risk using Risk Impact Parameters (RIP) and Risk is also calculated based upon the Threat Events in the Internet of Medical Things (IoMT). UICC (Universal Integrated Circuit Card) and TPM (Trusted Platform Module) are used to ensure security in IoMT. PILAR Risk Management Tool is used to perform qualitative and quantitative risk analysis. It is designed to support the risk management process along long periods, providing incremental analysis as the safeguards improve.

Keywords

References

  1. D.N. Burrell, A.S. Aridi, Q. McLester, A. Shufutinsky, C. Nobles, M. Dawson, S.R. Muller (2021). Exploring system thinking leadership approaches to the healthcare cybersecurity environment, Int. J. Extreme Autom. Connect. Healthc. (IJEACH) 3 (2) (2021) 20-32 .
  2. D.K. Wyant, P. Bingi, J.R. Knight, A. Rangarajan (2022). Deter framework: a novel paradigm for addressing cybersecurity concerns in mobile healthcare, Res. Anthol. Secur. Med. Syst. Rec. (2022) 381-407 .
  3. W. Burke, T. Oseni, A. Jolfaei, I. Gondal (2019). Cybersecurity indexes for eHealth, in: Proceedings of the Australasian Computer Science Week Multiconference, 2019, pp. 1-8 .
  4. D. W. Kim, J.Y. Choi and K.H. Han (2020). "Risk management-based security evaluation model for telemedicine systems," BMC Medical Informatics Decision Making, vol.20, no.1, pp.1-14,2020. [doi: 10.1186/s12911-020-01145-7] [Medline: 32522216]
  5. Jofre M, Navarro-Llobet D, Agullo R, Puig J, Gonzalez-Granadillo G, Mora Zamorano J, Romeu R. (2021). Cybersecurity and Privacy Risk Assessment of Point-of-Care Systems in Healthcare-A Use Case Approach. Applied Sciences. 2021; 11(15):6699. https://doi.org/10.3390/app11156699
  6. Mohd Javaid, Abid Haleem, Ravi Pratap Singh, Rajiv Suman (2023). Towards insighting cybersecurity for healthcare domains: A comprehensive review of recent practices and trends, Cyber Security and Applications, Volume 1, 2023, 100016,ISSN 2772-9184, https://doi.org/10.1016/j.csa.2023.100016.
  7. L. Xiao, S. Xie, D. Han, W. Liang, J. Guo et al., (2021). "A lightweight authentication scheme for telecare medical information system," Connection Science, vol.33, no.3, pp.769-785, 2021 [doi: 10.1080/09540091.2021.1889976]
  8. J. Muthing, T. Jaschke and C. M. Friedrich (2017). "Client-Focused Security Assessment of mHealth Apps and Recommended Practices to Prevent or Mitigate Transport Security Issues," JMIR Mhealth Uhealth, vol.5, no.10: e147, 2017 [doi: 10.2196/mhealth.7791]
  9. J. Muthing, R. Brungel and C.M. Friedrich (2019). "Server-Focused Security Assessment of Mobile Health Apps for Popular Mobile Platforms," Journal Medical Internet Research, vol.21, no.1: e9818, 2019 [doi: 10.2196/jmir.9818]
  10. B.M. Silva, J.JPC. Rodrigues, F. Canelo, I.C. Lopes and L. Zhou (2013). "A Data Encryption Solution for Mobile Health Apps in Cooperation Environments," Journal Medical Internet Research, vol.15, no.4: e66, 2013 [doi: 10.2196/jmir.2498]
  11. PILAR Risk Management Tool https://www.pilartools.com/en/