Abstract
AbstractThe integration of IoT in healthcare has introduced vulnerabilities in medical devices and software, posing risks to patient safety and system integrity. This study aims to bridge the research gap and provide valuable insights for addressing healthcare vulnerabilities and their mitigation mechanisms. Software vulnerabilities related to health systems from 2001 to 2022 were collected from the National Vulnerability Database (NVD) systematized by software developed by the researchers and assessed by a medical specialist for their impact on patient well-being. The analysis revealed electronic health records, wireless infusion pumps, endoscope cameras, and radiology information systems as the most vulnerable. In addition, critical vulnerabilities were identified, including poor credential management and hard-coded credentials. The investigation provides some insights into the consequences of vulnerabilities in health software products, projecting future security issues by 2025, offers mitigation suggestions, and highlights trends in attacks on life support and health systems are also provided. The healthcare industry needs significant improvements in protecting medical devices from cyberattacks. Securing communication channels and network schema and adopting secure software practices is necessary. In addition, collaboration, regulatory adherence, and continuous security monitoring are crucial. Industries, researchers, and stakeholders can utilize these findings to enhance security and safeguard patient safety.
Graphical abstract
Funder
Ministerio de Ciencia e Innovación
Universidad de Murcia
Publisher
Springer Science and Business Media LLC
Subject
Computer Science Applications,Biomedical Engineering
Reference70 articles.
1. Statista (2020) Number of connected devices worldwide 2030 | Statista. Statista Research Department. https://www.statista.com/statistics/802690/worldwide-connected-devices-by-access-technology/ (accessed Aug. 09, 2021).
2. Xiao F, Miao Q, Xie X, Sun L, Wang R (2018) Indoor anti-collision alarm system based on wearable Internet of Things for smart healthcare. IEEE Commun Mag 56(4):53–59. https://doi.org/10.1109/MCOM.2018.1700706
3. “Browse cve vulnerabilities by date.” https://www.cvedetails.com/browse-by-date.php (accessed Mar. 20, 2020)
4. Shamal PK, Rahamathulla K, Akbar A (2018) A study on software vulnerability prediction model, in Proceedings of the 2017 International Conference on Wireless Communications, Signal Processing and Networking, WiSPNET 2017, Institute of Electrical and Electronics Engineers Inc 703–706. https://doi.org/10.1109/WiSPNET.2017.8299852
5. Ruohonen J (2019) A look at the time delays in CVSS vulnerability scoring. Appl Comput Informa 15(2):129–135. https://doi.org/10.1016/j.aci.2017.12.002
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献