Advertisement

Managing the Risks of Emerging IoT Devices

  • Napoleon C. PaxtonEmail author
  • David L. Branca
Chapter
Part of the Healthcare Delivery in the Information Age book series (Healthcare Delivery Inform. Age)

Abstract

The Internet of Things (IoT) has opened up limitless possibilities to capture and share data of nearly any electronic device. Inevitably, an increasing number of medical devices will join this emerging trend of device data collection, processing, and sharing due to the enormous potential to enrich lives. Unfortunately, devices connecting to the Internet inherit the fundamental flaws which have plagued the Internet since its inception. These flaws allow cybercriminals to search for, access, exploit, steal, modify, and even destroy data and devices of unsuspecting victims. This is extremely problematic for medical devices, which will contain personal and critical data, specific of the owner it belongs to. In this chapter, we will discuss a subset of security issues concerning the Internet, IoT, and the adoption of IoT-enabled medical devices. We will also discuss proposed solutions to these issues and, in particular, present a network science-based method that has been successfully used to analyze botnets which is one of the major threats posed by IoT devices.

Keywords

Emerging risks IoT Connecting medical devices Cybercrime Real threats 

References

  1. A Brief History of NSF and the Internet. (2003). Retrieved from https://www.nsf.gov/news/news_summ.jsp?cntn_id=103050
  2. A Selected History of DARPA Innovation. (2018). Retrieved from https://www.darpa.mil/Timeline/index.html
  3. Akpakwu, G. A., Silva, B. J., Hancke, G. P., & Abu-Mahfouz, A. M. (2018). A survey on 5G networks for the internet of things: Communication technologies and challenges. Browse Journals & Magazines, IEEE Access, 6, 3619–3647.CrossRefGoogle Scholar
  4. Amazon Elastic Compute Cloud (Amazon EC2), Cloud Computing Servers. Aws.amazon.com (2014-07-01). Retrieved on 2014-07-01.
  5. Armerding, T. (2018). The 17 biggest data breaches of the 21st century. Retrieved from https://www.csoonline.com/article/2130877/data-breach/the-biggest-data-breaches-of-the-21st-century.html
  6. Bryner, J. (2009). 40 years ago: The message that conceived the Internet. Retrieved from https://www.livescience.com/5839-40-years-message-conceived-internet.html
  7. Cerf, V. (1990). Thoughts on the national research and education network. Retrieved from https://tools.ietf.org/html/rfc1167
  8. Cerf, V. G., & Kahn, R. E. (1974). A protocol for packet network intercommunication. IEEE Transactions on Communications, 22(5), 637–648.CrossRefGoogle Scholar
  9. Deffree, S. (2017). ARPANET establishes 1st computer-to-computer link, October 29, 1969. Retrieved from https://www.edn.com/electronics-blogs/edn-moments/4399541/ARPANET-establishes-1st-computer-to-computer-link%2D%2DOctober-29%2D%2D1969
  10. Goldstein, P. (2016). NSFNET served as a precursor to the Internet, helped spur scientific research. Retrieved from https://fedtechmagazine.com/article/2016/11/nsfnet-served-precursor-internet-helped-spur-scientific-research
  11. Lomas, N. (2018). Facebook data misuse scandal affects “substantially” more than 50M, claims Wylie. Retrieved from https://techcrunch.com/2018/03/27/facebook-data-misuse-scandal-affects-substantially-more-than-50m-claims-wylie/
  12. MERIT Networks, Inc. (1995). NSFNET: A partnership for high-speed networking final report. Retrieved from https://www.nsf.gov/news/special_reports/nsf-net/textonly/related.jsp
  13. NSFNET. (2017). Retrieved from http://www.internet-guide.co.uk/NSFNET.html
  14. Palla, G., Derenyi, I., Farkas, I., & Vicsek, T. (2005, June). Uncovering the overlapping community structure of complex networks in nature and society. Nature, 435, 814.CrossRefGoogle Scholar
  15. Perry, P., & Wolfe, P. (2012). Null models for network data. Available at http://arxiv.org/abs/1201.5871v1
  16. Postel, J. (1981). NCP/TCP transition plan. Retrieved from https://tools.ietf.org/html/rfc801#page-2
  17. Rosvall, M., & Bergstrom, C. T. (2007). An information-theoretic framework for resolving community structure in complex networks. Proceedings of the National Academy of Sciences of the United States of America, 18, 7327–7331.CrossRefGoogle Scholar
  18. Stewart, W. (2000). The living Internet. Retrieved from https://www.livinginternet.com/i/ii_arpanet.htm
  19. Wang, J., Li, M., Chen, J., & Pan, Y. (2011). A fast hierarchical clustering algorithm for functional modules discovery in protein interaction networks. IEEE/ACM Transactions Computational Biology and Bioinformatics, 8, 607–620.CrossRefGoogle Scholar
  20. Xie, J., Kelley, S., & Szymanski, B. (2012). Overlapping community detection in networks: the state of the art and comparative study. In Social and information Networks. ACM.Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.IOMAXIS, LLCLortonUSA

Personalised recommendations