Managing the Risks of Emerging IoT Devices

  • Napoleon C. PaxtonEmail author
  • David L. Branca
Part of the Healthcare Delivery in the Information Age book series (Healthcare Delivery Inform. Age)


The Internet of Things (IoT) has opened up limitless possibilities to capture and share data of nearly any electronic device. Inevitably, an increasing number of medical devices will join this emerging trend of device data collection, processing, and sharing due to the enormous potential to enrich lives. Unfortunately, devices connecting to the Internet inherit the fundamental flaws which have plagued the Internet since its inception. These flaws allow cybercriminals to search for, access, exploit, steal, modify, and even destroy data and devices of unsuspecting victims. This is extremely problematic for medical devices, which will contain personal and critical data, specific of the owner it belongs to. In this chapter, we will discuss a subset of security issues concerning the Internet, IoT, and the adoption of IoT-enabled medical devices. We will also discuss proposed solutions to these issues and, in particular, present a network science-based method that has been successfully used to analyze botnets which is one of the major threats posed by IoT devices.


Emerging risks IoT Connecting medical devices Cybercrime Real threats 


  1. A Brief History of NSF and the Internet. (2003). Retrieved from
  2. A Selected History of DARPA Innovation. (2018). Retrieved from
  3. Akpakwu, G. A., Silva, B. J., Hancke, G. P., & Abu-Mahfouz, A. M. (2018). A survey on 5G networks for the internet of things: Communication technologies and challenges. Browse Journals & Magazines, IEEE Access, 6, 3619–3647.CrossRefGoogle Scholar
  4. Amazon Elastic Compute Cloud (Amazon EC2), Cloud Computing Servers. (2014-07-01). Retrieved on 2014-07-01.
  5. Armerding, T. (2018). The 17 biggest data breaches of the 21st century. Retrieved from
  6. Bryner, J. (2009). 40 years ago: The message that conceived the Internet. Retrieved from
  7. Cerf, V. (1990). Thoughts on the national research and education network. Retrieved from
  8. Cerf, V. G., & Kahn, R. E. (1974). A protocol for packet network intercommunication. IEEE Transactions on Communications, 22(5), 637–648.CrossRefGoogle Scholar
  9. Deffree, S. (2017). ARPANET establishes 1st computer-to-computer link, October 29, 1969. Retrieved from
  10. Goldstein, P. (2016). NSFNET served as a precursor to the Internet, helped spur scientific research. Retrieved from
  11. Lomas, N. (2018). Facebook data misuse scandal affects “substantially” more than 50M, claims Wylie. Retrieved from
  12. MERIT Networks, Inc. (1995). NSFNET: A partnership for high-speed networking final report. Retrieved from
  13. NSFNET. (2017). Retrieved from
  14. Palla, G., Derenyi, I., Farkas, I., & Vicsek, T. (2005, June). Uncovering the overlapping community structure of complex networks in nature and society. Nature, 435, 814.CrossRefGoogle Scholar
  15. Perry, P., & Wolfe, P. (2012). Null models for network data. Available at
  16. Postel, J. (1981). NCP/TCP transition plan. Retrieved from
  17. Rosvall, M., & Bergstrom, C. T. (2007). An information-theoretic framework for resolving community structure in complex networks. Proceedings of the National Academy of Sciences of the United States of America, 18, 7327–7331.CrossRefGoogle Scholar
  18. Stewart, W. (2000). The living Internet. Retrieved from
  19. Wang, J., Li, M., Chen, J., & Pan, Y. (2011). A fast hierarchical clustering algorithm for functional modules discovery in protein interaction networks. IEEE/ACM Transactions Computational Biology and Bioinformatics, 8, 607–620.CrossRefGoogle Scholar
  20. Xie, J., Kelley, S., & Szymanski, B. (2012). Overlapping community detection in networks: the state of the art and comparative study. In Social and information Networks. ACM.Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.IOMAXIS, LLCLortonUSA

Personalised recommendations