Managing the Risks of Emerging IoT Devices
Abstract
The Internet of Things (IoT) has opened up limitless possibilities to capture and share data of nearly any electronic device. Inevitably, an increasing number of medical devices will join this emerging trend of device data collection, processing, and sharing due to the enormous potential to enrich lives. Unfortunately, devices connecting to the Internet inherit the fundamental flaws which have plagued the Internet since its inception. These flaws allow cybercriminals to search for, access, exploit, steal, modify, and even destroy data and devices of unsuspecting victims. This is extremely problematic for medical devices, which will contain personal and critical data, specific of the owner it belongs to. In this chapter, we will discuss a subset of security issues concerning the Internet, IoT, and the adoption of IoT-enabled medical devices. We will also discuss proposed solutions to these issues and, in particular, present a network science-based method that has been successfully used to analyze botnets which is one of the major threats posed by IoT devices.
Keywords
Emerging risks IoT Connecting medical devices Cybercrime Real threatsReferences
- A Brief History of NSF and the Internet. (2003). Retrieved from https://www.nsf.gov/news/news_summ.jsp?cntn_id=103050
- A Selected History of DARPA Innovation. (2018). Retrieved from https://www.darpa.mil/Timeline/index.html
- Akpakwu, G. A., Silva, B. J., Hancke, G. P., & Abu-Mahfouz, A. M. (2018). A survey on 5G networks for the internet of things: Communication technologies and challenges. Browse Journals & Magazines, IEEE Access, 6, 3619–3647.CrossRefGoogle Scholar
- Amazon Elastic Compute Cloud (Amazon EC2), Cloud Computing Servers. Aws.amazon.com (2014-07-01). Retrieved on 2014-07-01.
- Armerding, T. (2018). The 17 biggest data breaches of the 21st century. Retrieved from https://www.csoonline.com/article/2130877/data-breach/the-biggest-data-breaches-of-the-21st-century.html
- Bryner, J. (2009). 40 years ago: The message that conceived the Internet. Retrieved from https://www.livescience.com/5839-40-years-message-conceived-internet.html
- Cerf, V. (1990). Thoughts on the national research and education network. Retrieved from https://tools.ietf.org/html/rfc1167
- Cerf, V. G., & Kahn, R. E. (1974). A protocol for packet network intercommunication. IEEE Transactions on Communications, 22(5), 637–648.CrossRefGoogle Scholar
- Deffree, S. (2017). ARPANET establishes 1st computer-to-computer link, October 29, 1969. Retrieved from https://www.edn.com/electronics-blogs/edn-moments/4399541/ARPANET-establishes-1st-computer-to-computer-link%2D%2DOctober-29%2D%2D1969
- Goldstein, P. (2016). NSFNET served as a precursor to the Internet, helped spur scientific research. Retrieved from https://fedtechmagazine.com/article/2016/11/nsfnet-served-precursor-internet-helped-spur-scientific-research
- Lomas, N. (2018). Facebook data misuse scandal affects “substantially” more than 50M, claims Wylie. Retrieved from https://techcrunch.com/2018/03/27/facebook-data-misuse-scandal-affects-substantially-more-than-50m-claims-wylie/
- MERIT Networks, Inc. (1995). NSFNET: A partnership for high-speed networking final report. Retrieved from https://www.nsf.gov/news/special_reports/nsf-net/textonly/related.jsp
- NSFNET. (2017). Retrieved from http://www.internet-guide.co.uk/NSFNET.html
- Palla, G., Derenyi, I., Farkas, I., & Vicsek, T. (2005, June). Uncovering the overlapping community structure of complex networks in nature and society. Nature, 435, 814.CrossRefGoogle Scholar
- Perry, P., & Wolfe, P. (2012). Null models for network data. Available at http://arxiv.org/abs/1201.5871v1
- Postel, J. (1981). NCP/TCP transition plan. Retrieved from https://tools.ietf.org/html/rfc801#page-2
- Rosvall, M., & Bergstrom, C. T. (2007). An information-theoretic framework for resolving community structure in complex networks. Proceedings of the National Academy of Sciences of the United States of America, 18, 7327–7331.CrossRefGoogle Scholar
- Stewart, W. (2000). The living Internet. Retrieved from https://www.livinginternet.com/i/ii_arpanet.htm
- Wang, J., Li, M., Chen, J., & Pan, Y. (2011). A fast hierarchical clustering algorithm for functional modules discovery in protein interaction networks. IEEE/ACM Transactions Computational Biology and Bioinformatics, 8, 607–620.CrossRefGoogle Scholar
- Xie, J., Kelley, S., & Szymanski, B. (2012). Overlapping community detection in networks: the state of the art and comparative study. In Social and information Networks. ACM.Google Scholar