Abstract
The Internet of Things (IoT) has opened up limitless possibilities to capture and share data of nearly any electronic device. Inevitably, an increasing number of medical devices will join this emerging trend of device data collection, processing, and sharing due to the enormous potential to enrich lives. Unfortunately, devices connecting to the Internet inherit the fundamental flaws which have plagued the Internet since its inception. These flaws allow cybercriminals to search for, access, exploit, steal, modify, and even destroy data and devices of unsuspecting victims. This is extremely problematic for medical devices, which will contain personal and critical data, specific of the owner it belongs to. In this chapter, we will discuss a subset of security issues concerning the Internet, IoT, and the adoption of IoT-enabled medical devices. We will also discuss proposed solutions to these issues and, in particular, present a network science-based method that has been successfully used to analyze botnets which is one of the major threats posed by IoT devices.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
A Brief History of NSF and the Internet. (2003). Retrieved from https://www.nsf.gov/news/news_summ.jsp?cntn_id=103050
A Selected History of DARPA Innovation. (2018). Retrieved from https://www.darpa.mil/Timeline/index.html
Akpakwu, G. A., Silva, B. J., Hancke, G. P., & Abu-Mahfouz, A. M. (2018). A survey on 5G networks for the internet of things: Communication technologies and challenges. Browse Journals & Magazines, IEEE Access, 6, 3619–3647.
Amazon Elastic Compute Cloud (Amazon EC2), Cloud Computing Servers. Aws.amazon.com (2014-07-01). Retrieved on 2014-07-01.
Armerding, T. (2018). The 17 biggest data breaches of the 21st century. Retrieved from https://www.csoonline.com/article/2130877/data-breach/the-biggest-data-breaches-of-the-21st-century.html
Bryner, J. (2009). 40 years ago: The message that conceived the Internet. Retrieved from https://www.livescience.com/5839-40-years-message-conceived-internet.html
Cerf, V. (1990). Thoughts on the national research and education network. Retrieved from https://tools.ietf.org/html/rfc1167
Cerf, V. G., & Kahn, R. E. (1974). A protocol for packet network intercommunication. IEEE Transactions on Communications, 22(5), 637–648.
Deffree, S. (2017). ARPANET establishes 1st computer-to-computer link, October 29, 1969. Retrieved from https://www.edn.com/electronics-blogs/edn-moments/4399541/ARPANET-establishes-1st-computer-to-computer-link%2D%2DOctober-29%2D%2D1969
Goldstein, P. (2016). NSFNET served as a precursor to the Internet, helped spur scientific research. Retrieved from https://fedtechmagazine.com/article/2016/11/nsfnet-served-precursor-internet-helped-spur-scientific-research
https://hitrustalliance.net/documents/content/Securing-Connected-Hospitals.pdf
Lomas, N. (2018). Facebook data misuse scandal affects “substantially” more than 50M, claims Wylie. Retrieved from https://techcrunch.com/2018/03/27/facebook-data-misuse-scandal-affects-substantially-more-than-50m-claims-wylie/
MERIT Networks, Inc. (1995). NSFNET: A partnership for high-speed networking final report. Retrieved from https://www.nsf.gov/news/special_reports/nsf-net/textonly/related.jsp
NSFNET. (2017). Retrieved from http://www.internet-guide.co.uk/NSFNET.html
Palla, G., Derenyi, I., Farkas, I., & Vicsek, T. (2005, June). Uncovering the overlapping community structure of complex networks in nature and society. Nature, 435, 814.
Perry, P., & Wolfe, P. (2012). Null models for network data. Available at http://arxiv.org/abs/1201.5871v1
Postel, J. (1981). NCP/TCP transition plan. Retrieved from https://tools.ietf.org/html/rfc801#page-2
Rosvall, M., & Bergstrom, C. T. (2007). An information-theoretic framework for resolving community structure in complex networks. Proceedings of the National Academy of Sciences of the United States of America, 18, 7327–7331.
Stewart, W. (2000). The living Internet. Retrieved from https://www.livinginternet.com/i/ii_arpanet.htm
Wang, J., Li, M., Chen, J., & Pan, Y. (2011). A fast hierarchical clustering algorithm for functional modules discovery in protein interaction networks. IEEE/ACM Transactions Computational Biology and Bioinformatics, 8, 607–620.
Xie, J., Kelley, S., & Szymanski, B. (2012). Overlapping community detection in networks: the state of the art and comparative study. In Social and information Networks. ACM.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Paxton, N.C., Branca, D.L. (2020). Managing the Risks of Emerging IoT Devices. In: Wickramasinghe, N., Bodendorf, F. (eds) Delivering Superior Health and Wellness Management with IoT and Analytics. Healthcare Delivery in the Information Age. Springer, Cham. https://doi.org/10.1007/978-3-030-17347-0_22
Download citation
DOI: https://doi.org/10.1007/978-3-030-17347-0_22
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-17346-3
Online ISBN: 978-3-030-17347-0
eBook Packages: MedicineMedicine (R0)