Open Access iconOpen Access

ARTICLE

crossmark

Device Security Assessment of Internet of Healthcare Things

by Abdulaziz Attaallah1, Masood Ahmad2, Md Tarique Jamal Ansari2, Abhishek Kumar Pandey2, Rajeev Kumar2,3,*, Raees Ahmad Khan2

1 Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah-21589, Saudi Arabia
2 Department of Information Technology, Babasaheb Bhimrao Ambedkar University, Lucknow-226025, Uttar Pradesh, India
3 Department of Computer Application, Shri Ramswaroop Memorial University, Barabanki 225003, Uttar Pradesh, India

* Corresponding Author: Rajeev Kumar. Email: email

Intelligent Automation & Soft Computing 2021, 27(2), 593-603. https://doi.org/10.32604/iasc.2021.015092

Abstract

Security of the Internet of Healthcare Things (IoHT) devices plays a vital role in e-healthcare today and there has been a rapid increase in the use of networked devices of IoHT in the present healthcare services. However, these networked devices are also highly vulnerable to attackers who constantly target the security of devices and their components to gain access to the patients’ data. Infringement of patients’ data is not only a violation of privacy but can also jeopardize patients’ health if the health records are tampered with. Once the device has been intruded upon, attackers can not only change the record of the patients but also block and switch off the device. Decidedly, the security of IoHT devices is at a huge risk and needs to be designed, manufactured and networked with more secure mechanisms. In this league, the present study employs a new methodology to assess the privacy and security of the IoHT devices. The study analyses the security defects of the medical devices by enlisting the opinions of the hacking experts. Based on the collated list of defects cited by the experts, the authors have designed a list of criteria and represented the defects in hierarchical format for assessing the security defects in the devices. Thereafter, the Technical for Order Preference by Similarity to Ideal Solution (TOPSIS) method has been used for ranking the security of IoHT devices, based on their security features. The findings of the study iterate that the proposed mechanism would be an efficacious approach for evaluating the security of the medical devices.

Keywords


Cite This Article

APA Style
Attaallah, A., Ahmad, M., Ansari, M.T.J., Pandey, A.K., Kumar, R. et al. (2021). Device security assessment of internet of healthcare things. Intelligent Automation & Soft Computing, 27(2), 593-603. https://doi.org/10.32604/iasc.2021.015092
Vancouver Style
Attaallah A, Ahmad M, Ansari MTJ, Pandey AK, Kumar R, Khan RA. Device security assessment of internet of healthcare things. Intell Automat Soft Comput . 2021;27(2):593-603 https://doi.org/10.32604/iasc.2021.015092
IEEE Style
A. Attaallah, M. Ahmad, M. T. J. Ansari, A. K. Pandey, R. Kumar, and R. A. Khan, “Device Security Assessment of Internet of Healthcare Things,” Intell. Automat. Soft Comput. , vol. 27, no. 2, pp. 593-603, 2021. https://doi.org/10.32604/iasc.2021.015092

Citations




cc Copyright © 2021 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 2557

    View

  • 1163

    Download

  • 2

    Like

Share Link