Securing IoT Devices in Healthcare: Endpoint Protection for Patient Monitoring Systems
Authors: Anjan Gundaboina
DOI: https://doi.org/10.37082/IJIRMPS.v11.i5.232623
Short DOI: https://doi.org/hbhcjp
Country: United States
Full-text Research PDF File:
View |
Download
Abstract: IoT devices in healthcare have made huge strides by enhancing services, monitoring, diagnostics and treatment. Although the exponential rise of smart connected devices has brought forth effective leverage for the industry, particularly in end-point health data collection and transmission, the potential security threats synced to the development are massive. This paper aims to review the steps that can be taken in order to effectively protect IoT endpoints in the context of their use in healthcare and, more particularly, in patient monitoring systems. As a result, this paper aims to identify the possible vulnerabilities, threats, and potential attack surfaces in H-IoT applications. To achieve a robust endpoint protection mechanism, we have developed a five-fold vulnerability management plan that includes device authentication, the secure boot system, encryption of data, the adopted anomaly detection method, and the blockchain-based logging technique. We also assess the superiority of these techniques in real-time data from our simulated healthcare IoT environment and bodily-worn patients’ monitors. An implication is a decreased number of instances of breach of unauthorized access and data alteration and manipulation. This research enlightens the need to apply proper security measures to the health monitoring systems in today’s healthcare networks.
Keywords: IoT Security, Healthcare Systems, Endpoint Protection, Patient Monitoring, Cybersecurity, Medical Devices, Anomaly Detection.
Paper Id: 232623
Published On: 2023-10-15
Published In: Volume 11, Issue 5, September-October 2023
All research papers published in this journal/on this website are openly accessible and licensed under